G06Q20/4015

PAYMENT PROCESSING SYSTEM AND METHOD THEREFOR

A payment processing system is discloses. The system comprises a module configured to receive a payment request for a payment transaction from one of a plurality of different merchant applications associated with a computing device wherein the request comprises payment information comprising a merchant code or transaction identifier; in response to receiving the payment request, receive encrypted payment data from a reader coupled to the computing device wherein the payment data comprises an account number associated with a user wherein the account number is encrypted according to a first key; and transmit the payment information and the encrypted payment data to a payment server.

Localized account freeze for fraudulent transactions

Computer-implemented methods and systems are provided for locally freezing a user account in a geographic or digital space. Consistent with disclosed embodiments, locally freezing a user account in a geographic or digital space includes receiving fraud data associated with the user account, the fraud data including a location where a fraud associated with the user account has occurred, wherein the fraud location includes at least one of a digital location or a geographical location; receiving account data associated with the user account, the account data including non-fraudulent account transaction information; generating a pattern of fraud based on the fraud data; generating a pattern of use associated with the user account based on the account data; determining a geodigital area for a localized account freeze based on the pattern of fraud and the pattern of use; and performing a localized account freeze on the user account based on the determined geodigital area.

AUTHENTICATION SYSTEM, MANAGEMENT DEVICE, AND AUTHENTICATION METHOD

An authentication system that includes a memory and processing circuitry. The processing circuitry is configured to manage a plurality of items of authentication information for authenticating a user; determine a usage type; select an authentication type, from among a plurality of authentication types, corresponding to the usage type; perform an authentication process for the user based on the authentication type; and output a result of authentication of the user.

NETWORK BASED ENFORCEMENT OF GEOGRAPHICAL COMPLIANCE
20210345070 · 2021-11-04 ·

Improved systems and methods for enhancing the performance of network based computerized content rendering and hosting and providing of devices, systems and/or platforms by modifying the capabilities and providing non-native functionality to such devices, systems and/or platforms through a novel and improved application, networked based enforcement of geographical compliance, data processing and networking framework.

SYSTEMS AND METHODS FOR VALIDATING AN INSTRUMENT

Disclosed are methods and systems for validating instruments. For instance, a request to generate a cashier's check may be received from an application executing on a drawer's computing device. Request information may be stored within a data storage entry for the check, and a code to be printed on the check may be generated to include at least a portion of the request information. Instructions may be provided to a printing system to cause the check to be printed with the code, where the printed check is invalid. Instructions may be provided to the application and/or printing system to cause display of a prompt to facilitate a reading of the code to validate the check. When information within the code is read by and received from the printing system, the check may be validated, which triggers a transfer of funds from the drawer's account. Otherwise, the check may remain invalid.

METHODS, APPARATUSES, AND DEVICES FOR VERIFYING AUTHENTICITY OF CROSS-BORDER TRANSACTIONS

Disclosed herein are methods, systems, and media for verifying authenticity of cross-border transactions. One of the methods herein comprises: obtaining transaction information of a transaction submitted by a transaction platform in a blockchain network; obtaining, from the blockchain network, remittance information provided by a payment institution for the transaction, wherein the payment institution is in the blockchain network; generating, based on the transaction information and the remittance information, a first result of authenticity of the transaction; and generating authenticity confirmation of the transaction based on the first result.

Automated teller machine (ATM) including an application programming interface (API)-equipped, embedded mobile computer

An ATM system includes a back-end server, an ATM central processing unit (ATM CPU) that receives information relating to the ATM system and a mobile computer. The mobile computer provides a CPU (MC CPU) and a keypad. The mobile computer may also provide a touch screen configured to display an initial ATM display. The ATM system also includes an interface system for interfacing between the ATM CPU and MC CPU. The back-end server formats and transmits to the ATM an API call. The API call requests a location of the user, ATM device information, and identification information of the user. The mobile computer is configured to respond to the API call by providing the location, the ATM device information, and the identification information of the user to the back-end server.

PAYMENT CARD WITH USER FEEDBACK
20210342820 · 2021-11-04 ·

Aspects described herein may allow for method of detecting when a payment card is in a retail establishment by establishing communication between the payment card and a real-time position tracking system; determining whether one of a plurality of accounts linked to the payment card has been used in one or more prior purchasing transactions in the retail establishment; detecting, movement of the payment card with respect to the individual carrying the payment card while the payment card is in a carrying device carried by the individual; and providing, by the payment card, haptic feedback and visible feedback to the individual carrying the payment card.

MOBILE AUTHENTIFICATION METHOD VIA PEER MOBILES

Embodiments include systems and techniques to perform secure transactions including processing registration information for each computing device of a plurality of computing devices having authority over a financial account. In one example, embodiments include receiving a pending transaction against the financial account from a computing device. Embodiments include executing an authentication protocol to determine the computing device is a member of the plurality of computing devices based upon the registration information, and processing data identifying another computing device within a configurable distance from the computing device. Embodiments further include the system to execute the authentication protocol to determine the other computing device is a member of the plurality of computing devices based upon the registration information and bypass a portion of a security procedure for authorizing execution of the pending transaction.

SYSTEM, METHOD AND COMPUTER-ACCESSIBLE MEDIUM FOR FRAUD DETECTION BASED ON SATELLITE RELAYS
20210342845 · 2021-11-04 ·

An exemplary system, method, and computer-accessible medium can include receiving first information related to a first transaction associated with a financial account, determining a first network coverage area associated with the first transaction, receiving second information related to a second transaction associated with the financial account, determining a second network coverage area associated with the second transaction, flagging the second transaction as potentially fraudulent based on the first network coverage area and the second network coverage area. The financial account can be a credit card account. The second transaction can be flagged if the first network coverage area and the second network coverage area do not overlap. The first network coverage area can be based on a coverage area for a first satellite and the second network coverage area can be based on the coverage area for a second satellite, where the first satellite can be different than the second satellite.