G06Q20/356

Dynamically configurable transaction management controller and method thereof

Technologies for managing payment authorization request messaging for payment transactions include a transaction management controller. The transaction management controller receives a transaction amount for a payment transaction from a business management engine and a payment transaction type from a point of interaction device. The transaction management controller initializes a transaction processing module that corresponds to the received payment transaction type. The transaction processing module defines payment processing parameters for processing payment transactions of the payment transaction type. One or more of the payment processing parameters are modified based on configuration data received from a remote configuration device. The transaction management controller processes the payment transaction as a function of the payment processing parameters. Other embodiments are described and claimed.

Secure in-line payments for rich internet applications

Methods and systems are provided for making secure financial transactions, such as purchase payments, using rich Internet applications (RIA) running an RIA runtime (also referred to as a platform or framework) on the user's smart phone or other mobile device. Embodiments differ from the usual way of re-directing a user from a third-party application and authenticating the user by providing secure in-line payments from a rich Internet application running on an RIA runtime. A system includes: a mobile device executing a rich Internet application running on an RIA runtime; a payment library communicating with the RIA runtime and a service provider, for which the payment library communicates with the service provider to authenticate the rich Internet application; and in response to authentication by the service provider, facilitates secure financial transactions via the rich Internet application.

Systems and methods of push-based verification of a transaction

A system and method of implementing an API of an authentication service includes implementing a confirmation API, wherein the implementing includes: initiating a confirmation API request based on receiving an access request, wherein the confirmation API request operates to perform an authentication of a requestor making the access request; identifying the requestor based on a search of the requestor via the confirmation API; identifying, by one or more API endpoints of the remote authentication service: (i) a subscriber account of the subscriber maintained by the remote authentication service and (ii) identifying a user device of the requestor that is enrolled with the subscriber account based on the confirmation API request; transmitting a confirmation request to the user device; obtaining from the user device a response to the confirmation request and presenting the response to the confirmation request to the subscriber; and granting or denying the access request.

DIGITAL ASSET DISTRIBUTION BY TRANSACTION DEVICE

A user can associate a digital asset corresponding to a value with a transaction device to be used by another user. For example, a first user can load a digital asset corresponding to a cryptocurrency amount onto a transaction device, where the first user then provides the transaction device to a second user. The second user can utilize the cryptocurrency amount on the transaction device to conduct a transaction. The generation and use of digital assets can be managed using ledgers that store data in the form of block chains.

HARDWARE WALLET FOR CRYPTOCURRENCY
20230206222 · 2023-06-29 ·

The invention relates to hardware and software for data storage and consummation of digital transactions in peer-to-peer environments, primarily for making cryptocurrency payments. The technical result consists in higher security for using a hardware wallet. 3 sub-claims.

Method and system for secure transactions
09852426 · 2017-12-26 · ·

This invention relates to systems and methods for authenticating transactions using a mobile device based primarily on the introduction of a layer of middleware and wherein the Payment Networks, Merchants, Issuing Banks, Credit Reporting Bureaus, Insurance Companies, Healthcare Providers may customize the implementation of the services based on individual strategy and consumer preferences.

Card reader based payment transactions from a web browser

This disclosure relates to systems and methods for processing electronic payments for customer purchases. In some implementations, a mobile computing device receives a payment request identifying a sales transaction between a merchant and a customer. The payment request indicates a purchase amount owed by the customer to the merchant, and carries a set of instructions. The mobile computing device activates a card reader based at least in part on the set of instructions, receives customer authorization for electronic payment of the purchase amount, instructs the card reader to process a credit card for the purchase amount based on receiving the customer authorization, and receives confirmation of payment of the purchase amount from the card reader.

Systems and Methods for Use in Evaluating Vulnerability Risks Associated With Payment Applications
20170353482 · 2017-12-07 ·

Disclosed are exemplary embodiments of systems and methods for evaluating payment applications based on associated vulnerability risks. In an exemplary embodiment, a method generally includes soliciting, by a computing device, application data associated with a payment application via a vulnerability questionnaire interface, validating, by the computing device, the application data against criterion, and determining, by the computing device, a vulnerability risk score of the application based on the application data. The method also includes approving, by the computing device, the application when the vulnerability risk score satisfies an approval threshold, denying, by the computing device, the application when the vulnerability risk score satisfies a denial threshold, and referring, by the computing device, the application for manual decision when the vulnerability risk score satisfies a manual decision threshold.

Extensible Interface for Synchronous and Asynchronous Payment

An applications programming interface (API) or other interface may be configured for use with a plurality of e-commerce applications and/or a plurality of payment systems. The API may be associated with an operating system of a client or may be otherwise located in an e-commerce system or network. The API may receive a call regarding a purchase transaction. The purchase transaction may be examined to determine if a payment method is synchronous or asynchronous. An appropriate payment system may be activated to perform the purchase transaction based at least in part on the determination made by the examination of the purchase transaction. A result of the purchase transaction may be sent to the e-commerce program. By revision of the API, developers of e-commerce applications are freed from the burden of revising code in response to the need to utilize additional or differently operated payment systems.

Systems and methods for deploying enterprise software updates
11675579 · 2023-06-13 · ·

Systems and methods for deploying enterprise software updates are provided. At a server storing applications and a record of client devices is provided. Each application includes a corresponding group identifier indicating a group associated with an application and a corresponding version identifier indicating a version of the application. The record includes the deployment identifier for each application in the plurality of applications installed on each device. A first application having a first group identifier and a first version identifier, and a second application having the first group identifier and a second version identifier is installed in each respective device. An update for the first application is received at the server, which includes modifying the version identifier of the first application. The update for the first application is communicated to each device. For each respective device, a modification of the deployment identifier indicates which application is executable on the respective device.