G06Q20/4015

Dynamic Contactless Payment Processing Based on Real-Time Contextual Information
20230214841 · 2023-07-06 ·

Arrangements for payment and recommendation control are provided. In some aspects, contextual data may be received from a user. For instance, data such as calendar data may be received and an event may be identified. Based on the event, a pre-authorized amount may be identified for payment associated with the event. The system may receive a request for payment and event details. The amount may be compared to the pre-authorized amount and, if more than the pre-authorized amount, a request for payment authorization may be transmitted to a user device. If the amount is not more than the pre-authorized amount, expected location data of the user may be received and current location data of the user may be requested from a user device. The location data may be compared and, if the locations match, the payment may be authorized and automatically processed.

Localized account freeze for fraudulent transactions

Computer-implemented methods and systems are provided for locally freezing a user account in a geographic or digital space. Consistent with disclosed embodiments, locally freezing a user account in a geographic or digital space includes receiving fraud data associated with the user account, the fraud data including a location where a fraud associated with the user account has occurred, wherein the fraud location includes at least one of a digital location or a geographical location; receiving account data associated with the user account, the account data including non-fraudulent account transaction information; generating a pattern of fraud based on the fraud data; generating a pattern of use associated with the user account based on the account data; determining a geodigital area for a localized account freeze based on the pattern of fraud and the pattern of use; and performing a localized account freeze on the user account based on the determined geodigital area.

Live card tracking
11551225 · 2023-01-10 · ·

A method for use with a smart card is provided. The smart card may include a communication interface, a housing, a microprocessor embedded in the housing, a battery for powering the communication interface and the microprocessor, and a nano GPS chip, located within the housing and in electronic communication with the communication interface and the microprocessor. The thickness of the smart card is preferably no greater than 0.8 millimeters (“mm”) and has surface area not greater than 86 mm×54 mm. The method may include determining the location of the smart card in response to a request for a smart card transaction authorization and determining the location of a mobile device associated with a specified user of the smart card. Based on the location of the smart card and the location of the mobile device, the smart card may calculate a location delta between the smart card and the mobile device. If the location delta is greater than or equal to a threshold distance, the smart card may deny the request for smart card transaction authorization.

Constraining transactional capabilities for contactless cards

Systems, methods, articles of manufacture, and computer-readable media. A communications interface may receive an indication that a server preauthorized a transaction. The communications interface may receive, from a point of sale device, an indication to pay for the transaction. The contactless card may determine, based on rules stored in the memory, that the location of the mobile device is within one or more locations the contactless card is permitted for use. The contactless card may generate transaction data comprising: indications of an account number and an expiration date of the contactless card, and the indication of the preauthorization. The contactless card may transmit the transaction data to the POS device as payment for the transaction. The server may authorize payment for the transaction using at least a portion of the transaction data based at least in part on identifying the indication of the preauthorization in the transaction data.

Systems and methods for kiosk or payment terminal-based touchless interactions using mobile electronic devices

Systems and methods for kiosk or payment terminal-based touchless interactions using mobile electronic devices are disclosed. In one embodiment, at a cloud-based information processing apparatus comprising at least one computer processor, a method for interacting with a kiosk or payment terminal using a mobile electronic device may include: (1) receiving, from a mobile electronic device and at a uniform resource locator, a communication comprising an identifier for a kiosk or payment terminal comprising a screen; (2) receiving, from the mobile electronic device, touch data corresponding to user input to a touch-sensitive input on the mobile electronic device; and (3) communicating the touch data to the kiosk or payment terminal. The kiosk or payment terminal may graphically represent the touch data by moving a cursor on the screen.

Digital payments linked to geographic locations
11694191 · 2023-07-04 · ·

Electronic transfers of value may be secured via verification of locations of parties, and/or progressive trust building, while maintaining privacy of sensitive personal information of parties via separate communications by parties with a payment network server. Locations may be fixed geolocations, proximities, and/or positions relative to markers/beacons that are in motion. Transfers may be made from party to party, party to place and place to party, and/or party to a virtual point-of-sale at a place. Transferred items may be electronic funds in fiat and/or crypto currencies, Non-Fungible Tokens (NFTs)/data associated NFTs, electronic data, and/or securities/financial instruments, for example. Transactions may be multiparty and may comprise multiple exchanges of value.

DETECTING AND TRIGGERING A PREVENTATIVE OPERATION MODE CHANGE IN A LOYALTY PROGRAM

Potential impending disaster information is received for a potential impending disaster including an event impact value for an extent of the potential impending disaster, a response value for a relief effort for the potential impending disaster, and a donation impact value for effectiveness of the response value. A detection is made, using an artificial intelligence engine, of the response value, of the donation impact value, and of at least one redirection trigger from the potential impending disaster information. Upon the detection of the at least one redirection trigger, a redirection mode is configured. Data is received for a transaction between a customer and a merchant. A determination is made from information from the transaction of a donation amount and a location associated with the transaction. When configured to operate in the redirection mode, generating signals to cause accrual of: at least a portion of the donation amount to a redirection account based on the location associated with the transaction, and any remaining portion of the donation amount to one or more defined donation accounts based on charity catchment area parameters. After the donation amount and the location associated with the transaction are determined, data fields derived from the transaction are received that include: first data for the transaction defined using a first merchant account, and second, different data for the same transaction defined using a second merchant account. Information is transmitted to facilitate a donation of the donation amount to a charity.

SYSTEM AND METHOD FOR OBSERVABILITY, DASHBOARD, ALERTING AND PRO-ACTIVE ACTION MECHANISM
20230004976 · 2023-01-05 · ·

A system and method for observability, dashboard, alerting and pro-active action framework for card authorizations application are disclosed. A receiver receives a payment authorization request message having a predefined first format via a communication protocol TCPIP socket including an application process called socket manager corresponding to a card transaction. A processor operatively connected to the processor via a communication network collects application data from the message in connection with the card transaction; aggregates and stores the application data onto a dynamically allocated shared memory; reads the aggregated application data from the shared memory; stores the application data in an individual transient data queue attached to the socket manager; converts, in response to reading, the predefined first format of the payment authorization request message to a predefined second format suitable for publishing onto a desired messaging platform; and publishes the converted message onto the desired messaging platform.

Real-time authorization of initiated data exchanges based on dynamically generated tokenized data

The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that, among other things, authorize initiated exchanges of data in real-time based on dynamically generated tokenized data. For example, an apparatus may receive first positional data identifying a first geographic position of a client device and based on the first positional data, the apparatus may determine a value of a parameter characterizing an exchange of data between the client device and a terminal device disposed proximate to the client device during a temporal interval. The apparatus may transmit data requesting a pre-authorization of the data exchange to a computing system, which perform operations that pre-authorize the data exchange in accordance with the parameter value and transmit a digital token representative of the pre-authorized data exchange to the terminal device. The digital token may be valid during the temporal interval and may include a cryptogram associated with the client device.

Self-service modular drop safes with messenger access capability

Novel modular smart management devices in the form of drop safes include the modular components of a chassis, door and technology cabinet. The drop safes enable retailers to make cash deposits quickly and safely within or near their own facilities. Various technology, including RFID readers, RFID tags, and other equipment allow the drop safes to identify each deposited bag. Employees utilize specialized apps on their mobile devices to facilitate deposit creation and other tasks. Novel methodologies for accessing the drop safes for emptying employ single-use, time-expiration type authorization codes along with other security measures to minimize risk and to provide other benefits. Novel structures along with methodologies for replacing, on-site, modular components with auto-detection of functionality during initialization and re-initialization enables for efficient replacement and upgrading of components, including the upgrading of safes to provide additional functionality.