G06Q20/354

System for packaging, processing, and activating a bundled greeting and gift card
11756027 · 2023-09-12 · ·

A greeting card stored-value card combinations and methods of forming said combinations are provided. In one embodiment, these combinations include a greeting card comprising means for affixing a stored-value card thereto. These combinations also include a stored-value card affixed to the greeting card. A single identifier, such as a Stock-Keeping Unit (SKU) or a Universal Product Code (UPC), is assigned to the bundle that uniquely identifies the bundled greeting card and stored-value card. The single identifier provides identification means allowing the stored-value card to be activated. A single capture of the single identifier enables the customer to both purchase the greeting card stored-value card combination product as well as to activate the store-value card.

BOOKING MANAGEMENT SYSTEM

A booking management system for secure authentication of payment information and delayed transaction processing is provided. Third-party services partner with booking management systems to aggregate and list offerings of the third-party services in a digestible display on a one-stop platform. A booking management system can manage the authentication of payment card information on behalf of any number of such third-party services. The booking management system may receive a delayed transaction request from one or more such third-party service. The booking management system may provide virtual payment information to the third-party services for delayed transactions. The third-party services may later initiate the delayed transactions using the virtual payment information, without being required to perform authentication processing on the payment card information maintained by the booking management system.

Computer-based systems and methods involving biometric authentication aspects for handling exceptions, enabling deactivation and/or performing other functionality
11748589 · 2023-09-05 · ·

Systems and methods involving biometric authentication of transaction cards including aspects of exception handling, deactivation and other features are disclosed. In one embodiment, an exemplary implementation may involve generating a first user interface having one or more interactive UI elements that enable a card owner to manage a plurality of features associated with a transaction card, and determining, if a biometric-activated control is enabled and the vendor is not excluded from the biometric-activated control, whether the transaction card is biometrically-active. Further, the interactive UI elements may include elements such as a first UI element that is configured to allow the card owner to enable a biometric-activated control of the transaction card, and/or a second UI element that is configured to allow the card owner to exclude one or more vendors from the biometric-activated control.

IN-STORE CARD ACTIVATION
20230153791 · 2023-05-18 ·

A user having an account with a payment provider receives an unregistered payment card that is associated with the payment provider, and that includes a magnetic strip encoded with a number unique to the card and a machine readable code such as a QR/barcode embossed thereon. The user may then open an application on the user's mobile device to capture the number associated with the card by, for example, scanning the QR/barcode, capturing an image of the number, speaking the number into the device, or manually entering the number into the user's device. The user may also authenticate with the payment provider by entering login credentials. The user may then confirm a request to link the number of the card with the user's payment provider account, which activates and links the card to the user account so that the user can immediately use the card for purchases.

SYSTEM AND METHOD FOR NEAR FIELD COMMUNICATIONS PAYMENT
20230140038 · 2023-05-04 ·

A card detection subsystem for control of a payment card reader, where the payment card reader comprises a magnetic stripe reader (MSR), an integrated circuit card (ICC) reader, and a near field communications (NFC) reader, and the NFC reader comprises an antenna. The card detection subsystem includes a processor, a storage, and one or more sensors. The one or more sensors detect a payment card and the antenna is either turned on or turned off based on the detection of the payment card.

TRANSACTION CARDS AND COMPUTER-BASED SYSTEMS THAT PROVIDE FRAUD DETECTION AT POS DEVICES BASED ON ANALYSIS OF FEATURE SETS AND METHODS OF USE THEREOF
20220405762 · 2022-12-22 ·

Transaction cards, systems and methods for performing fraud detection at POS devices based on analysis of feature sets are disclosed. In one embodiment, an exemplary transaction card may comprise one or more sensors configured to collect pre-card-use sensor data regarding a user of the card, circuitry that assembles such data into feature sets and performs fraud detection, and data storage. According to some aspects, the fraud detection may include comparing user specific sensor data, collected for a current transaction, to a user-specific risk profile validation model to determine a risk score for the current transaction, and transmitting the risk score to a card transacting device when a card is presented during a transaction. In some implementations, the risk score may enable the card transacting device to evaluate a risk associated with accepting the transaction card to complete the attempted transaction.

Systems and methods for content management using contactless cards

Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.

VIRTUALIZED MAGNETIC PLAYER CARD
20230360480 · 2023-11-09 ·

A method of implementing a player tracking system in a gaming network includes receiving a virtual player tracking card identifier and a virtual player tracking card password, authenticating the identifier and the password; receiving a virtual player tracking card PIN, identifying a gaming machine that transmitted the virtual player tracking card PIN, and crediting an account associated with the virtual player tracking card PIN based on game play on the gaming machine.

Method and system for providing financial transaction using empty card
11816657 · 2023-11-14 · ·

A method and a system for providing a financial transaction using an empty card are provided. The method for providing a financial transaction using an empty card includes receiving, by a server, a virtual card number generated by a program included in a user terminal, searching, by the server, for an empty card storage location at which the empty card is registered, in a storage location search algorithm based on the virtual card number, searching, by the server, for a real card number storage space linked to a user identification (UID) assigned to the found empty card storage location, extracting, by the server, a real card number stored in the real card number storage space, and performing, by the server, a financial transaction progress or a financial transaction progress request with the extracted real card number.

AUTHORIZATION CONTROL NETWORK AND METHOD OF VALIDATING AN AUTHORIZATION REQUEST

An authorization control network includes a limit profile database and at least one computer server. The server(s) receives an account identifier and a datum from a communications device, and associates the datum with the account identifier in a limit profile record of the limit profile database. The server(s) also receives the account identifier and a transaction limit, and associates the transaction limit with the account identifier in the limit profile record. The server(s) then receives from a POS device an authorization request that includes the account identifier and an authorization amount. If the server(s) confirms that the authorization amount does not exceed the transaction limit that is associated with the account identifier in the limit profile record and does not exceed an available credit limit that is associated with the account identifier, the server(s) transmits to the POS device an authorization response that confirms authorization of the authorization amount.