G06Q20/357

Token management and handling system

Systems and methods for handling tokens. In one aspect, a token is intercepted by a data processor and a contact is made with a detokenization provider by the data processor. In another aspect, token service is aggregated. In another aspect, tokenization is extended to physical cards, to deter certain kinds of fraud.

Portable electronic device, non-contact communication system, and non-contact communication method

A portable electronic device of an embodiment includes a plurality of secure elements and a communicator. The communicator performs communication with a reader/writer device to which an external device is connected using non-contact communication. The communicator changes a transmission destination to a secure element corresponding to a transmission destination identifier for identifying the transmission destination among the plurality of secure elements on the basis of the transmission destination identifier and change-instruction-information giving instructions to change the transmission destination, assigned to telegraph data received from the reader/writer device using the non-contact communication and transmits the telegraph data received from the reader/writer device to the secure element.

Multi-address population based on single address
10917238 · 2021-02-09 · ·

A physical card (in some cases without any on-board source of power or computing capabilities) is configured to maintain access information for digital bearer assets. The physical card may include disposed thereon a single address operable to receive digital bearer assets in one or more transactions on a decentralized computing platform, like a blockchain-based decentralized computing platform. Other decentralized computing platforms utilize different address generation protocols, thus preventing use of a single address on those other platforms. A set of addresses is generated, each address corresponding to a given decentralized computing platform. Each address is based on a same underlying key-pair, and a primary address is selected from the set for a given card. The remaining addresses in the set are stored, without storage of the public key or private key, and returned in a response to a request for additional addresses of the currency card.

SYSTEMS AND METHODS FOR TRACKING AND LOCATING TRANSACTION CARDS

Systems, methods, and apparatuses for tracking and monitoring a transaction card are provided. A method includes receiving a control parameter indicative of normal operation of a transaction card; acquiring operational data regarding operation and usage of the transaction card; comparing the operational data to the control parameter; responsive to the comparison, determining one of normal operation and non-normal operation of the transaction card; and, causing at least one response based on the determination, the at least one response structured to notify a user associated with the transaction card of the determination.

CHECKOUT DEVICE AND PROGRAM
20230419293 · 2023-12-28 ·

According to an embodiment, a checkout device includes a processor configured to acquire an identifier value identifying a customer by member type and then acquire payment method options available to the customer for settlement of a sales transaction according to the identified member type. The processor then causes a display unit to display a selection screen on which the acquired payment method options available to the customer are selectable. The processor may then receive a selection input of a payment method from among the selectable payment method options, then perform settlement using the selected payment method.

COMPUTER-BASED SYSTEMS AND METHODS INVOLVING BIOMETRIC AUTHENTICATION ASPECTS FOR HANDLING EXCEPTIONS, ENABLING DEACTIVATION AND/OR PERFORMING OTHER FUNCTIONALITY
20210216840 · 2021-07-15 ·

Systems and methods involving biometric authentication of transaction cards including aspects of exception handling, deactivation and other features are disclosed. In one embodiment, an exemplary computer-implemented method may comprise generating a first user interface having one or more interactive UI elements that enable a card owner to manage a plurality of features associated with a transaction card, and determining, if a biometric-activated control is enabled and the vendor is not excluded from the biometric-activated control, whether the transaction card is biometrically-active. Further, the interactive UI elements may include elements such as a first UI element that is configured to allow the card owner to enable a biometric-activated control of the transaction card, and/or a second UI element that is configured to allow the card owner to exclude one or more vendors from the biometric-activated control.

CONVERGED PAYMENT CREDENTIAL
20210216982 · 2021-07-15 ·

A physical credential includes a first core stock layer provisioned in accordance with a first architecture defining an arrangement of embedded identity attributes with respect to X-Y coordinates of the physical credential. An inlay card layer is affixed to the first core stock layer and includes one or more wire-based antennas. A core stock layer is affixed to the inlay card layer and provisioned in accordance with a second architecture defining an arrangement of embedded security attributes with respect to the X-Y coordinates. The second architecture defines one or more constraints with the first architecture with respect to the X-Y coordinates. The core stock layer includes a semiconductor chip electrically coupled to the one or more wire-based antennas. A personalization layer is affixed to the core stock layer and includes one or more of the identity attributes embedded in compliance with the first architecture and the second architecture.

Payment card with user feedback

Aspects described herein may allow for method of detecting when a payment card is in a retail establishment by establishing communication between the payment card and a real-time position tracking system; determining whether one of a plurality of accounts linked to the payment card has been used in one or more prior purchasing transactions in the retail establishment; detecting, movement of the payment card with respect to the individual carrying the payment card while the payment card is in a carrying device carried by the individual; and providing, by the payment card, haptic feedback and visible feedback to the individual carrying the payment card.

System and Computer Implemented Method for Sharing Expenses Using a Dual-Chip Payment Card

The present disclosure relates to a transaction processing system and a method for sharing expenses among multiple peers using a dual-chip payment card. The method includes receiving a request for creating a temporary pool session for a plurality of users from one of the plurality of users having a dual-chip payment card. In response to the request, the method includes creating the temporary pool session, holding a proportional credit amount of each of the plurality of users. Subsequently, the method includes associating the temporary pool session with a secondary chip of the dual-chip payment card of at least one of the plurality of users. Finally, the method includes processing one or more transaction requests received through the secondary chip of the dual-chip payment card of at least one of the plurality of users, using the temporary pool session.

TAMPER-EVIDENT VERIFICATION OF AN ARTICLE OF MANUFACTURE
20210004776 · 2021-01-07 ·

An instance of a physical product includes a verification code and a unique identifier disposed thereupon by which authenticity or condition of the instance may be determined. The combination may be uniquely associated with the instance and stored, by the issuer or manufacturer for each authentic instance, locally or within a decentralized computing system having an immutable data store. The verification code may be concealed by a tamper-evident component such that access of the verification code is evident upon visual inspection. Verification may require revealing of the verification code with tamper-evidence and submission of a request including the verification code and the unique identifier (or representation thereof) to receive a verification result. Each request to verify an instance may be recorded and returned with a next request for verification of the same instance of the product to indicate whether another entity has already performed a verification.