G06Q20/4015

Enhanced certificate authority
11316704 · 2022-04-26 ·

An enhanced certificate authority system and method allows for the enhanced security, validation and Multi-Factor Authentication of user's within a digital signature and transaction system through the creation and management of a user's Digital Identity certificate so that through an enhanced certificate authority a user's identity and bona fides may be both protected and established across a diversity of electronic devices and transactions.

Adaptable QR codes to launch customized experiences

Systems, computer-implemented methods, apparatus, and/or computer program products that can facilitate adaptable QR codes to launch customized experiences are provided. In various embodiments, a system can receive, from a client device, a quick response (QR) code, a client identifier, and location data associated with the client device. In various aspects, the system can identify, from a plurality of merchants, a first merchant that corresponds to the QR code, based on identifying that the first merchant corresponds to the location data. In various instances, the system can identify, from a plurality of client profiles, a first client profile that corresponds to the client identifier. In various cases, the system can identify a digital content based on the first merchant and the first client profile. In various aspects, the system can cause the digital content to be provided to the client device.

ANONYMOUS PEER-TO-PEER COMMUNICATION SYSTEM
20230245114 · 2023-08-03 ·

An in-application content transfer system that generates receiver identifiers to categorize a given exchange between two users. A first mobile device displays a plurality of user interface controls that are each selectable by a first user. In response to selection of a first control, an application message is generated that includes a unique identifier associated with a second user of a second device, and a user content that is associated with the first user and that is identified at least in part based on the selection of the first control. The application message, which is configured to seed an application on the second device with the unique identifier, is transmitted to the second device via peer-to-peer communication. The user content associated with the first user is then shifted to the second device.

SECURITY DEVICES, SYSTEMS, AND METHODS FOR DYNAMIC TRANSACTION CARDS
20230245115 · 2023-08-03 ·

A dynamic transaction card including: one or more light emitting elements; a transceiver; and an embedded microprocessor configured to: receive, from a transaction terminal, a location information corresponding to a current location of the transaction terminal; wirelessly transmit, via the transceiver and to a mobile device, the location information; receive an indication that a location-specific security concern exists; and in response to receiving the indication, control the one or more light emitting elements to display a visual indication corresponding to the location-specific security concern.

ADAPTIVE DAILY WITHDRAWAL LIMITS FOR SMART CHIP ATM TRANSACTIONS
20230245084 · 2023-08-03 ·

A computer-implemented method includes receiving a first transaction request including a first transaction amount, determining that the first transaction amount would cause a violation of a daily spending limit, determining to apply an adaptive daily spending limit (ADSL) override, generating an approval message indicating that the first transaction request is approved based on the application of the ADSL override, transmitting the approval message to the ATM, and dispensing the first transaction amount in a currency by the ATM.

COMPUTER-BASED SYSTEMS AND METHODS CONFIGURED FOR ONE OR MORE TECHNOLOGICAL APPLICATIONS FOR AUTHORIZING A CREDIT CARD FOR USE BY A USER

A configured application for authorizing a credit card by a user and a method that may include receiving an electronic request to pair a mobile device associated with a user with a credit card of the user. The credit card may include a location tracking circuitry to remotely communicate a location of the credit card to a remote electronic recipient. The location of the credit card may be received by a processor from the remote electronic recipient. A proximity multi-factor authentication may verify that the user is an authorized user of the credit card. The mobile device associated with the user may be paired with the credit card of the user after verifying that the user is the authorized user. The processor may receive the location of the credit card paired with the mobile device from the remote electronic recipient. The location of the credit card may be displayed on a display of the mobile device associated with the user.

INTELLIGENT GEOSPATIAL GRID ENGINE AND WARNING SYSTEM
20220120912 · 2022-04-21 ·

An apparatus receives a transaction request comprising a pair of latitude and longitude coordinates for where a transaction is being attempted by a user. The apparatus determines that the latitude and longitude coordinates from the transaction request are outside of a first region comprising a first plurality of points and outside of a second region comprising a second plurality of points. The points in the first and second regions comprise latitude and longitude coordinates for a location where a user visited. The second region does not overlap the first region. The apparatus tags the transaction request as anomalous. The apparatus generates an alert requesting that the user confirm whether the second transaction should be authenticated. The apparatus also transmits the alert to a first user device identified in a user account profile.

AUTOMATIC DETECTION AND VALIDATION OF TRANSPORT SERVICE
20220122090 · 2022-04-21 ·

An example operation includes one or more of performing, by a transport, validation of a service that is utilized at a first time, in response to the validation at the first time, transferring, by the transport, a portion of a value related to the service, performing, by the transport, at least one other validation of the service that is utilized at a second time, wherein the second time is later than the first time, and in response to the at least one other validation at the second time, transferring, by the transport, a second portion of the value related to the service.

AUTOMATED, DYNAMIC DIGITAL FINANCIAL MANAGEMENT METHOD AND SYSTEM
20220122166 · 2022-04-21 · ·

An automated, dynamic digital financial management tool is described herein. The financial management tool enables a user to access all forms of payments, debt and transactions to be deducted automatically depending on which form of payment is chosen. The financial management tool documents every item/service purchased. The documentation enables a company/manufacturer/store to provide marketing and recall information to the user. The financial management tool is able to include any and/or all financial aspects of a user's life. The financial management tool is able to be implemented using a universal card. The financial management tool is able to include a pay station to receive payments. The financial management tool is able to include automated services.

TEMPLATE-DRIVEN DISTRIBUTED ELECTRONIC TRANSACTION DATA VALIDATOR

Techniques and systems are disclosed for performing data validation in distributed settings, to enable data validation of an electronic transaction request or command based on a template and validation definitions. In an example, techniques for data validation may include obtaining information processing rules for validating electronic data that is used to perform a financial transaction in a locality (e.g., internationally), generating an electronic data validation template for the locality using the validation rules, and transmitting the electronic data validation template to a computing device for use in validating electronic data using the one or more data field definitions. In further examples, the validation rules may indicate one or more payment validation rules, bank validation rules, or chronology rules. The validation may be automatically deployed to client systems (such as in an enterprise resource planning system) or incorporated into a server as part of data file processing.