G06Q20/3574

SYSTEMS AND METHODS FOR DYNAMIC INCLUSION OF ENHANCED DATA IN TRANSACTIONS

Systems and methods for dynamic inclusion of enhanced data in transactions are disclosed. According to another embodiment, in an information processing apparatus comprising at least one computer processor, a method for conducting a mobile wallet payment with dynamic enhanced data using a mobile payment application may include: (1) receiving, from a merchant point of transaction device, a transaction request from a mobile payment application executed by a mobile electronic device, the transaction request comprising a unique identifier for a financial instrument provisioned to a mobile wallet computer application and a payment option selection; and (2) processing the transaction request according to the payment option selection.

Trusted internal interface

An interface and device architecture for a payment device. An interface between a payment application installed in a payment device and one or more value-add applications (such as loyalty programs, transit applications, etc.) that are also installed in the payment device. The API or interface design permits communications and data transfer between the payment application and one or more value-add applications. This reduces (and in some cases may prevent) the need for back-end server processing of data that may be relevant to both a payment transaction and to a function of the value-add application. Similarly, the same or another API or interface may enable communications and data transfer between a value-add application and the payment application.

ELECTRONIC CHIP FOR STORING PLURALITY OF LINKED ACCOUNTS
20170357962 · 2017-12-14 ·

According to a first aspect of the invention, there is provided a carrier comprising an electronic chip having stored thereon data identifying a plurality of accounts each linked to a respective issuer, wherein the electronic chip is configured to instruct a terminal reading the electronic chip to prompt for selection of one of the plurality of linked accounts before initiating a financial transaction.

Method of accessing applications in a secure mobile environment
09843933 · 2017-12-12 · ·

A method of accessing, in a mobile communication device, an application issued by a Service Provider from a trusted application, also known as a wallet. A secure element, such as a SmartMX device, comprises a service manager that manages the application and a link between the application and an application-codec issued by the Service Provider, wherein the application-codec is designed for interfacing between the service manager and the application, for processing an access request requesting access to the application received from the service manager and, triggered by the wallet, accessing the application via the service manager by means of the link between the application and the application-codec, such that the application-codec linked with the respective application performs accessing the application under control of the service manager.

METHOD AND SYSTEM FOR MANAGING THE DISTRIBUTION OF AID OR BENEFITS INVOLVING MULTIPLE PARTNERS SHARING AN INFRASTRUCTURE

A method for managing programs associated with multiple entities on a payment card includes: storing lease profiles, each lease profile including a lease identifier, managing identifier, transaction account numbers, and one or more tenant identifiers; receiving a management request, the management request including a specific lease identifier, specific managing identifier, and requesting tenant identifier; identifying a specific lease profile that includes the specific lease identifier; verifying that the specific managing identifier corresponds to the managing identifier included in the specific lease profile; inserting the requesting tenant identifier into the specific lease profile; receiving a program request, the request including the specific lease identifier, the requesting tenant identifier, and program data; and transmitting the program data to a payment card corresponding to one of the transaction account numbers included in the specific lease profile.

Secure and safe method to disabling payment functionality on lost or stolen transaction cards

The disclosure includes systems and methods for disabling a payment function of a transaction card. The system receives payment account data from a transaction card and transmits a payment authorization request message to a card issuer associated with the transaction card. The system receives, from the card issuer, an authorization request response message. The authorization request response message declines the transaction and includes a status response code corresponding to a status of the transaction card. The system determines whether the status response code indicates that the transaction card is to be captured, and if so, disables the payment function of the transaction card via activation of a disabling system.

SYSTEMS AND METHODS FOR USER VERIFICATION VIA SHORT-RANGE TRANSCEIVER
20220051241 · 2022-02-17 ·

Systems, methods, and computer-accessible mediums for user verification through the interaction of a short-range transceiver, such as a contactless card, with a client device are presented. User verification may be provided in the context of reading two types of data from the short-range transceiver, such as a contactless card, using a client device, sending the data to a server, obtaining identifiers from each data type and comparing with stored user identifier data. Matching stored user identifier data to two forms of identification data obtained from a short-range transceiver, such as a contactless card, provides an enhanced ability to verify that the short-range transceiver is being used by an authorized user.

DYNAMIC MULTIPLE-APPLICATION SYSTEMATIC FRAMEWORK FOR INTEGRATED CIRCUIT CARD AND INFORMATION PROCESSING METHODS BASED ON THE FRAMEWORK
20170250810 · 2017-08-31 · ·

A multiple-application systematic framework for an IC card comprising a card issuer device 10, a service provider device 20 and a user terminal device 30, in which the three devices are interconnected by a first communications means. The card issuer device 10 comprises a card-issuing module 100 and a service provider management module 101. The service provider device 20 comprises a service module 200. The user terminal device 30 comprises an IC card 300 supplied by a card issuer and a communications device 301 comprising an application control module 3010, the IC card 300 comprises an authentication and security management module 3000 and a multi-application data storage area 3001. The communications device 301 and the IC card 300 communicate through a second communications means. The service provider management module 101 enables the service module 200 to use storage space in the multi-application data storage area 3001 for providing a service to a user via a service token, and the service module 200 communicates with the application control modulo 3010 enable a user and/or at least one service provider to manipulate one or more service tokens in the IC card 300.

Payment systems and methods for managing payment card use

A method, at a mobile device, of assigning a preferred payment application stored on the mobile device to a merchant, the method comprising the steps of: receiving a selection of a merchant at the mobile device; receiving a selection of a preferred payment application; and mapping the payment application to the merchant by creating a record containing an application identifier and a merchant identifier.

SECURE CONTACTLESS CARD EMULATION
20170221047 · 2017-08-03 ·

A device may detect a trigger to perform a contactless transaction. The trigger may relate to the device being within a threshold proximity of a point of sale device. The device may provide a dynamic card identifier associated with the device based on detecting the trigger to perform the contactless transaction. The device may exchange data, with the point of sale device after providing the dynamic card identifier, to perform a mutual authentication to establish a secure session. The data may be encrypted based on a dynamic diversified key associated with the dynamic card identifier. The dynamic card identifier and the dynamic diversified key may be valid for a threshold period of time and may be invalid after the threshold period of time. The device may perform the contactless transaction via the secure session based on exchanging the data to perform the mutual authentication to establish the secure session.