Patent classifications
G06Q20/4014
CONTROLLED DISPENSING SYSTEM AND METHOD
An electronic device comprising: one or more processors; a radio transceiver; memory storing a unique serial number identifying the electronic device; pairing circuitry configured to communicatively couple, using the radio transceiver, the electronic device with an external device distinct from the electronic device; first electronic circuitry configured to perform a plurality of operations of the electronic device; and activation circuitry configured to activate and deactivate the first electronic circuitry; wherein the memory stores instructions that, when executed by the one or more processors, cause the one or more processors to (i) detect, using the pairing circuitry, a successful pairing of the electronic device with a first external device; and (ii) in accordance with the detection of the successful pairing, activate, using the activation circuitry, the first electronic circuitry.
Mobile wallet using math based currency systems and methods
A mobile wallet computer system may send a token to a customer computing device to share the token with a recipient computer system in exchange for payment for a service or a good. The mobile wallet computer system may receive, the token, a recipient public key associated with a MBC account of the recipient, and a transaction amount. The mobile wallet computer system determines whether the recipient public key is registered with the mobile wallet computer system. The mobile wallet computer system updates a ledger that lists a MBC balance of the MBC account of the recipient and the ledger that lists the MBC balance of the customer or transmits, to MBC processing nodes, a request to transfer the amount of MBC in a pooled MBC account of a financial institution to the MBC account of the recipient.
SYSTEM AND METHOD FOR ENRICHMENT OF TRANSACTION DATA
The invention relates to a computer-implemented system and method for uniquely identifying a merchant from a transaction string transmitted by a payment network. The method may comprise the steps of: gathering input information, including receiving the transaction string from the payment network and receiving from a data provider a data set containing merchant information; cleansing the transaction string; executing a match process between the transaction string and the data set from data provider to find the best merchant match; wherein the match process comprises using a logistic regression model, a waterfall process, or an override process; consolidating results of the matching process to create a master lookup table having attributes from transaction strings mapped to matching merchant attributes from the data provider data set; and executing a transaction tagging process on a received transaction string.
ATM bill pay
A computer system and a transaction machine (such as an automated teller machine (ATM)) of the same financial institution, can provide a third party customer the ability to pay bills, issued by the third party, at the ATM. A third party computer system communicates with the financial institution computer system to register the third party customer and obtain a first passcode associated with the third party customer. The financial institution computer system communicates the passcode and an associated bill amount to the ATM. The ATM accepts and verifies a second passcode received from the third party customer. The ATM communicates with the third party computer system to verify the bill amount. Responsive to receiving the verification, the ATM communicates with the third party user to accept a payment. Upon successfully receiving the payment, and verifying the payment amount, the ATM sends a payment notification to the third party computer system.
DEVICE FOR CONTACTLESS RESOURCE DISPENSING WITH PRE-STAGE AND SECURITY MODULES
Embodiments of the invention are directed to systems, methods, and computer program products for resource dispensing at a computer terminal using pre-stage capabilities for a completely contactless experience for physical resource distribution. The system identifying one or more tokens within a user application at a pre-stage event, where the user is able to pre-stage a resource dispensing at a computer terminal in the future. The system may review the token selected for confidence and transmit a resource distribution request amount and a security token tied to the identified user application. Upon contactless communication with a computer terminal, the system extracts the resource distribution request information and security token. The system may confirm the resource distribution request information and security token received at pre-stage with a user current token selection and authorize the pre-staged resource distribution at the computer terminal without additional authentication.
Systems and methods for a context-driven electronic transactions fraud detection
Systems and methods are disclosed for establishing a multi-dimensional fraud detection system and payment analysis. One method includes: receiving transaction history of a user, the transaction history including a first payment vehicle and a second payment vehicle; determining, of the received transaction history, one or more instances of switching from one the first payment vehicle to the second payment vehicle; and determining a user-specific abandonment score for the user, based on the determined instances of switching from the first payment vehicle to the second payment vehicle.
Systems and methods for hosted authentication service
Systems and methods for authenticating an electronic transaction using a hosted authentication service. The systems and methods determine whether an authentication is required based on a first electronic message received from a first data system. Upon determining the authentication is required, the systems and methods transmit a dummy authentication request and a hosted authentication service uniform resource locator to the first data system. The systems and methods further determine or receive an indication whether a user authentication challenge is required based on a transaction risk analysis by a second data system. Upon determining the user authentication challenge is required, the systems and methods provide, at a user interface, an electronic form including a challenge request. The systems and methods transmit, to the first data system, another electronic form including a dummy authentication response generated based on a challenge result.
SYSTEM AND METHOD FOR UTILIZING MULTI-PEGGED DIGITAL CONTRACTS AS PART OF PAYMENT PROCESSING
A system and method for utilizing multi-pegged digital contracts as part of a payment processing system.
SYSTEMS AND METHODS FOR USE WITH NETWORK AUTHENTICATION
Systems and methods are provided for sharing personal identifying information with relying parties. One exemplary computer-implemented method includes generating a token for personal identifying information (PII) included in a record of a user and linking the token to the record. The method then includes, in response to a request for the token, accessing the record, authenticating the user, compiling a response to the request that includes the token, and transmitting the response to a communication device of the user, whereby the token included in the response is populated, at the communication device, into an interface associated with a relying party based on a network interaction between the user and the relying party. The method further includes, in response to a request for the PII from the relying party, retrieving the PII for the user based on the token included in the request and transmitting the PII to the relying party.
SYSTEM AND METHOD FOR EPHEMERAL COMPUTE WITH PAYMENT CARD PROCESSING
Technology is described for payment card processing using ephemeral compute. An example system comprises a client application, an ephemeral compute instance, and a payment service. The client application is configured to send a request for transmitting sensitive information associated with a payment card to the ephemeral compute instance. The ephemeral compute instance is triggered to transmit the sensitive information to the payment service in response to receiving the request and is configured to shut down after the transmission of the sensitive information to the payment service. The payment service is configured to authorize a transaction based on the received sensitive information transmitted by the ephemeral compute instance.