G06Q20/4014

Provisioning of an individual computing device via ATM

An automated teller machine (ATM) includes a network interface and an authentication circuit configured to receive data indicative of an interaction with the ATM by a user, detect that an individual computing device is in proximity to the ATM, determine that the individual computing device is not associated with a financial account, display a prompt comprising instructions to bind the individual computing device of the user to the financial account, receive data comprising a unique identifier of the individual computing device of the user, bind the individual computing device to the financial account based at least in part on the received unique identifier of the individual computing device of the user, and transmit, to the individual computing device, an application authorization, the application authorization authorizing an application to complete operations associated with the financial account via the bound individual computing device of the user.

System and method for third-party food and dining ordering control
11741452 · 2023-08-29 · ·

A system and method for third-party food and dining ordering control, comprising at least one device capable of accessing the internet which may be a mobile device or personal computing device such as a laptop or desktop, a web application, and a point-of-sale system at a restaurant or retailer, wherein users of the web application may deposit funds into an account and set regulations on what they may purchase with the deposited funds, or have an administrator set up an account for them such as a parent setting up an account for a child or a doctor setting up an account for a patient, allowing the parent or doctor or other administrator to regulate what the sub-user such as the child or patient may purchase, in keeping with budget, diet, and lifestyle restrictions, and which may utilize zero-step authentication to allow for seamless use of the service at certain establishments.

Systems and methods for employing a card rotation sequence to authenticate a user

Systems and methods for authenticating identification information are disclosed. For example, an Automated Teller Machine (ATM) may comprise a user interface. The user interface may comprise a card reader. The card reader may be configured for card rotation about an axis of a bank card. The user interface may be configured to receive card rotation input from a user. The ATM may comprise at least one memory storing instructions. The ATM may comprise at least one processor configured to execute the instructions to perform operations. The operations may comprise receiving identification information from the user. The operations may comprise receiving the card rotation input. The operations may comprise extracting a card rotation sequence from the card rotation input. When the card rotation sequence is within a predetermined threshold from a stored card rotation sequence corresponding to the identification information, the operations may comprise authenticating the user for an ATM operation.

PAYMENT TRANSACTION HANDLING IN A RADIO COMMUNICATION NETWORK
20220156736 · 2022-05-19 ·

A method for payment transaction handling in a radio communication network is presented. The method is performed in a billing support node. The method includes receiving a payment indication from a third party node of a plurality of predefined third party nodes, generating a cryptographic key by combining a plurality of different identifiers identified in the received payment indication, and checking if the generated cryptographic key is new or already known in the billing support node. When the generated cryptographic key is new the method includes storing a backup of the payment indication in a blockchain, and setting a transaction state of the payment indication to indicate a new transaction. When the generated cryptographic key is already known the method includes rejecting the payment indication. A billing support node, a computer program and a computer program product for payment transaction handling in a radio communication network are also presented.

CREDIT ANALYSIS ASSISTANCE METHOD, CREDIT ANALYSIS ASSISTANCE SYSTEM, AND NODE

A credit analysis assistance method for a system 10, the method comprising executing by a node 100 of a party involved in a predetermined transaction a process of extracting evaluation information on a business partner in the transaction from the predetermined transaction data in the distributed ledger 110, a process of extracting an evaluation result on the business partner determined by a predetermined external institution from the predetermined transaction data in the distributed ledger 110, and a process of generating credit information on the business partner by applying a predetermined rule defined in advance to the evaluation information and the evaluation result.

Method, System, and Computer Program Product for Automatically Providing Items Based on Item Preferences
20220156711 · 2022-05-19 ·

A method for automatically providing items based on an item preference may include receiving payment credential data associated with a payment credential and preference data associated with an item preference of a user, determining whether one or more items associated with the item preference of the user is available, and processing, with at least one processor, a payment transaction involving the one or more items associated with the item preference of the user based on determining that the item is available. A system and a computer program product are also provided.

SYSTEM AND METHOD FOR AUTHORIZING A TRANSACTION
20220156742 · 2022-05-19 ·

A method, system, and computer program product is provided for authorizing a transaction. The method includes registering, with a first merchant system associated with a first merchant, a second merchant system associated with a second merchant, receiving, from the second merchant system, user data associated with a user requesting a transaction through the second merchant system, determining, with the first merchant system, a user profile for the user based on the user data, the user profile stored on a data storage device that is not accessible to the second merchant system, the user profile including an account identifier, obtaining, with the first merchant system, a transaction token generated based on the account identifier, and transmitting, to the second merchant system, the transaction token.

BROWSER EXTENSION FOR LIMITED-USE SECURE TOKEN PAYMENT

Methods and systems for a browser extension system are disclosed. In some embodiments, a browser extension server includes a communication device configured to communicate with a first computing device executing a browser extension application and a web browser application and a second computing device executing an authentication application. The browser extension server further includes a memory storing instructions, and a processor configured to execute the instructions to perform operations. The operations may include receiving from the first computing device an indication of a financial service account associated with the first computing device, detecting a payment field in a web page provided by the computing device through the web browser application and, in response, generating a secure token mapped to the financial service account. The operations may further include sending the second computing device an authentication request, receiving an authentication response, and populating the payment field with the secure token.

METHODS AND SYSTEMS FOR DUAL-TO-SINGLE MESSAGE CONVERSION IN ELECTRONIC TRANSACTIONS
20230267437 · 2023-08-24 ·

Systems and methods are disclosed for electronic transaction messaging conversion. One method comprises receiving an authorization request message from a point of sale (POS) device, the authorization request message comprising transaction data associated with a transaction. Upon validating the authorization request message, a provisional authorization response message may be generated and sent to the POS device. Subsequently, a capture message may be received from the POS device, requesting clearing and settlement of the transaction. The capture message may be validated and translated to a composite message that is single-message system (SMS)-compatible. The composite message may then be sent downstream for further processing.

MULTI-FACTOR AUTHENTICATION PROVIDING A CREDENTIAL VIA A CONTACTLESS CARD FOR SECURE MESSAGING
20230269584 · 2023-08-24 · ·

Exemplary embodiments may use a contactless card as a secondary form of authentication in a multi-factor authentication for a secure messaging service. The recipient party of a request to initiate a messaging service session (such as a server computing device) may be programmed to use the phone number of the originating device to look up records regarding an identity of a party and their associated phone number as a primary credential and then may require an authentication credential originating from the contactless card as a secondary credential for the initiating party. In some instances, the credential originating from the contactless card is a onetime password that is valid only for a period of time. The recipient party determines whether the onetime password is valid. If both credentials are valid, a secure messaging session may be initiated with the initiating party.