Patent classifications
G06Q20/4014
Methods and systems for deconflicting data from multiple sources in computer systems
Methods and systems are described for verifying an identity of a user through contextual knowledge-based authentication. The system described uses contextual knowledge-based authentication. By verifying an identity of a user through contextual knowledge-based authentication, the verification is both more secure and more intuitive to the user. For example, by relying on confidential and/or proprietary information, the system may generate verification questions, the answers to which are known only by the user.
SYSTEMS AND METHODS FOR PROCESSING DATA MESSAGES FROM A USER VEHICLE
A payment processor computing device for performing an electronic transaction initiated by a vehicle is described. The payment processor computing device is configured to receive a registration secure token from a vehicle computing device, the registration secure token corresponding to a cardholder and including an account identifier, a vehicle identifier, and a biometric identifier. The payment processor computing device is further configured to store the registration secure token in memory, receive an authorization request message associated with a payment transaction initiated by the cardholder using the vehicle computing device in communication with a merchant computing device wherein the authorization request message includes a transaction secure token, authenticate the authorization request message by matching the transaction secure token to the registration secure token, embed a matching indicator within the authorization request message, and transmit the authorization request message with the embedded matching indicator to an issuer.
PAYMENT INFORMATION PROCESSING METHOD, APPARATUS, DEVICE AND COMPUTER READABLE STORAGE MEDIUM
The present application discloses a payment information processing method, apparatus, device, and computer readable storage medium. The payment information processing method includes: obtaining motion data of a mobile acquiring device, in response to an acquiring request sent by the mobile acquiring device; determining a motion feature of the mobile acquiring device according to the motion data, under a condition that the mobile acquiring device obtains payment card information; determining a payment information processing result according to the motion feature.
ACCOUNT ASSERTION
Methods and systems for processing interactions with account assertions are disclosed. A method includes receiving, by an assertions model manager, a first request from a resource provider computer for a set of assertions including an account assertion, related to a digital identity of a user. The method then includes responding, by the assertions model manager, to the first request with a response message, comprising a set of assertions, wherein one of the plurality of assertions is an account assertion. Then the method includes receiving, by the assertions model manager, a second request from the resource provider for a value interaction from the user and initiating, by the assertions model manager, the value interaction.
SYSTEMS AND METHODS FOR MANAGING A TRANSACTION STATE OBJECT
A method is disclosed. A server computer receives, from a client computer, of a plurality of client computers, a transaction state object indicating that a transaction has been initiated. The server computer transmits, to a first subset of the client computers, a notification that the transaction has been initiated. The server computer receives, from a second client computer, a first modification to the transaction state object indicating that a first step has been executed. The server computer transmits, to a second subset of the client computers, a notification that the first step in the transaction has been executed. The server computer receives, from a third client computer, a second modification to the transaction state object indicating that a second step in the transaction has been executed. The server computer transmits, to a third subset of the client computers, a notification that the second step has been executed.
SYSTEM AND METHOD FOR FACILITATING TRANSFER OF ELECTRONIC PAYMENT INFORMATION
In a method for transferring payment account information, a payment information transfer request is received from an account holder device associated with a first provider account. A list of payees to which electronic payments have been made from the first provider account is transmitted to the account holder device for display to the account holder and a user selection of at least one selected payee from the list of one or more payees is received from the account holder device. A payment account information data file is assembled in a predetermined data format, the file including payment account information for each selected payee. The payment account information data file is then transmitted to at least one of the set consisting of the account holder device and an information processing system of a second account provider.
SYSTEMS AND METHODS FOR DATA SECURITY WITH MODULAR WEBSITE INTEGRATION
Examples described herein include systems, methods, instructions, and other implementations for data security. One example includes receiving a checkout communication received from a merchant system, where the checkout communication does not include client information, and processing the communication to authenticate a validated checkout system. A client token is generated in response to an authentication that the checkout communication is from the validated checkout system and transmitted to allow verification of the merchant system. An account communication is then received including the client token and client information, where the client information is not received from the merchant system. A tokenized client account number is generated and used to allow the merchant system to process the secure transaction without access to the client information.
Method and System of Access Management Using a Payment Transaction
The present disclosure relates to a method and system of access management using a payment transaction. The computer-implemented method includes receiving a payment transaction request and one or more details associated with a lock. Further, the method includes providing one of a success message or a failure message to an access management system to operate the lock based on a result of authorization of the payment transaction request and a result of a validation of the one or more details.
METHOD AND SYSTEM FOR PAYMENT INTEGRATION WITH PROVENANCE SUPPLY CHAIN EVENTS
A method for triggering payment transactions through predetermined events identified using a blockchain includes: receiving, at a first system, trigger data including a first account identifier, second account identifier, and trigger event values; receiving, at the first system, blockchain data values, each including a hash value; identifying, by the first system, a match between a specific blockchain data value and a specific trigger event value based on the hash value; transmitting, by the first system, a notification message to a second system including the first account identifier and second account identifier; identifying, by the second system, a first payment identifier using the first account identifier and a second payment identifier using the second account identifier; and initiating, by the second system, a payment transaction for payment from a transaction account associated with the first payment identifier to a transaction account associated with the second payment identifier.
GENERATING OBFUSCATED IDENTIFICATION TEMPLATES FOR TRANSACTION VERIFICATION
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for identification templates for identification search and authentication. In some implementations, obtaining first data that represents a physical document identifying a party to a transaction, providing the first data as an input to a machine learning model that comprises at least one hidden layer that is a trained security feature discriminator layer, obtaining activation data generated by the security feature discriminator layer based on the machine learning model processing the first data, determining based on the obtained activation data, that the transaction is to be denied, and based on determining that the transaction is to be denied, generating a notification that, when processed by the computer, causes the computer to output data indicating that the transaction is to be denied.