G06Q20/4012

SYSTEM AND METHOD FOR A SOCIAL NETWORKS PAYMENT ACCEPTANCE PROCESSING SYSTEM USING BIOMETRICS, ENCRYPTION, AND TOKENIZATION TO SECURELY STORE INFORMATION

A social media based online payment system that allows a customer to use his/her voice to make a payment. Once the cardholder voice is enrolled into the bank's APP or the first payment is made via the social media application—such as the WhatsApp® messaging application or the Facebook® Messenger application, all future payments can be made with a simple voice command, secured through biometric voice authentication. The customer does not need to share sensitive credit/debit card information every time he/she makes a payment. The system tokenizes and encrypts the card information, and also registers the customer's voice fingerprint. The customer can make future payments to any affiliated merchant with a voice command, as simple as sending a voice message through the social media application. Businesses can send payment requests to their customers through social media messages. The customer may attend to the merchant's messages whenever he/she wishes, without jeopardizing financial safety and without receiving annoying phone calls for payments.

SECOND FACTOR FOR SECURE PASSWORD AUTHENTICATION
20230216843 · 2023-07-06 ·

At an authorization server, a shared secret electronic key may be shared with a second computer. A selection to use a system to complete a transaction may be received from a first computing device. An image may be communicated to the first computing device. A digital representation entered by the user representing the image and a PIN based on the copy of the shared electronic key may be received from the second computing device. The system and method may determine if the digital representation entered by the user on the second computing device matches the image communicated to the first computing device. The system and method may determine if the PIN based on the copy of the shared electronic key from the second computing device is as expected. In response to determining the digital representation entered by the user matches the image and the PIN the second computing device is as expected, the user may be authorized.

Method for processing transaction data, corresponding communications terminal, card reader and program

A method for processing transaction data, implemented by a communications terminal having a touch screen. The method includes: detecting a necessity of entering a piece of personal identification data; transmitting to a card reader connected to the communications terminal a request for supporting a display of a virtual keypad, the request comprising a piece of data representing a passage of the communications terminal from a “master” mode to a “slave” mode of operation, the slave mode leading to implementation of the method for processing transaction data under the exclusive control of the card reader; of entry, by the user on the virtual keypad, of the piece of personal identification data; and receiving, from the card reader, the piece of personal identification data.

SYSTEMS AND METHODS FOR CENTRALIZED AUTHENTICATION OF FINANCIAL TRANSACTIONS

Disclosed are systems and methods for centralized authentication of financial transactions. An authentication server receives, from a client device, information for a financial transaction. In accordance with an embodiment of the disclosure, the authentication server executes in a kernel-based environment at least one authentication step based on the information. For example, in some implementations, the authentication server generates a PIN block and transmits the PIN block to a financial gateway, along with a request for the financial transaction. Notably, the client device does not need to perform the authentication steps executed by the authentication server, such as generating the PIN block for example. This can enhance security of the transaction system because information such as a terminal key used to generate the PIN block remains centralized and not on a client device where it could possibly be stolen by a criminal.

PREMISES SECURITY SYSTEM WITH SECURE EMBEDDED CRYPTOCURRENCY STORAGE
20230214835 · 2023-07-06 ·

A cryptocurrency management device configurable to communicate with a security system base station is described. The cryptocurrency management device comprises processing circuitry configured to receive a personal identification number (PIN) from the security system base station; provide access to a cryptocurrency wallet based on the PIN; and perform a cryptocurrency transaction associated with the cryptocurrency wallet subsequent to providing access to the cryptocurrency wallet.

Systems and methods for routing electronic transactions using network simulation and forecasting
11551218 · 2023-01-10 · ·

Systems and methods are for routing electronic payment transactions to PIN-less networks using payment pseudo-networks and electronic transaction simulation. One method comprises: receiving transaction-related information from a merchant, the transaction-related information including a bank identification number (“BIN”), one or more available network IDs, one or more merchant categories, an issuer regulatory status, a transaction amount, and a preferred status; extracting routing criteria from the received transaction-related information; dynamically identifying one or more eligible networks based on extracted routing criteria; dynamically identifying one or more breakeven transaction amounts for each identified eligible network, each breakeven transaction amount defining a point at which two or more eligible networks have the same expenses for a given transaction amount; and routing signature debit transactions from the merchant to a least cost PIN-less network selected from the eligible networks based on identification of a desired breakeven transaction amount for the PIN-less network.

Injecting exchange items into an exchange item marketplace network

A method begins by monitoring exchange item transactions occurring in an exchange item marketplace network. The method continues with generating trend information based on the monitored exchange item transactions and determining attributes for a targeted marketing program based on the trend information. The method continues with identifying a subset of buyer computing devices based on the attributes. The method continues by generating offer information based on the targeted marketing program and sending the offer information to the subset of buyer computing devices. When receiving a purchase request from a buyer computing device, the method continues by generating an exchange item request regarding an exchange item and sending the exchange item request to a branded server associated with the exchange item. The method includes receiving offer exchange item information from the branded server and sending at least a portion of the offer exchange item information to the buyer computing device.

ATM intercommunication system and method for fraudulent and forced transactions

Various methods, apparatuses/systems, and media for implementing a multi-tier intercommunication module (MTIM) for an automatic teller machine (ATM) to prevent fraudulent and forced transactions are provided. A processor within the MTIM verifies whether an anomaly withdrawal transaction is occurring based on analysis of a user's normal banking behavior. When anomaly transactions are detected, the processor transmits a notification to the user's registered Multi-Factor Authentication (MFA) device to verify whether the transaction is fraudulent. Additionally, the MTIM provides a continuous feedback loop of user location data when forced transactions have been triggered. Forced card transactions are allowed completion and the MTIM sends a custom security code (CSC) to the user's registered MFA mobile device. An application module, running on this MFA device, upon receiving this CSC will automatically send continuous push notifications on pre-determined time deltas containing location data of the user to a security module operated by a local authority.

Merchant terminal for receiving payment from a vehicle

Methods, systems, apparatus, and non-transitory computer readable media are described for using a vehicle as a payment device. Various aspects may include receiving a selection of a stored financial card or financial account at a vehicle head unit. The selected financial card or financial account may be transmitted to a point-of-sale (POS) terminal for making a payment by transmitting a tokenized card number to the POS terminal. The tokenized card number may be transmitted over a very short-range communication link to ensure that the transmission is secure. For example, electronic circuitry may be attached to the exterior of the vehicle, where the electronic circuitry may be within a threshold distance (e.g. one inch, three inches, six inches, one foot, three feet, etc.) of the POS terminal. The tokenized card number may be transmitted from the vehicle head unit to the electronic circuitry and then to the POS terminal.

Systems and methods for kiosk or payment terminal-based touchless interactions using mobile electronic devices

Systems and methods for kiosk or payment terminal-based touchless interactions using mobile electronic devices are disclosed. In one embodiment, at a cloud-based information processing apparatus comprising at least one computer processor, a method for interacting with a kiosk or payment terminal using a mobile electronic device may include: (1) receiving, from a mobile electronic device and at a uniform resource locator, a communication comprising an identifier for a kiosk or payment terminal comprising a screen; (2) receiving, from the mobile electronic device, touch data corresponding to user input to a touch-sensitive input on the mobile electronic device; and (3) communicating the touch data to the kiosk or payment terminal. The kiosk or payment terminal may graphically represent the touch data by moving a cursor on the screen.