G06Q20/4015

Methods and systems for performing secure transactions associated with instructions received in natural language form

Embodiments provide methods and systems for facilitating scheduled payment transactions to users via an application provided by the server system, the application available on the user device. The method performed by the server system includes receiving a transaction request message from the user device, the transaction request message includes scheduled transaction instruction provided by the user in natural language format. The method includes authenticating the user based on a plurality of user authentication factors received from the user at pre-defined time intervals. In an embodiment, the server system is configured to train a data model using ML algorithms by learning the plurality of user authentication factors based on which the user is automatically authenticated by the server system. Upon successful authentication, the method includes parsing the transaction request message to determine a scheduled transaction instruction. The method includes facilitating, processing of the scheduled transaction based on the scheduled transaction instruction.

Dynamic and predictive adjustment of payment attributes based on contextual data and metadata

Implementations described herein relate to dynamic and predictive updating of a payment attribute of a payment instrument. In some implementations, the method includes receiving, at a computing device, route data for a plurality of trips, receiving, at the computing device, first trip data for the first trip from the user device, wherein the first trip data includes at least location data of the user device, calculating, based on the received first trip data, a fuel likelihood score for the first trip, comparing the fuel likelihood score to a first threshold, based on a determination that the fuel likelihood score meets the first threshold: transmitting, to a computer associated with a payment network, a message to update one or more payment attributes stored at the payment network and associated with the first payment instrument, and displaying an indication that the first payment instrument is approved for the fuel transaction.

Systems and methods for contactless and secure data transfer

In one embodiment, a method comprises receiving a unique identifier from an item and sending a communication to an electronic device requesting that a user confirm a pending transaction, receiving input from the electronic device associated, and sending the received input to an authentication system for completing a transaction. In another embodiment, a system comprises a sensor, an authentication system, and a transaction processing system. The sensor is configured to emit energy and receive at least one first identifier, send at least one communication to an electronic device requesting a second identifier, receive at least one second identifier, and send the at least one first identifier and the at least one second identifier to the authentication system. The authentication system is configured to receive the at least one first and second identifiers from the sensor, to choose, based on the at least one first identifier and the at least one second identifier, a transaction processing system, and send the at least one first and second identifiers to the chosen transaction processing system.

Systems and methods for managing foreign transactions

Systems and methods are provided for managing foreign transactions. An exemplary method may include providing, to a device of the user, instructions to display an application interface. The application interface may receive user requests to specify a foreign geographical area and to enable and disable the foreign transaction service in the foreign geographical area. The method may also include receiving, through the application interface, a request to enable the foreign transaction service. The method may include associating a transaction rule with the payment account. The transaction rule may define a condition upon which approval of a foreign transaction is permitted. The method may also include receiving a foreign transaction authorization request associated with the payment account. The method may also include approving the foreign transaction authorization request when the condition is met and declining the foreign transaction authorization request when the condition is not met.

NETWORK OF TRUST

A user device may detect at least one external device in communication range of the device, receive at least one external device identifier from the at least one external device, generate a transaction request comprising data describing a transaction to be processed and the at least one external device identifier, and send the transaction request to a transaction service for fulfillment. The transaction service may receive the transaction request, analyze the at least one external device identifier to identify at least one security factor associated with the at least one external device identifier, adjust a security score for the transaction based on the at least one security factor, and determine whether to process the transaction based on the adjusted security score.

Systems For Providing and Processing Customized Location-Activated Gifts

A method for providing a gift includes receiving gift information from a first computing device. The gift information includes a maximum gift amount, a gift recipient, and a gifter financial account and gift redemption information. The method includes generating a tokenized PAN associated with the gifter financial account, identifying a second computing device associated with the gift recipient, determining one or more gift redemption locations and receiving gift recipient location data. The method includes determining that the second computing device has entered a gift-eligible location based on the gift recipient location data and the one or more redemption locations and transmitting data indicative of a gift for display by the second computing device. The method further includes outputting an instruction to debit the gifter financial account with an amount of money in response to determining that a transaction has been executed using the tokenized PAN at the gift-eligible location.

SYSTEMS AND METHODS FOR ELECTRONIC LOYALTY-BASED TRANSACTIONS OVER ELECTRONIC MONETARY EXCHANGE NETWORKS

Computer-implemented systems and methods for initiating a transaction, the transaction generating a validation request to verify a customer's identity, the validation request requesting a first unique randomized identifier from a mobile payment cloud; transmitting the first unique randomized identifier to a customer device, the first unique randomized identifier being forwarded to the mobile payment cloud as a second unique randomized identifier to validate the transaction; receiving an authentication from the mobile payment cloud based on a result of validating the transaction; transmitting a customer identification code and the cash value to an interbank network as an interbank transaction request; receiving a response from the interbank network regarding the interbank transaction request; and processing the transaction based on the response from the interbank network.

SYSTEMS AND METHODS FOR PAYMENT MANAGEMENT FOR SUPPORTING MOBILE PAYMENTS

Systems and methods for managing mobile payments is provided. An account issuer provides an application that is loaded onto a mobile device, which enables a consumer to pay for transactions. The mobile payment application generates a unique code. The code is read by the point of sale terminal, which is then provided to the payment management system. The payment management system contracts the account issuer and authenticates the code, thereby receiving a primary account number. Account number and transaction information is used to authorize the transaction via payment systems. The payment system accepts or declines the transaction in a response. Tokens may be generated for the account number, and value added services may be generated based upon user behaviors.

SYSTEMS AND METHODS FOR SECURING ACCESS TO RESOURCES

In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.

Point-Of-Sale Customization Service

Concepts and technologies are disclosed herein for point-of-sale customization service. A processor executing a point-of-sale customization service can receive a unique identifier associated with a user device detected in a proximity of a computing device. The processor can query preferences stored in a data store using the unique identifier and identify point-of-sale preferences associated with the user device based upon the querying. The processor can transmit the point-of-sale preferences to the computing device to apply to a transaction.