Patent classifications
G06Q20/4015
SYSTEMS INVOLVING MOBILE DEVICES AND/OR PLATFORM AGNOSTIC INFRASTRUCTURE FEATURES FOR IN-BRANCH AUTHENTICATION AND/OR AUTHORIZATION AND METHODS OF USE THEREOF
Systems and methods involving platform agnostic infrastructure for in-branch authentication and authorization, e.g., for customers and/or transactions, are disclosed. In one embodiment, an exemplary method may include initiating, upon an account access attempt, an authentication-authorization session based on account information, receiving a transaction request from an app running on a customer computing device, updating the session data of the current authentication/authorization session with the transaction request, determining a transaction risk level based on session data of current and/or prior session(s), initiating an authentication procedures based on transaction information, selecting an authentication mechanism from a library based on the authentication procedures, utilizing the authentication mechanism to authenticate the user according to the authentication procedure(s), enabling the app, upon authentication, to proceed to perform the transaction, and/or concluding the session and/or updating the session data with the one or more authentication procedures and/or transaction details of the completed transaction.
SYSTEM AND METHOD FOR PROVIDING A GROUP PAYMENT VEHICLE
A group payment vehicle and process for establishing and utilizing the group payment vehicle may be utilized to make proxy payments for group members and associate payment mechanisms with the group payment vehicle. The group payment vehicle may be virtual or physical and may be time limited (or have another payment limitation). The group payment vehicle may be a debit-type or credit-type as established by a creator of the group payment vehicle. A system may be configured to enable the creator to invite potential group participants to participate with the group payment vehicle that functions as a single payment mechanism to vendors for an event. The system may limit the group payment vehicle to be time limited, geolocation limited, and/or merchant limited to limit potential financial exposure and fraud.
SYSTEM AND METHOD FOR PERSONAL IDENTIFICATION NUMBER ENTRY IN A COMMERCIAL OFF THE SHELF COMMUNICATION DEVICE
A system for conducting a card transaction comprises an consumer application running on a user device, a card reading interface separate from the user device, a payment application residing on a COTS device, a PIN verification subsystem, an EPB creation subsystem located at an EPB creation location, and a server. The user device receives an entered PIN. The card reading interface receives a PAN from a payment card. Either the PIN or a first set of signals comprising the PIN is received by the EPB creation subsystem. The second set of signals comprising the PAN is generated and transmitted by the payment application via the network. An EPB is created by the EPB creation subsystem based on the PIN and PAN, and the EPB is transmitted by the EPB creation subsystem to either the PIN verification subsystem or the payment card for PIN verification.
Using proof of purchase for multifactor authentication
Multifactor authentication techniques described herein may allow a user to submit a recent proof of purchase as a part of a multifactor authentication process to access an account associated with a financial institution. As part of the login process, the user may submit a proof of purchase associated with a transaction. The financial institution may determine information associated with the transaction, such as a merchant associated with the proof of purchase, a time of the transaction, the last four numbers of the transaction card used, a dollar amount, or any combination thereof. If the information matches one or more records in the transaction history of the user's account, the financial institution may authenticate the user and provide access to the account. In this way, the financial institution may leverage transaction history known to the financial institution and the user to authenticate the user.
Digital check disbursement using point of sale devices
Aspects of the disclosure relate to digital check processing. A computing platform may receive a check image from a user device. The computing platform may configure, based on the check image, a digital check for use in conducting transactions between the user device and point of sale devices, which may include generating a QR code for the check. The computing platform may send, to the user device, the digital check, which may enable the user device to execute a transaction with a first point of sale device. The computing platform may receive, from the first point of sale device, a request to execute the transaction. The computing platform may direct an event processing server to process the transaction, which may cause the event processing server to execute a transfer of funds from an account of the initial payor to an enterprise account of the first point of sale device.
Asynchronous automated correction handling in concierge system of incorrectly sorted items using point-of-sale data
An online concierge system performs asynchronous automated correction handling of incorrectly sorted items using point-of-sale data. The online concierge system receives orders from customer client devices and determines a batched order based on the received orders. The online concierge system sends the batched order to a shopper client device for fulfillment. The online concierge system receives transaction data associated with the batched order from a third party system. The online concierge system determines whether a sorting error occurred based on the transaction data and the batched order. In response to determining that a sorting error occurred, the online concierge system sends an instruction to correct the sorting error to the shopper client device.
System and method for using user context and behavior for providing access to a secure computer network
Aspects of the disclosure provide techniques for using behavior based information for providing and restricting access to a secure website, or computer network and its assets to a user. Components of the system may include the following. Client remote computing device, network and browser unique attribute data collection and fingerprinting. Method for capturing user habits and fingerprinting with ability to detect abnormalities through AIML using mobile and wearable device applications. System for detection of normality of user behavior based on habits, and cyber transactions, device access and determining a confidence score associated with each transaction. Method for calculating individual transaction risk based on contextual factors such as user behavior, device, browser and the network traffic and request for authentication by account owner when risk greater than allowed threshold. Method and system to identify user device, browser, and behavior unique attributes, storing and later matching to infer change upon consequent transactions and measuring transaction risk through a search and match against classified set of static and dynamic attributes using a user, browser traffic, device search and match engine.
User authentication based on account transaction information in text field
Methods, systems, and apparatuses are described herein for authenticating access to an account using questions which allow users to provide textual information about transactions conducted by an account. A machine learning model may be trained to predict the guessability of merchants. A request for access to an account may be received, and transaction data for that account may be received. An authentication question may be presented. For example, a user may be prompted to list places they have shopped recently. A user response comprising text data may be received. The text data may be processed to identify one or more merchants. If the one or more merchant(s) are represented in the transaction data, the machine learning model may be used to determine the guessability of the one or more merchants. An authentication score may be determined based on the guessability, and access to the account may be provided.
Method for authenticating internet users
A method for authenticating the identity of a user who is attempting to access a website or conduct a transaction is described. The method involves receiving two geographical locations, and associated time stamps, of a mobile phone associated with the user, one of the locations being the location of the transaction or access attempt. The method determines whether the speed required to travel between the two geographical locations in the elapsed time is within acceptable limits. A confidence score, derived in part from this calculation, is taken into account when deciding whether to allow or deny the access or the transaction.
Processing interrupted transactions over non-persistent network connections
An offline retail machine comprising a short-range transceiver, one or more processors, and memory performs communications operations via one or more mobile devices. The communications operations include establishing via the short-range transceiver a connection with a first mobile device, and transmitting first information to the first mobile device. Upon not receiving an acknowledgement that the first information was received by a remote server, the offline retail machine maintains the first information in the memory and establishes, via the short-range transceiver, a connection with a second mobile device, appends the first information to second information, and transmits the first and second information to the second mobile device. Upon receiving acknowledgement that the first and second information were received by a remote server, the offline retail machine deletes the first and second information.