G06Q20/4015

METHOD AND SYSTEM FOR AUTHORIZING CARD ACCOUNT TRANSACTIONS BY GEOGRAPHIC REGION
20210081942 · 2021-03-18 ·

A method and system for authorizing card account transactions by geographic region by providing data for a user interface displaying geographic regions and merchant locations each corresponding to the location of a merchant where a transaction using a card account may be initiated, receiving a user interface selection representing a request to authorize or restrict card account transactions, receiving authorization requests for desired transactions, and authorizing or restricting the transactions in accordance with the request.

OFFLINE AUTHENTICATION

Techniques for enhancing the security of a communication device when conducting a transaction using the communication device may include using a limited-use key (LUK) to generate a transaction cryptogram, and using a signature key to generate a signature. The transaction can be an offline data authentication transaction, and access can be granted based on authentication of the signature prior to verifying the transaction cryptogram.

Systems, methods and apparatuses for prevention of relay attacks

The systems, methods and apparatuses described herein provide an apparatus configured for preventing relay attacks on a communication link between the apparatus and a communication partner. The apparatus may comprise a communication port, a timer and a processor. The processor may be configured to generate a request, transmit the request through the communication link using the communication port and start counting time using the timer, receive a response via the communication port and stop the timer, receive authentication data via the communication port, authenticate the authentication data, compare the counted time with a predefined threshold, compare a first field within the request with a second field within the response and determine whether there is a relay attack.

SYSTEMS AND METHODS FOR IDENTIFYING PAYMENT ACCOUNTS TO SEGMENTS

Systems and methods for use in identifying payment accounts to segments are provided. One exemplary method includes receiving a first indicator for a first location from a communication device, where the communication device is associated with a consumer and the consumer is associated with a payment account issued to the consumer by an issuer. The method also includes appending, by a computing device, the payment account to a first segment based on the first location indicator, and causing at least one rule associated with the payment account to be modified where the at least one rule relates to authorization of transactions in a first region including the first location.

PROVISION OF LOCATION-SPECIFIC USER INFORMATION

According to an example aspect of the present invention, there is provided a method, comprising: receiving user information provided by a user equipment, associating spatiotemporal information with the user information on the basis of location of at least one wireless access network device in communication with the user equipment, generating a proof of location indication transaction associated with the user information on the basis of the spatiotemporal information, and providing the proof of location indication transaction to a distributed ledger.

METHOD, SERVER, AND STORAGE MEDIUM FOR VERIFYING TRANSACTIONS USING A SMART CARD

A method, server and storage medium for verifying a transaction using a smart card are disclosed. A server receives a transaction request to perform a transaction with a user of the smart card. The transaction request includes identification information and encrypted data extracted from the smart card, and transaction information. The server determines a user account linked to the identification information. The server performs a first verification process to authenticate the smart card by verifying that the smart card possesses a correct decryption key corresponding to the identification information. The server performs a second verification process to authenticate the smart card by verifying that the encrypted data extracted from the smart card encodes stored data corresponding to the respective user account linked to the identification information. If the first and the second verification processes are successful, the server processes the transaction in accordance with the transaction information.

System and Method for Location-Based Transactions
20210065158 · 2021-03-04 ·

A system and method for using at least location information to facilitate a transaction is provided. In one embodiment of the present invention, a mobile application operating on a mobile device is used to determine a location of the mobile device. Location information is then provided to a host device, where it is used to identify a merchant. Information is also entered (or acquired) to identify a shopping cart that is used during a shopping session. As items are placed within the cart, information concerning the items is presented to the user via a display on the cart and/or the mobile device. The first party can then interact with the same to enhance their shopping experience (e.g., access coupons, search for items, etc.). Once the user is done, the host device will charge a payment method linked to the user's account for items that are in the shopping cart.

System and Method for Location-Based Transactions
20210065471 · 2021-03-04 ·

A system and method for using at least location information to facilitate a transaction is provided. In one embodiment of the present invention, a mobile application operating on a mobile device is used to determine a location of the mobile device. Location information is then provided to a host device, where it is used to identify a merchant. Information is also entered (or acquired) to identify a shopping cart that is used during a shopping session. As items are placed within the cart, information concerning the items is presented to the user via a display on the cart and/or the mobile device. The first party can then interact with the same to enhance their shopping experience (e.g., access coupons, search for items, etc.). Once the user is done, the host device will charge a payment method linked to the user's account for items that are in the shopping cart.

System for managing personal identifiers and financial instrument use
10929850 · 2021-02-23 ·

A method for the secure use of a personal identifier and/or financial instrument that may take place simultaneously with traditional methods of authorization for credit card, check, funds withdraw/transfer or purchase. Authorization according to the present invention may take place as follows: A) the Owner provides a pre-approval of authorization if the request meets an array of Owner-defined parameters; B) an authorization may be granted based on proximity of the Owner to the point of use; or C) the Owner provides a real time approval by smart device. In each case the invention subjects the request for authentication to a sequential verification procedure in which the request is tested against one or more pre-defined verification protocols, the deployed authentication protocol being pre-determined by the Owner and pre-selected in accordance with a user profile that was pre-programmed by the Owner.

METHOD FOR PROCESSING VEHICLE-RELATED INFORMATION BASED ON BLOCKCHAIN AND APPARATUS
20210065168 · 2021-03-04 ·

Embodiments of the present disclosure disclose a method and an apparatus for processing vehicle-related information based on blockchain, and a computer device and a computer readable storage medium. The method according to an embodiment of the present disclosure includes: a node of a blockchain network may obtain vehicle-related information of a user, embed an identifier of the belonged user into the vehicle-related information of the user, deposit the vehicle-related information embedded with the identifier of the belonged user in a blockchain as a transaction object based on the blockchain network. When the transaction on the vehicle-related information embedded with the identifier of the belonged user is detected, whether the seller of the transaction is the user corresponding to the embedded belonged identifier, if it is not continuation of the transaction is prohibited or restricted.