Patent classifications
G06Q20/403
METHOD AND APPARATUS FOR DETECTING SUSPICIOUS ACTIVITY USING VIDEO ANALYSIS
A system detects a transaction outcome by obtaining video data associated with a transaction area and analyzing the video data to obtain at least one video transaction parameter concerning transactions associated with the transaction area. The transaction area can be a video count of items indicated in the video data as detected by an automated item detection algorithm applied to the video data. The system obtains at least one expected transaction parameter concerning an expected transaction that occurs in the transaction area, such as a scan count of items scanned at a point of sale terminal. The system automatically compares the video transaction parameter(s) to the expected transaction parameter(s) to identify a transaction outcome that may indicate fraudulent activity such as sweethearting in a retail environment.
Systems and methods for partial authorization of electronic transactions
A method for managing payment submissions includes receiving, at an acquirer computing system, an authorization request submitted by a merchant computing system for a transaction of a predefined amount, the merchant computing system being associated with a merchant, and the authorization request identifying account information for an account that is associated with a payment card network and an issuer processor; and re-transmitting the authorization request for less than the predefined amount and greater than a configurable threshold value, until the authorization request is approved by the issuer processor or until the authorization request falls below the configurable threshold value.
System and method for processing a card-not-present payment transaction by a purchaser using a friend's card for obtaining a reward
A server and method for processing a card-not-present transaction whereby a purchaser selects to use one or more friends' card to obtain a reward is disclosed. The server comprises at least a computer processor to: (i) receive, from a merchant server, a payment request including a contact mechanism for the friend(s); (ii) send a selection request to the friend(s) using the contact mechanism; (iii) receive, from the friend(s) a selection response including card number(s) eligible for the reward; (iv) request the issuer server(s) for authentication and blocking the amount; (v) track a cumulative amount dynamically and repeat steps (iii) and (iv) until equal to or greater than the payment amount; (vi) generate a virtual card number for one time use based on the card number(s); and (vii) send a payment response to the merchant server including the virtual card number for the purchaser to complete the transaction.
PROVIDING A CUSTOMER WITH A NUMBER OF PAYMENT SCENARIOS
A system and method for providing a customer with a number of payment scenarios is disclosed. The method receives at a payment provider computing system an inquiry about a payment scenario for a customer, the inquiry including identification information for the customer, utilizes the identification information to perform a credit prescreen, and generates, based on a result of the credit prescreen, a plurality of payment scenarios with associated terms. The plurality of payment scenarios with associated terms is then provided to the customer and the customer selects the desired payment scenario. An agreement with the associated terms of the payment scenario is generated and provided to the payment provider computing system. The mobile device provides the selected payment scenario to a retail computing system during a checkout process and the transaction is completed.
Resource transferring monitoring method and device
Methods and apparatus, including computer programs encoded on computer storage media, for monitoring resource transfer are provided. One of the methods includes: by a server, receiving a resource deposit request from a resource deposit initiator; performing, using a first risk identification model, a first risk identification on the target account according to the resource deposit request to obtain a first risk identification result; receiving a resource withdrawal request from a resource withdrawal initiator, and the resource withdrawal request requesting a resource withdrawal from the target account to the recipient account; performing, using a second risk identification model, a second risk identification on the target account according to the resource withdrawal request to obtain a second risk identification result; and determining, using a third risk identification model, a resource transfer risk monitoring result of the target account according to the first risk identification result and the second risk identification result.
Platform for building decentralized applications
An example system can include: at least one processor; and non-transitory computer-readable storage storing instructions that, when executed by the at least one processor, cause the system to: provide a workflow to add a verifiable credential on a client device, the workflow generating the verifiable credential according to parameters defined by an entity associated with the verifiable credential; populate the verifiable credential in a wallet on the client device, the wallet; and surface the verifiable credential from within the wallet when a request for the verifiable credential is received.
Cryptocurrency loyalty program based on transactional data
Introduced here are computer programs and associated computer-implemented techniques for purchasing, selling, and/or transferring cryptocurrency to be disbursed as a reward for using a specialized payment card. The technology allows cardholders to receive cryptocurrency for completing transactions with specialized payment cards without requiring the card-issuing financial institution directly issue the cryptocurrency.
Computationally Efficient Transfer Processing and Auditing Apparatuses, Methods and Systems
The Computationally Efficient Transfer Processing, Auditing, and Search Apparatuses, Methods and Systems (“SOCOACT”) transforms smart contract request, crypto currency deposit request, crypto collateral deposit request, crypto currency transfer request, crypto collateral transfer request inputs via SOCOACT components into transaction confirmation outputs. Also, SOCOACT transforms transaction record inputs via SOCOACT components into matrix and list tuple outputs for computationally efficient auditing. A blockchain transaction data auditing apparatus comprises a blockchain recordation component, a matrix Conversion component, and a bloom filter component. The blockchain recordation component receives a plurality of transaction records for each of a plurality of transactions, each transaction record comprising a source address, a destination address, a transaction amount and a timestamp of a transaction; the source address comprising a source wallet address corresponding to a source digital wallet, and the destination address comprising a destination wallet address corresponding to a destination virtual currency wallet; verifies that the transaction amount is available in the source virtual currency wallet; and when the transaction amount is available, cryptographically records the transaction in a blockchain comprising a plurality of hashes of transaction records. The Bloom Filter component receives the source address and the destination address, hashes the source address using a Bloom Filter to generate a source wallet address, and hashes the destination address using the Bloom Filter to generate a destination wallet address. The Matrix Conversion component adds the source wallet address as a first row and a column entry to a stored distance matrix representing the plurality of transactions, adds the destination wallet address as a second row and column entry to the stored distance matrix representing the plurality of transactions, adds the transaction amount and the timestamp as an entry to the row corresponding to the source wallet address and the column corresponding to the destination wallet address; and generate a list representation of the matrix, where each entry in the list comprises a tuple having the source wallet address, the destination wallet address, the transaction amount and the timestamp.
SYSTEM AND METHOD FOR GENERATING DATA TRANSFER RECOMMENDATIONS
A server computer system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to analyze historical data transfers within one or more resource accounts to generate a data budget; receive a signal indicating a data transfer request; analyze the data transfer request and, based on the data budget, determine an affordability of the data transfer; responsive to determining that the data transfer is not affordable from one of the resource accounts, generate one or more recommendations to afford the data transfer; and send, via the communications module and to a computing device, a signal causing the computing device to display a notification that includes the one or more recommendations to afford the data transfer.
Data interaction method and device, and offline credit payment method and device
Implementations of the present application provide data interaction and offline credit payment methods and devices. In one implementation, a credit payment code generated by a server is obtained by scanning and parsing a two-dimensional code presented on a mobile computing device for making a payment. The credit payment code is then decrypted based on asymmetric key decryption to obtain a credit payment token. The credit payment token is parsed to obtain security content included in the credit payment token. The payment associated with the credit payment code is then determined to satisfy the security content and the payment is verified with the server that generates the credit payment code at a predetermined time.