G06Q20/4015

Processing transactions in offline mode

In some examples, methods and systems may process one or more payment transactions between a merchant and a buyer by detecting buyer's communication device as an instrument to approve or reject a payment transaction in offline mode. The method includes detecting at least one transaction activity associated with a payment system, establishing a communication channel between the POS terminal an RF communication device in proximity to the POS terminal to obtain at least one device characteristic of the communication device, related to the operational or physical features of the communication device; generating a digital fingerprint based in part on the obtained device characteristic and the information related to received payment object; determining whether the digital fingerprint substantially compares to an existing fingerprint in a database and if the existing fingerprint is substantially similar to the digital fingerprint, rejecting the payment transaction through presence of the communication device.

Shared authentication for limited use of an associated account based on user location and connected devices

There are provided systems and methods for shared authentication for limited use of an associated account based on user location and connected devices. A user may own a location where another user may visit or rent. The user may have a payment account that may be used with merchants to purchase items that are associated with the location or offered with use of the location. The user may set up the payment account to have a shared authentication mechanism with other users that utilize the location to allow the other users to pay for items using the payment account. The authentication mechanism may be a credential that may be pushed to a device of one or more of the other users when the other users are at or nearby the location or may be information of the other users that may be matched during transaction processing.

SYSTEMS AND METHODS FOR SECURE MOBILE TRANSACTIONS
20190228416 · 2019-07-25 ·

Systems and methods for secure mobile transactions are disclosed. A method for conducting a transaction may include an issuer receiving, over a first network and from a customer mobile device, authentication information and mobile device location information; the issuer authenticating the customer, generating a transaction session identifier, and communicating the transaction session identifier to the mobile device over the first network; the issuer communicating, over a second network, the transaction session identifier and payment device information to an acquirer; the acquirer receiving, from the merchant, the transaction session identifier from the computer application, location information a merchant point of transaction, and transaction information; the acquirer generating a transaction authorization request including payment device information and the transaction information and communicating the request to the issuer portion over the second network; and the issuer authorizing the transaction authorization request. The issuer and acquirer may be under common control.

SAFETY INDEX FOR THE CALCULATION OF A RATING BASED ON USER GENERATED REPORTS OR ACTIONS AND REWARDS SYSTEM THEREFOR

The method and system allows for users to share and be rewarded for information submitted or actions performed, including reports containing messages, images, videos, and geolocation data, of any issues they encounter. The submissions can be shared with the appropriate organization and/or stored on a server, and uploaded to a blockchain to ensure that there is a permanent, tamper-proof record verifying the authenticity of all related transactions. Each submission or action can be verified to create a rating for each user. The system can additionally provide a trust rating for a municipality, facility, venue or organization itself as well. Such a trust rating can be a function of the number of reports submitted by users and the resolution of such reports. The system can have the ability to reward users with digital value in return for receiving and verifying authenticity of the information, and to provide such users with the ability to redeem those rewards for goods and services.

Authenticating activities of accounts

A system, a medium, and a method involve a communication interface of a server device that receives first activity data associated with a first activity of an account and second activity data associated with a second activity of the account. A processor of the server device determines a first location of the first activity from the first activity data and a second location of the second activity from the second activity data. An authentication circuit of the server device determines a first authentication of the first activity based at least on the first activity data. The authentication circuit determines a second authentication of the second activity based on at least one of the first authentication, the first location, and the second location. A transmitter of the communication interface transmits an indication of the second authentication to a client device.

Methods and systems of providing verification of the identity of a digital entity using a centralized or distributed ledger

Providing verification of the identity of a digital entity may include including receiving information and a public key of the digital entity, the information having been previously attested to in an attestation transaction stored within a centralized or distributed ledger at an attestation address, the centralized or distributed ledger providing a record of transactions. The system may derive an attestation address using the information and the public key of the digital entity. The system may verify the existence of the attestation transaction at the attestation address in the centralized or distributed ledger and verify that the attestation transaction has not been revoked. The processor associated with the user may receive a cryptographic challenge nonce signed by the digital entity's private key; and may verify the digital entity's identity with the cryptographic challenge nonce signed by the digital entity's key.

EVENT BASED PAYMENT-PROCESSING SYSTEM
20190220851 · 2019-07-18 ·

Disclosed herein are systems and methods for processing a gift request that use mobile computing devices to transfer a gift payment associated with the gift request. The mobile computing devices are capable of running a gift transfer application, which facilitates a transfer of the gift payment via a payment-processing server. A sender user execute the gift transfer application, using a mobile computing device, to transfer the gift payment, through a gift processing system that runs the gift transfer application, to a mobile computing device of a recipient user. One or more techniques authenticate the recipient user prior to processing the gift requests initiated by the sender user.

Dynamic Virtual Transaction Card Management System
20240177138 · 2024-05-30 ·

Methods, systems, and apparatuses are described herein for generating and managing virtual transaction cards based on mobile device location so as to provide transaction security during in-person transactions. A geographic location of a mobile device may be determined, a proximate merchant may be selected, and a virtual transaction card may be generated for that particular merchant. Data corresponding to that virtual transaction card may be deployed into a digital wallet device for use during transactions with point-of-sale devices. Use of the digital wallet device may be conditioned on geographic location, time, an unlock command from a mobile device, or the like. By providing such dynamically-generated and limited virtual transaction cards for in-person transactions, the threat of security vulnerabilities relating to point-of-sale systems may be mitigated.

CUSTOMIZABLE INTERMEDIARY PLATFORM FOR CONNECTING ENTITIES
20240177159 · 2024-05-30 ·

In an example embodiment, a system is provided that allows for multiple service partners to be accessible simultaneously via a single API. The system ensures that requests to collect payment information are sent only to a service partner that is active and operating, ensuring that a request to collect payment information that would normally have been sent to a service partner that is down or otherwise unavailable will be rerouted to an alternative service partner. Furthermore, the system also allows for a dynamic selection of a service partner to utilize among multiple service providers, based on factors such as how well the service provider's system integrates with the underlying institution from which the payment will be made, and the estimated speed of the processing of the transaction by the service provider. This latter aspect can be technically challenging because the same institution may be known by multiple different names on the different service providers.

USER POSITIVE APPROVAL AND AUTHENTICATION SERVICES (UPAAS)

The invention provides Users of Retail Payment and Identification instruments with the ability to review transaction details and approve transaction by capturing UVM in User controlled environment and Issuers of these instruments with the ability to positively authenticate Users in Issuer controlled environment. The invention accounts for real time legacy or non-legacy processing systems to provide an authorization request from POA to Issuer Host. The invention introduces two UPAAS componentsUser Gateway and User Application. The UPAAS User Gateway is implemented in an Issuer controlled environment enabling interface between Issuer legacy Host and UPAAS User Applications. The UPAAS User Application can be implemented on any device supporting communication protocol such as TCP/IP without any hardware changes enabling the User to login to UPAAS User Gateway, review and approve or decline a specific transaction in real time by entering UVM, such as PIN, for User authentication purposes.