Patent classifications
G06Q20/409
SYSTEMS AND METHODS TO PERFORM CONTACTLESS CARD ACTIVATION
Example embodiments relate to performing activation techniques for contactless cards. For example, embodiments may include performing a near-field communication (NFC) exchange with a contactless card, processing a message comprising data to activate the contactless card, communicating the data to a server to activate the contactless card; and receiving a response from the server, the response to indicate whether the contactless card is successfully activated or not successfully activated.
Method and system for authentication of coupons via blockchain
A method for authentication of coupons using a blockchain includes: storing transaction data for a payment transaction, wherein the transaction data includes at least a transaction amount; receiving an identification value; receiving a block included in a blockchain, wherein the block includes at least a block header and a plurality of transaction values, each transaction value including at least a coupon identifier and coupon data; executing a query on the received block to identify a specific transaction value of the plurality of transaction values where the included coupon identifier corresponds to the received identification value; and executing a query on the memory to update at least the transaction amount included in the stored transaction data based on the coupon data included in the identified specific transaction value.
Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods
Systems, methods, and software are disclosed for provisioning tokens in a networked computing environment including merchants participating in payment networks. The method includes receiving, by a merchant processor, card account data of a purchase card from a cardholder. The method includes determining, by the merchant processor, that the card account data includes a multi-token enabled BIN. The method includes, in response to determining that the card account data includes the multi-token enabled BIN, receiving and storing, by the merchant processor and in a memory of the merchant, respectively, a primary token associated with a front-of-card brand of the purchase card. The method includes, in response to receiving the primary token, transmitting, by the merchant processor, a request for a secondary token. The method includes receiving and storing, by the merchant processor and in the merchant memory, respectively, the secondary token simultaneously with storing the primary token.
Edge Device Machine Learning
Techniques are disclosed in which a computing device repeatedly trains, using a stream of user data received at the computing device, a baseline model to generate a device-trained model, wherein the baseline model is trained at the computing device without providing user data included in the stream to a server computer system. In some embodiments, the computing device inputs, to the device-trained model, a set of characteristics associated with a user request received from a user of the computing device, wherein the device-trained model outputs a score for the user request. In some embodiments, the computing device transmits, to the server computer system, the score for the user request, wherein the transmitting includes requesting a decision for the user request. In some embodiments, the computing device performs an action associated with the user request in response to receiving a decision for the user request from the server computer system.
DYNAMICALLY SHARING AN EXCHANGE ITEM
A method includes receiving, by a marketplace server, a sharing request regarding an exchange item from a first computing device, where the sharing request indicates a sharing approach for sharing the exchange item with one or more other computing devices and includes dynamic exchange item information generated by the first computing device. The method further includes verifying, by the marketplace server, the dynamic exchange item information received from the first computing device. When the verification is favorable, the method includes generating shared exchange item security parameters for the one or more other computing devices, generating shared exchange item information in accordance with the sharing approach, and sending the shared exchange item security parameters and the shared exchange item information to the one or more other computing devices for facilitating utilization of the exchange item by the one or more other computing devices in accordance with the shared approach.
Wireless devices for storing a financial account card and methods for storing card data in a wireless device
A non-transitory computer-readable medium stores instructions causing a processor to generate a menu displaying representations of a plurality of cards, the cards having associated card data; receive, from a user input device, a selection corresponding to a selected one of the cards; update the menu to display a representation of the selection; and authorize transmission of the card data associated with the selected card to complete a transaction.
In-store card activation
A user having an account with a payment provider receives an unregistered payment card that is associated with the payment provider, and that includes a magnetic strip encoded with a number unique to the card and a machine readable code such as a QR/barcode embossed thereon. The user may then open an application on the user's mobile device to capture the number associated with the card by, for example, scanning the QR/barcode, capturing an image of the number, speaking the number into the device, or manually entering the number into the user's device. The user may also authenticate with the payment provider by entering login credentials. The user may then confirm a request to link the number of the card with the user's payment provider account, which activates and links the card to the user account so that the user can immediately use the card for purchases.
System and method for processing a card-not-present payment transaction by a purchaser using a friend's card for obtaining a reward
A server and method for processing a card-not-present transaction whereby a purchaser selects to use one or more friends' card to obtain a reward is disclosed. The server comprises at least a computer processor to: (i) receive, from a merchant server, a payment request including a contact mechanism for the friend(s); (ii) send a selection request to the friend(s) using the contact mechanism; (iii) receive, from the friend(s) a selection response including card number(s) eligible for the reward; (iv) request the issuer server(s) for authentication and blocking the amount; (v) track a cumulative amount dynamically and repeat steps (iii) and (iv) until equal to or greater than the payment amount; (vi) generate a virtual card number for one time use based on the card number(s); and (vii) send a payment response to the merchant server including the virtual card number for the purchaser to complete the transaction.
Method and system for authenticating digital transactions
A system and computer-implemented method for authenticating digital transactions. The method includes receiving a device registration request and a device attestation response including at least a device integrity status from a device. In response to the device registration request, the method includes providing a device registration response to the device, based on validation of the device integrity status. Further, the method includes receiving a first payment transaction request and an enrolment request from the device via an application to authenticate a second payment transaction request using a first type of authentication technique. Finally, the method includes enrolling the device to the first type of authentication technique and providing a second token to the device based on a result of the first payment transaction request, wherein the second token is used for authenticating the second payment transaction request.
METHOD AND SYSTEM FOR PIN LOGIN AUTHENTICATION
A method and system is described for authenticating computer users using full login authentication to initialize a work session and then using an authentication by a PIN value when access is required in a fast moving workplace context.