Patent classifications
G06Q20/4015
PAYMENT METHOD AND DEVICE USING ULTRA-WIDEBAND COMMUNICATION
The present disclosure provides a UWB-based safe proximity payment method. A method of a first electronic device of the present disclosure may comprise the steps of: broadcasting a UWB initiation message including certificate information of the first electronic device; receiving, from at least one second electronic device, a UWB response message including identification information of a payment application included in the second electronic device and certificate information of the payment application; and determining a priority of the at least one second electronic device on the basis of the UWB response message.
TOLL PAYMENT APPARATUS FOR VEHICLE
A toll payment apparatus for a vehicle includes a synchronizer, an occupant data obtainer, and a vehicle processor. The synchronizer is configured to synchronize with a communicator of an occupant of the vehicle and acquire, from the communicator of the occupant, payment data of the occupant and identification data of the occupant. The occupant data obtainer is configured to acquire occupant data from the occupant. The vehicle processor is configured to perform a comparison between the identification data and the occupant data when the synchronizer synchronizes with the communicator of the occupant after a start up of the vehicle, and validate a payment that is based on the payment data when the vehicle processor determines that the occupant is a person identified by the payment data.
COMPUTER IMPLEMENTED TECHNIQUES FOR FACILITATING KYC AND JURISDICTIONAL REGULATORY COMPLIANCE VERIFICATIONS OF PSEUDONYMIZED OR ANONYMIZED USERS
Various aspects described or referenced herein are directed to techniques for facilitating KYC and jurisdictional regulatory compliance verifications of pseudonymized and/or anonymized users accessing regulated and/or non-regulated services provided by one or more service providers. One aspect disclosed herein is directed to the issuance of dynamic SmartPass Tokens certifying that an identified, anonymous or pseudonymous SmartPass user satisfies all the jurisdictional and regulatory compliance requirements for permitting that user to access a specific service provided by specific service provider, enabling SmartPass users to anonymously or pseudonymously access various types of regulated and non-regulated online services while maintaining user anonymity, and providing service providers with desirable regulatory compliance certifications that each SmartPass user accessing the service provider's services satisfies the minimum regulatory compliance requirements for permitting users to access the service provider's services.
GENERATING GRAPHICAL USER INTERFACES COMPRISING DYNAMIC AVAILABLE DEPOSIT TRANSACTION VALUES DETERMINED FROM A DEPOSIT TRANSACTION PREDICTOR MODEL
The disclosure describes embodiments of systems, methods, and non-transitory computer readable storage media that utilize deposit transaction prediction data from a deposit transaction predictor model to generate a graphical user interface (GUI) that indicates an available deposit balance and options for the available deposit balance. Indeed, the disclosed systems can enable access to an available deposit balance on a user account prior to an occurrence of a predicted deposit transaction as indicated by the deposit transaction predictor model. For example, the disclosed systems can receive deposit transaction prediction data from a data pipeline that includes a deposit transaction predictor model. Moreover, the disclosed systems can determine an available deposit balance from the deposit transaction prediction data. Then, the disclosed systems can enable, within a GUI, user selections of a pre-deposit transaction amount from the available deposit balance to modify a user account value based on the pre-deposit transaction amount.
Systems and methods for fraud detection and prevention
Systems and methods for fraud detection and prevention is disclosed. The system may receive a transaction request for a first customer including a transaction location, transaction time stamp, and merchant type code. The system may determine whether the transaction location is expected for the first customer. When the transaction location is unexpected, the system may identify a last-known video detection having a last-known time stamp and last-known location. The system may determine a travel time estimate between the last-known location and the transaction location and determine a buffer based on the merchant type code. The system may compare the travel time estimate to an allotted time that includes a difference between the transaction time stamp and last-known time stamp less the buffer. When the travel time estimate exceeds the allotted time, the system may execute one or more fraud prevention steps.
Automated verification of user interface process flows
Methods and systems are presented for automatically verifying online content for different device configurations and/or account configurations. A request for verifying a user interface software workflow is received from a device. The request can specify particular parameters and content to see if that content appeared correctly when presented to users. Session data associated with one or more real-world user interaction sessions between user devices and a service provider server is obtained. The session data is used to generate data representing how one or more user interface elements are rendered on one or more user devices during the one or more real-world user interaction sessions. The data is comparable against benchmark data to determine if content was correctly presented. Reporting data can be made available that indicates if the user interface workflows are operating correctly.
Systems and methods for completing transactions via lockable boxes
A method includes receiving a lockbox transaction order associated with an account of the provider from a first user device where the lockbox transaction order includes a requested transaction and a desired transaction location, validating whether the requested transaction can be completed at the desired transaction location, determining a physical lockbox associated with the provider from a plurality of physical lockboxes at an alternative lockbox transaction location based on determining that the lockbox transaction order cannot be completed at the desired transaction location, transmitting an indication to a user device indicating that the requested transaction can be completed at the alternative lockbox transaction location, preparing the physical lockbox for the requested transaction, and authenticating a user at the physical lockbox where authenticating the user at the physical lockbox enables the physical lockbox to unlock and become accessible by the user.
SYSTEM AND METHOD FOR INCENTIVIZING REPEAT TRANSACTIONS WITH MERCHANTS WITHIN A PRESCRIBED GEOGRAPHIC AREA USING PAYMENT PROCESSING NETWORK DATA
A method for incentivizing repeat transactions within a prescribed geographic area using payment process network data includes acquiring a first set of transaction data from a payment network, creating a database of a second set of transaction data of transactions by an enrolled cardholder or merchant, identifying rewards eligible transactions and creating a database of rewards eligible transactions by enrolled cardholders at enrolled merchants, calculating rewards by querying the database of rewards eligible transactions and multiplying the amount by a factor, transmitting an instruction to a virtual card issuer to apply the rewards amount to a virtual payment card, receiving an authorization request to make a purchase using rewards, and determining if the transaction of the authorization request occurred within a prescribed geographic area in which rewards may be spent at enrolled merchants and if so authorization for the virtual card issuer to complete the transaction using the rewards.
RFID-enabled payment authentication
Authentication methods and systems using RFID-enabled payment cards are disclosed herein where a server receives a request corresponding to authorization of a payment associated with a payment card from an electronic terminal. The server identifies an electronic device of a user associated with the payment card. The server then transmits an instruction to the electronic device to cause an RFID reader of the electronic device to determine whether an RFID tag corresponding to the payment card is located within a predetermined proximity to the electronic device. When the payment card is located within the predetermined proximity, the server executes a first authentication protocol. Moreover, when the payment card is not located within the predetermined proximity, the server executes a second authentication protocol, wherein the second authentication protocol is more restrictive than the first authentication protocol.
Digital payments linked to geographic locations
Electronic transfers of value may be secured via verification of locations of parties, and/or progressive trust building, while maintaining privacy of sensitive personal information of parties via separate communications by parties with a payment network server. Locations may be fixed geolocations, proximities, and/or positions relative to markers/beacons that are in motion. Transfers may be made from party to party, party to place and place to party, and/or party to a virtual point-of-sale at a place. Transferred items may be electronic funds in fiat and/or crypto currencies, Non-Fungible Tokens (NFTs)/data associated NFTs, electronic data, and/or securities/financial instruments, for example. Transactions may be multiparty and may comprise multiple exchanges of value.