Patent classifications
G06Q20/4012
Systems and methods for cloud based pin pad device gateway
A method of processing payment transactions includes receiving a connection request from a client device, determining whether a gateway is available for the client device, creating a connection between the client device and a gateway, the gateway being a previously existing gateway or a newly generated gateway, creating a message filter for the client device on a message bus, listening for messages on the message bus and transmitting the message to the client device by way of the gateway upon finding a message on the message bus matching the message filter.
SYSTEMS AND METHOD FOR ENABLING SECURE TRANSACTION
Embodiments of the present invention provide systems and methods of generating a secure transaction, particularly when the transaction is made using a mobile computing device. This is achieved by eliminating the need for cryptographic keys to be stored on the mobile computing device, by firstly creating a strong link between users and their devices, and storing this pre-defined link with a trusted authentication service (i.e. in a secure backend payment system), and secondly using the pre-defined link between user and device to generate a unique, electronic or digital signature for a transaction which will authorise a payment, wherein the digital signature having been generated by using authentication information comprising a first authentication identifier and a second authentication identifier.
Method and system for facilitating invoice data, payment credit transfers, real-time package tracking, and account-to-account payment on delivery
A method for real-time invoice updating and account-to-account payment includes: receiving invoice data based on presentation of an invoice by a distributor to a recipient at a delivery location, modification of the invoice by the recipient, and acceptance of the invoice by the recipient; generating a request for payment (RFP) message based on the invoice data; transmitting the RFP message to a financial institution associated with the recipient via a financial institution of the distributor; receiving, from the financial institution associated with the distributor, a payment confirmation for the invoice based on a real-time payment from the financial institution associated with the recipient; generating reconciliation data based on the payment confirmation and the invoice data; and transmitting the reconciliation data to a computing device of the distributor and a computing device of the recipient.
Techniques for multi-voice speech recognition commands
Various embodiments are generally directed to techniques for multi-voice speech recognition commands, such as based on monitoring a telecommunications channel between first and second devices, for instance. Some embodiments are particularly directed to prompting initiation of a transaction between a first entity associated with a first device and a second entity associated with a second device based on detection of an audible request corresponding to the second entity and an audible response corresponding to the first entity.
Dynamic risk assessment for security features
Techniques are described for determining account features based on a risk assessment. A first set of account features may be determined, including security feature(s) such as mode(s) for authenticating and/or verifying the identity of a user associated with account(s). Based on the first set of features, a risk metric may be determined for the account(s). The risk metric may indicate a risk that fraud may be committed against the account or using the account. Based on the determined risk metric, a second set of account features may be determined for the account(s). The first and second sets of account feature(s) may be applied to the account(s). Disabling a particular feature may cause a reevaluation of the risk metric and a redetermination of the feature sets to be applied to the account(s).
SYSTEMS AND METHODS FOR BUDGET, FINANCIAL ACCOUNT ALERTS MANAGEMENT, REMEDIAL ACTION CONTROLS AND FRAUD MONITORING
A method includes applying at least one fraud management machine learning algorithm to a corpus of payment card account transactions. A fraud management profile is built for a payment account holder who performed the payment card account transactions. After the algorithm is applied, the account holder is issued access to perform EFT (electronic funds transfer) transactions via an EFT network switch. The EFT transactions are initiated by the account holder at payment card account acceptance points. The EFT transactions are funded by a bank deposit account owned by the account holder. The fraud management profile is applied to perform fraud management review of the EFT transactions.
Methods of using a cellular telephone
Various switchable devices, e.g., cellular telephones, including inductive and/or RF antennas are disclosed. These switchable devices may include one or more switches and a biometric sensor. Some of these one or more switches are optionally wireless and/or manual. In various embodiments, the switchable devices include are included within cellular phones, security devices, identity devices, financial devices, remote controls, and the like. The switchable devices are optionally configured to perform financial transactions.
Secured authentication techniques with dynamism and connected overlapping inputs from various sources
Aspects of the present invention disclose a method for dynamic password inducing techniques for security configuration and validation of a user. The method includes one or more processors identifying textual data of a user. The method further includes generating a set of password parameters for a password. The method further includes identifying one or more password dynamisms of the user from one or more sources, where the one or more password dynamisms are dynamic inputs, from the user, to an authentication device. The method further includes modifying the textual data to include a text placeholder, wherein the text placeholder includes a replacement parameter that induces the user to provide a password dynamism. The method further includes configuring the set of password parameters for the password of the user based at least in part on the one or more password dynamisms of the user from the one or more sources.
SYSTEM FOR DATA ROTATION THROUGH TOKENIZATION
Embodiments rotate data by tokenization. Embodiments determine one or more check data fields of a check such as check number and routing number; generate a PIN based on the determined check data fields; receive user input of a user PIN; compare the generated PIN with the inputted user PIN; if the generated PIN matches the inputted user PIN, proceed with the transaction; and if the generated PIN does not match the inputted user PIN, cancel the transaction. In some cases, a point of sale terminal comprising a scanner for scanning the check to determine the one or more check data fields. In some cases, receiving user input of the user PIN comprises receiving, by a communication device of the system from a mobile device of the user, a text message, SMS message or phone call comprising the user input of a user PIN.
Processing of financial transactions using debit networks
Methods and systems are disclosed for executing financial transactions between customers and merchants. An identifier of a financial account is received from the customer at a merchant system. A one-time password is also received from the customer at the merchant system, with the customer having been provided with the one-time password by a mobile electronic device or contactless presentation instrument. A cryptogram is generated to include the identifier of the financial account encrypted using the one-time password. An authorization request is formulated at the merchant system. The authorization request includes the cryptogram and transaction information describing at least a portion of the financial transaction. The authorization request is transmitted from the merchant system to an authorization processor for authorization of the financial transaction.