Patent classifications
G06Q20/3263
ESTABLISHING CONNECTIVITY BETWEEN USER DEVICES
A computer-implemented method, computer program product, and computer system is provided for establishing connectivity between user devices. The computer-implemented method includes: broadcasting a message to running processes on an operating system of the first user device to indicate that a requesting application is looking for a live connection channel to attempt discovery with a second user device to ascertain virtual proximity of the first user device with the second user device. The computer-implemented method further includes receiving a response from a live connection channel and attempting to verify pairing via the live connection channel to confirm a virtual proximity of the second user device with the first user device. The pairing provides information for establishing a subsequent connection between the first and second user devices via the requesting application.
Beacon-triggered activation of a near field communication application
An automated method is provided for activating a NFC application in a mobile interface device. In this method, the device receives from a beacon a wireless beacon signal comprising at least one beacon identifier. The wireless beacon signal is processed by the mobile interface device to determine the at least one beacon identifier. The mobile interface device determines based on the at least one beacon identifier, whether to activate the NFC application. Responsive to a determination that the NFC application should be activated, the mobile interface device transitions the NFC application from a passive state to an active state. NFC communication is then established between the mobile interface device and at least one NFC transmitting device disposed within a beacon range volume defined by the beacon location and the beacon range.
AUTHENTICATION AND PERSONAL DATA SHARING FOR PARTNER SERVICES USING OUT-OF-BAND OPTICAL MARK RECOGNITION
Disclosed are methods and apparatuses for creating a verified mutually authenticated transaction between a service provider and an on-line identity for a physical client person. A dynamic optical mark may be displayed on a device screen where the physical client person is using a web service. The dynamic optical mark may be recognized via scanning the dynamic optical mark by a personal mobile device equipped with a camera. The verified mutually authenticated transaction between the service provider and the on-line identity for the physical client person may be used for sharing personal data of the physical client person by using out-of-band optical mark recognition of the dynamic optical mark. The verified mutually authenticated transaction may be initiated with a time-limited one-time password comprising a sequence of numbers encoded in the dynamic optical mark.
Terminal transaction method, and terminal
In this application, a terminal transaction method and a terminal are provided and used to resolve a problem existing in the prior art that an NFC application does not match a type of a POS, and there is relatively poor user experience. The method includes: establishing, by a terminal, a near field communication NFC radio frequency connection to a point of sale POS, and starting up a first transaction; and selecting, by the terminal, a first NFC application corresponding to the POS, and performing the first transaction when a use condition of the first NFC application is already satisfied.
Wearable transaction device
A wearable transaction device may include a housing, a fastener component attached to the housing, and an electronic chip secured within the housing. The wearable transaction device may detect a connection with a user device, and receive, from the user device and via the connection, security information for operating the wearable transaction device. The security information may indicate one or more conditions for placing the wearable transaction device in a payment mode or a non-payment mode. The wearable transaction device may receive a request to perform the transaction, and determine, based on the security information, whether the wearable transaction device is in the payment mode or the non-payment mode. The wearable transaction device may selectively perform the transaction based on whether the wearable transaction device is in the payment mode or the non-payment mode.
SECURE ACCOUNT CREATION
In one embodiment, a payment service system-implemented method of assigning payment card numbers for individual user accounts associated with the payment service system includes receiving payment card numbers activated by a third-party server that are unassigned to accounts registered. The method includes receiving a first transaction authorization request for one of the payment card numbers and denying the request, without notifying the third-party server, based on the number being unregistered with the payment service system. The method includes receiving, via an executable application, a request to register a user account for a payment service system user, and in response, generating a record assigning the payment card number to the user account. The method includes receiving a second transaction authorization request for the payment card number, authorizing the request based on the number being assigned to the user account, and notifying the third-party server, causing user account's balance to be modified.
SYSTEM AND METHOD FOR IMPLEMENTING INTEGRATED FINANCIAL SERVICES FUNCTIONALITY IN A CASINO ENVIRONMENT
A system for implementing integrated financial services functionality in a casino environment may comprise a channel that integrates with casino devices and systems. The financial services system may comprise or implement an exchange relative to the casino environment and one or more external banking networks. Each patron may have a personal exchange which represents funds associated with account at an external bank. The system permits a patron to associate funds with their exchange and to utilize funds associated with their exchange at touch-points throughout a casino (including both gaming and retail locations), such as for funding wagering activities or paying for goods and/or services on the retail side. The financial services system may be accessed by a patron in various manners, including by an application running on the patron's computing or mobile device, via kiosks or other service devices, via a casino cage or cashier, or via other touch-points.
Techniques to generate and store characteristics of a signature on a transaction card circuit
Various embodiments are generally directed to techniques to perform transaction with transaction cards utilizing characteristics of customer's signature. Techniques may further include determining characteristics of a signature including a reduced set of data points for the signature and storing the characteristics in secure memory of transaction card. The transaction card including the characteristics are used to perform transactions, such as those performed at Point-of-Sale (POS) terminals.
SECURE AND SAFE METHOD TO DISABLING PAYMENT FUNCTIONALITY ON LOST OR STOLEN TRANSACTION CARDS
The disclosure includes systems and methods for disabling a payment function of a transaction card. The system receives payment account data from a transaction card and transmits a payment authorization request message to a card issuer associated with the transaction card. The system receives, from the card issuer, an authorization request response message. The authorization request response message declines the transaction and includes a status response code corresponding to a status of the transaction card. The system determines whether the status response code indicates that the transaction card is to be captured, and if so, disables the payment function of the transaction card via activation of a disabling system.
SYSTEM AND METHOD FOR IDENTITY VERIFICATION ACROSS MOBILE APPLICATIONS
Embodiments are directed to methods, apparatuses, computer readable media and systems for authenticating a user on a user device across multiple mobile applications. The identity of the user is validated by encoding and subsequently validating cryptographically encrypted data in a shared data store accessible by the mobile applications tied to the same entity. Specifically, the application leverages the authentication process of a trusted mobile application (e.g. a banking mobile application) to authenticate the same user on a untrusted mobile application (e.g. a merchant mobile application).