G06Q20/4015

PROVIDING ACCESS TO A NETWORKED APPLICATION WITHOUT AUTHENTICATION

A method and apparatus are herein disclosed for allowing suppliers to generate an invoice from a purchase order without requiring them to log in or pre-register with a networked application. Implementation is provided by having a first user provide a first document to a networked application. An electronic notification is dispatched to a receiver for the first document with a unique link to a data entry page within the networked application. The data entry page is sandboxed with limited functionality within the networked application, but accepts data from the receiver to be sent directly into the first user's system.

EVENT MANAGEMENT
20210012293 · 2021-01-14 · ·

Obtain rider locations for horse riders of a horse show event, the rider locations including at least a first location associated with a first horse rider, the horse show event including a plurality of venues, each of the plurality of venues being associated with at least a different first venue location. Obtain horse locations for horses associated with the horse riders, the horse locations including at least a second location associated with a first horse associated with the first horse rider. Determine a first route for the first horse rider from the first location of the first horse rider to a first venue location. Determine a second route for the first horse from the second location of the first horse to the first venue location. Provide an interface through which the first route and the second route are accessible.

Secure card not present transactions using chip-enabled cards
10891625 · 2021-01-12 · ·

Techniques are described for performing secure card not present (CNP) transactions using integrated circuit chip-enabled cards. The techniques include continually or periodically tracking a location of a user's card by a user computing device, e.g., a smart phone, and storing a log of datasets relating to the location of the user's card at a server device. Based on the tracking, the user computing device may alert the user via a push notification or other message when the user's card is not within a preset range of the user computing device. In addition, an authentication server determines a location of a purchaser computing device attempting to perform a CNP transaction using the user's card information, and compares the location of the purchaser computing device with a most recent location of the user's card retrieved from the log of datasets to determine whether to approve the CNP transaction.

CONTACTLESS IDENTIFICATION AND PAYMENT
20240005296 · 2024-01-04 · ·

Systems, methods, devices, and/or other components may implement contactless user identification, payment processing, and/or to otherwise facilitate provision of services. A smart device may detect beacon signals and determine a relative position based on the detected beacon signals. The relative position may be compared to nearby service point areas and notification messages may be generated upon entering or exiting a service point area. An anchor-based coordinate system may be defined relative to a set of beacons. The service point areas and the relative position of the smart device may be based on the coordinate system.

CONSTRAINING TRANSACTIONAL CAPABILITIES FOR CONTACTLESS CARDS

Systems, methods, articles of manufacture, and computer-readable media. A communications interface may receive an indication that a server preauthorized a transaction. The communications interface may receive, from a point of sale device, an indication to pay for the transaction. The contactless card may determine, based on rules stored in the memory, that the location of the mobile device is within one or more locations the contactless card is permitted for use. The contactless card may generate transaction data comprising: indications of an account number and an expiration date of the contactless card, and the indication of the preauthorization. The contactless card may transmit the transaction data to the POS device as payment for the transaction. The server may authorize payment for the transaction using at least a portion of the transaction data based at least in part on identifying the indication of the preauthorization in the transaction data.

APPARATUS AND METHOD FOR PROVIDING TRANSACTION SECURITY AND/OR ACCOUNT SECURITY
20210004807 · 2021-01-07 ·

A transaction security apparatus, including a database which stores information regarding an account, information regarding a user associated with the account, and information regarding a travel itinerary or schedule of the user; a receiver which receives information regarding a transaction involving the account and which includes information regarding the transaction, information regarding the account, and information regarding a position or location of the communication device; and a processor which information regarding the transaction. The processor determines a position, location, or geographic location, of the communication device and processes information for authenticating the user by processing information for comparing the position, location, or geographic location, of the communication device with or against an expected position, location, or geographic location, of the user, based on the itinerary or schedule of the user. If the processor determines that the user is authenticated, the processor processes information for allowing the transaction.

Electronic commerce transaction authentication based on a vehicle travel route data

A device and method in a vehicle control unit for providing electronic commerce transaction authentication are provided. Upon receiving an electronic commerce transaction request relating to a transaction source, the vehicle control unit authenticates the transaction source against a vehicle travel route parameter by comparing the source location data with the vehicle travel route parameter. When the source location data compares favorably with the vehicle travel route parameter, an electronic commerce authentication is generated in response to the request, and transmitted.

Systems and methods for anticipating financial risk

A financial institution computing system includes a network interface, a database storing transaction data of the user and financial data for a plurality of entities, and a processor. The processor receives location data of the mobile device the financial data for at least one of the entities, determines a financial risk of the user based on a comparison of the location of the mobile device with the location of the at least one entity and based on at least one of the financial data for the at least one entity and the transaction data of the user, generate a notification in response to the financial risk exceeding a financial risk threshold, and cause the notification to be transmitted to the mobile device. The notification indicates that the user is susceptible to a financial risk based on the location of the user with respect to the at least one entity.

System, Method, and Computer Program Product for Predicting Payment Transactions Using a Machine Learning Technique Based on Merchant Categories and Transaction Time Data

Provided is a computer-implemented method for predicting payment transactions using a machine learning technique that includes receiving transaction data, generating a categorical transaction model based on the transaction data, determining a plurality of prediction scores including determining, for one or more users, a prediction score in each merchant category of a plurality of merchant categories for each predetermined time segment of a plurality of predetermined time segments, where a respective prediction score includes a prediction of whether a user will conduct a payment transaction in a merchant category at a time associated with a predetermined time segment associated with the respective prediction score, determining a recommended merchant category and a recommended predetermined time segment of at least one offer, generating the at least one offer, and communicating the at least one offer to the one or more users. A system and computer program product are also disclosed.

Method, System, and Computer Program Product for Automatically Generating a Suggested Fraud Rule for an Issuer

A method for automatically generating a suggested fraud rule for an issuer includes: identifying a first issuer from a plurality of issuers; determining a transaction volume category and a region category associated with the first issuer; determining a second issuer from the plurality of issuers associated with the same transaction volume category and region category; associating the first issuer and the second issuer to form an issuer consortium; obtaining consortium transaction data associated with the issuer consortium; generating a suggested fraud rule for the first issuer based on the consortium transaction data; and communicating the suggested fraud rule to a first issuer system associated with the first issuer.