G06Q20/407

Real-time payment system, method, apparatus, and computer program

Tracking account positions in a real-time payments system is provided. Each of a plurality of participants is linked to a funding agent account via an ACH network, thereby creating a plurality of linked participants. Each of the plurality of linked participants is provided access to a current prefunded position of the funding agent through the ACH network. An unsettled financial position of each of the plurality of participants is compared to the current prefunded position of the funding agent. A determination is made whether to perform a financial settlement for a corresponding one of the plurality of participants based on the comparison. The financial settlement for the corresponding participant is performed when it is determined that the unsettled financial position of the corresponding participant is not greater than the current prefunded position of the funding agent.

Dynamic Question Presentation in Computer-Based Authentication Processes

Methods, systems, and apparatuses are described herein for improving computer authentication processes by dynamically adjusting questions presented during authentication. A request for access to an account may be received. A first authentication question may be generated based on a first transaction of a plurality of transactions associated with an account. Based on whether a response to the first authentication question is correct or not, a second or third transaction of the plurality of transactions may be selected, and a second authentication question might be generated based on the selected transaction. It may be determined whether to provide access to the account based on a response to the second authentication question.

Distributed Ledgers with Ledger Entries Containing Redactable Payloads

The ability to write illegal information or rights holder information into an immutable public ledger is problematic for society. Similarly, the inability to selectively cause funds transfers to be undone currently gives rise to significant abuses. In various embodiments, a processor, can be configured to obtain a ledger entry associated with a distributed ledger. The ledger entry can comprise an assertion authentication value and a reference. Data can be requested based on the reference. When the data is not available, an assertion can be obtained. a result can be generated and then compared. when the result and the assertion authentication value match, a challenge can be computed using a cryptographic system, wherein the challenge is based on the ledger entry. A block that incorporates the ledger entry can be broadcast to securely add the block to the distributed ledger.

Comprehensive tax return preparation system
11544799 · 2023-01-03 · ·

Methods, systems, and apparatus for facilitating interactions between a taxpayer and a tax preparer. The system includes a taxpayer client device configured to provide a graphical user interface to a user for receiving and displaying data in a consistent manner. The system also includes a signature unit configured to receive taxpayer signature data from the taxpayer client device via the graphical user interface. The system also includes a document upload unit configured to receive tax document data from the taxpayer client device via the graphical user interface. The system also includes a secure messaging unit configured to facilitate securely exchanging messages between devices. The system also includes an E-File authorization unit configured to receive taxpayer E-File authorization data from the taxpayer client device via the graphical user interface. The system also includes a payment unit configured to receive payment data from the taxpayer client device via the graphical user interface.

Systems and methods for processing transaction disputes and processing transactions associated with compromised accounts

The present disclosure provides systems and methods for computerized methods and systems for processing transaction disputes and processing transactions associated with compromised accounts. According to one exemplary method, a server receives, from a user device, an instruction for disputing a transaction associated with a user account. The server can initiate, based on a record of the transaction, a dispute investigation, and issue provisional credit to the user account for the transaction. Based on a transaction history associated with the user account, the server can determine a plurality of expected transactions associated with the user account and cause the determined expected transactions to be displayed on the user device. After receiving a transaction authorization for at least one of the plurality of expected transactions, the server can process payments for the at least one of the plurality of expected transactions, and generate a notification indicating a status of the dispute investigation.

CASHLESS PAYMENT SYSTEM AND INFORMATION TERMINAL
20220414644 · 2022-12-29 · ·

A technique in which with respect to cashless payment technique, suitable cashless payment can be carried out with less operation by a user who is a purchaser is provided. An information terminal is configured to: photograph, by a camera, a code of payment destination information posted by a store and a payment amount corresponding to a purchase amount of a product or service on a basis of an operation of a user; issue a payment command in a case where both payment destination information and the payment amount are recognized on a basis of a photographed image, the payment command including the payment destination information and the payment amount; and transmit the payment command to a server to cause the server to execute the cashless payment processing.

SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DETERMINING FRAUD

A method of determining fraud includes: receiving a transaction request associated with a first payment transaction between a merchant and a user from a merchant system; generating a first risk score based on the transaction request and a first set pot of transaction data received prior to the transaction request; processing a transaction request approval based on the first risk score not satisfying a first threshold; receiving a risk score request associated with the first payment transaction, where the risk score request is received after the transaction request has been approved; generating a second risk score based on a second set of transaction data received after the first risk score is determined; and automatically classifying the first payment transaction as potentially fraudulent in response to determining that the second risk score satisfies a second threshold.

Prioritizing Holds When Selecting Transactions for Transaction-Based Knowledge-Based Authentication

Aspects discussed herein may relate to techniques for authenticating a user using transaction-based authentication questions. Hold transactions conducted using a financial account may be identified and verified. The hold transactions may be transactions that do not post to the financial account, and therefore are not provided on any financial account statement. The transaction-based authentication questions may be generated based on the identified and verified hold transactions. The user may be authenticated based on responses by the user to the transaction-based authentication questions. Malicious actors that gain access to financial account statements are unlikely to answer the transaction-based authentication questions correctly as they are based on financial transaction data that is not provided on the financial account statements.

Secondary financial session monitoring across multiple access channels

An example computing device is programmed to: (a) detect an attempt to secondarily access a user account, the user account being involved in an ongoing primary financial session with a primary device; (b) raise the level of authentication required to secondarily access the user account beyond that which was required to access the account for the primary financial session; (c) when successful authentication at the raised level is achieved, permit secondary access to the user account through a secondary financial session and compare one or more user activities occurring during the secondary financial session to a plurality of fraud profiles; and (d) indicate fraud when comparison of the user activity is consistent with one or more of the plurality of fraud profiles.

Error resolution for interactions with user pages

Techniques are disclosed relating to automatically resolving an error in a user interaction with a user page without the user having to disengage from the user page to resolve the error. A monitoring agent may interface with the user page. The monitoring agent may provide an error signal to an error resolution module in response to detecting an error in the user interaction with the user page. The error resolution module may determine a causal factor for the error based on the error signal and contextual data at the time of the error. A resolution flow may be determined based on the causal factor. The resolution flow may be implemented by the monitoring agent contextually within the user page to resolve the error without the user disengaging from the user page.