G06Q20/4012

SYSTEM AND METHOD TO PROTECT PRIVACY OF PERSONAL-IDENTIFICATION-NUMBER ENTRY ON CONSUMER MOBILE DEVICE AND COMPUTING APPARATUS
20230351385 · 2023-11-02 ·

A system for accepting the input of a PIN comprises a first device receiving a randomized PIN layout derived on a fourth device. The randomized PIN layout is displayed on a display of the first device. A second device comprises an input for accepting a series of key presses to produce a PIN token. The PIN token indicating each of the series of key presses. A third device is in communication with the second device. The third device derives the randomized PIN layout and receives the PIN token from the second device without the PIN token being present on the first device. The third device combines the PIN layout and the PIN token to produce a PIN. The PIN is used to authenticate a transaction. The fourth and third devices each store a shared secret used to independently derive the randomized PIN layout on the fourth and third devices.

Digital asset exchange system and related methods
11810096 · 2023-11-07 · ·

A system is provided as a computer server platform and application programming software installed in primary devices of users for exchanging and trading digital asset securely and anonymously between two users of the system. The digital asset is registered under a device account of a primary device of a user with the system using a unique device account name. The system respects “privacy by design” in GDPR by using device account based-on anonymized data instead of personal account based-on personal data of prior art to ensure the system does not collect, store and process users' personal data in the course of device accounts' set-up and transactions of digital assets.

SYSTEM AND METHOD FOR PROVIDING TEMPORARY VIRTUAL PAYMENT CARD
20230368179 · 2023-11-16 ·

A system and method for providing a temporary virtual payment card are provided. The system includes a user device, an administrator processing system, an account processing system, and a database. The system is configured to receive a request for a temporary virtual payment card, verify the user, and provide a temporary virtual payment card.

SYSTEM AND METHOD FOR PROVIDING TEMPORARY VIRTUAL PAYMENT CARD
20230368180 · 2023-11-16 ·

A system and method for providing a temporary virtual payment card are provided. The system includes a user device, an administrator processing system, an account processing system, and a database. The system is configured to receive a request for a temporary virtual payment card, verify the user, and provide a temporary virtual payment card.

Method for provisioning merchant-specific payment apparatus

Various embodiments are directed to a method and system for provisioning a merchant-specific payment apparatus, such as a temporary payment card, via a computing device, such as an automated teller machine (ATM). A user, such as a customer, may specify a merchant. A record of known payment acceptance types at that merchant may be returned, which may be used to determine what type of temporary payment card gets issued to the user.

CARD FOR SECURE INTERACTIONS BY UTILIZING MULTIPLE CARD CREDENTIALS
20230342777 · 2023-10-26 ·

In some implementations, a device may receive, from a terminal, an indication of a first card credential associated with a card that was provided to the terminal to initiate a first interaction, where the card is associated with the multiple card credentials, including the first card credential. The device may determine that the first card credential is valid based on at least one of: the first card credential having not been previously used for another interaction associated with the card, or a first amount of time, from a first time indicated by a first timestamp associated with the first card credential to a reception time of the first card credential, satisfying a validity threshold. The device may transmit, to the terminal, an indication that the card is approved for the first interaction based on the first card credential being determined to be valid.

ACCESS CONTROL BYPASS ON MOBILE FOR MASS TRANSIT

A contactless transaction terminal and method for interacting with a payment enabled mobile device to permit access to a location or to a service. The contactless transaction terminal includes a processor, a polling signal generator operably connected to the processor, an NFC circuit operably connected to the polling signal generator, and a receiver operably connected to the NFC circuit and to a data recovery circuit that is operably connected to the processor. Also included is a storage device operably connected to the processor. The storage device stores program instructions which when executed cause the processor to generate, via the polling signal generator, short-distance radio signals including at least three polling signals; emit, via the NFC circuit, the at least three polling signals at frequent intervals for detection by a payment-enabled mobile device; receive at least one of a Type A or Type B signal from the payment enabled mobile device; and permit access to at least one of a location or service.

SYSTEMS AND METHODS TO PROVIDE USER VERIFICATION IN A SHARED USER ENVIRONMENT VIA A DEVICE-SPECIFIC DISPLAY
20230297996 · 2023-09-21 ·

A method of generating a shared augmented reality payment authentication entry interface includes detecting a first consumer device and a second consumer device; prompting a display of a first augmented reality payment authentication interface at the first consumer device; and prompting a display of a second augmented reality payment authentication interface at the second consumer device.

Derived unique token per transaction

Example implementations include a method for using tokens between two entities including a client device and a server, by generating, by a first one-way function of the client device, a first intermediate value from a transaction count corresponding to a number of transactions involving an original data, the first intermediate value being unique to a first verification transaction at a server, generating, by a second one-way function of the client device, a second intermediate value from the first intermediate value, the second intermediate value being unique to a second verification transaction at the server, sending, by the client device, a first token based on the first intermediate value to the server to execute the first verification transaction, and sending, by the client device, a second token based on the second intermediate value to the server to execute the second verification transaction.

Integration for performing actions without additional authorization requests

Techniques, devices, and systems for performing actions, within an application provided by a service provider, without additional authorization requests are described. An example process includes receiving an access request to access an application on a user device, and presenting an interactive element via a user interface of the application, wherein the interactive element, when selected, causes a website of a merchant to load to an in-app browser within the application. The example process further includes receiving, via the in-app browser, a payment request to initiate a payment to the merchant from an account associated with the application, determining, based at least in part on the payment request, that the payment request originated from within the application, and based at least in part on the determining, causing the payment to be authorized without additional input from a user associated with the user device.