G06Q20/4012

Peer-to-peer VoIP
11671534 · 2023-06-06 · ·

A Voice over Internet Protocol (VoIP) system is configured for direct communications between remote computing devices in a peer-to-peer configuration. Voice data from the communication is marked such that the voice data from the different endpoints can be combined into a unified audio stream. An authentication may be accomplished automatically prior to text or audio communication between a customer and a service agent. In some embodiments, authentication is accomplished automatically by authentication of the remote access device or accomplished by asking the customer questions. A single authentication of the remote access device may be used to authenticate a service request transferred between service agents. The authentication of the remote device may include, for example, use of a personal identification number, a fingerprint, a photograph, and/or a hardware identifier.

VOICE RECOGNITION TO AUTHENTICATE A MOBILE PAYMENT

Systems and methods are provided for authenticating mobile payments from a customer account to a merchant. The systems and methods may include a financial service provider receiving a request to authorize an electronic transaction at a point-of-sale. A financial service provider server computer may verify that the customer is present at the point-of-sale using received location data. An image having distorted text such as a captcha may be transmitted to a device at the point-of-sale, and the customer may read the captcha aloud. A voice sample of the customer may be sent to the financial service provider for comparison to stored voice recordings, to verify that the customer’s voice sample is authentic if the voice matches a previously generated voice recording for the account. If the voice sample is authentic, the financial service provider may authorize the mobile payment.

ELECTRONIC APPARATUS PROVIDING ELECTRONIC PAYMENT AND OPERATING METHOD THEREOF
20170330188 · 2017-11-16 ·

According to various example embodiments, an electronic device may include a communication module comprising communication circuitry, a short-range communication module comprising short-range communication circuitry, a One Time Password (OTP) module comprising OPT circuitry configured to generate an OTP, and a processor operatively coupled to the communication module and the short-range communication module. The processor may be configured to request an offline payment registration by transmitting an IDentification (ID) of the OTP module via the communication module, to receive an account ID based on the offline payment registration, and to store the account ID, and to generate the OTP via the OTP module at a time of an offline payment, to generate a token based on the generated OTP and the account ID, and to transmit the generated token to a Point On Sale (POS) terminal via the short-range communication module to perform a payment.

MOBILE PERSON TO PERSON VOICE PAYMENT
20170330183 · 2017-11-16 ·

Methods, systems and apparatus for conducting mobile device person-to-person voice payments. An embodiment includes a mobile device processor of a mobile device detecting a first key entry by a sender during a mobile telephone call, muting the call, prompting the sender to enter persons-to-person (P2P) security data and a payment amount, and detecting a second key entry. The mobile device processor then prompts the sender to provide voice data associated with a password, detects a third key entry, and then transmits a P2P payment request including the P2P security data, the payment amount, the voice data, sender account data, and a recipient mobile telephone number, to a mobile person-to-person (P2P) computer. The mobile device processor then unmutes the mobile telephone call and receives a P2P payment message from the mobile P2P computer.

FRAUD DETERRENCE FOR SECURE TRANSACTIONS
20230169499 · 2023-06-01 ·

An illustrative fraud deterrent method includes presenting an identity verification option for a first website displayed in a web-browser, the option including offering a login to a third-party website, unrelated to the first website. The method further includes receiving login information for a first user account on the third-party website and verifying the login information through a verification service associated with the third-party website, to verify that the login information is valid for the first user account, identified by the login information. The method additionally includes verifying an identity at the first website, responsive to the verification.

SYSTEM AND TECHNIQUES FOR AUTHENTICATED WEBSITE BASED CHECKOUT USING UNIFORM RESOURCE LOCATOR
20230169505 · 2023-06-01 · ·

Disclosed are a system, computer readable medium and a method in which a notification is received from a website that an authentication request will be received at the financial institution system within a predetermined time period. A prompt that includes a request for confirmation of a pending transaction via a near-field communication interaction with a contactless card, is presented on a mobile device that corresponds to the verification identifier of the user. In response to a near-field communication interaction responsive the prompt, an encrypted authentication payload may be received at an authentication web address as confirmation of the pending transaction. The payload is decrypted, and parameters obtained from the decrypted authentication payload. The user may be authenticated as a holder of the contactless card using one or more of the parameters. In response, the pending transaction is completed by sending user identifying information to the website.

Cash processing system, cash processing method, portable terminal and cash processing machine
11263858 · 2022-03-01 · ·

A cash processing system capable of preventing erroneous operations by an operator during cash transfer processing and enabling the cash transfer to be executed efficiently. This system comprises a first cash processing machine for performing an outgoing cash transfer, a second cash processing machine for performing an incoming cash transfer, and a portable terminal. The portable terminal is equipped with a display unit, an operation unit for receiving input of cash transfer information, including cash information, and a communication processing unit. Upon receiving outgoing cash transfer information included in the cash transfer information from the portable terminal, the first cash processing machine pays out cash based on the outgoing cash transfer information. Upon receiving incoming cash transfer information included in the cash transfer information from the portable terminal, the second cash processing machine receives cash based on the incoming cash transfer information.

DETERMINING AN AUTOMATIC ACQUISITION APPROACH FOR AN EXCHANGE ITEM REQUEST
20230169553 · 2023-06-01 · ·

A method for execution by one or more computing devices of an exchange item marketplace network includes determining an issue regarding an exchange item of an exchange item request between a mobile computing device and a point-of-sale device, where the issue prevents the exchange item request from being executed. The method further includes obtaining a set of acquisition and utilization factors based on one or more of the exchange item request and the issue. The method further includes determining an automatic acquisition approach to resolve the issue based on the set of acquisition and utilization factors, where the automatic acquisition approach includes one or more of acquiring a new exchange item, acquiring a marketplace exchange item, and increasing a quantifiable value of the exchange item. The method further includes executing the automatic acquisition approach to resolve the issue associated with the exchange item request.

IC card with fingerprint recognition function and working method thereof
11263507 · 2022-03-01 · ·

A working method for an IC card having a fingerprint recognition function, comprising: an IC card receiving and determining an instruction type from a terminal, and when determined that the received instruction is an application selection instruction, the IC card selecting an application and returning a response to the terminal; when determined that the received instruction is a processing option acquisition instruction, the IC card acquiring a user fingerprint information verification state according to the content of the instruction, and if verification is successful, returning to the terminal a processing option instruction response containing an application file locator list for which a personal identification number does not need to be verified; if verification fails, returning to the terminal a processing option instruction response containing an application file locator list for which a personal identification number must be verified; when determined that the received instruction is a record reading instruction, the IC card returning a record reading response to the terminal according to the record reading instruction, wherein the record reading response contains a method for verifying a card holder. Thus, the risk of a personal identification number being leaked is avoided, thus enhancing the security of a transaction, while also improving user experience.

Interactive video overlay with persistent cart

Systems and methods are provided for enabling in-video shopping functionality that includes a cross-video shopping cart. For example, a user may add items to an electronic shopping cart that is persistent across two different websites or pages, where items may be added to the shopping cart within overlays on two separate videos presented on the respective pages. The persistent shopping cart features may also enable a persistent shopping cart that enables joint checkout involving two or more different payment processors, two or more different third-party shopping systems, two or more different publisher systems, two or more different video hosting platforms, or two or more different client devices sharing a user account.