G06Q20/4012

Trusted service manager (TSM) architectures and methods
09852418 · 2017-12-26 · ·

A client device comprises a first secure element and a second secure element. The first secure element comprises a first computer-readable medium having a payment application comprising instructions for causing the client device to initiate a financial transaction. The second secure element comprises a second computer-readable medium having a security key, a payment instrument, stored authentication data and instructions for generating a secure payment information message responsive to the payment application. The secure payment information message comprises the payment instrument and is encrypted in accordance with the security key.

Dual/multiple pin payment account

The present invention relates to a method of authorizing a transaction process, whereby a communication between a payment device and a payment processing network is established. Subsequently a transaction is initialized at the payment device, the input of a first User Identification Metric (UIM) is requested, the input of a second UIM is requested, the first and second UIMs are verified and the transaction process proceeds if both UIMs are verified.

Consumer device based point-of-sale

Systems and related methods facilitating interactions between a merchant device, a central system and a consumer device are discussed herein. Wallet identifying data may be used to secure messages between the consumer device and the merchant device over a wireless link. For example, the merchant device may include circuitry configured to wirelessly receive the wallet identifying data from a consumer device and to transmit the wallet identifying data to the central system. In response, consumer identifying data associated with the wallet identifying data may be received by the merchant device from the central system. In some embodiments, the consumer identifying data may be associated with a unit of location, such as a dine-in location at a restaurant, to facilitate consumer service.

Method and system for secure transactions
09852426 · 2017-12-26 · ·

This invention relates to systems and methods for authenticating transactions using a mobile device based primarily on the introduction of a layer of middleware and wherein the Payment Networks, Merchants, Issuing Banks, Credit Reporting Bureaus, Insurance Companies, Healthcare Providers may customize the implementation of the services based on individual strategy and consumer preferences.

System and method for instant issue of personalized financial transaction cards

In a method for instantly issuing a personalized financial transaction card to a customer a bank employee receives customer information and card information from the customer at a branch location. The card information may include a card personal identification number (PIN) selected by the customer. The operator inputs the customer information and at least some the card information into a data processing terminal at the branch. The customer information and the card information are communicated from the branch across a network to a card services provider. At the card services provider, the PIN is entered into a PIN database and a reference number associated with the customer and a PIN offset is generated. The reference number and at least some of the customer data and card data may be stored in a card file associated with the customer. The reference number is used to retrieve the PIN from the PIN database. The retrieved PIN is then used to apply calculations to the card file. The card file is securely sent from the card services provider across the network to the branch location. Using information from the card file, the financial transaction card is printed for the customer at the branch location. In a preferred embodiment, the personalized card is instantly issued while the customer is present at the branch location.

Dynamically configuring verification information at point-of-sale devices
09852410 · 2017-12-26 · ·

Techniques and arrangements for dynamically modifying an order of a cardholder verification method (CVM) implemented at a point-of-sale (POS) device. In some instances, the techniques instruct a POS device to determine a card network or other attributed associated with a received payment instrument and determine, based on this information, whether to implement a default order of a CVM or whether to modify the order of the CVM such that the POS device requests different verification information than if the POS device did not modify the order of the CVM.

Systems and methods for use in authenticating users in connection with network transactions

Systems and methods are provided for authenticating a user in connection with a network transaction by the user, based on a biometric combination for the user. One exemplary method includes receiving an authorization request for a network transaction by a user where the authorization request includes biometric data representing at least first and second biometrics of the user. The method also includes converting the biometric data to a personal identification number (PIN) specific to the biometric data, where the first biometric is converted to a first character of the PIN and the second biometric is converted to a second character of the PIN. The method further includes appending the PIN to the authorization request and transmitting the authorization request to an issuer, thereby permitting the issuer to approve or decline the network transaction based, at least in part, on the PIN included in the authorization request.

SYSTEM AND METHOD FOR MOBILE PAYMENTS
20170364902 · 2017-12-21 ·

A system and method for distributing incentives via mobile devices is described. One embodiment, a computer-server-based method, receives a request from a merchant to generate an incentive which incentive is funded and initiated by the merchant, receives the incentive, associates the incentive with a recipient's phone number, and transmits a notification of the incentive to a mobile device associated with the recipient's phone number, the computer server acting as a server-side wallet for the incentive, the incentive being usable, through interaction with the computer server, by the recipient for the purchase of goods or services from the merchant associated with the incentive.

Electronic account settlement via distinct computer servers

A server includes a processor that receives, from a first device, initiation message(s) each including a service identifier and a service value and, for each initiation message, saves in a database a record comprising the service identifier in association with the service value. The processor receives, from a second device, authorization message(s) each including one of the service identifiers and an authorization value, and for each authorization message, validates one of the initiation messages by (i) locating in the database the record comprising the one service identifier, and (ii) confirming that the service value in the located database record matches the authorization value. The processor updates a journal with an entry identifying a transfer between a first ledger and a second ledger in an amount equal to a sum of the service values of the validated initiation messages, and provides the first device with a message confirming the transfer.

Payment methods and systems based on a deceptive pin of a payment card

A method of facilitating a transaction with a payment card of a cardholder. The method includes receiving a deceptive PIN comprising a set of characters in which one character is a deceptive character. The deceptive character is different than each of a set of actual characters of an actual PIN of the payment card. The method includes identifying the deceptive character and a position of the deceptive character among the set of characters of the deceptive PIN. The method includes determining a reconstructed PIN by replacing the deceptive character with a corresponding actual character at the position in the deceptive PIN. The actual character is determined based on a predefined mathematical expression and a predefined value for the predefined mathematical expression. The method includes authenticating the reconstructed PIN by matching the reconstructed PIN with the actual PIN. The method further includes facilitating the transaction upon successful authentication.