Patent classifications
G06Q20/38215
Method and device for implementing password-free EMV contact transaction
A method for realizing an EMV contact transaction without a password, wherein said method is implemented by an EMV IC card and a terminal, wherein when a terminal receives transaction information, it sets a password-free function setting; performs an offline data validation and limitation; performs terminal risk management and a behavior analysis; determines, on the basis of the password-free function setting, whether to perform online processing and performs transaction termination processing; the password-free function setting comprises: when an optional kernel configuration flag in an application parameter corresponding to the current application acquired is set and the transaction amount in the transaction information is greater than a password-free IC card transaction limitation amount, the current application is configured so that verifying the cardholder's PIN is obviated. The present invention allows password-free small-amount transactions, and obviates to upgrade IC cards.
Payment systems and methods for in-store and online purchases
Systems and methods for implementing payments or mobile payments. In an aspect of in-store purchase, a merchant sends a payment amount and merchant account info to transaction center. A buyer sends a code and buyer account info to transaction center. The code represents the merchant. In an aspect of online purchase, an e-commerce merchant provides options for a buyer to use names other than a first name plus a surname. In one embodiment, a buyer submits a shortened name or nickname for online purchases when a given payment service is used as a payment method.
SYSTEM, METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIA FOR MANAGING NON-FUNGIBLE TOKEN
A networked computer system for storing promotional awards associated with non-fungible tokens (NFTs) is described herein. The networked computer system includes a master engagement record blockchain system including a plurality of master engagement records associated with NFTs, an engagement computer server system, and a plurality of kiosk terminals. A kiosk processor is programmed to capture a dynamic NFT verification (DNV) displayed on a user's mobile device via a kiosk camera and display the plurality of engagement activities via the display touchscreen. The processor of the engagement computer server system performs algorithm steps including determining a promotional award associated with the user selected engagement activity upon receiving the engagement activity completion message from the kiosk processor, and recording a master engagement record to the master engagement record blockchain system associating the determined promotional award with the user owned NFT.
Biometric authentication during voice data transfers
There are provided systems and methods for biometric authentication during voice data transfers. A user may initiate voice communications with a service provider endpoint that provides automated services to the user through the voice or audio communications, such as an interactive voice response (IVR) system where a user may navigate menus through audio commands. The user may by required to authenticate their identity during the phone call or other voice data transfer, which may be done by entering a biometric, such as a fingerprint. The biometric may be converted to biometric feature data and provided to one or more token service providers. The token service providers may provide one or more tokens for the biometric, which may be used as the authentication token. This token may then be transmitted to the IVR system through the user's endpoint using a dialer feature of the endpoint.
METHODS AND SYSTEMS FOR ENHANCING PURCHASE EXPERIENCE VIA AUDIO WEB-RECORDING
A computer system includes a processor programmed to process a first web page to identify a hyperlink contained thereon. The hyperlink includes a link to a second web page. The processor performs natural language processing on the first web page to determine one or more context word tokens and on the second web page to determine a context of the second web page. The processor also applies a context relevant tag to the hyperlink to generate a tagged hyperlink. The processor maps at least one of the context word tokens to the context relevant tag applied to the hyperlink and generates a transaction score for the tagged hyperlink.
AGREEMENTS ON THE BLOCKCHAIN
A computer-implemented method of recording an agreement between a requesting party and a confirming party on a blockchain, wherein the method is performed by the requesting party and comprises: generating a request transaction, wherein the request transaction comprises an input signed by the requesting party, and at least a first output comprising a cryptographic puzzle based on a first data item known to both the requesting and confirming parties, wherein the first data item represents the agreement; and causing the request transaction to be transmitted to one or more blockchain nodes.
LONGITUDINAL SYSTEM USING NON-FUNGIBLE TOKENS THAT EVOLVE OVER TIME
Certain embodiments of the present disclosure relate to a system and method for the assignment of access rights and an NFT to a user device. The method includes assigning a non-fungible token (NFT), linked with the access rights, to the account associated with the user device based on the assignment of the access rights from the list of unfilled access rights. The method further includes verifying the validity of the access rights linked with the NFT, when the user device is requesting access to the resource, based on scanning information provided on the access rights and referencing a transaction history of the NFT in the blockchain, and transmitting at least one updated NFT and privilege to access the resource to the user device based on the verification of the access rights linked with the NFT.
Interoperable mobile-initiated transactions with dynamic authentication
A transaction is pre-staged by providing transaction preferences, such as a financial instrument, a transaction type, and a transaction amount, to a user device. The user device captures a visual code at a terminal, such as an ATM. The visual code includes terminal attributes, including a signed hash and call-back URI. The user device authenticates the visual code using the signed hash and requests the transaction through the issuer server. The issuer server creates and sends the card data to the call-back URI. The terminal uses the card data to create a transaction request it routes to through its acquirer server.
Data storage and management and methods of thereof
Described herein are various methods of sharing data across multiple computers. The method of sharing data permits the pruning of data from the shared data.
System and method for generating a dynamic machine readable code
Aspects of the present disclosure involve systems, methods, devices, and the like for generating dynamic machine readable codes. In one embodiment, a system is introduced that enables the analysis of user information for the generation of the dynamic machine readable code. In response to the analysis, using middleware on a multi-tier system, user information is embedded onto the dynamic machine readable code. The embedded user information can be captured during the transaction enabling the presentation of customized content which can be used to provide a user friendly interface for the transacting while detecting incorrect account usage. In another embodiment, in conjunction with the dynamic machine readable code, additional user and/or device features are captured during the processing of a transaction such that the combination facilitate fraudulent activity detection.