Patent classifications
G06Q20/3552
ON-DEMAND PAYMENT GENERATION TRANSACTION SYSTEMS
Methods and systems for generating on-demand payment instruments are described. A user with a user payment account may perform a transaction with a user device and request an on-demand payment instrument. The request may be communicated to a transaction device. The transaction device may authenticate the request and associate an on-demand payment instrument to the user payment account. Information associated with the on-demand payment instrument information may then be tokenized and communicated to the user device, the merchant, or another party and the information may be entered and/or processed for the transaction.
Systems, methods, and computer program products for managing data re-installation
Systems, methods, and computer program products are provided for managing data re-installation including service re-installation. A re-installation procedure re-installs and optionally activates data at least partially installed on a secure element without intervention middleware to repair a personalization procedure failure. Thus, personalization data on a secure element (SE) may be comprehensively managed by interfacing between one of a plurality of service provider (SP) trusted service managers (TSM) and a central trusted service manager (central TSM). The processing time required to manage the re-installation procedure is minimized.
SYSTEMS AND METHODS FOR INITIALIZATION AND ACTIVATION OF SECURE ELEMENTS
Disclosed herein are secure transaction systems having secure elements that are initialized and activated independent from each other. The secure element is first initialized to make the secure element turn to a state in which the secure element can be packaged, sold within retail stores, and then injected with encryption keys. The initialization process of the secure element formulates the secure element to ensure trust between the secure elements and secure element activation servers. The process of independently initializing and activating the secure elements while still addressing the security protocols allows the secure element to be packaged and sold within retail stores after initialization, and then activating the secure element at a later date and time when the secure element is ready to be used by a merchant.
Device provisioning using partial personalization scripts
Embodiments of the invention relate to systems and methods for efficiently provisioning mobile devices with personalization data. For some embodiments, a method is disclosed comprising receiving a request for provisioning comprising device information for a mobile device and user authentication information for a user, generating a partial personalization script, an activation script, and a deletion script using the device information, sending the partial personalization script, the activation script, and the deletion script to an application provider computer, wherein the application provider computer initiates execution of the partial personalization script on the mobile device, authenticating the user authentication information, and sending an activation message to the application provider computer, wherein the application provider computer initiates execution of the activation script.
Mobile payment application provisioning and personalization on a mobile device
Embodiments of the present invention are directed to systems and methods for providing a central entity that can provision mobile payment applications on mobile communication devices and personalize the mobile payment applications with consumer and account information. The personalization of the mobile payment application on the mobile communication device may include provisioning a payment account on the mobile payment application. The central entity may provision the account on the mobile payment application without interacting with the issuer during the provisioning of the account. The central entity may provision the account on the mobile communication device by decrypting, using a secure element key, encrypted payment account information received from the mobile communication device. The payment account information may be encrypted by a secure element of the mobile communication device using the same secure element key.
CONSUMER CONTROLLED PORTFOLIO CHARITABLE GIVING SYSTEM AND METHOD
A donation facilitation system that can allow a donor, such as a customer, to challenge another entity, such as a provider, to make a provider contribution to a portfolio of charities set up by the donor upon, for example, the purchase of a good or service from the provider. The provided portfolio donation facilitation system can allow the other entity such as a provider to create its own provider portfolio of charities and make a provider contribution to a customer's portfolio of charities when at least one component of the provider's portfolio of charities matches at least one component of the customer's portfolio of charities.
Method of controlling an electronic device and corresponding electronic device
Method of controlling an electronic device and corresponding electronic device. The method may be performed by an electronic device (20) and includes steps such as receiving an instruction command (CMD) that includes identifiers (ID) of instructions (IS) that are prerecorded in a memory (30) of the electronic device; using the identifiers to form a code (RC) defining a set of instructions, where the set of instructions combines prerecorded instructions (IS) to execute a security check; and storing the code (RC) in a memory (28) of the electronic device in order to configure the electronic device (20) to execute the security check.
Account registration using a contactless card
Account registration using a contactless card. A payment application executing on a device may receive a request to generate a payment account using a contactless card. The payment application may receive encrypted data from the contactless card and transmit the encrypted data to a server associated with the contactless card. The device may receive a push notification from the server and open an account application associated with the contactless card responsive to selection of the push notification. The account application may receive confirmation to generate the payment account using the contactless card and transmit the confirmation to the server. The device may open the payment application responsive to receiving verification of the encrypted data from the server. The payment application may fill form fields with account data received from the server and generate the payment account using the account data received from the server filled into the form fields.
DYNAMIC MODIFICATION OF A VERIFICATION METHOD ASSOCIATED WITH A TRANSACTION CARD
A device may determine that a verification method associated with a transaction card is to be modified from a first verification method to a second verification method. The first verification method and the second verification method may use different types of verification information. The device may provide a set of instructions to the transaction card after determining that the verification method is to be modified. The set of instructions may cause the transaction card to modify the verification method from the first verification method to the second verification method. The device may provide information identifying a modification to the verification method to a transaction backend device to notify the transaction backend device that the verification method associated with the transaction card has been modified from the first verification method to the second verification method.
Devices and methods for providing emergency information using a payment card
A card for storing both emergency information and payment information is disclosed. The card can be used by an emergency responder to retrieve emergency information for the user. The emergency information can enable the emergency responder to better render aid to the user. The card can have one or more processors, a sensor, and a memory in communication with the one or more processors and storing an application thereon. The application can cause the card to receive a request from a user device (e.g., from an emergency medical technician, or EMT) to access emergency information stored in the memory, transmit a security challenge to the user device, authenticate a received response to the security challenge from the user device, and transmit the emergency information to the user device.