Patent classifications
G06Q20/4014
CONTRACTOR POINT OF SALE SYSTEM
Systems and related methods facilitating interactions between a merchant device, a central system and a consumer device are discussed herein. A system that may be implemented to provide a master merchant having a merchant device with a POS system configured to generate a bill for products, experiences, or services provided, a way to link or associate one or more accounts, such as contractor accounts to their master merchant account or merchant device, and transfer a portion of the payment to the linked accounts. In addition, some embodiments of the system may provide for receiving selection of, for each product, service or experience provided, a contractor account from a list of one or more approved contractor accounts linked to the master merchant account. Further embodiments may provide for receiving a payment or payment information for a charge amount, the charge amount comprised of costs associated with the products, services and experiences, as well as adjustments for redeemed instruments, taxes, tip or the like.
SYSTEMS AND METHODS TO PROVIDE USER VERIFICATION IN A SHARED USER ENVIRONMENT VIA A DEVICE-SPECIFIC DISPLAY
A method of generating a shared augmented reality payment authentication entry interface includes detecting a first consumer device and a second consumer device; prompting a display of a first augmented reality payment authentication interface at the first consumer device; and prompting a display of a second augmented reality payment authentication interface at the second consumer device.
Devices, Methods and Computer Readable Mediums for Providing Access Control
Various implementation described herein are directed to a method for providing access control. User information is received at a device. A request to provide access control is generated by the device based on the received user information. The request is transmitted via a network to an access manager. A response to the request is received from the access manager. Access control via the device is provided based on the response to the request.
TRANSACTION AUTHENTICATION, AUTHORIZATION, AND/OR AUDITING UTILIZING SUBSCRIBER-SPECIFIC BEHAVIORS
Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, using one or more computing devices to receive at a server device coupled to a communications network, a first signal indicating that a subscriber of a mobile device has initiated a transaction. The method may continue with accessing a data store to determine occurrence of one or more deterministic events with respect to the mobile device and accessing the data store to determine one or more behavior norms specific to the subscriber with respect to the mobile device. The method may additionally include generating, by the server coupled to the communications network, a second signal indicating an authorization status of the transaction, the authorization status being dependent on the occurrence of the one or more deterministic events in relation to the one or more behavior norms.
CENTRALIZED ELECTRONIC INVOICE SYSTEM
An illustrated view of an exemplary centralized electronic invoice/payment system for providing efficiency of invoicing and payment is presented. The centralized electronic invoice/payment system is useful for conveniently receiving all invoices in a timely manner and in one location for review. The centralized electronic invoice/payment system is useful for eliminating redundancy of invoice payments by paying multiple invoices with a single click. The centralized electronic invoice/payment system is further useful for retaining electronic proof of payment indefinitely.
Point-of-sale consumer resolution system
A system for identifying a consumer at a retailer point of sale (POS) incorporates a virtual wallet database that contains consumer records. A consortium processor utilizes a database or databases with information known to the electronic tender provider but not available to the virtual wallet database. If the identifying data from the retailer POS hardware does not match any data from the virtual wallet database, an enhanced trade area append processor is employed to find a matching consumer within the retailer POS trade area. If a match is found, the applicable address is attached to the consumer data captured at the POS. A record is then sent to the consortium processor, which compares this data to its own records and returns a match or no-match result. The virtual wallet database is updated based on the match results.
System and method for providing API version control
Described herein is a system for providing version control across APIs. In an embodiment, an application of a client device may transmit communications to a service application API that are in a format not accepted by the service application API, using the application API. A central (or public) API may receive the communication transmitted by the application's API. The central API may identify the versions of the application's API and the service application API. The central API may format the communication based on the mapped fields, to a format accepted by the service application API. The central API 106 may forward the formatted communication to the service application.
Identity deep freeze
System and methods perform identity freezing. A user input requesting halting of operations related to a plurality of accounts or profiles of the user at different local systems is received. In response, a token mapping database is accessed to identify a personally identifiable information (PII) token for the user. A freeze message with the PII token is transmitted to the different local systems to halt operations associated with the plurality of accounts or profiles of the user. Thereafter, at the different local systems, the operations associated with the plurality of accounts or profiles of the user are halted to freeze an identity of the user. More efficient communication and operations to freeze the user accounts and profiles thereby result.
Optimizing tokens for identity platforms
The present disclosure is directed to generating cross-platform electronic tokens. First information of a first user associated with a first identity platform is accessed. Second information of a second user associated with a second identity platform is accessed. The second identity platform is different from the first identity platform. The first information and the second information are analyzed to determine whether the first user and the second user are the same person. In response to a determination that the first user and the second user are the same person, a cross-platform electronic token is generated to be used for both the first identity platform and the second identity platform.
Methods and systems for enhanced endpoint identity validation in electronic transactions
Methods and systems are disclosed for merchant system identity validation. One method comprises generating, by an access management system, a primary key associated with an integrator system and transmitting the primary key to the integrator system. The access management system may also generate a hash value associated with a merchant system, and may transmit the hash value to the merchant system. When a payment transaction is initiated at the merchant system, the access management system may receive an authorization request comprising a key-hash pair. The key-hash pair may be validated against a validation database. Upon successful validation, the access management system may transmit the authorization request to an acquirer processor.