G06Q20/4014

SYSTEMS AND METHODS ASSOCIATED WITH NETWORK-BASED INTERACTIONS
20220383297 · 2022-12-01 ·

Systems and methods are provided for altering images associated with accounts, for use with digital wallets. One example computer-method includes receiving a request for an image associated with an account, informing an issuer of the account of the request, and receiving, from the issuer, an image and a base configuration ID for the account. The method also includes retrieving a base configuration profile for the account, creating a new configuration profile for the account, and returning, to the issuer, a new configuration ID for the new configuration profile. The method further includes receiving, from the issuer, in response to the new configuration ID, a token for the account, linking the token to the new configuration profile based on the new configuration ID, and pushing the image to an electronic device associated with the account thereby permitting the electronic device to display the image when the account is selected.

PAYMENT CARD SECURITY
20220383308 · 2022-12-01 ·

Disclosed is a system and method for more secure card transactions. The security is generated by the use of a dynamic transaction number which is valid for only a single predetermined time interval. The transaction number is generated through a two step process. In a first step, time is used as an input to a transaction number function. The transaction number function outputs a plurality of digits. The second step uses the plurality digits for input and uses a ruleset to strip at least one digit to determine the transaction number valid for the predetermined time interval.

EXTENDED REALITY INTERFACE FOR REAL-TIME TRANSACTION PROCESSING
20220383279 · 2022-12-01 · ·

Systems, computer program products, and methods are described herein for transaction management via an extended reality platform. The present invention provides the functional benefit of providing a user with the ability to manage, schedule, and complete transactions in an extended reality (XR) environment. The present invention may also be configured to communicate with a plurality of third-party systems, in order to request access to various user accounts, as well as information associated with one or more upcoming transactions associated with a user. The user may then visualize said transaction information on a virtual hub presented via an XR platform (accessible using a virtual/augmented/mixed reality device) and complete transaction management actions from any location, in real-time. User interfaces hosted in an XR environment are immersive, providing intuitive user interfaces that may bolster the effect of interactivity.

SYSTEMS AND METHODS FOR USER IDENTIFICATION USING GRAPHICAL BARCODE AND PAYMENT CARD AUTHENTICATION READ DATA
20220383315 · 2022-12-01 ·

A method for authenticating an online transaction or a log-in process is provided. The method comprises: receiving image data of a visual graphical barcode from a user device, and the visual graphical barcode is configured to be displayed on an unauthenticated device for conducting the online transaction; analyzing the image data to obtain a transaction validation identifier (ID); comparing the transaction validation ID to a pre-stored validation ID; comparing a first set of collection data from the user device to a second set of collection data that is pre-stored; and determining whether to approve or reject the online transaction based on (1) a match between the transaction validation ID and the pre-stored validation ID, and (2) a match between the first set of collection data and the second set of collection data that is pre-stored.

MULTI-FACTOR AUTHENTICATION SECURITY SYSTEM AND METHOD FOR VERIFYING IDENTIFICATION USING EVOLVING PERSONAL DATA COMBINED WITH BIOMETRICS

A method for generating and authenticating a user account in a system including entering personal information into the system of a vendor, selecting an image for the user account, selecting a personal identification number (PIN) for the user account, selecting a color for the user account, selecting a shape, selecting a word for the user account, recording audio for the user account, inputting biometric markers the user account, receiving a transaction information request for requested information in the system, verifying the requested information and matching account information of a requesting user to the user account in the system, determining if the requested information involves personal information previously entered into the system, beginning a user security setup, determining if a threshold in the user security setup exceeds a threshold requirement of a vendor security setup, determining if the user is authenticated, and sending requested information to the authenticated user.

System and method to facilitate peer to peer transactions by establishing trust network between the users
20220383289 · 2022-12-01 ·

Systems and methods are disclosed herein for computer-aided method for developing, customizing, and deploying a platform where people can provide service to other users based on a trust among multiple individuals. This is especially useful among ecommerce applications where users can initiate and complete an ecommerce transaction with an individual not directly trusted.

Systems and methods for provisioning a payment instrument
11514453 · 2022-11-29 · ·

The invention relates generally to the provisioning of payment instruments onto electronic devices such as a mobile telephone, tablet, laptop or wearable, and in particular to securely provisioning payment instrument for which authorisation for the provisioning must be provided by a payment instrument issuer. A first embodiment is provided in which data that is generated during a transaction is received by an electronic device and transmitted from the electronic device to a server associated with an acquirer. The data received from the electronic device is compared to the data generated during the transaction and, if these match, provisioning is authorised. A second embodiment is provided in which a server associated with an acquirer generates an identification message that is separate from but based on a response message associated with a transaction, and provisioning is authorised or declined based on the identification message.

Modular data processing and storage system
11513706 · 2022-11-29 · ·

A system enables entities to access a single platform in order to utilize electronic data storage for storing different types of information. One or more computers may operate an electronic data storage processing network that entities can access when updating information in electronic data storage. The electronic data storage processing network may operate a plurality of electronic data storage processing modules, which can include an aggregator module, a formatter module, an operator signer module, and a validator module. Based on the specific use case for which electronic data storage is utilized, recordable data that is to be added to the electronic data storage can be processed by the appropriate aggregating, formatting, signing, and validating functions provided by the electronic data storage processing modules.

User interfaces for transfer accounts
11514430 · 2022-11-29 · ·

The present disclosure generally relates to managing the use of transfer accounts using an electronic device. In accordance with some embodiments, user interfaces for inputting information about a secure credential to an electronic device are described. In accordance with some embodiments, user interfaces for managing the use of a credential provisioned on an electronic device that operates on stored power are described. In accordance with some embodiments, user interfaces for managing the use of a transfer account associated with different credentials on an electronic device are described.

Systems and methods for providing notifications regarding data breaches

A computer-implemented method includes receiving an indicator of enrollment of a user in a breach notification service; acquiring information regarding the user; and generating one or more indicators of a data breach for an entity that stores one of data regarding the user or an indication of a transaction with the user in a past predefined time period. The computer-implemented method further includes determining that the one or more indicators meet a threshold level for notifying the user of the data breach; in response to determining that the one or more indicators meet the threshold, generating a notification specific to the user regarding the data breach; and providing the notification to the user during a log-in process for a product or service associated with the provider computing system.