Patent classifications
G06Q20/4015
Systems and methods for location-based automated authentication
Systems and methods for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform is in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range, and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted encrypted transitory identifier.
Method and system for processing internet purchase transactions
A method for minimizing risk of a consumer performing a fraudulent Internet purchase transactions using a transaction card is disclosed herein, the method comprising receiving an enrollment verification request for a transaction from a merchant's website, transmitting the enrollment verification request to an access control server; receiving an enrollment verification response from the access control server, determining whether the transaction is risky based on at least a portion of the enrollment verification request, if the transaction is not risky, forwarding the enrollment verification response to the merchant website and, if the transaction is risky, modifying the enrollment verification response to denote the transaction is risky and forwarding the modified enrollment verification response to the merchant's website.
Authorization Techniques for Fund Sharing Between Accounts
Techniques are disclosed relating to authorization of asset sharing between user accounts. In some embodiments, a server-side method includes storing account information for a first user account and receiving a first request to share funds from the first user account with a second user account. In some embodiments, the first request includes one or more constraints on the shared funds. In some embodiments, the method further includes authenticating that the first request was received from a user authorized to share funds from the first user account, receiving a second request that is an authorization request for a payment transaction initiated by the second user account, and authorizing, in response to determining that the second request meets the one or more constraints, the second user account to access the shared funds for the payment transaction. In some embodiments, the shared funds are not transferred from the first user account until after receiving the second request.
SYSTEM AND METHOD FOR AUTHORIZING PAYMENT TRANSACTION BASED ON DEVICE LOCATIONS
A method for authorizing a mobile payment transaction is provided that is based on device locations. The method includes receiving, by a server, a request from a point of sale (POS) device to authorize a payment transaction involving a payment facilitating device. In an embodiment, the request includes payment information of the payment transaction and location information of the POS device. When the request is received, an authorizing client device for the payment transaction is identified based on the payment information from the payment facilitating device. The request to authorize the payment transaction is granted when it is determined that the authorizing client device is located within a predetermined distance from the POS device.
SYSTEMS AND METHODS FOR ENHANCED AUTHORIZATION RESPONSE
According to embodiments of the invention, data not ordinarily sent through a transaction network can be transmitted to a resource provider (e.g., a merchant) in an authorization response message. For example, a location of an authorized user of a credential can be transmitted to a merchant to be compared to the merchant's location. This allows the merchant to determine whether to deliver goods or services to a consumer presenting the credential. In an additional or alternative example, transaction statistics can be transmitted to a merchant to allow the merchant to perform analytics. In both cases, the authorization response message serves the function of not only providing authorization services, but also authentication services (via user location) and/or data services (via statistics).
Security system
A terminal for use in a retail banking system comprises an interface for receiving multiple types of personal authentication elements. An authentication request for a user is associated with one or more of these types of element. The terminal also comprises a security module for providing access to a plurality of different access spaces of the system, each space comprises a different respective function or combination of functions of the system. For each access space, the security module provides a mapping between that access space and a respective one or more of the types of personal authentication element. Based on this mapping, the security module is thus configured to grant the user with access to one of the access spaces on condition of being mapped to the one or more types of personal authentication element associated with the authentication request for the user, and on condition those elements are verified.
Virtual asset freeze
A method includes receiving an asset freeze service request having an authentication token by a service computing system from a user computing system. The method further includes retrieving a recorded user identifier and a recorded asset identifier by the service computing system from an asset control system that facilitates access of the virtual asset within a virtual environment. The method further includes comparing the user identifier with the recorded user identifier or the asset identifier with the recorded asset identifier by the service computing system. The method further includes the service computing system generating a key associated with the virtual asset and sending the key and the asset freeze service request to the asset control system. The method further includes service computing system generating an asset freeze protocol defining access to the virtual asset. The asset freeze protocol includes receiving a level one first trigger by the service computing system.
Beverage dispenser systems and methods
A cartridge adaptor system may include a puncturing device; a nozzle adaptor including: a puncture port configured to receive the puncturing device; a nozzle coupling portion configured to releasably couple to a beverage dispenser nozzle; and a cartridge coupling portion configured to releasably couple to a cartridge containing a beverage ingredient; and a cartridge holster having a receiving portion for receiving a portion of the cartridge. The puncturing device may be configured to puncture the cartridge thereby releasing the beverage ingredient.
METHODS FOR PERFORMING INTERNET PROCESSES USING GLOBAL POSITIONING AND OTHER MEANS
Methods for purchasing of goods or services over the internet. A customer has a customer account set up at a bank with associated account information. The account information includes verification information for verification parameters, such as authorized computer identification, authorized delivery addresses, authorized global positioning satellite or other secure location information, authorized user identification, authorized telephone caller identification, and/or other account information. An order is placed by a user via an ordering computer which provides order information. Such order information includes verification variables used by the bank. Verification and/or authentication using one or more variables of the customer account information is used by the bank to validate the order before assuring payment to the merchant.
DATA SHARING WITH CARD ISSUER VIA WALLET APP IN PAYMENT-ENABLED MOBILE DEVICE
A payment-enabled mobile device runs a merchant wallet application. The mobile device engages in a transaction with the merchant at the point of sale. Transaction detail data is transmitted from the wallet application to a transaction authentication server. The transaction detail data includes details of the transaction. A response message from the authentication server is received by the payment-enabled mobile device. Payment credential information is made available to a POS terminal operated by the merchant and/or to a payment processor acting for the merchant.