G06Q20/4018

BOOKING MANAGEMENT SYSTEM

A booking management system for secure authentication of payment information and delayed transaction processing is provided. Third-party services partner with booking management systems to aggregate and list offerings of the third-party services in a digestible display on a one-stop platform. A booking management system can manage the authentication of payment card information on behalf of any number of such third-party services. The booking management system may receive a delayed transaction request from one or more such third-party service. The booking management system may provide virtual payment information to the third-party services for delayed transactions. The third-party services may later initiate the delayed transactions using the virtual payment information, without being required to perform authentication processing on the payment card information maintained by the booking management system.

METHODS AND SYSTEMS FOR AUTHENTICATION FOR HIGH-RISK COMMUNICATIONS

An authentication method includes assigning a risk status to a request received from a remote interaction system, transmitting a notification communication to a device associated with the request, monitoring interaction data from an interaction network, and identifying, from the monitored interaction data, authentication interaction information, the authentication interaction information including a coded sequence and a predetermined authentication identifier. The authentication method also includes comparing the coded sequence in the authentication interaction information to an expected coded sequence and transmitting a verification communication after determining the coded sequence in the authentication interaction information matches the expected coded sequence.

Payment card expiration identification and information update

A system to identify and update expired payment cards may include servers that can perform operations including determining that a transaction performed with first payment card is denied due to expiration of the first payment card, determining that the expired first payment card is replaced with a second payment card, and sending information associated with the second payment card to a merchant payment server for performing the transaction.

SYSTEMS AND METHODS FOR PROXY CARD AND/OR WALLET REDEMPTION CARD TRANSACTIONS

Systems and methods for associating a proxy card with an electronic wallet are disclosed. A computer implemented method may include receiving anauthentication information of a proxy card, and associating the proxy card with an electronic wallet, wherein associating the proxy card with the electronic wallet allows secure access to the electronic wallet when the proxy card is presented at a point of sale. A system may include a proxy card comprising authentication information, and an electronic wallet associated with the proxy card, wherein the association of the electronic wallet with the proxy card allows secure access to the electronic wallet when the proxy card is presented at a point of sale. A wallet redemption card may comprise a rewriteable magnetic stripe, a smart chip, a wireless communicator operably connected to the smart chip, and an interface operably connected between the rewriteable magnetic stripe and the smart chip.

Digital asset distribution by transaction device

A user can associate a digital asset corresponding to a value with a transaction device to be used by another user. For example, a first user can load a digital asset corresponding to a cryptocurrency amount onto a transaction device, where the first user then provides the transaction device to a second user. The second user can utilize the cryptocurrency amount on the transaction device to conduct a transaction. The generation and use of digital assets can be managed using ledgers that store data in the form of block chains.

Using on-demand applications to process encrypted data from a contactless card

A device may receive, from a contactless card, a uniform resource locator (URL) and encrypted data. The device may download a first application from an application server based on the URL. The device may download and execute the first application. The first application may receive the encrypted data.

MINIMIZING RISKS POSED TO ONLINE SERVICES

A system receives a request for payment of a transaction between a vendor and a consumer, and sends a first request to a database associated with the online service for historical transactions and personal attributes of the vendor concurrently with sending a second request to a number of third-party services for credit information and personal attributes of the consumer. The system receives information responsive to the first and second requests from the database and the third-party services, respectively, and obtains a risk score for the transaction based on an application of one or more risk assessment rules to the received information by a machine learning model trained with at least the historical transactions and the personal attributes of the vendor. In some aspects, the system determines whether to advance funds to the vendor, prior to requesting payment from a consumer account, based at least in part on the risk score.

MULTI NODAL AUTHENTICATION TECHNOLOGY
20230137135 · 2023-05-04 ·

Methods are provided for authenticating an initiator of a transaction during processing of the transaction. Methods may include initiating a transaction, including transaction details, at a transaction initiation node. Methods may include transmitting the transaction to a processing entity. Methods may include identifying that the transaction is above a threshold of anomalous transactions based on historic transactions associated with the transaction details. Methods may include transmitting an authorization request from the processing entity to a payment card linked to the transaction details. Methods may include receiving the authorization request at the payment card. Methods may include approving and/or denying the authorization request at the payment card. Approving and/or denying the request may include input of a signature and/or biometric. Methods may include transmitting the approval and/or denial from the payment card to the processing entity. The processing entity may transmit the approval and/or denial to the transaction initiation node.

System, Method, and Apparatus for Aggregated Authentication
20230012289 · 2023-01-12 ·

Provided is a system, method, and apparatus for aggregated authentication in an online, open loop payment network. The method includes receiving a single authentication request message to conduct a plurality of transactions with a plurality of merchants, the single authentication request message comprising an aggregation identifier, detecting the aggregation identifier in the single authentication request message, in response to detecting the aggregation identifier, generating a single authentication response message comprising a plurality of authentication codes, each authentication code of the plurality of authentication codes corresponding to a merchant of the plurality of merchants, and communicating the single authentication response message to the merchant system, the single authentication response message configured to cause the merchant system to separately process each transaction of the plurality of transactions.

ELECTRONIC TRANSACTION FOBS

Systems and methods for electronic fobs that communicate via short range communications protocols to conduct transactions with a nearby device are provided. Such electronic fobs may use electronic tokens to conduct electronic transactions, such as payment transactions. Account data may be stored within a secure element of the electronic fob. Electronic tokens may also be stored by the secure element. Using such data and/or tokens, electronic fob may write electronic tokens to be used in electronic transactions. Also, such electronic fobs may also be used to perform other tasks and interface with other devices.