G06Q20/4014

MERCHANT TERMINAL FOR RECEIVING PAYMENT FROM A VEHICLE
20230019736 · 2023-01-19 ·

Methods, systems, apparatus, and non-transitory computer readable media are described for using a vehicle as a payment device. Various aspects may include receiving a selection of a stored financial card or financial account at a vehicle head unit. The selected financial card or financial account may be transmitted to a point-of-sale (POS) terminal for making a payment by transmitting a tokenized card number to the POS terminal. The tokenized card number may be transmitted over a very short-range communication link to ensure that the transmission is secure. For example, electronic circuitry may be attached to the exterior of the vehicle, where the electronic circuitry may be within a threshold distance (e.g. one inch, three inches, six inches, one foot, three feet, etc.) of the POS terminal. The tokenized card number may be transmitted from the vehicle head unit to the electronic circuitry and then to the POS terminal.

Funds transfer authentication

The innovation disclosed and claimed herein, in me aspect thereof, comprises systems and methods of funds transfer authentication. The authentication can include receiving a transfer request to transfer funds from a payer to a payee, the transfer request identifies the payer, the payee, and an amount to transfer. Customer information associated respectively with the payer and the payee is identified. The payer and the payee are authenticated. A communication session is opened between the payer and payee. A time-limited payee OTP is generated and sent to the payee. The payee OTP is received within a first time limit. The funds are transferred from the payer to the payee based on receiving a matching payee OTP.

Systems and methods for electronic certification of e-commerce security badges
11704664 · 2023-07-18 · ·

A method for managing secure processing of electronic payment transactions includes receiving a request submitted by a merchant computing system for a security verifier. The security verifier is to be displayed on an electronic display associated with the merchant computing system. A set of security credentials received from a security service provider is measured against a security threshold. When the set of security credentials meets the security threshold, a uniform resource locator (“URL”) is transmitted to the merchant computing system. The URL identifies the security verifier to be retrieved and displayed at the electronic display associated with the merchant computing system.

COMPUTER-IMPLEMENTED METHOD FOR DETERMINING A MERCHANT LOCATION USING A VIRTUAL CARD, IN REAL-TIME

The present disclosure is related to a computer-implemented method, card processing server, and non-transitory computer readable medium for determining a merchant location using a virtual card, in real-time. A card processing server may receive test transaction data from an acquirer bank of a merchant when a test transaction is initiated through a virtual card provided to the merchant. The card processing server may detect a record of the test transaction in a transaction database, in real-time, using one or more attributes of the virtual card stored in the card processing server and may retrieve signature data from the test transaction data upon detecting the record of the test transaction. Finally, the card processing server determines a transaction source data location of the merchant at which the test transaction was initiated and a registered name of the merchant based on the signature data.

Blaze non-browser based application for purchasing digital products
11704642 · 2023-07-18 · ·

A method and system for conducting an online payment transaction through a point of sale device. The method includes receiving input from a user selecting an item for purchase through the point of sale device; calculating a total purchase amount for the item in response to a request from the user to purchase the item; and sending payment authorization for the total purchase amount from the point of sale device to a payment entity, in which the payment authorization is sent to the payment entity via a mobile communication device of the user. The method further includes receiving a result of the payment authorization from the payment entity through the mobile communication device; and completing the payment transaction based on the result of the payment authorization.

DECENTRALIZED COMPUTER SYSTEMS AND METHODS FOR USING A DEBIT NETWORK AS AN INTERMEDIARY BETWEEN DISTRIBUTED LEDGERS
20230015136 · 2023-01-19 ·

Decentralized computer systems and methods are disclosed for using a debit network as an intermediary between distributed ledgers. One method includes: receiving, at a first blockchain network from a merchant, transaction information comprising a consumer identification, an issuer identification from a payment vehicle presented for a transaction, and a transaction amount in resources of a first type, wherein the merchant and/or its acquirer are participants of the first blockchain network but the consumer and/or issuer are not participants of the first blockchain network; sending the transaction information to a debit network; identifying, using the debit network, a second blockchain network having the consumer and/or the issuer as participants, using the received consumer identification or issuer identification; and if participants of the second blockchain network accept the transaction, generating a new immutable entry to the second blockchain network indicating a change in the resources of a second type.

METHOD FOR BINDING CARD, TERMINAL DEVICE, AUTHENTICATION SERVER AND STORAGE MEDIUM

Embodiments of the present application provide a method for binding card, a terminal device, an authentication server and a storage medium. The method is applicable to terminal device including security element, and includes: obtaining a user identifier for logging in target application by a user and a secure element identifier of the secure element; sending the user identifier to an authentication server, wherein the user identifier is for the authentication server to search at least one first card bound to the user identifier; receiving card information of at least one first card sent by the authentication server; and sending a binding request to a card issuing server corresponding to card information, wherein the binding request comprises the card information, the user identifier and the secure element identifier, and the binding request is for the card issuing server to bind card information to the user identifier and the secure element identifier.

SYSTEM AND METHOD TO PERFORM DIGITAL AUTHENTICATION USING MULTIPLE CHANNELS OF COMMUNICATION

Embodiments are generally directed to systems, devices, and techniques to authenticate unauthenticated users to perform sensitive actions.

Identity protection system

A central computer system transforms identification information of a consumer into an identity code that hides the identification information and stores it with contact information of a consumer's computer system. When a computer system on the network of the central computer system conducts a transaction with a subject who uses the identity code of the consumer, the central computer system contacts the consumer's computer system so that the consumer can stop the transaction if it is not authorized. Because only the identity code is used to protect the consumer, the original identification information of the consumer is fully protected.

PERSONAL DATA WALLET
20230015523 · 2023-01-19 ·

Methods and systems are presented for providing a secured electronic transaction processing framework that enables online service providers to process electronic transactions for users while allowing the users to retain control over their user data. The secured electronic transaction processing framework includes a data access system configured to dynamically access user data, that is stored on user devices and controlled by users, on an as-needed basis. When a service provider server receives a request for processing a transaction through a user account, the service provider serer may use the data access system to dynamically obtain user data required for processing the transaction from a wallet application of a user device. The wallet application may include data access policies that specify data access settings for different service providers. After processing the transaction using the user data, the service provider server may remove the user data.