Patent classifications
G06Q20/4015
Customer identification verification process
An example device may include one or more processors to receive a request for a service from a requestor user device; provide transaction information associated with the service to a provider user device, where the transaction information may include location information corresponding to a location at which the service may be provided; obtain verification information from the requestor user device based on an interaction associated with the requestor user device or the provider user device at the location, where the verification information may include one or more characteristics of the requestor user device; generate a verification token based on the one or more characteristics of the requestor user device; provide the verification token to the requestor user device; and provide the verification information to the provider user device to permit the provider user device to verify the requestor user device, in connection with performance of the service, based on receiving the verification information and obtaining the verification token from the requestor user device.
DIGITAL CURRENCY PAYMENT SYSTEM, PAYMENT METHOD AND PAYMENT APPARATUS
A digital currency payment system, includes: a payment apparatus, a settlement terminal, a digital currency block chain and a network server, wherein the digital currency block chain records each transaction in the form of a block chain; the network server stores related information associated with user information and generates matched information according to the user information; the payment apparatus carries payment information; and the settlement terminal includes: a payment information input module, a field decomposition module, a verification module and a transaction information generation module, wherein the payment information input module acquires the payment information by the payment apparatus, and the field decomposition module decomposes the payment information into fields; and the verification module sends user information in a second field to the network server, and the transaction information generation module generates the transaction recorded in the digital currency block chain after acquiring the verification and authorization.
SELF-SERVICE MODULAR DROP SAFES WITH DEPOSIT CREATION CAPABILITY
Novel modular smart management devices in the form of drop safes include the modular components of a chassis, door and technology cabinet. The drop safes enable retailers to make cash deposits quickly and safely within or near their own facilities. Various technology, including RFID readers, RFID tags, and other equipment allow the drop safes to identify each deposited bag. Employees utilize specialized apps on their mobile devices to facilitate deposit creation and other tasks. Novel methodologies for accessing the drop safes for emptying employ single-use, time-expiration type authorization codes along with other security measures to minimize risk and to provide other benefits. Novel structures along with methodologies for replacing, on-site, modular components with auto-detection of functionality during initialization and re-initialization enables for efficient replacement and upgrading of components, including the upgrading of safes to provide additional functionality.
SELF-SERVICE MODULAR DROP SAFES WITH DOOR REPLACEMENT / SAFE TYPE CHANGING CAPABILITY
Novel modular smart management devices in the form of drop safes include the modular components of a chassis, door and technology cabinet. The drop safes enable retailers to make cash deposits quickly and safely within or near their own facilities. Various technology, including RFID readers, RFID tags, and other equipment allow the drop safes to identify each deposited bag. Employees utilize specialized apps on their mobile devices to facilitate deposit creation and other tasks. Novel methodologies for accessing the drop safes for emptying employ single-use, time-expiration type authorization codes along with other security measures to minimize risk and to provide other benefits. Novel structures along with methodologies for replacing, on-site, modular components with auto-detection of functionality during initialization and re-initialization enables for efficient replacement and upgrading of components, including the upgrading of safes to provide additional functionality.
AUTOMATICALLY DISPLAYING PAYMENT PAGES BASED ON PROXIMITY TO A PAYMENT DEVICE
Techniques for displaying a payment page based on the proximity of a payment device to a client computing device are described. One example method includes receiving, at a client computing device, a signal when the client computing device is within a predetermined range of a source of the signal; determining, by the client computing device, that the signal is a predetermined characteristic signal sent by an electronic device of a payee; and in response to determining that the received signal is the predetermined characteristic signal, displaying, by the client computing device, a payment page configured to be read by the electronic device of the payee to perform an electronic payment.
Intelligent authentication process
A method for authentication includes receiving consumer information associated with a consumer transmitted over a first data network in a processor operated by an account issuer; determining available account authentication options based on the received consumer information and a database of potential authentication options stored in a memory in the processor; selecting a set of available authentication options from the available account authentication options based on a database of attributes for the potential authentication options stored in the memory in the processor; transmitting consumer information to an authentication provider associated with a selected authentication option over a second data network; receiving an authentication confirmation over the second data network in the processor; and updating the database of attributes for the potential authentication options to include information regarding a successful authentication and the authentication provider associated with the selected authentication option.
Token and cryptogram using transaction specific information
Systems and methods for token processing are disclosed. An access device can provide access device data to a mobile communication device. The communication device generates a token request including the access device data and communication device data and sends the token request to a server computer. The server computer returns a token and a token cryptogram to the mobile communication device. The token and the cryptogram may be used in a transaction.
Systems and methods for authenticating a user using private network credentials
A cardholder authentication computing device for authenticating user computing devices during online payment transactions are provided. The cardholder authentication computing device leverages pre-authentication of a user by a private network to facilitate authentication of a user in the context of an online payment transaction between the user and a merchant. During the course of an online payment transaction, the cardholder authentication computing device may receive an authentication request messages containing pre-authentication data from a merchant computing device. The cardholder authentication computing device then authenticates the user based, in part, on the pre-authentication data. In certain embodiments, the cardholder authentication computing device may also determine whether one or more partner services apply to transactions between the user and the merchant based on the user's affiliation with the organization.
System and method for correlating diverse location data for data security
A method for authentication using location correlation is disclosed. The method includes determining geographic zones and zone identifiers associated with a location of a mobile communication device. Later, transaction data is received and a zone identifier is determined from that transaction data. If the zone identifier matches one of the previously determined zone identifiers, then a match indicator is sent to an authorizing entity computer system or the transaction may be allowed to proceed.
Resource transfer method, fund payment method, and electronic device
A face image of a resource transferor is obtained, wherein the face image is used to authenticate an identity of the resource transferor. Resource transfer identification information of the resource transferor is obtained, wherein the resource transfer identification information corresponds to a transferor account of the resource transferor. Based on the resource transfer identification information, information about the transferor account and a reference image corresponding to the transferor account are obtained. In response to determining that the face image corresponds to the reference image, a resource of the resource transferor is transferred based on the information about the transferor account.