Patent classifications
G06Q20/4018
SYSTEMS AND METHODS FOR IMAGE CAPTURE SIGNATURE DATA STORAGE
A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector formatted visible information lasered onto its surface. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format. The systems and methods may receive a request to add a first plurality of visible information to a transaction card and capture an image of the first plurality of visible information. The systems and methods may also map the image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machine.
SYSTEMS AND METHODS FOR PHONE-BASED CARD ACTIVATION
Example embodiments of systems and methods for data transmission between a contactless card, a client device, and one or more servers are provided. The contactless card may include one or more processors and memory. The memory may include one or more applets. The client device may include one or more processors and memory. The client device may be in data communication with the contactless card. One or more servers may be in data communication with the client device. A first set of information may be transmitted from the contactless card to the client device. The first set of information may include one or more links to activate the contactless card. The client device may be configured to receive the first set of information from the contactless card. Upon validation of the first set of information, the contactless card may be activated.
Binding cryptogram with protocol characteristics
A method is disclosed. The method includes generating, by a communication device during an interaction with an access device, a cryptogram using transaction level data and interoperability level data; transmitting the transaction level data and interoperability level data to the access device; and transmitting the cryptogram the access device, wherein the access device or a remote server computer in communication with the access device validates the received cryptogram before allowing the transaction to proceed.
APPARATUS, METHOD AND PROGRAM FOR PROVIDING FINANCIAL TRANSACTION BY VRITUAL CARD NUMBER
Embodiments of the inventive concept described herein relate to a virtual card number-based financial transaction apparatus, a virtual card number-based financial transaction providing method, and a virtual card number-based financial transaction providing program, and more particularly, relate to an apparatus, method, and program that may provide a user with an electronic wallet service in an environment where an infrastructure of a financial transaction service is not established.
User apparatus and manager apparatus included in blockchain network and controlling method thereof
A user apparatus connectable to a block chain system is provided. The user apparatus includes a memory, a communication interface, and at least one processor configured to divide a block chain consisting of a plurality of blocks into an active area and an inactive area based on a predefined standard, store blocks included in the active area in a first portion of the memory, based on a transaction occurring in the block chain system, record information of the transaction in the blocks stored in the first portion of the memory, and control the communication interface to transmit transaction information satisfying a predefined condition among the transaction information stored in the first portion to a manager apparatus included in the block chain system.
Systems and methods for generating and transmitting electronic transaction account information messages
Systems and methods are disclosed for secure transmission of account information messages. One method comprises receiving account information; providing a notification to a third party regarding the account information; receiving a first request for information regarding the notification from the third party; providing a response to the third party regarding the first request; receiving data from the third party; using the data to generate a message including details about the account, wherein at least some of the details about the account are encrypted; receiving a second request for information regarding the notification from the third party; and providing the message to the third party.
PAYMENT INSTRUMENT INCLUDING PRIMARY AND AUXILIARY CHIPS
Apparatus and methods for a payment instrument are provided. The apparatus may include a primary chip positioned on an outer face of the payment instrument and a power source. The apparatus may include a first supplementary chip, a second supplementary chip, and a third supplementary chip. Each of the first, second and third supplementary chips may be positioned within a thickness of the payment instrument and configured to draw power from the power source.
SYSTEM AND METHOD FOR NFC TRANSACTIONS ON USER MOBILE DEVICES
A system for facilitating a Near-Field Communication (NFC) transaction comprising a user's NFC-enabled electronic device, a user's NFC-enabled card, and a transaction server is disclosed. The user's NFC-enabled electronic device includes a background NFC service (BNS) and applications. The applications may be configured to provide an NFC transaction request including recipient information to the BNS via service calls. The BNS may be configured to provide the recipient information and card details associated with the user's NFC-enabled card to the transaction server. Further, the transaction server may be configured to provide the recipient information and the card details to a transaction processor, an acquirer bank, or an issuer bank. A method, an NFC-enabled electronic device, and a transaction server for facilitating the NFC transaction is also disclosed.
Direct Data Share
Methods, systems, and apparatuses are described herein for the direct sharing and use of transaction data separately from transaction authorization processes. Transaction metadata associated with a transaction may be received and validated. Authorization information corresponding to the transaction may be received. The degree to which the transaction metadata is tested may be based on a predicted time of receipt of the authorization information. The transaction metadata and authorization information may be correlated. A computing device may determine whether to authorize the financial transaction based on the authorization information and the correlated transaction metadata. All or portions of the transaction metadata may be provided to one or more users after the transaction has been authorized or denied.
Multi-tiered approach to detect and mitigate online electronic attacks
A triaged approach is implemented to detect and prevent electronic attacks against online entities and to reduce latency. Transaction requests are classified into different tiers and are treated differently based on the tier status. For example, transaction requests to conduct transactions with an entity are received from a client system. Characteristics such as rate or amounts of transactions of the transaction requests are analyzed. The characteristics are compared against specified threshold limits to assess whether the specified threshold limits are exceeded. Based on an assessment that at least one of the specified threshold limits is exceeded, a set of computer instructions is selected from different sets of computer instructions for execution on the client system. A result of an execution is received from the client system. Based on the result of the execution, a determination is made whether the transaction requests appear to have originated from a machine-automated submission process.