Patent classifications
G06Q20/4014
CUSTOMER IDENTITY VERIFICATION SYSTEM
A computerized system conducts customer identification processing for customers who remotely open accounts with personal identification information that cannot be verified through available data sources. The system receives a portion of identity data in response to a request for the customer to provide the portion of identity data from a customer identification document during a financial transaction. The system updates an identity profile of the customer by combining the portion of identity data with different portions of previously received identity data that were previously received from different merchants during transactions between the customer and the different merchants. Based on comparing the identity profile to unverified identity data of the customer, the system determines whether to maintain or terminate the account.
Data verification in transactions in distributed network
Systems and methods for verifying a financial transaction based on an account number, a mobile directory number associated with the financial transaction, a mobile directory number associated with the account number, an email address associated with the account number, internet protocol address data associated with the financial transaction, and internet protocol address data associated with accesses of the email address.
Private confirmation system
A method stores, at a first computer system, first data associated with a user, a first portion of a first account number associated with the first data, and third data associated with the first data. An identity of the user is unidentifiable from the first data. The method receives, at the first computer system, a second portion of a second account number from a second computer system, second data generated by the second computer system based on electronically obtained identification information. The method transmits, by the first computer system, a message associated with the user based on the third data when the second data corresponds to the first data and the second portion of the second account number corresponds to the first portion of the first account number. The message is for completing a transaction, preventing a crime, making a statement, triggering a response, and/or giving an instruction.
System and method for processing transactions
A method, computer program product, and computer system for receiving a first scan of an identifier from a first computing device is disclosed. The identifier is associated with a financial transaction. A second scan of the identifier is received from a second computing device. The financial transaction is processed based upon, at least in part, receiving the second scan of the identifier from the second computing device.
CONFIGURABLE TRANSACTION MANAGEMENT CONTROLLER AND METHOD THEREOF
Technologies for managing payment authorization request messaging for payment transactions include a transaction management controller for receiving a transaction amount for a payment transaction from a business management engine and payment card data for the payment transaction from a point of interaction device. The transaction management controller inserts the transaction amount and the payment card data into a payment authorization request message, which is transmitted to a payment network. A payment authorization response message is received from the payment network and transmitted by the transaction management controller the business management engine. Other embodiments are described and claimed.
CPK-BASED DIGITAL BANK, DIGITAL CURRENCY, AND PAYMENT METHOD
Disclosed are a CPK-based digital bank, a digital currency and a payment method. The digital currency is a core component of the digital bank. The digital currency is realized by means of a CPK digital signature, and a payer provides an account authenticity certification, an amount authenticity certification and a fund allocation authenticity certification, thereby effectively preventing crimes inside or outside a bank. The digital currency directly takes an account identifier as an account number. The digital currency can be used in on-line operations, as well as off-line operations, thereby satisfying face-to-face trade requirements between a great number of retail accounts. The CPK digital bank is realized by means of a CPK chip without support of other devices, such that everyone can check the authenticity of the digital currency.
Bifurcated digital wallet systems and methods for processing transactions using information extracted from multiple sources
A system and method for creating and accessing a bifurcated digital wallet is described. The method comprises of processor implemented steps of authenticating by an authentication server one or more authentication information sent by a user terminal to the authentication server; extracting a first set of information by the authentication server based on the authentication of the authentication information; extracting a second set of information by one or more second servers based on the authentication of the authentication information; collating the first set of information and second set of information and displaying the collated information at the user terminal for processing a transaction.
SYSTEM-BASED DETECTION OF CARD SHARING AND FRAUD
This disclosure describes, in part, a payment service that associates customer profiles with an identifier of a payment instrument, and then uses the customer profiles to identify a customer that is using the payment instrument during a transaction with a merchant. For instance, in some examples, the payment service can identify preferences of customers using transaction information that includes an identifier for a payment instrument, and associate the preferences with respective customer profiles. The payment service can then receive transaction information associated with a transaction between a customer and a merchant, identify preferences of the customer using the transaction information, compare the preferences of the customer with preferences stored in the customer profiles, and identify the customer based on the comparing. The payment service can further generate a receipt for the transaction and send the receipt to contact information of the customer.
Cryptographic authentication and tokenized transactions
A cryptographic method of performing a tokenised transaction between a payment offering party and a payment accepting party is described. The tokenised transaction is mediated by a transaction scheme. The payment accepting party is provided with a merchant identity and a merchant certificate associated with that identity by the transaction scheme provider. The payment accepting party provides the merchant identity and transaction seed data to the payment offering party. The payment offering party validates the merchant identity and uses the merchant identity and the transaction seed data to generate a cryptogram for the tokenised transaction. The payment offering party provides the cryptogram to the payment accepting party for transmission to the transaction scheme provider for authorisation of the tokenised transaction. A suitable user computing device and merchant computing device for acting as payment offering party and payment accepting party respectively are also described.
SYSTEMS AND METHODS FOR USE IN AUTHENTICATING USERS TO ACCOUNTS IN CONNECTION WITH NETWORK TRANSACTIONS
Systems and methods are provided for authenticating users to accounts in connection with network transactions. An exemplary method includes receiving an authentication request associated with a transaction where the authentication request includes a credential associated with the account, and transmitting an authentication assertion request to an entity associated with the account other than an access control server (ACS) associated with an issuer of the account. The method also includes providing an authentication confirmation, in response to the authentication request, when the entity provides an authentication assertion for the transaction based on a prior authentication of the user, whereby the transaction proceeds based on the authentication confirmation and without authentication specific to the transaction. The method further includes seeking authentication of the user, based on the authentication request, from the ACS, when the entity provides instruction to seek authentication of the user or fails to respond to the authentication assertion request.