G06Q20/425

Graphical user interface for configuring card controls for a card
11550450 · 2023-01-10 · ·

Card controls can be selectively applied by a user to a card using a graphical user interface (GUI). The card controls can dictate whether network requests associated with usage of the card are to be handled using an account subsystem or a service subsystem. For example, the user can input a first selection to the GUI for applying a first card control in relation to a first type of network request. Based on the first selection, the system can be configured to complete network requests of the first type using the service subsystem. The user can also input a second selection to the GUI for applying a second card control in relation to a second type of network request. Based on the second selection, the system can be configured to complete network requests of the second type using the account subsystem.

Secure account creation

In one embodiment, a payment service system-implemented method of assigning payment card numbers for individual user accounts associated with the payment service system includes receiving a request, in the context of an authorization for a payment transaction, to assign a payment card number to a user account associated with a user of the payment service system. The method includes retrieving, from a database associated with the payment service system, an account record associated with the user account. The method includes determining that the user account is not associated with an active payment card number. The method includes identifying an unassigned payment card number and modifying the account record to assign the unassigned payment card number to the user account as an active payment card number. The method includes authorizing the payment transaction using the active payment card number, causing a modification to an account balance of the user account.

Systems and methods for transactions using an ATM/credit/debit card and a second communications channel to an account holder's bank

Systems and methods for performing a transaction with a headless point-of-sale or automated teller machine (ATM) device are disclosed using a card having a second communications path to a financial services provider. A card having a display and radio frequency (RF) communications module may be authenticated with a headless point-of-sale device using a short-range RF communications link. Characteristics of the card may be set prior to the transaction. Transaction information may be provided to the display of the card from the headless point-of-sale device. A customer may confirm the transaction at the card using a touch-sensitive input area. During the processing, a communication may be made over the second communications path to authorize the transaction independently of the transaction processing path. A transaction may then be completed at the headless point-of-sale device.

USER CONTROLLED SHARING OF PERSONAL AND CONTACT INFORMATION USING A BLOCKCHAIN
20220405767 · 2022-12-22 ·

Techniques are provided for propagating updates to user profile information using a blockchain and for controlling access to user profile information using a blockchain. In one embodiment, a first block is added to a blockchain. The first block includes a first transaction ID that identifies a first transaction entry in the blockchain and a first version of user profile information encrypted using the first encryption key. The first transaction ID and a first decryption key that is able to decrypt information encrypted with the first encryption key is communicated to a plurality of entity computing devices that are to use the user profile information. The user profile information is updated by adding a second block to the blockchain that refers to the first transaction ID and includes a second version of the profile information encrypted using the first encryption key.

Making Payments Through Electronic Channels
20220405740 · 2022-12-22 ·

Among other things, a server receives from a payer an indication of a payment to be made from an account of the payer to an account of a biller. The server is hosted independently of a party that maintains the account for the payer or the biller. The server receives authentication information from the payer that authenticates an association of the payer with the account of the payer. After the association has been authenticated and without requiring the payer to obtain online access to the payer's account, the server sends to the party that maintains the account for the payer a credit transfer from the account of the payer into the account of the biller.

Systems and methods for facilitating card present transactions

This disclosure describes systems and methods related to facilitating card present transaction. In one embodiment, a service provider system may receive a request from a merchant to initiate a card present transaction associated with a consumer. The service provider system may determine an identifier associated with a mobile device associated with the consumer. The service provider system may communicate to the mobile device, based at least in part on the identifier, a message that facilitates invocation of a transaction module associated with the mobile device. The service provider system may facilitate the car present transaction based at least in part on an interaction with the transaction module.

Mobile device verification for an electronic application before providing a digital pass to an approved customer

A system and method for mobile device verification for an electronic application before providing a digital pass to an approved customer is disclosed. The method and system receives, at a store's customer credit application computer, an application for a new account, the application including a contact information for a customer's mobile device providing, from the store's customer credit application computer, the contact information for the customer's mobile device to a verification system to authenticate the customer's mobile device providing, from a credit account provider, a text to the customer's mobile device, the text causing the customer's mobile device to be subjected to a second authentication; receiving, at the customer's mobile device, a message that includes a link to the digital pass; and utilizing the link to receive the digital pass at a mobile wallet of the customer's mobile device.

OPTIMIZED DUNNING USING MACHINE-LEARNED MODEL
20220391914 · 2022-12-08 ·

In an example embodiment, information about one or more failed payment attempts via an electronic payment processing system is obtained. One or more features are extracted from the information. Then, for each of a plurality of potential candidate retry time points, the one or more features and the potential candidate retry time point are fed into a dunning model, the dunning model trained via a machine-learning algorithm to produce a dunning score indicative of a likelihood that a retry attempt at an input retry time point will result in a successful payment processing. The dunning scores for the plurality of potential candidate retry time points are used to select a desired retry time point. Then the electronic payment processing system is caused to attempt to reprocess a payment associated with one of the failed payment attempts at a time matching the desired retry time point.

PAYMENT SYSTEM AND APPARATUS
20220391876 · 2022-12-08 ·

A payment system apparatus configured to install with a merchant's non-payment equipment, comprising one or more payment tokens, a transceiver system and a housing, within which the transceiver system is installed, configured to install physically, electrically, wirelessly, or any combination thereof, with the merchant's non-payment equipment.

Systems and methods for performing financial transactions using active authentication

A financial transaction method includes receiving a request to perform a financial transaction at a financial institution, generating a single-use transaction key for the financial transaction, and storing at least a first portion of the transaction key in a storage medium. The transaction key is transmitted to a user that requested the financial transaction, and an authorization request including at least a second portion of the transaction key is received from a merchant. The second portion of the transaction key received from the merchant is compared to the first portion of the transaction key to determine if the transaction should be authorized. An authorization message is transmitted to the merchant if the second portion of the transaction key received from the merchant matches the first portion of the transaction key. The financial transaction is funded from an account of the user if the financial transaction is authorized.