Patent classifications
G06Q20/3226
Cloud-based virtual wallet NFC apparatuses, methods and systems
The CLOUD-BASED VIRTUAL WALLET NFC APPARATUSES, METHODS AND SYSTEMS (“EAE”) transform user enhanced security transaction initiation requests using EAE components into time-limited, session-specific transaction bounding tokens. In some implementations, the disclosure provides a processor-implemented method of transforming a transaction bounding token request into transaction bounded tokens and purchase authorizations.
Systems and methods for preventing fraudulent credit card and debit card transactions
A system and method for preventing fraudulent credit card or debit card transactions by coupling a smart phone to the credit card or the debit card, and transmitting identification information from the smart phone to the card. The card is normally disabled such that no transaction may take place unless the card is enabled. The card receives the transmitted identification information and compares that information to corresponding information stored on the card. If the received information matches the stored information, the card is enabled thus allowing the transaction to take place.
METHOD AND SYSTEM FOR OPERATING A MOBILE POINT-OF-SALES APPLICATION
A method for operating a mobile Point-of-Sales (mPOS) application includes: an application frontend of the mPOS application is installed and launched on a terminal device connected to a communication network via a secure connection; an application backend of the mPOS application is installed and launched on an edge cloud server of the communication network; the application frontend, for starting a transaction associated with the mPOS application, transmits a transaction request indicating the transaction to be started and comprising transaction data associated with the indicated transaction to the application backend via the connection; the application backend transmits an authorization request to the application frontend via the connection; the application frontend authorizes the requested transaction and transmits a transaction authorization to the application backend via the connection; and the application backend completes the transaction.
Mobile device based identity verification
Apparatuses, systems, methods, and computer program products are presented for mobile device based identity verification. An apparatus includes a data module configured to receive sensor data from a hardware device associated with a user. An apparatus includes a transaction module configured to receive transaction data associated with a transaction. An apparatus includes a verification module configured to verify an identity of a user making a transaction based on received sensor data. A transaction may be allowed in response to verifying a user's identity.
Peer-to-peer relaying of discovery information
Certain aspects of the present disclosure relate to methods and apparatus for wireless communication, and more specifically to advertising discovery information, relaying discovery information, and to the secure relay of discovery information in wireless networks. Various frame structures are provided for such transmitting and relaying of discovery information. According to certain aspects of the present disclosure, security is provided for relaying discovery information. According to certain aspects of the present disclosure, compensation may be provided to a device that relays discovery information (e.g., when the relaying results in a transaction).
Processing a mobile payload
In one embodiment, a method includes receiving, by a payment server and from a messaging application executing on a first mobile device operated by a first user, a request to initiate a payment transaction using a payment application. The request includes a payment amount and an identifier associated with the first user. The method includes facilitating a first adjustment to a balance associated with the financial account of the first user in the data store identified based on the identifier. The method includes generating a link associated with the first adjustment and transmitting the link to the first mobile device. The method includes, upon receiving from a second user operating a messaging application, an indication that the second user has interacted with the link within the messaging application, facilitating a second adjustment of a balance of a financial account of the second user according to the payment amount.
Method, system, and computer program product for automatically re-processing a transaction
A method for automatically re-processing a transaction in an electronic payment processing network independent of a merchant system or a user includes: receiving a first transaction message associated with a payment transaction; generating a first authorization request; communicating the first authorization request to an issuer system; in response to determining that the first authorization request failed, automatically determining a second payment device associated with the user based on profile data; automatically generating a second authorization request associated with the transaction; communicating the second authorization request to a second issuer system; and in response to determining that the second authorization request was approved by the second issuer, processing the transaction based on the transaction data and the second account data.
Zero-step authentication using wireless-enabled mobile devices
A zero-step authentication system and method which uses wireless mobile devices to automatically make payments in a secure manner without requiring the customer to handle his or her mobile device. The system and method uses a payment facilitation device at the business location which automatically detects and recognizes registered mobile devices, displays a photo of the customer to a business employee for identity confirmation, and automatically deducts payments for purchases from a pre-authorized customer account. The customer account is managed by a payment processing server, which stores the customer account data, makes appropriate deductions, sends confirmation of deductions to the customer's mobile device, and automatically refills the customer's account by making pre-authorized charges to the customer's banking institution.
Contactless payment relay attack protection
A method for contactless payment relay attack protection includes receiving an online authorization request including a cryptogram, a measured processing time, and a reference processing time from a terminal. The cryptogram is verified, and a determination is performed as to whether the measured processing time exceeds the reference processing time. An online authorization response authorizing or declining a monetary transaction is transmitted, based on the determination. An artificial intelligence transaction analysis can be performed based on past and current conditions (e.g., battery level, operating system, open applications) of a payment device such as a mobile phone, past and current conditions of a terminal, and/or a monetary amount. The online authorization response can be based on the artificial intelligence transaction analysis.
MERCHANT TERMINAL FOR RECEIVING PAYMENT FROM A VEHICLE
Methods, systems, apparatus, and non-transitory computer readable media are described for using a vehicle as a payment device. Various aspects may include receiving a selection of a stored financial card or financial account at a vehicle head unit. The selected financial card or financial account may be transmitted to a point-of-sale (POS) terminal for making a payment by transmitting a tokenized card number to the POS terminal. The tokenized card number may be transmitted over a very short-range communication link to ensure that the transmission is secure. For example, electronic circuitry may be attached to the exterior of the vehicle, where the electronic circuitry may be within a threshold distance (e.g. one inch, three inches, six inches, one foot, three feet, etc.) of the POS terminal. The tokenized card number may be transmitted from the vehicle head unit to the electronic circuitry and then to the POS terminal.