Patent classifications
G06Q20/3278
DYNAMIC MODIFICATION OF A VERIFICATION METHOD ASSOCIATED WITH A TRANSACTION CARD
A device may determine that a verification method associated with a transaction card is to be modified from a first verification method to a second verification method. The first verification method and the second verification method may use different types of verification information. The device may provide a set of instructions to the transaction card after determining that the verification method is to be modified. The set of instructions may cause the transaction card to modify the verification method from the first verification method to the second verification method. The device may provide information identifying a modification to the verification method to a transaction backend device to notify the transaction backend device that the verification method associated with the transaction card has been modified from the first verification method to the second verification method.
Risk mitigation for a cryptoasset custodial system using data points from multiple mobile devices
Methods, systems, and apparatus for risk mitigation for a cryptoasset custodial system include transmitting an endorsement request for a cryptoasset transaction to a user device configured to cause the user device to prompt a user to endorse the cryptoasset transaction. Multiple data points are collected from mobile devices associated with the user. The data points indicate an identity of the user. A cryptographic endorsement of the cryptoasset transaction is received from the user device. A graphical visualization including a risk metric is generated based on the data points. The risk metric indicates a risk of accepting the cryptographic endorsement from the user device. Generating the graphical visualization includes determining whether the plurality of data points matches expected values.
Processing payment transactions without a secure element
A user conducts a wireless payment transaction with a merchant system by transmitting payment information from a user device to a terminal reader without accessing a secure element resident on the user device. A user taps a user device in a merchant system's terminal reader's radio frequency field. The terminal reader and the user device establish a communication channel and the terminal reader transmits a signal comprising a request for a payment processing response. The signal is received by the user device and converted by a controller to a request understandable by an application host processor. The controller transmits the request to the application host processor, where the request is processed, and a response is transmitted to the controller and then to the terminal reader. The response generated by the application host processor is identifiable by the merchant system as a payment response.
FACILITATING TRANSACTIONS WITH A USER ACCOUNT USING A WIRELESS DEVICE
A wireless device can store account identifiers and facilitate transactions. The wireless device can be loaded with user account identifiers and can be presented to various checkpoint devices. When presented, the wireless device can transmit a selected account identifier to the checkpoint device. In the context of a purchase transaction, the checkpoint device can be a point-of-sale terminal and the account data can be financial account data. In some instances, the wireless device can also facilitate a purchase transaction, e.g., by obtaining information about products to be purchased, constructing a purchase order from the product information, and transmitting the purchase order to a point-of-sale terminal.
Data-securing chip card construction
A card may store data on integrated circuits housed within the card. The card includes two short-range antennas and one long-range antenna that are configured to transmit the data. Antennas of the card may be configured to transmit the data in different directions as a result of a signal-blocking layer embedded within the card that isolates respective antennas from electromagnetic signals originating from a direction on the opposing side of the blocking layer. The long-range antenna may be configured to transmit identification data of the user, while the short-range antennas may be configured to transmit financial data related to the user. A system may be configured to instantiate events for the user of the card with the long-range antenna. Events that are instantiated by the long-range antenna may then be executed using the short-range antennas.
Method, system, and computer program product for automatically providing items based on item preferences
A method for automatically providing items based on an item preference may include receiving payment credential data associated with a payment credential and preference data associated with an item preference of a user, determining whether one or more items associated with the item preference of the user is available, and processing, with at least one processor, a payment transaction involving the one or more items associated with the item preference of the user based on determining that the item is available. A system and a computer program product are also provided.
SYSTEM AND METHOD FOR MANAGING DIGITAL WALLETS
A system for configuring a digital wallet application for implementing a casino player loyalty program includes a memory storing reward configuration data associated with digital wallet awards and a processor configured to: (a) provide an award type user interface for receiving player loyalty award types; (b) receive award type data corresponding to one or more selected player loyalty award types; (c) provide an award threshold user interface for receiving at least one indication corresponding to player loyalty award thresholds; (d) receive award threshold data corresponding to one or more selected player loyalty award thresholds; (e) provide an award trigger user interface for receiving player loyalty award triggers; (f) receive award trigger data corresponding to selected player loyalty award triggers; and (g) configure a rules engine for a mobile wallet based, at least in part, on the award type data, the award threshold data and the award trigger data.
Contactless payment relay attack protection
A method for contactless payment relay attack protection includes receiving an online authorization request including a cryptogram, a measured processing time, and a reference processing time from a terminal. The cryptogram is verified, and a determination is performed as to whether the measured processing time exceeds the reference processing time. An online authorization response authorizing or declining a monetary transaction is transmitted, based on the determination. An artificial intelligence transaction analysis can be performed based on past and current conditions (e.g., battery level, operating system, open applications) of a payment device such as a mobile phone, past and current conditions of a terminal, and/or a monetary amount. The online authorization response can be based on the artificial intelligence transaction analysis.
MERCHANT TERMINAL FOR RECEIVING PAYMENT FROM A VEHICLE
Methods, systems, apparatus, and non-transitory computer readable media are described for using a vehicle as a payment device. Various aspects may include receiving a selection of a stored financial card or financial account at a vehicle head unit. The selected financial card or financial account may be transmitted to a point-of-sale (POS) terminal for making a payment by transmitting a tokenized card number to the POS terminal. The tokenized card number may be transmitted over a very short-range communication link to ensure that the transmission is secure. For example, electronic circuitry may be attached to the exterior of the vehicle, where the electronic circuitry may be within a threshold distance (e.g. one inch, three inches, six inches, one foot, three feet, etc.) of the POS terminal. The tokenized card number may be transmitted from the vehicle head unit to the electronic circuitry and then to the POS terminal.
Order post to enable parallelized order taking using artificial intelligence engine(s)
In some aspects, a computing device receives a scan of a code displayed on an order post located near a restaurant, determines that the code is associated with the restaurant, and automatically opens a software application and navigates the software application to an ordering page associated with the restaurant. The computing device initiates receiving, via the software application, input associated with an order, sends the input to a machine learning based software agent executing on a server, receives a predicted response to the input, provides the predicted response as audio output and/or displays the predicted response on the touchscreen display device. After the order is complete, the computing device sends order data associated with the order to the restaurant. After receiving an indication from the restaurant that the order is ready, the computing device indicates that the order is ready to be picked up.