G06Q20/4015

Systems and methods for secure wireless payment transactions when a wireless network is unavailable
11526866 · 2022-12-13 · ·

Systems, methods, and devices are disclosed which allow a mobile device user to complete financial transactions even when the mobile device is not connected to a wireless network. The systems, methods, and devices of the present disclosure may utilize a combination of an encrypted lockbox containing out of network payment codes on the mobile device and a matching set of out of network payment codes stored on a server of a payment authority.

Systems and methods for authentication based on personal card network

A financial institution computing system includes a network circuit exchanging information over a network, a customer database storing financial information, and a transaction circuit. The transaction circuit receives a transaction request associated with a user computing device. The transaction request specifies a financial account. The transaction circuit receives payment card location information indicative of a location of a payment card with respect to the user computing device. The payment card location information indicates that the payment card is within a threshold distance of the user computing device. The transaction circuit authenticates the transaction request using the payment card location information and by determining whether the payment card is associated with an authorized user of the financial account. The transaction circuit authorizes the transaction request based on whether the transaction request is authenticated and transmits a confirmation to a transaction terminal over the network via the network circuit.

Authentication of Users Using Historical Tipping Information to Generate Authentication Questions

Methods, systems, and apparatuses are described herein for improving computer authentication processes by generating authentication questions based on tipping trends. A computing device may receive a request for access to an account. Transactions data conducted by a user may be received. A tipping trend may be determined based on the one or more transactions conducted by the user. Based on the tipping trend, an authentication question may be generated. The authentication question may be provided, and a response to the authentication question may be received. A user device may be provided access to the account based on the response to the authentication question.

PAYMENT ALERT SYSTEM AND TECHNIQUES BASED ON GEOGRAPHIC FOOTPRINT

A non-transitory computer-readable storage medium storing computer-readable program code executable by a processor to retrieve a customer data record including bill payment activity associated with a provider account for a customer of a financial institution; and define a geographical footprint for the customer. The geographical footprint may be defined by identifying a customer set including the customer from a plurality of customers of a provider of the provider account, having customer records indicating geographic proximity, and determining that a predetermined fraction of the customer set are associated with a common billing cycle for the provider. The computer-readable program code may be executable by the processor to send a bill payment alert for transmission to the customer via electronic communication or telephonic communication, when the bill payment activity meets a threshold condition, wherein the threshold condition is determined at least in part by the geographical footprint.

SYSTEMS AND METHODS FOR IDENTIFYING ENTITY LOCATIONS BASED ON DEVICE LOCATION DATA
20220394430 · 2022-12-08 ·

Systems and methods are provided for use in identifying an entity's location based on device-level location data. One example computer-implemented method includes, for an entity associated with an unconfirmed location, transmitting, to a mobile device, a request to identify a physical location of the entity and receiving, from the mobile device, a response including at least (i) an identifier associated with the entity and/or a user associated with the mobile device and (ii) a location of the mobile device at the physical location of the entity. The method also includes matching the location of the mobile device to a transaction record for a transaction at the entity based on the transaction record including the identifier from the response and, in response to a match, assigning the location to the entity and publishing the assigned location of the entity.

Settlement system, user terminal and method executed thereby, settlement device and method executed thereby, and program
11521192 · 2022-12-06 · ·

A settlement system with higher security which replaces a settlement system using credit cards is provided. The settlement system has a user terminal, a settlement device, and a settlement terminal. First, a user ID, a password, and upper limit amount information identifying an amount are inputted in a user terminal 100 (S912), and sent to the settlement device (S913). The settlement device performs credit determination (S922), generates temporary permission information if credit is possible (S923), and sends the temporary permission information to the user terminal (S924). The user terminal generates a one-time password (S915). The one-time password is inputted to the settlement terminal (S931). If the one-time password sent from the settlement terminal to the settlement device is identical to the one-time password created in the settlement device, the settlement device allows a user's payment (S928).

Use management system for moving body
11521191 · 2022-12-06 · ·

A use management system comprises a moving body on which a user rides; a storage medium and an information processing apparatus, wherein the medium stores identification, a predetermined route and movement information, and the moving body includes a first reader/writer for acquiring information from the storage medium and records information onto the storage medium, starts recording the movement information regarding the moving body when the use of the moving body is started, records the movement information when the moving body deviates from the route, and writes the recorded movement information onto the storage medium when the use of the moving body is ended, and the information processing apparatus includes a second reader/writer for acquiring information from the storage medium and charges an additional fee to a user based on the movement information.

Automated verification of user interface process flows
11521210 · 2022-12-06 · ·

Methods and systems are presented for automatically verifying online content for different device configurations and/or account configurations. A request for verifying a user interface software workflow is received from a device. The request can specify particular parameters and content to see if that content appeared correctly when presented to users. Session data associated with one or more real-world user interaction sessions between user devices and a service provider server is obtained. The session data is used to generate data representing how one or more user interface elements are rendered on one or more user devices during the one or more real-world user interaction sessions. The data is comparable against benchmark data to determine if content was correctly presented. Reporting data can be made available that indicates if the user interface workflows are operating correctly.

DYNAMIC AUTOSCALING OF SERVER RESOURCES USING INTELLIGENT DEMAND ANALYTIC SYSTEMS

There are provided systems and methods for dynamic autoscaling of server resources using intelligent demand analytic systems. A service provider, such as an electronic transaction processor for digital transactions, may utilize different computing resource to provide computing resources to users. During use of such computing resources by end users and their computing devices, different demand and needs may be required by such users and devices. The service provider may utilize an intelligent machine learning system to predict computing resource needs and demands at different future time periods based on past usages over similar time periods, computing requests and demands, and network communications. The machine learning engines may identify one or more usages curves, which may be of one or more degrees of curvature, to determine potential future usage. Using these past analytics, the service provider may dynamically scale automatic provision of computing resources.

Systems and methods for contactless and secure data transfer

In one embodiment, a method comprises receiving a unique identifier from an item and sending a communication to an electronic device requesting that a user confirm a pending transaction, receiving input from the electronic device associated, and sending the received input to an authentication system for completing a transaction. In another embodiment, a system comprises a sensor, an authentication system, and a transaction processing system. The sensor is configured to emit energy and receive at least one first identifier, send at least one communication to an electronic device requesting a second identifier, receive at least one second identifier, and send the at least one first identifier and the at least one second identifier to the authentication system. The authentication system is configured to receive the at least one first and second identifiers from the sensor, to choose, based on the at least one first identifier and the at least one second identifier, a transaction processing system, and send the at least one first and second identifiers to the chosen transaction processing system.