Patent classifications
G06Q20/4012
System, method, and computer program product for fraud management with a shared hash map
A method, system, and computer program product for fraud management with a shared hash map. A shared hash map may include a plurality of identifiers mapped to a plurality of buckets by at least one hash function. One or more buckets of the plurality of buckets may include at least one blockchain. The at least one blockchain may include fraud data associated with one or more fraudulent transactions. A method may include storing the shared hash map, receiving an update to the shared hash map, and providing a copy of the shared hash map. A method may include storing a local copy of the shared hash map, receiving transaction data associated with a transaction, accessing fraud data in the local copy of the shared hash map, and determining an authorization or a denial of the transaction based on the fraud data.
Generation of web pages for verification of data
Provided herein is a method for delivering web content to a computer user where the computer user must provide data for verification. A control presented by a first web page provided by a requesting server of a requesting party may be selected to request a further web page where data may be entered that requires verification. The requesting server may redirect the computer user to a verifying server that may provide a second web page to fulfil the request for the further web page. The second web page may be presented as a foreground window positioned over a backdrop frame. The foreground window may be provided with fields for entering the data and the backdrop frame may be provided by the requesting party. The verifying server may verify data entered in the foreground window and may send the requesting server a notification as to whether the verification was successful.
Systems and methods for providing cash redemption to a third party
A system includes one or more memory devices storing instructions, and one or more processors configured to execute the instructions to perform steps of a method. Upon receiving a request to provide cash redemption to a third party from a provider client terminal, the system may allocate an amount of cash to a temporary financial account and generate a temporary access code that may be used to access the cash in the temporary financial account. The system may transmit the temporary access code to a recipient client terminal and upon an ATM terminal's receipt of the input access code, the system may authorize the withdrawal of the amount of cash.
Dynamic verification method and system for card transactions
Disclosed are methods and systems for payment card transactions, where a Card Verification Value (CVV) or Card Verification Code (CVC) is generated dynamically as part of a tokenized session.
TECHNIQUES FOR MULTI-VOICE SPEECH RECOGNITION COMMANDS
Various embodiments are generally directed to techniques for multi-voice speech recognition commands, such as based on monitoring a telecommunications channel between first and second devices, for instance. Some embodiments are particularly directed to prompting initiation of a transaction between a first entity associated with a first device and a second entity associated with a second device based on detection of an audible request corresponding to the second entity and an audible response corresponding to the first entity.
KEYPAD DULCET AUTHENTICATION CARDLESS PAYMENT TECHNOLOGY
Architecture and methods may be provided to enable a user to authenticate and complete a cardless transaction at a point-of-sale (“POS”) device. The POS device may include a keypad configured to receive a sequence of keypresses. The POS device may also include a processor configured to record the sequence of keypresses and tag each keypress with a timestamp. The POS device may include a keypress controller configured to determine from the sequence of keypresses, a number of keypresses, a frequency of each keypress and a time-delay between each keypresss. The sequence of keypresses may be transmitted to a secure transaction network and, using a machine-learning pattern identifier, be configured to identify a pattern to the sequence of keypresses based off of the determined number of keypresses, the frequency and time-delay and then further verify that the pattern matches to a stored pattern to authenticate the cardless transaction.
Method and system for multi-modal transaction authentication
This invention relates to systems and methods for authenticating transactions using a mobile device based primarily on the introduction of a layer of middleware and wherein the Payment Networks, Merchants, Issuing Banks, Credit Reporting Bureaus, Insurance Companies, Healthcare Providers may customize the implementation of the services based on individual strategy and consumer preferences.
SYSTEM AND METHOD FOR INSERTING DATA INTO AN INTERNET BROWSER FORM
Systems, methods, and computer-readable storage media for inserting payment information into payment forms without user interaction. A system can identify that a user has navigated to a web page operated by a merchant computer system for a merchant and identify a payment form within the web page. The system can then execute a payment request API which generates a query for saved payment credentials for the user from the merchant computer system. When the merchant computer system indicates it does not have the saved payment credentials for the user, the system can identify browser-saved payment credentials stored in the Internet browser, then generate a virtual payment information associated with the browser-saved payment credentials. The virtual payment information can then be inserted into corresponding fields of the payment form without the user entering any additional information.
Secure payment processing
Systems and methods for secure payment processing are disclosed. An issuer vault generates payment items, which correspond to consumer account information and which replicate the structure of the account information but do not include consumers' actual account number. The payment items, rather than the actual account information, are communicated to on-line and mobile payment services for use by consumers in payment transactions. When a consumer uses a payment item in a payment transaction and the transaction undergoes authorization processing, the payment authorization network uses the payment item to request and receive the actual account information from the issuer vault. The authorization network uses the actual account information for the limited use of authorizing the transaction. Once the transaction has been authorized using the actual account information, the processing of the transaction continues using the payment item information rather than the actual account information.
Method, System, and Computer Program Product for Network Bound Proxy Re-Encryption and PIN Translation
A method, system, and computer program product generate, with a payment network, a first value (a) and a second value (g.sup.a), the second value (g.sup.a) based on the first value (a) and a generator value (g); generate, with the payment network, a plurality of random merchant numbers (m.sub.i) for a respective plurality of merchant banks; determine, with the payment network, a merchant product (M) based on a product of the plurality of random merchant numbers (m.sub.i); generate, with the payment network, a public key (pk.sub.i) based on the second value (g.sup.a), the merchant product (M), and the random merchant number (m.sub.i) and a random key (rk.sub.i) based on the merchant product (M) and the random merchant number (m.sub.i) for each respective merchant bank; and communicate, with the payment network, the public key (pk.sub.i) and the random key (rk.sub.i) to at least one respective merchant bank.