G06Q20/425

Systems and methods for contactless and secure data transfer

In one embodiment, a method comprises receiving a unique identifier from an item and sending a communication to an electronic device requesting that a user confirm a pending transaction, receiving input from the electronic device associated, and sending the received input to an authentication system for completing a transaction. In another embodiment, a system comprises a sensor, an authentication system, and a transaction processing system. The sensor is configured to emit energy and receive at least one first identifier, send at least one communication to an electronic device requesting a second identifier, receive at least one second identifier, and send the at least one first identifier and the at least one second identifier to the authentication system. The authentication system is configured to receive the at least one first and second identifiers from the sensor, to choose, based on the at least one first identifier and the at least one second identifier, a transaction processing system, and send the at least one first and second identifiers to the chosen transaction processing system.

SYSTEMS AND METHODS FOR CONTACTLESS BILLING AND PAYMENT
20220374897 · 2022-11-24 ·

Systems and methods for contactless payment are disclosed. The system and methods may include performing steps of: receiving user information from a user device, the user information including at least authentication information and payment information; receiving check information from a venue, the check information including at least a check identifier and initial order information; generating a check identifier for wirelessly communicating the check information to the user device; displaying the check identifier on a display on the user device; receiving a check close command; and requesting a payment from a user based on the user information and check information.

SYSTEMS AND METHODS FOR PERFORMING FINANCIAL TRANSACTIONS USING ACTIVE AUTHENTICATION
20230059316 · 2023-02-23 ·

A financial transaction method includes receiving a request to perform a financial transaction at a financial institution, generating a single-use transaction key for the financial transaction, and storing at least a first portion of the transaction key in a storage medium. The transaction key is transmitted to a user that requested the financial transaction, and an authorization request including at least a second portion of the transaction key is received from a merchant. The second portion of the transaction key received from the merchant is compared to the first portion of the transaction key to determine if the transaction should be authorized. An authorization message is transmitted to the merchant if the second portion of the transaction key received from the merchant matches the first portion of the transaction key. The financial transaction is funded from an account of the user if the financial transaction is authorized.

Method for acquiring access rights to conditional access content

A method of acquiring access rights to conditional access content. The method comprises receiving an access right on a first terminal through a first communication channel; storing said access right in said first terminal; sending a request for said conditional access content to a content provider, said request containing at least an identifier of an account to which said first terminal is associated, an identifier of the requested content and a piece of information concerning said access right; verifying, by said content provider, the authenticity of said access right using said piece of information concerning the access right; and when there has been a successful verification, marking said access right as used, and sending said conditional access content to at least one terminal linked to said account. The first terminal using near field communication technology (NFC) during at least one transfer of said access rights.

Optimized dunning using machine-learned model
11587093 · 2023-02-21 · ·

In an example embodiment, information about one or more failed payment attempts via an electronic payment processing system is obtained. One or more features are extracted from the information. Then, for each of a plurality of potential candidate retry time points, the one or more features and the potential candidate retry time point are fed into a dunning model, the dunning model trained via a machine-learning algorithm to produce a dunning score indicative of a likelihood that a retry attempt at an input retry time point will result in a successful payment processing. The dunning scores for the plurality of potential candidate retry time points are used to select a desired retry time point. Then the electronic payment processing system is caused to attempt to reprocess a payment associated with one of the failed payment attempts at a time matching the desired retry time point.

Transaction validation service

Concepts and technologies are disclosed herein for providing a transaction validation service. A device can receive a request to validate a transaction requested by a user device, where the transaction can be performed by an application and where the request to validate the transaction can be obtained with a first hash that is created by the user device. The first hash can include a hash of transaction data that is hashed using data stored on the user device. The device can receive an indication that the transaction has been approved, obtain a second hash of the transaction data that is hashed using the data stored on the user device, and determine, based on the first hash and the second hash, whether the transaction should be allowed or blocked.

Method and system for multi-modal transaction authentication
11501298 · 2022-11-15 · ·

This invention relates to systems and methods for authenticating transactions using a mobile device based primarily on the introduction of a layer of middleware and wherein the Payment Networks, Merchants, Issuing Banks, Credit Reporting Bureaus, Insurance Companies, Healthcare Providers may customize the implementation of the services based on individual strategy and consumer preferences.

Smart inclusion of technology at time of use

Apparatuses, methods, systems, and program products are disclosed for modifying the enabled features of a hardware component at the time of use. An apparatus includes a processor and memory that stores code executable by the processor. The code is executable by the processor to obtain a feature of the hardware component that is not enabled and generates an encrypted code associated with the feature of the hardware component to be enabled. The apparatus processes a payment for the cost of enabling the hardware component and enables the feature of the hardware component in response to the association of the payment processed with the encrypted code for the feature of the hardware component.

Systems and methods for automated fraud detection and analytics using aggregated payment vehicles and devices
11587089 · 2023-02-21 · ·

Systems and methods are disclosed for automated fraud detection and analytics using aggregated payment vehicles and devices, at the individual and/or household level. One method includes receiving an authorization request for a payment transaction originating at a merchant, using a first payment vehicle; receiving device information of a first device used in the payment transaction; retrieving transaction data and identifying information associated with the authorization request before the authorization request is routed to a financial institution; searching and determining payment vehicles and devices associated with the individual using the retrieved identifying information; aggregating transaction data associated with the payment vehicles and devices from the transaction database; retrieving reported fraudulent activities pertaining to the payment vehicles and devices; and generating a profile data for the individual according to the identifying information associated with the authorization request, personally identifiable information (PII), the aggregated transaction data, and reported fraudulent activities.

TOUCHLESS TRANSACTION METHOD, TOUCHLESS TRANSACTION SYSTEM, TRANSACTION MANAGEMENT APPARATUS, AND AUTOMATIC TRANSACTION APPARATUS

Disclosed is a touchless transaction method in which a user executes a transaction without operating an automatic transaction apparatus and which is executed by a transaction management apparatus communicably connected to a mobile terminal and the automatic transaction apparatus used by the user. The touchless transaction method includes executing by the transaction management apparatus: an authentication step of authenticating that the user using the mobile terminal is a registered user on a basis of information received from the mobile terminal; a translation control management step of receiving a prescribed transaction content requested by the user from the mobile terminal and managing the received prescribed transaction content; and an instruction step of outputting to the prescribed automatic transaction apparatus an instruction to execute the prescribed transaction content when identification information for identifying the prescribed automatic transaction apparatus to be used by the user is received.