G06Q20/401

Authorizing a payment with a multi-function transaction card

A multi-function transaction card may include a card body having dimensions that are in accordance with a standard for transaction cards, an output device on the card body, and a secure element within the card body. The multi-function transaction card may pair, via a wireless connection, the multi-function transaction card with a terminal. The multi-function transaction card may receive, from the terminal, information associated with a transaction. The multi-function transaction card may generate, based on the information associated with the transaction, and using a cryptographic key, an authorization request cryptogram (ARQC), wherein the cryptographic key is stored in the secure element. The multi-function transaction card may generate, based on the ARQC, a machine-readable code. The multi-function transaction card may display, using the output device, the machine-readable code.

TRANSACTION AUTHENTICATION METHOD, SERVER AND SYSTEM USING TWO COMMUNICATION CHANNELS

A transaction method for a user using a first and a second terminal and connected to a server via a first and a second communication channel, respectively. The first terminal sends a transaction amount to the server. The server establishes a verification code whose length depends on the transaction amount, then sends a request to the first terminal and the verification code to the second terminal. The user returns the request filled in with a copied code to the server using the first terminal. The server compares the verification code with the copied code and sends a transaction validation or invalidation message to the first terminal depending on the comparison.

Application Programming Interface (API)-enabled Automated Compliance Verification and Processing

Various aspects of the disclosure relate to automated compliance verification systems for authenticating and verifying compliance associated with electronic transactions. A compliance verification platform may be an intermediary between an application for managing and/or recording transactions and a transaction processing platform for processing a transaction. Based on successful compliance verification and authentication, the compliance verification platform may send notifications to the transaction processing platform to process a transaction requested via the application

METHOD, COMPUTER DEVICE, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM TO AVOID MISDEPOSIT OF VIRTUAL CURRENCY

A method, a computer device, and a non-transitory computer-readable recording medium for preventing an erroneous deposit of cryptocurrency are provided. A method of preventing an erroneous deposit of cryptocurrency includes providing an interface for inputting transaction request information including a target coin and a wallet address; verifying at least one of the target coin and the wallet address using a trading environment of a target exchange corresponding to the transaction request information; and processing a transaction according to the transaction request information based on a verification result.

Specialized transaction execution via assistive devices

Systems, methods, and apparatus are provided for secure transaction execution at an assistive device. Assistive devices include technologies that support people with disabilities in daily tasks, such as mobility aids or vision aids. An assistive device may be preregistered with a financial institution. The financial institution may generate a first hash incorporating a customer identifier and a device identifier. At the time of transaction, an active session may be initiated with the assistive device at a POS terminal, self-service kiosk, or financial institution. The assistive device may use short range wireless communication such as NFC or UWB to transmit the customer identifier and device identifier. A second hash may be generated and compared to the first hash to authenticate the device. Following authentication, the transaction may be completed at the assistive device via user inputs to the assistive device.

Mobile wallet systems and methods using trace identifier using card networks

A mobile wallet computer server receives a fund access request from a user device. The fund access request is made in connection with a payment transaction. The mobile wallet server generates a tokenized card number, transmits the tokenized card number to the user device, and receives receive the tokenized card number from a card network computer system after having been routed from the user device via a merchant computer system and via an acquirer processor computer system. The mobile wallet computer server converts the tokenized card number to the actual credit card account number of the user and transmits the actual credit card account number to the card network computer system to process the payment transaction.

Method, system, and computer program product for identifying a malicious user

A method, system, and computer program product for identifying a malicious user obtain a plurality of service requests for a service provided by a processing system, each service request of the plurality of service requests being associated with a requesting user and a requesting system, and a plurality of service responses associated with the plurality of service requests, each service response of the plurality of service responses being associated with the processing system; and identify the requesting user as malicious based on the plurality of service requests and the plurality of service responses.

Systems and methods for improved verification of transactions

A method for implementing transactions includes receiving, by a first computing system, a transaction request from a second computing system, the transaction request indicating a first account number that is an alias of a transaction account having a second account number, and specifying a transaction. The method further includes determining the second account number by referencing a data structure that associates the first account number and the second account number, determining a verification policy associated with the second account number, and transmitting a verification challenge based on the verification policy. The method yet further includes receiving a response to the verification challenge, determining to authorize the transaction request based on the response to the verification challenge, and implementing the transaction involving the transaction account specified by the transaction request.

Systems and methods for designing, designating, performing, and completing automated workflows between multiple independent entities

A computer-based method is provided for managing a transaction including provision of a process intelligence engine comprising a workflow aligner and process tool box, receiving deal parameters at the process intelligence engine, defining transaction subjects, each requiring the participation of at least one network partner, where each transaction subject is a requirement for achieving the objective of the transaction, defining, for each transaction subject, a plurality of subject goals to be addressed by a network partner, and defining, for each subject goal at least one action item required for satisfying the subject goal. The subject goals are then sequenced by the workflow aligner by defining prerequisites for at least one subject goal and transaction modules are defined based on the sequencing. During execution of a deal using the method, subject goals are not made available until prerequisite subject goals have been completed.

Two level crux chain platform for protecting and verifying blockchain data
11593803 · 2023-02-28 ·

The present invention relates to a two level crux chain platform with a Proof of History (PoH) for increasing security, robustness and/or verifiability of a blockchain includes a first initial block with a node assigned to an address of a shard, a plurality of following blocks comprising a new address for each of the following blocks generated using previous address and previous block head by a ladder swapping protocol, a record stream with a plurality of stream value and each stream value is a current record value hashed with a previous stream value and a blockchain server for storing a plurality of modules.