G06Q20/3265

Method for personalizing a secure element, method for enabling a service, secure element and computer program product
09749303 · 2017-08-29 · ·

According to an aspect of the invention, a method for personalizing a secure element for a mobile device is conceived, wherein an application is stored in the secure element and wherein the application is pre-provisioned by loading secure credentials into the application without tying said secure credentials to a specific user of the secure element.

Secure communication of access information via mobile devices
11246034 · 2022-02-08 · ·

An account management system receives, from a user computing device, a request for a virtual access card and a user account identifier associated with an account hub system account. The system receives, from the account hub computing system, account hub system account metadata associated with the user account hub system account. The system transmits, to the account hub computing system, a request for an access card identifier and a virtual access payload. The system receives, from the account hub computing system, the access card identifier and the virtual access payload. The system provides, to the user computing device, the access card identifier and the virtual access payload, the user computing device communicating the access card identifier and the virtual access payload to a reader computing device via a wireless communication channel.

CHECK-IN TO CHECKOUT SYSTEMS AND METHODS

Provided are check-in to checkout systems and methods. The system includes a point of sale, a display, a mobile device, and a backend system. When the POS starts a transaction, such as, but not limited to scanning an item, the POS generates a transaction/basket identification. In response to starting the transaction, the POS sends the transaction/basket ID to the display in the form of a QR code or one-dimensional barcode. The mobile device operating a mobile application scans and captures the displayed code and reports to the backend systems. The backend systems then send a check-in event, which includes gathered data by the backend systems, to the POS and the POS acknowledges receipt of the message. At this point, a notification may be sent to the mobile application that the check-in was successful and a link is established far flow of information.

Dual controls for processing electronic transactions

Methods and systems are presented for enabling an online service provider to process transaction requests according to a dual control workflow using multiple transaction processing systems that are only configured to process transaction requests according to a single control workflow. A dual control module is implemented between an interface server and the transaction processing systems. The dual control module may intercept transaction requests from the interface server. The dual control module may withhold transaction requests from being sent to any one of the transaction processing systems until a set of criteria is satisfied according to the dual control workflow. The dual control module may obtain approvals and/or denials from designated approvers. Once the set of criteria is satisfied for a transaction request, the dual control module may forward the transaction request to one of the transaction processing systems for processing.

System and method for customer initiated fraud management

The invention relates to a customer initiated fraud management. With an embodiment of the present invention, customers may control card utilization through a mobile application. For example, customers may restrict the utilization on their cards when they do not need to use their cards as well as allow specific types of transactions on demand (e.g., PoS, Cash, card absent environment transactions, etc.). Also, an interactive user interface provides cardholders the ability to open utilization windows in specific countries and for specific utilization types.

Systems and methods for transferring values in remote databases
11429942 · 2022-08-30 · ·

A method includes receiving a communication identifying a remote database and a first value stored in the remote database that is being transferred to a first entity by a second entity. That first value is capable of being modified by the second entity. Modification of the first value stored in the remote database by the second entity is prevented by identifying an application programming interface allowing operations to be performed on the remote database, and using that API to transfer the first value so as to be associated with one or more other identifiers unknown to the second entity. After modification of the first value stored by the second entity is prevented, a transfer of a second value to a database record associated with the second entity is triggered. Related systems and applications of the method and those systems are also disclosed.

UTILIZING MACHINE LEARNING AND A NETWORK OF TRUST FOR CROWD AND TRAFFIC CONTROL AND FOR MAPPING A GEOGRAPHICAL AREA
20220034664 · 2022-02-03 ·

A device may receive application data associated with transaction applications of client devices and transaction card data associated with transaction cards. The device may receive geographical data identifying a geographical area associated with users of the client devices and the transaction cards. The device may determine, based on the application data, the transaction card data, and the geographical data, location data identifying geographical locations of the users in the geographical area. The device may determine, based on the location data, quantity data identifying quantities of the users located on multiple paths of the geographical area. The device may process the geographical data, the location data, and the quantity data, with a machine learning model, to identify a path with less than a threshold quantity of users in the geographical area. The device may perform one or more actions based on the path.

Cloud-based application security
11455614 · 2022-09-27 · ·

Systems, methods, and computer program products for providing cloud-based application security are disclosed. For example, a server part of a cloud-based application may determine a plurality of security challenges for authorizing a request based on a plurality of security settings of a user account and one or more attributes of the request, issue a first-level authorization challenge and a second-level authorization challenge based on the determining, identify a plurality of available resources from the user account for the request, and responsive to successful completion of the first-level authorization challenge and the second-level authorization challenge, automatically apply two or more of the available resources from the user account to fulfill the request based on the one or more attributes of the request and a physical location associated with the request.

Payment systems and methods for managing payment card use

A method, at a mobile device, of assigning a preferred payment application stored on the mobile device to a merchant, the method comprising the steps of: receiving a selection of a merchant at the mobile device; receiving a selection of a preferred payment application; and mapping the payment application to the merchant by creating a record containing an application identifier and a merchant identifier.

METHOD FOR TRIGGERING OUTREACH BASED ON THIRD PARTY DATA REQUESTS

The communication techniques described herein may allow a server to send communications to user devices in response to detecting a user interacting with an application and/or their device. A request to access information associated with an account may be detected. Next, a determination may be made as to whether the request is from a third-party and/or initiated by the user. When the request is from a third-party and/or initiated by the user, a customer outreach module may be triggered, which may select a communication to send to the user. A verification of whether the user allows for receipt of communications may be performed. When the user accepts communications, the communication may be sent to the user device. Accordingly, sending communications when the user may be interacting with an application and/or device improves the probability of the user interacting with the communication and the user receiving the information associated with the communication.