G06Q20/4015

Multi-Dimension Classification Object Matrices to Estimate Multi-Dimensional Representations with Multi Function Device
20210318132 · 2021-10-14 ·

Various implementations directed to price time priority queue routing for a optimized multi-dimension map matrix tile data exchange linked database are provided. Implementations of various computer methods to organize a multi-dimension map tile data exchange linked database with associated social networking elements and multi dimension coordinate object optimization and price time priority queues and securitization to organize the data and create a fluid system for trading value within the system for the data over a plurality of devices and network members.

System, method, and computer program product for guaranteeing a payment authorization response

Provided are computer-implemented methods for guaranteeing a payment authorization response. Computer-implemented methods may include determining that a payment authorization response message for a payment transaction was not received from a transaction service provider system within a predetermined period of time after a payment authorization request message for the payment transaction was transmitted to the transaction service provider system; generating a supplemental payment authorization request message for the payment transaction based on the payment authorization request message; determining that the payment transaction is authorized based on a quantitative risk score associated with the supplemental payment authorization request message and an insurer rate associated with the supplemental payment authorization request message; and transmitting a supplemental payment authorization response message to a merchant system based on determining that the payment transaction is authorized. Systems and computer program products are also provided.

TOKEN AND CRYPTOGRAM USING TRANSACTION SPECIFIC INFORMATION
20210312448 · 2021-10-07 ·

Systems and methods for token processing are disclosed. An access device can provide access device data to a mobile communication device. The communication device generates a token request including the access device data and communication device data and sends the token request to a server computer. The server computer returns a token and a token cryptogram to the mobile communication device. The token and the cryptogram may be used in a transaction.

MERCHANT LOCATION BASED DISPLAY FOR A PROJECTABLE TRANSACTION CARD
20210312428 · 2021-10-07 ·

A device may determine information that identifies a location of a projectable transaction card that is capable of being used to conduct a transaction associated with a merchant. The device may determine that the location of the projectable transaction card matches a location associated with the merchant. The device may identify a virtual transaction number that is unique to the merchant, previously associated with the merchant, unique to an account associated with the projectable transaction card, and to be used in conducting the transaction. The device may provide the virtual transaction number for display on a display screen of the projectable transaction card. The virtual transaction number may not be displayed on the display screen of the projectable transaction card prior to a determination that the location of the projectable transaction card matches the location associated with the merchant.

SELF-SERVICE MODULAR DROP SAFES WITH MESSENGER ACCESS CAPABILITY

Novel modular smart management devices in the form of drop safes include the modular components of a chassis, door and technology cabinet. The drop safes enable retailers to make cash deposits quickly and safely within or near their own facilities. Various technology, including RFID readers, RFID tags, and other equipment allow the drop safes to identify each deposited bag. Employees utilize specialized apps on their mobile devices to facilitate deposit creation and other tasks. Novel methodologies for accessing the drop safes for emptying employ single-use, time-expiration type authorization codes along with other security measures to minimize risk and to provide other benefits. Novel structures along with methodologies for replacing, on-site, modular components with auto-detection of functionality during initialization and re-initialization enables for efficient replacement and upgrading of components, including the upgrading of safes to provide additional functionality.

Initiating a transaction based on a real-time kinematics assisted location of a device

A client device can determine, based on global navigation satellite system (GNSS) data received from one or more GNSS satellites, a non-real-time kinematics (RTK) GNSS location of the client device. The client device can determine, based on corrections data received from a reference station, an RTK-assisted GNSS location, of the client device, from the non-RTK GNSS location. The client device can broadcast location information associated with the client device, the location information indicating the RTK-assisted GNSS location of the client device. The client device can receive, from a merchant device, a peer-to-peer connection request, for a peer-to-peer connection between the client device and the merchant device, based on transmitting the location information and based on the RTK-assisted GNSS location of the client device being located within a particular geographic area. The client device and the merchant device can process a transaction via the peer-to-peer connection.

Monitoring system capable of classifying items added to a shopping cart

A system for monitoring shopping carts uses cameras to generate images of the carts moving in a store. In some implementations, cameras may additionally or alternatively be mounted to the shopping carts and configured to image cart contents. The system may use the collected image data, and/or other types of sensor data (such as the store location at which an item was added to the basket), to classify items detected in the shopping carts. For example, a trained machine learning model may classify item in a cart as “non-merchandise,” “high theft risk merchandise,” “electronics merchandise,” etc. When a shopping cart approaches a store exit without any indication of an associated payment transaction, the system may use the associated item classification data, optionally in combination with other data such as cart path data, to determine whether to execute an anti-theft action, such as locking a cart wheel or activating a store alarm. The system may also compare the classifications of cart contents to payment transaction records (or summaries thereof) to, e.g., detect underpayment events.

SYSTEM FOR MANAGING PERSONAL IDENTIFIERS AND FINANCIAL INSTRUMENT USE
20210264431 · 2021-08-26 ·

A method for the secure use of a personal identifier and/or financial instrument that may take place simultaneously with traditional methods of authorization for credit card, check, funds withdraw/transfer or purchase. Authorization according to the present invention may take place as follows: A) the Owner provides a pre-approval of authorization if the request meets an array of Owner-defined parameters; B) an authorization may be granted based on proximity of the Owner to the point of use; or C) the Owner provides a real time approval by smart device. In each case the invention subjects the request for authentication to a sequential verification procedure in which the request is tested against one or more pre-defined verification protocols, the deployed authentication protocol being pre-determined by the Owner and pre-selected in accordance with a user profile that was pre-programmed by the Owner.

Authentication of mobile device for secure transaction
11132694 · 2021-09-28 · ·

There are provided systems and methods for authenticating a mobile device for use in a secure transaction. A user having a master device authenticated for use in a secure transaction system, such as an electronic payment system, identifies a secondary device to be enabled for use in processing a secure transaction. The secondary device connects to a companion device and shares information associated with the secondary device and companion device with a transaction processing server, which returns authentication information associated with both devices. When the user initiates a secure transaction, the secondary device identifies whether the third device is in proximity. The secure transaction is processed only if the second and third devices are in communication and authenticated during the transaction. If the secondary device is lost or stolen, the device may be disabled until reauthenticated through the master device.

Systems and methods for processing data messages from a user vehicle

A payment processor computing device for performing an electronic transaction initiated by a vehicle is described. The payment processor computing device is configured to receive a registration secure token from a vehicle computing device, the registration secure token corresponding to a cardholder and including an account identifier, a vehicle identifier, and a biometric identifier. The payment processor computing device is further configured to store the registration secure token in memory, receive an authorization request message associated with a payment transaction initiated by the cardholder using the vehicle computing device in communication with a merchant computing device wherein the authorization request message includes a transaction secure token, authenticate the authorization request message by matching the transaction secure token to the registration secure token, embed a matching indicator within the authorization request message, and transmit the authorization request message with the embedded matching indicator to an issuer.