G06Q20/4015

INFORMATION PROCESSING APPARATUS, SERVER DEVICE, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM
20240127249 · 2024-04-18 · ·

An information processing apparatus related to the present example embodiment comprising: an acquisition unit for acquiring visitor registration information of a person permitted to enter a management area by a first biometrics authentication; and a control unit for performing a second biometrics authentication for a predetermined transaction in the management area using the visitor registration information.

SYSTEM AND METHOD FOR CARD CONTROL

A system and method for card control includes a card control computing system configured to enforce a card control rule based upon transactions made with a payment card. The card control computing system includes a memory unit configured to store information associated with a card control dashboard, and a processing unit configured to cause presentation of the card control dashboard via a display associated with a remote computing device, such that the card control dashboard is associated with the payment card and the card control rule. The card control dashboard includes a user interface. The processing unit is further configured to receive an input via the user interface to activate or deactivate one or more features associated with the card control rule, and trigger the card control rule based upon the one or more features that are activated or deactivated.

SYSTEM AND METHOD FOR CARD CONTROL
20240127257 · 2024-04-18 ·

A system and method for card control includes a card control computing system configured to enforce a card control rule based upon transactions made with a payment card. The card control computing system includes a memory unit configured to store information associated with a card control dashboard, and a processing unit configured to cause presentation of the card control dashboard via a display associated with a remote computing device, such that the card control dashboard is associated with the payment card and the card control rule. The card control dashboard includes a user interface. The processing unit is further configured to receive an input via the user interface to activate or deactivate one or more features associated with the card control rule, and trigger the card control rule based upon the one or more features that are activated or deactivated.

Systems and methods for setting spend limits and counteracting fraud in gas station transaction

The disclosed technology relates to Spend Limit Systems for gas-station refuel transactions. An exemplary system may receive vehicle information identifying a customer's vehicle and identify associated vehicle characteristics (e.g., gas tank size). The system may identify a known gas-station transaction geographic region for the customer. When the customer (or a fraudster) attempts to purchase gas, the system may receive a transaction request and, in response, set a single transaction limit sufficient to fill the gas tank size with gas and an associated spend limit. The system may also determine whether the merchant location falls within the known gas-station transaction geographic region. When it does, the system may approve the transaction request up to the spend limit. Otherwise, the system may perform one or more fraud prevention actions to authenticate the customer and either approve or deny the transaction request up to the spend limit and/or selectively perform fraud mitigation action(s).

System and method of providing proximity payments
11961082 · 2024-04-16 · ·

Methods and apparatus consistent with the present disclosure allow a customer or payor to select from a plurality of nearby vendors or payees when a computing device of the payor is physically close to electronic devices of the payees. Payee devices and locations of those payee devices may be identified and displayed on a display of a payor device. Once displayed, a specific payee device may be selected by the customer and an order for a product or service may be sent to the selected payee device from the payor device. After the product or service has been provided to the customer, information that confirms that purchase may be sent to any of the selected payee device, the payor device, or a payment processing computer and funds to pay for the product or service may be deposited into an account of the payee based on the confirmation.

SYSTEMS AND METHODS FOR ELECTRONIC LOYALTY-BASED TRANSACTIONS OVER ELECTRONIC MONETARY EXCHANGE NETWORKS

Computer-implemented systems and methods for initiating a transaction, the transaction generating a validation request to verify a customer's identity, the validation request requesting a first unique randomized identifier from a mobile payment cloud; transmitting the first unique randomized identifier to a customer device, the first unique randomized identifier being forwarded to the mobile payment cloud as a second unique randomized identifier to validate the transaction; receiving an authentication from the mobile payment cloud based on a result of validating the transaction; transmitting a customer identification code and the cash value to an interbank network as an interbank transaction request; receiving a response from the interbank network regarding the interbank transaction request; and processing the transaction based on the response from the interbank network.

SYSTEMS AND METHODS FOR CONTACTLESS AND SECURE DATA TRANSFER

In one embodiment, a method comprises receiving a unique identifier from an item and sending a communication to an electronic device requesting that a user confirm a pending transaction, receiving input from the electronic device associated, and sending the received input to an authentication system for completing a transaction. In another embodiment, a system comprises a sensor, an authentication system, and a transaction processing system. The sensor is configured to emit energy and receive at least one first identifier, send at least one communication to an electronic device requesting a second identifier, receive at least one second identifier, and send the at least one first identifier and the at least one second identifier to the authentication system.

Methods and systems for merchant-industry mapping based on ambient noise

Embodiments provide a method and a system for conducting merchant-industry mapping based on ambient noise. The method includes receiving a payment transaction request and an audio signal comprising ambient noise in surrounding of a merchant terminal of a merchant. The ambient noise is recorded by the merchant terminal and includes a plurality of sounds. The method includes determining whether the merchant is an aggregated merchant or a non-aggregated merchant. The method includes processing the ambient noise to determine a type of the merchant upon determining that the merchant is the non-aggregated merchant. The method includes mapping the merchant to an industry from a plurality of industries available in the server system based on the type of the merchant. The method further includes storing the mapping of the industry and the merchant in a database associated with the server system.

RFID-enabled payment authentication

Authentication method and systems using RFID-enabled payment cards are disclosed herein where a server receives a request corresponding to authorization of a payment associated with a payment card from an electronic terminal. The server identifies an electronic device of a user associated with the payment card. The server then transmits an instruction to the electronic device to cause an RFID reader of the electronic device to determine whether an RFID tag corresponding to the payment card is located within a predetermined proximity to the electronic device. When the payment card is located within the predetermined proximity, the server executes a first authentication protocol. Moreover, when the payment card is not located within the predetermined proximity, the server executes a second authentication protocol, wherein the second authentication protocol is more restrictive than the first authentication protocol.

Systems for authenticating user permissions and methods of use thereof

Systems and methods of the present disclosure physical object-based passwords by registering an object password including first object representations, first background scene representations, and a first presentation sequence from first image data. Receiving second image data and a second presentation sequence that is a second order in which the user has presented second physical objects to an image acquisition device, and detecting in the second image data second object representations of the second physical objects, and second background scene representations. Computing a probability that the user is a permissioned user by inputting the first image data and the second image data into a machine learning model configured to compute the probability based on comparing the object password and the second image data. Tagging the user as the permissioned user or non-permissioned user based on the probability.