G06Q20/3563

Method of authenticating a customer, method of carrying out a payment transaction and payment system implementing the specified methods
11682008 · 2023-06-20 ·

The invention relates to the field of technical infrastructures that ensure the implementation of financial transactions between economic entities, in particular to payment systems that provide ease of use and confidential data security. The present invention is the method of authenticating a customer, the method of carrying out a payment transaction comprising said authentication method, and the payment system implementing the specified methods, which ensure the achievement of a technical effect consisting in expanding the functionality of the payment system and reducing its vulnerability, in particular, by making it possible to conduct a payment transaction in a contactless way, on condition that the reference value of the customer authentication data is stored exclusively on the customer's device, as well as by combining the advantages of online and offline customer authentication procedures.

Methods and systems for providing updates to and receiving data from devices having short range wireless communication capabilities

A method for providing a software update package (SUP) to an Internet of Things (IoT) device via a user's communication device (UCD) is disclosed. In some embodiments, the method includes the UCD automatically discovering that a SUP needs to be provided to the IoT device. The UCD obtains the needed SUP from a software administration server (SAS). The UCD transmits the SUP to the IoT device using a first short range wireless signal. After transmitting the SUP to the IoT device, the UCD receives confirmation data transmitted wirelessly by the IoT device using a second short range wireless signal. The confirmation data confirms that the IoT device received the SUP. The UCD transmits the confirmation data to the SAS. The SAS may verify the confirmation data and, if verified, provide a reward to the user of the UCD. In this way, crowd sourcing can be used to provide SUPs to many IoT devices.

Configuring a set of applets on a battery-less transaction card

A transaction card may power on the transaction card using electric current induced from an interaction of the transaction card with an electromagnetic field. The transaction card may establish a communication with a device. The communication may indicate that the transaction card has powered. The transaction card may receive, from the device, a set of instructions to configure a set of applets on the transaction card after notifying the device that the transaction card has powered on. The set of applets to be configured may be related to completing one or more different transactions. The set of applets to be configured may be different than another set of applets already configured on the transaction card. The transaction card may configure the set of applets on the transaction card according to the set of instructions after receiving the set of instructions.

METHOD AND SYSTEM FOR MANAGING THE DISTRIBUTION OF AID OR BENEFITS INVOLVING MULTIPLE PARTNERS SHARING AN INFRASTRUCTURE

A method for managing programs associated with multiple entities on a payment card includes: storing lease profiles, each lease profile including a lease identifier, managing identifier, transaction account numbers, and one or more tenant identifiers; receiving a management request, the management request including a specific lease identifier, specific managing identifier, and requesting tenant identifier; identifying a specific lease profile that includes the specific lease identifier; verifying that the specific managing identifier corresponds to the managing identifier included in the specific lease profile; inserting the requesting tenant identifier into the specific lease profile; receiving a program request, the request including the specific lease identifier, the requesting tenant identifier, and program data; and transmitting the program data to a payment card corresponding to one of the transaction account numbers included in the specific lease profile.

METHOD AND SYSTEM FOR ALLOCATING AND TRANSACTING WITH MULTIPLE NON-FINANCIAL COMMODITIES

A method for conducting an offline, commodity-based transaction includes: storing program data for benefit programs, wherein the program data includes a program identifier and plurality of commodity pairs for the respective program, each commodity pair including a commodity code and balance; receiving a data request from a point of sale device, the request including a specific program identifier; identifying program data the specific program identifier; transmitting the identified program data to the point of sale device; receiving transaction data from the point of sale device, the transaction data including purchased commodity pairs, each purchased commodity pair including a commodity code and purchased amount; and updating the program data for the benefit program that corresponds to the specific program identifier by deducting the balance included in each commodity pair corresponding to a purchased commodity pair based on the respective commodity codes by the associated purchased amount.

VERIFIED REVIEWS USING A CONTACTLESS CARD
20220358533 · 2022-11-10 · ·

Systems, methods, articles of manufacture, and computer-readable media for verified reviews. An application may receive an indication to generate a review. An application programming interface (API) of the application may receive, from a communications interface of a contactless card, encrypted data generated by the contactless card. The API of the application may transmit, to an authentication server: the encrypted data, an indication of the application, and an identifier associated with the entity. The API of the application may receive indications specifying that the authentication server decrypted the encrypted data and determined that the contactless card was used to make a purchase with the entity. The application may permit, based on the indications received from the authentication server, generation of the review. The application may publish the review to one or more review platforms associated with the application.

IC card with fingerprint recognition function and working method thereof
11263507 · 2022-03-01 · ·

A working method for an IC card having a fingerprint recognition function, comprising: an IC card receiving and determining an instruction type from a terminal, and when determined that the received instruction is an application selection instruction, the IC card selecting an application and returning a response to the terminal; when determined that the received instruction is a processing option acquisition instruction, the IC card acquiring a user fingerprint information verification state according to the content of the instruction, and if verification is successful, returning to the terminal a processing option instruction response containing an application file locator list for which a personal identification number does not need to be verified; if verification fails, returning to the terminal a processing option instruction response containing an application file locator list for which a personal identification number must be verified; when determined that the received instruction is a record reading instruction, the IC card returning a record reading response to the terminal according to the record reading instruction, wherein the record reading response contains a method for verifying a card holder. Thus, the risk of a personal identification number being leaked is avoided, thus enhancing the security of a transaction, while also improving user experience.

DATA INTERACTION METHOD AND SYSTEM
20170337545 · 2017-11-23 ·

A data interaction method and system, wherein the method includes: obtaining a real card information list of smart cover end by a smart cover; prompting the real card information list of smart cover end by the smart cover; receiving a real card selecting instruction by the smart cover, determining a selected real card by the smart cover; receiving first data sent from a transaction terminal by a simulation card, and sending the first data to the smart cover by the simulation card; prompting the first data by the smart cover, receiving a confirming instruction for confirming that the first data is correct by the smart cover, and sending the first data to the real card manager by the smart cover; and receiving the first data sent from the smart cover by the real card manager, and sending the first data to the selected real card by the real card manager.

SYSTEMS AND METHODS FOR AUTHENTICATED PEER-TO-PEER DATA TRANSFER USING RESOURCE LOCATORS
20220368692 · 2022-11-17 ·

An authenticated data transfer system may include generating, after entry of one or more processors of a transmitting device into a communication field, a link, the link comprising a near field communication data exchange format uniform resource locator including identifier data and user data; transmitting, to a first application comprising instructions for execution on a first device, the link to initiate data transfer; authenticating a user associated with the first device by activating one or more actions based on the link; transmitting one or more requests for confirmation of quantity and recipient data associated with the data transfer; receiving one or more notifications that are based on the one or more requests for confirmation of quantity and recipient data associated with the data transfer; and performing one or more login credentials that are responsive to the one or more notifications so as to complete the data transfer.

Information processing apparatus and method, recording medium, and program
09785780 · 2017-10-10 · ·

Information processing apparatus and method, recording medium, and program are provided. An information processing apparatus includes the following elements. A receiver receives a command requesting for the execution of predetermined processing. A storage unit stores data and first information indicating, among a plurality of stages in a lifecycle of the information processing apparatus, the current stage determined by the stored data and second information indicating an executable command in the current stage, the executable command being determined for each of the plurality of stages. A determining unit determines on the basis of the first information and the second information whether the command received by the receiver is an executable command in the current stage.