Patent classifications
G06Q20/4012
Payment Network for Security Assets
In one embodiment, a securities transaction system includes a ledger storing securities balances of security assets managed by a payment service and owned by users of the payment service. The securities balances relate to securities purchased on from a securities exchange system. The securities transaction system includes processors for executing instructions executable to send, to a mobile wallet application associated with the payment service, information regarding one or more of the security assets managed by the payment service; receive, from the mobile wallet application, a purchase request to acquire an amount of one of the security assets; update, via the ledger, the securities balances to reflect amounts of security assets respectively managed by the payment service and owned by the user based on the purchase request; and initiate one or more transactions from the securities exchange system to maintain a specified level of the security asset.
ZERO-KNOWLEDGE PROOF-BASED VIRTUAL CARDS
Disclosed are various embodiments for issuing virtual cards to client devices. Also disclosed are embodiments for provisioning a transaction terminal to process transactions with virtual cards. A zero-knowledge proof algorithm can be utilized to validate the transactions. A virtual card can be based upon a public key of a client device that is managed by a hardware security module.
Systems and methods for authenticating potentially fraudulent transactions using voice print recognition
Methods and systems are disclosed for providing fraudulent transaction processes. In one embodiment, a method is disclosed for performing fraudulent transaction processes that may include receiving an indication that a payment transaction has been identified as potentially fraudulent, the payment transaction involving a payment account associated with a user. The method may also include receiving a candidate voice print and comparing the candidate voice print to a user voice print that is associated with the payment account. The method may further include determining, based on the comparison, whether the candidate voice print matches the user voice print, and providing an indication whether the candidate voice print matches the user voice print, the indication configured for use to determine whether to approve or deny the payment transaction.
Dynamic modification of a verification method associated with a transaction card
A device may determine that a verification method associated with a transaction card is to be modified from a first verification method to a second verification method. The first verification method and the second verification method may use different types of verification information. The device may provide a set of instructions to the transaction card after determining that the verification method is to be modified. The set of instructions may cause the transaction card to modify the verification method from the first verification method to the second verification method. The device may provide information identifying a modification to the verification method to a transaction backend device to notify the transaction backend device that the verification method associated with the transaction card has been modified from the first verification method to the second verification method.
Secure smart container assembly, systems, and methods
A bin assembly, bin identification system and method are disclosed. A container bin assembly includes a bin body, a latching mechanism, and controller. A method includes receiving, via a communication interface, an authenticated request to access the smart container, actuating an electromechanical latch to disengage a fastening hook, thereby initiating a mechanical movement of an access component to make an internal compartment accessible, outputting, via an audiovisual element, an alert to identify the container, confirming that the electromechanical latch has re-engaged with the fastening hook, thereby securing the internal compartment, determining a change in a local inventory, and updating the local inventory in a non-volatile data store according to the change.
AUGMENTED REALITY-ENABLED ATM FOR SECURE AUGMENTED REALITY CHECK REALIZATION
An Augmented Reality (AR)-enabled Automated Teller Machine (ATM) receives a request to dispense cash equal to amount of an AR document. The AR document comprises an AR check. The AR-enabled ATM fetches a first AR check image from a memory. The AR-enabled ATM extracts a first set of features from the first AR check image. The AR-enabled ATM receives a second AR check image from a computing device associated with the receiver. The AR-enabled ATM extracts a second set of features from the second AR check image. The AR-enabled ATM compares the first AR check image with the second AR check image. The AR-enabled ATM determines whether the first AR check image corresponds to the second AR check image. In response to determining that the first AR check image corresponds to the second AR check image, the AR-enabled ATM dispenses cash equal to the amount.
Mobile wallet card carousel
A mobile wallet computing system associated with a mobile wallet database includes a mobile wallet circuit structured to present a mobile wallet interface a mobile wallet user. The mobile wallet interface includes a first portion that includes a graphical depiction of a user payment vehicle associated with a financial institution, the first portion including a first interaction point that enables the user to initiate a sequence to engage in a mobile wallet transaction using the mobile wallet. The interface also includes a second portion that includes a second interaction point and a third interaction point, the second interaction point enabling the user to access a functionality enabling the user to indicate a transaction preference for a transaction with an entity other than the mobile wallet provider or financial institution, the third interaction point enabling the user to indicate a preference to initiate communications with the financial institution.
Fraud deterrence for secure transactions
An illustrative fraud deterrent method includes presenting an identity verification option for a first website displayed in a web-browser, the option including offering a login to a third-party website, unrelated to the first website. The method further includes receiving login information for a first user account on the third-party website and verifying the login information through a verification service associated with the third-party website, to verify that the login information is valid for the first user account, identified by the login information. The method additionally includes verifying an identity at the first website, responsive to the verification.
SYSTEMS AND METHODS FOR SINGLE MESSAGE TRANSACTIONS WITH BATCH SETTLEMENT
A computer-implemented method for processing single message transactions with batch settlement may include receiving a dual-message transaction from a merchant, converting the received dual-message transaction to a single-message transaction, setting a flag on the converted single-message transaction indicating the conversion to a single-message transaction, receiving a batch settlement file from the merchant, for each transaction in the batch settlement file, determining whether the single-message transaction conversion flag is set, upon determining that the single-message transaction conversion flag is not set, storing the transaction for later processing, and upon determining that the single-message transaction conversion flag is set, sending the transaction to a payment network.
SYSTEMS AND METHODS FOR CONDUCTING REMOTE USER AUTHENTICATION
Disclosed embodiments may include a system that may receive, from a user device associated with a user, authentication rule(s), each authentication rule associated with respective merchant(s) and comprising respective required authentication factor(s) for completing a transaction with the respective merchant(s). The system may identify a user has navigated to a merchant webpage and may determine at least one rule of the authentication rule(s) associated with the merchant. The system may identify first required authentication factor(s) corresponding to the at least one rule, and may cause the user device to display, via a GUI, the first required authentication factor(s). The system may receive, via the user device, authentication information associated with the user. The system may determine whether the authentication information satisfies the first required authentication factor(s). Responsive to making that determination, the system may enable the user to complete a transaction via the merchant webpage.