Patent classifications
G06Q20/4015
Feature subspace isolation and disentanglement in merchant embeddings
A computer-implemented method for providing merchant recommendations comprises receiving, by a processor, raw merchant embeddings generated from payment transaction records, wherein the raw merchant embeddings include a plurality of embedded features entangled in an embedding space. The processor uses transaction metadata associated with the payment transaction records to determine a subspace of an identified feature within the embedding space. A linear transformation process then removes the subspace of the identified feature from the embedding space to create modified merchant embeddings that are merged and aligned with other ones of the plurality of features within the embedding space. The processor automatically generates a list of merchant rankings based on the modified merchant embeddings, past preferences of a target user using raw user embeddings, and a target region, and provides the list of merchant rankings to the target user.
Biometric solution enabling high throughput fare payments and system access
A communications network places in data communication an access point controlling access to a controlled access area; a server; and a medium-long range wireless communications transceiver. The transceiver detects presence of a portable electronic device outside the access point. The server obtains an indication that a user of the portable electronic device has been authenticated to the portable electronic device and initiates a payment approval process which is completed before the user seeks to pass through the access point. Based at least in part on the authentication and success of the payment approval process, the server provides to the access point an electronic token indicating that the user, bearing the portable electronic device, is to be allowed to pass through the access point into the controlled access area.
Location-based authentication of transactions conducted using mobile devices
A transaction authentication system authenticates a transaction by determining whether a mobile device and POS device involved in the transaction are at the same location. A POS registry stores location data for POS devices. A PAN registry stores mobile device IDs corresponding to account numbers. A mobile device ID can be provided from the PAN registry in response to receiving an account number from a POS device. The mobile device ID can then be used to retrieve location information from a home location register maintained by a mobile service provider. The retrieved location data for a POS device and the retrieved location data for a mobile device are compared.
SYSTEMS AND METHODS FOR CONTACTLESS AND SECURE DATA TRANSFER
In one embodiment, a method comprises receiving a unique identifier from an item and sending a communication to an electronic device requesting that a user confirm a pending transaction, receiving input from the electronic device associated, and sending the received input to an authentication system for completing a transaction. In another embodiment, a system comprises a sensor, an authentication system, and a transaction processing system. The sensor is configured to emit energy and receive at least one first identifier, send at least one communication to an electronic device requesting a second identifier, receive at least one second identifier, and send the at least one first identifier and the at least one second identifier to the authentication system. The authentication system is configured to receive the at least one first and second identifiers from the sensor, to choose, based on the at least one first identifier and the at least one second identifier, a transaction processing system, and send the at least one first and second identifiers to the chosen transaction processing system.
SYSTEM AND METHOD FOR SECURE DELIVERY AND PAYMENT OF A PRODUCT OR A SERVICE
A processor implemented method for secure delivery of a product or service is provided. The method includes (i) generating a first database by obtaining information regarding location as selected by a first user, (ii) authenticating a second user at a second user device by verifying user identity and bank details, to generate time restricted offers from the second device, (iii) verifying an assistant at a third device, (iv) communicating the time restricted offers to the first device based on the preference of the first user, (v) obtaining a product or a service request from the first device of the first user, (vi) obtaining payment from the first user at the first device for the selected product or service and transferring the payment to an intermediary payment bank and (vii) generating a unique image code when a secure payment is received from the first user for the selected product or service.
Systems and methods for secure mobile transactions
Systems and methods for secure mobile transactions are disclosed. A method for conducting a transaction may include an issuer receiving, over a first network and from a customer mobile device, authentication information and mobile device location information; the issuer authenticating the customer, generating a transaction session identifier, and communicating the transaction session identifier to the mobile device over the first network; the issuer communicating, over a second network, the transaction session identifier and payment device information to an acquirer; the acquirer receiving, from the merchant, the transaction session identifier from the computer application, location information a merchant point of transaction, and transaction information; the acquirer generating a transaction authorization request including payment device information and the transaction information and communicating the request to the issuer portion over the second network; and the issuer authorizing the transaction authorization request. The issuer and acquirer may be under common control.
Service Enhancements Using Near Field Communication
A near field communication (NFC) mobile device may obtain location information from a NFC terminal device that is communicating with the NFC mobile device. A data transfer link may be established between the NFC mobile device and a mobile telecommunication network. The mobile telecommunication network may prompt the NFC mobile device to obtain location information from the NFC terminal device. The mobile telecommunication network may then receive the location information from the NFC mobile device via the data transfer link, and may subsequently determine a location of the NFC mobile device using the location information.
MULTI-FACTOR AUTHENTICATION OF ON-LINE TRANSACTIONS
A fraudulent online payment transaction involving a stolen account number is prevented via a multiple factor authentication of the transaction. When an online payment transaction is initiated from a computing device, a mobile device that is associated with the account is employed as a physical token, and the online payment transaction is authorized based on possession of the mobile device. Real-time information associated with the user initiating the online payment transaction and real-time information associated with the mobile device are employed to verify user identity and user location. User identity is verified by comparing the name associated with the online payment transaction with the name that is currently registered as the user name for a mobile device. User location is verified by comparing the location at which the online payment transaction is initiated with the current location detected for the mobile device.
MOBILE COMMUNICATIONS DEVICE PAYMENT METHOD UTILIZING LOCATION INFORMATION
A method includes receiving, by a payment server, a request for a payment from a mobile communication device; and, generating, a request to verify the location of the mobile communication device. In response to receiving the location of the mobile communication device, determining whether or not to authorize the requested payment.
SYSTEMS AND METHODS FOR PUSHING HOSTED UNIVERSAL RESOURCE LOCATOR TO MOBILE COMPUTING DEVICES
A host system pushing hosted Universal Resource Locators (URLs) to mobile computing devices is provided. The host system includes at least one host computing device configured to receive first merchant data and first Internet of Technology (IOT) data associated with a merchant computing device, enroll the merchant computing device using the first merchant data and the first IOT data, and build an IOT device profile. The host computing device is also configured to generate a hosted URL associated with the merchant computing device and push the hosted URL, using a URL signal, to a user computing device via an IOT device. The host computing device is further configured to instruct the user computing device to convert the URL signal into a URL address and instruct the user computing device to load the URL address in a browser of the user computing device.