Patent classifications
G06Q20/425
METHODS FOR ACQUIRING AN INTERNET USER'S CONSENT TO BE LOCATED AND FOR AUTHENTICATING THE LOCATION INFORMATION
A method and system for acquiring an Internet user's consent to be geographically located via at least two independent sources of geographical information. At least one independent source of geographical information is the wireless location of the Internet user's mobile phone.
SYSTEMS AND METHODS FOR CONTACTLESS AND SECURE DATA TRANSFER
In one embodiment, a method comprises receiving a unique identifier from an item and sending a communication to an electronic device requesting that a user confirm a pending transaction, receiving input from the electronic device associated, and sending the received input to an authentication system for completing a transaction. In another embodiment, a system comprises a sensor, an authentication system, and a transaction processing system. The sensor is configured to emit energy and receive at least one first identifier, send at least one communication to an electronic device requesting a second identifier, receive at least one second identifier, and send the at least one first identifier and the at least one second identifier to the authentication system. The authentication system is configured to receive the at least one first and second identifiers from the sensor, to choose, based on the at least one first identifier and the at least one second identifier, a transaction processing system, and send the at least one first and second identifiers to the chosen transaction processing system.
Payment transactions with integrated point of sale terminals
A mobile communication device accepts payments and is capable of integration of retail business applications without additional hardware. It allows merchants to accept card present payments directly without any need for additional external hardware, such as Point of Sale (POS) terminals. The merchant can accept card present payments from a contactless credit/debit card, from a mobile smart phone or another mobile telecommunication device supporting payment card digitization, or from a mobile smart phone or another mobile telecommunication device that carries or can access and transmit relevant payment information.
Remote commands using network of trust
A device may include a processor, a wireless transceiver in communication with the processor, and a non-transitory memory. The memory may store instructions that, when executed by the processor, cause the processor to perform processing. The processing may include receiving a command configured to be executed by an external user device. The external user device and the user device may be members of a network of trust. The processing may include detecting, by the wireless transceiver, a plurality of member devices of the network of trust in communication range of the device. The processing may include sending, by the wireless transceiver, the command to each of the plurality of member devices.
Secure authentication system and method
Methods and systems pertaining secure transaction systems are disclosed. In one implementation, a merchant server payment information from a user computer. The merchant server can transmit a verification request to a gateway as well as receive a verification response from the gateway. The merchant server can transmit an authentication request and receive an authentication response. After receiving the authentication response, the merchant server can initiate an authorization process.
Digital user identity verification
Verification of user identities is an important aspect of computer and network security. In some instances, a first user may attempt to engage with a second user via a web application, mobile phone app, or other software without necessary knowing that the identity of a second user is accurate. The computer security problem of identity verification may be particularly acute when the only contact information is an email address, phone number, or other electronic identifier that can potentially change ownership (e.g. a person may get a new phone number, someone might purchase an Internet domain and thus change ownership of an email address, etc.) This disclosure and claims relate to techniques that allow for enhanced security by verifying an identity of a user via specific prompts and interactions provided via software. Particular credentials may be required in order to verify user identity, including biometrics and other specific required responses.
Hands-free transactions with voice recognition
Conducting hands-free transactions comprises a server at a payment processing system, a user computing device, and a merchant computing device. The payment processing system receives a communication from a hands-free payment application on a user device, the communication comprising a first transaction token, an identification of a user account, and a beacon identifier. The merchant may provide a challenge to the user and use the response to identify the token and account of the user. The merchant computing device can use voice patterns of the user to assist in identifying the token and account of the user. The system receives from the merchant computing device a transaction request, the transaction request comprising the first transaction token and transaction data associated with the transaction request. The system determines that the transaction is for an amount less than a configured transaction limit and communicates a request for an authorization of the transaction.
Smart card with distributed payment channels and autonomous resolution thereof
Systems and methods for autonomous payment routing are provided. A method may include storing in a smart card a database of contacts accessed from a digital contact directory. The method may include receiving a request to reroute a payment via an alternate payment channel, the payment including a recipient and an amount, and the alternate payment channel originating from an account associated with one of the contacts in the database. The method may also include resolving, via a wireless communication element that is embedded in the smart card, routing information for the account. The method may also include transmitting, to an administrator of the account, a request for authorization to reroute the payment, and, when authorization is received, executing the payment via the alternate payment channel.
TRANSACTION COMPLETION VIA APPLICATION INTERACTION
In some examples, a payment application on a mobile device receives a request from a mobile application on the mobile device to pay for a transaction initiated via the mobile application. The request may be generated in response to receiving a user input to a user interface of the mobile application for selecting the payment application as the payment method for the transaction. Further, based on the user input selecting the payment application as the payment method, the payment application is displayed on a foreground of the mobile device while the mobile application is executed in the background. The payment application sends a payment request to a payment service system to cause the payment service system to identify accounts associated with the user and the merchant, and to initiate a transfer of an amount from the user account to the merchant account as payment for the transaction.
REMOTE COMMANDS USING NETWORK OF TRUST
A device may include a processor, a wireless transceiver in communication with the processor, and a non-transitory memory. The memory may store instructions that, when executed by the processor, cause the processor to perform processing. The processing may include receiving a command configured to be executed by an external user device. The external user device and the user device may be members of a network of trust. The processing may include detecting, by the wireless transceiver, a plurality of member devices of the network of trust in communication range of the device. The processing may include sending, by the wireless transceiver, the command to each of the plurality of member devices.