G06Q20/409

Reducing false positive fraud alerts for online financial transactions

In a method of preventing fraudulent online financial transactions, a request to authorize an online, financial transaction may be received, where the transaction is associated with a debit or credit card account. A computing device at which information associated with the debit or credit card account was entered for the transaction may be identified, and a first geographic location at which the computing device resides may be determined. Based upon geolocation data indicating one or more geographic locations of the authorized cardholder, it may be determined that the authorized cardholder was at a second geographic location at a time of the transaction. If the second geographic location does not correspond to the first geographic location, the financial transaction may be prevented from being executed.

IDENTIFYING ELECTRONIC DEVICES USING TEMPORALLY CHANGING INFORMATION

Described are systems and methods to verify the identity of an evaluated device that has been previously identified and evaluated remotely from a reader device. The reader device obtains from an evaluated device temporally changing information, where the temporally changing information includes a unique identifier associated with the evaluated device and a proximity indication. The reader device verifies the temporally changing information by verifying that the unique identifier is contained in the temporally changing information, that the unique identifier is stored in a database associated with the reader device, and that the temporally changing information includes the proximity indication indicating that the evaluated device and the reader device are proximate to each other. Upon verifying the temporally changing information, the reader device obtains the price of the evaluated device, based on the unique identifier associated with the evaluated device. Upon obtaining the price of the evaluated device, the system compensates a user associated with the evaluated device.

AUTHENTICATION WITH OFFLINE DEVICE
20230216844 · 2023-07-06 · ·

A first user device can transmit an interaction request to a remote computer via a long range communication channel. The first user device can receive an authentication request message from the remote computer and can then transmit the authentication request message to a second user device via a short range communication channel. The first user device can then receive an authentication response message comprising a response value from the second user device via the short range communication channel. The first user device can then transmit the authentication response message to the remote computer causing the remote computer to verify the response value and perform further processing if the response value is verified.

KEY-VALUE MAP COMMITMENTS SYSTEM AND METHOD

A method includes a validation computer receiving an authorization request message comprising a user state and a user proof from a user device. The user state comprises first and second user state elements. The user proof comprises first, second, and third user proof elements. The validation computer computes a first verification value by multiplying the first user proof element raised to the power of the second user state element, and the second user proof element raised to the power of the first user state element. The computer computes a second verification value by raising the second user proof element to the power of the second user state element. The computer compares the first verification value to a first accumulated state element of an accumulated state. The compares the second verification value to a second accumulated state element. The validation computer authorizes the authorization request message based on the comparison steps.

SYSTEM AND METHOD FOR PROVIDING A REAL-TIME PAYMENT BETWEEN A CUSTOMER FINANCIAL INSTITUTION ACCOUNT AND A MERCHANT FINANCIAL INSTITUTION ACCOUNT FOR A TRANSACTION BASED ON A DIRECT COMMUNICATION BETWEEN A USER DEVICE AND A POINT-OF-SALE DEVICE

Systems and methods are disclosed for providing a payment authorization to a real-time payment (RTP) network to initiate an RTP between a customer financial institution account and a merchant financial institution account. One method performed by a payment facilitator device includes, based on a user device of a customer and a point-of-sale (POS) device of a merchant performing a direct communication regarding a transaction, receiving a payment request for a transaction amount of the transaction and receiving a customer authorization for the transaction. The payment facilitator then provides a payment authorization to an RTP network to initiate an RTP for the transaction amount of the transaction from a customer financial institution account to a merchant financial institution account, based on receiving the customer authorization for the transaction.

BANK-BASED ONBOARDING FOR MERCHANT INTEGRATION

Embodiments disclosed are directed to a computing system that performs steps for entity integration. The computing system receives, from a user device, an electronic request to associate a first online account of a user associated with a first entity with a second online account of the user associated with a second entity. The computing system authenticates the user device to verify that an identity of the user is authentic. The computing system determines whether the second online account exists and, if so, identifies a match between a first user property of the first online account and a second user property of the second online account. Based on the identified match, the computing system links the first online account with the second online account and updates, based on a first online account property of the first online account, a second online account property of the second online account.

Securing an exchange item associated with fraud

A method for execution by a marketplace server includes detecting fraudulent acquisition of an exchange item by a first computing device, where the exchange item has a static identifier (ID) and a dynamic ID that is generated based on exchange item security parameters associated with the exchange item. The method further includes deactivating the dynamic ID and the exchange item security parameters in response to the detecting fraudulent acquisition, where the static ID of the exchange item remains active and valid. The method further includes generating second exchange item security parameters for the exchange item. The method further includes generating a second dynamic ID based on the second exchange item security parameters, where the second dynamic ID establishes the exchange item for utilization in an exchange item marketplace network. The method further includes updating a record in a marketplace database to include the second dynamic ID.

System and method for integrated application and provisioning

The present disclosure involves systems, software, and computer implemented methods for generating new credit accounts for immediate availability for use in current online transaction. One example process includes identifying a request to perform a credit application process associated with a particular user via a client application. A first signal can be transmitted that includes a redirect instruction for the client application to a credit application site to perform a credit application process. A second signal can be transmitted that includes a merchant-specific identifier of the particular user and a request to perform the credit application process. A third signal can be received from the credit application site that includes an approval, a payment credential associated with a newly created credit account, and the merchant-specific identifier of the particular user. The payment credential can be associated with the user profile of the user corresponding to the merchant-specific identifier.

Constraining transactional capabilities for contactless cards

Systems, methods, articles of manufacture, and computer-readable media. A communications interface may receive an indication that a server preauthorized a transaction. The communications interface may receive, from a point of sale device, an indication to pay for the transaction. The contactless card may determine, based on rules stored in the memory, that the location of the mobile device is within one or more locations the contactless card is permitted for use. The contactless card may generate transaction data comprising: indications of an account number and an expiration date of the contactless card, and the indication of the preauthorization. The contactless card may transmit the transaction data to the POS device as payment for the transaction. The server may authorize payment for the transaction using at least a portion of the transaction data based at least in part on identifying the indication of the preauthorization in the transaction data.

Digital payments linked to geographic locations
11694191 · 2023-07-04 · ·

Electronic transfers of value may be secured via verification of locations of parties, and/or progressive trust building, while maintaining privacy of sensitive personal information of parties via separate communications by parties with a payment network server. Locations may be fixed geolocations, proximities, and/or positions relative to markers/beacons that are in motion. Transfers may be made from party to party, party to place and place to party, and/or party to a virtual point-of-sale at a place. Transferred items may be electronic funds in fiat and/or crypto currencies, Non-Fungible Tokens (NFTs)/data associated NFTs, electronic data, and/or securities/financial instruments, for example. Transactions may be multiparty and may comprise multiple exchanges of value.