Patent classifications
G06Q20/4015
SEMI-PRIVATE BLOCKCHAIN VIRTUAL CURRENCY EXCHANGE SYSTEMS
A first merchant node on a semi-private blockchain virtual currency exchange system is exclusively capable of creating first virtual currency units. Unaffiliated merchant node(s) are exclusively capable of creating other merchant-specific virtual currency units in the system, while customer computing devices are incapable of creating virtual currency units. The first merchant node creates and issues first virtual currency units to a first customer account associated with a first customer computing device. Upon receiving a transaction request for exchanging first virtual currency unit(s) for a second currency type between the first customer account and another customer account, the first merchant node validates the first transaction request, and creates and sends a first transaction receipt to unaffiliated merchant node(s). Upon receiving a redemption request from a customer account, the first merchant node validates the first redemption request, and creates and sends a first redemption receipt to unaffiliated merchant node(s).
Ensuring secure access by a service provider to one of a plurality of mobile electronic wallets
Facilitating exclusive access to a workflow of a service provider via a mobile wallet interface involves, within a client runtime environment, activating through the interface a service provider-specific application so that the service provider-specific application has exclusive access to a secure electronic transaction workflow of the service provider associated with at least one of the service provider-specific application and the wallet, while being denied access by the client runtime environment to any other service provider services or resources.
Token and cryptogram using transaction specific information
Systems and methods for token processing are disclosed. An access device can provide access device data to a mobile communication device. The communication device generates a token request including the access device data and communication device data and sends the token request to a server computer. The server computer returns a token and a token cryptogram to the mobile communication device. The token and the cryptogram may be used in a transaction.
Multipurpose smartphone device
Embodiments described herein relate generally to a multipurpose smartphone device. More specifically, embodiments described herein disclose a smartphone that is capable of being used as a point-of-sale (POS) device.
Computer-based systems configured to provide pre-staged transactions via lockers and methods of use thereof
Systems and methods of providing pre-staged transactions via lockers are disclosed. In one embodiment, an exemplary computer-implemented method may comprise receiving a request from a user to perform a pre-staged transaction at a physical location; generating a first token based on the pre-staged transaction; transmitting first token to an app executing on a mobile device associated with the user; assigning a locker from a plurality of lockers positioned within the physical location; receiving the first token from the app executing on the mobile device of the user to initiate access to the locker when the user is within the physical location; authenticating the user based on the first token; transmitting, upon successful authentication of the user, a second token to the app executing on the mobile device; and causing, in response to receiving the second token at the locker, the locker to unlock.
Self-service modular drop safes with technology shelf replacement capability
Novel modular smart management devices in the form of drop safes include the modular components of a chassis, door and technology cabinet. The drop safes enable retailers to make cash deposits quickly and safely within or near their own facilities. Various technology, including RFID readers, RFID tags, and other equipment allow the drop safes to identify each deposited bag. Employees utilize specialized apps on their mobile devices to facilitate deposit creation and other tasks. Novel methodologies for accessing the drop safes for emptying employ single-use, time-expiration type authorization codes along with other security measures to minimize risk and to provide other benefits. Novel structures along with methodologies for replacing, on-site, modular components with auto-detection of functionality during initialization and re-initialization enables for efficient replacement and upgrading of components, including the upgrading of safes to provide additional functionality.
System for identifying points of compromise
The disclosure describes an apparatus having programmed instructions that when executed cause the apparatus to receive, via a communication network, information regarding suspicious fraud activity at a first location involving a plurality of transaction cards; monitor changes over a first time interval to received information regarding suspicious fraud activity at the first location; and identify a point-of-compromise (POC) location based on monitored changes surpassing a threshold indicating suspicious fraud activity at the first location over the first time interval.
SYSTEMS AND METHODS FOR DISTRIBUTING PERSONALLY IDENTIFIABLE INFORMATION ACROSS GEOGRAPHIC BOUNDARIES
Systems, methods, and computer-readable storage media configured to facilitate execution of transactions via a money transfer network are disclosed. During execution of the transactions, tokenized identity information may be utilized when exchanging transaction data between geographically distributed nodes of the money transfer network and the transactions are recorded to a distributed ledger maintained by the nodes. Smart contracts may be utilized to digitally sign transactions at various stages of transaction processing, such as at different stages of regulatory compliance validation and to authenticate the validity of the requested transaction (e.g., prevent double-spends). Utilizing tokenized identity information may reduce the likelihood that personally identifiable information (PII data) is obtained by or inadvertently provided to unauthorized third parties or systems. Additionally, the distributed ledger may record information in immutable records, thereby increasing the reliability and trustworthiness (e.g., for auditing purposes) of the data stored on the distributed ledger.
MULTI-FACTOR AUTHENTICATION USING LOCATION DATA
In some implementations, a device may obtain first location data associated with one or more exchanges, where the first location data is associated with a first level of granularity. The device may determine second location data associated with the one or more exchanges based on records associated with the one or more exchanges, where the second location data is associated with a second level of granularity that is higher than the first level of granularity. The device may detect an authentication event associated with an access attempt to the account. The device may provide, based on detecting the authentication event, one or more authentication queries that are based on the second location data. The device may authenticate the access attempt to the account based on one or more responses to the one or more authentication queries.
Systems and methods for authenticating a user using private network credentials
A cardholder authentication computing device for authenticating user computing devices during online payment transactions are provided. The cardholder authentication computing device leverages pre-authentication of a user by a private network to facilitate authentication of a user in the context of an online payment transaction between the user and a merchant. During the course of an online payment transaction, the cardholder authentication computing device may receive an authentication request messages containing pre-authentication data from a merchant computing device. The cardholder authentication computing device then authenticates the user based, in part, on the pre-authentication data. In certain embodiments, the cardholder authentication computing device may also determine whether one or more partner services apply to transactions between the user and the merchant based on the user's affiliation with the organization.