G06Q20/4018

Card issuing with restricted virtual numbers

Various embodiments are directed to applying, via contactless card authentication, one or more restrictions to a virtual card number and generating the card number for use by a recipient. The one or more restrictions may be specifically personalized to the recipient and may include, for example, a merchant restriction, an amount restriction, a time period restriction, or a location restriction. The generated virtual card number along with the applied one or more restrictions may be consumed in various ways, such as writing the number to a blank card, transmitting the number directly to the recipient's computing device, etc., all via near-field communication.

CARD ISSUING WITH RESTRICTED VIRTUAL NUMBERS

Various embodiments are directed to applying, via contactless card authentication, one or more restrictions to a virtual card number and generating the card number for use by a recipient. The one or more restrictions may be specifically personalized to the recipient and may include, for example, a merchant restriction, an amount restriction, a time period restriction, or a location restriction. The generated virtual card number along with the applied one or more restrictions may be consumed in various ways, such as writing the number to a blank card, transmitting the number directly to the recipient's computing device, etc., all via near-field communication.

Systems and Methods for Transmitting Electronic Currency

Embodiments of the present invention provide for systems and methods for transmitting electronic currency. The systems and methods provide for one or more processors for transmitting electronic currency from a first end device associated with a first electronic payment network to a second end device associated with a second electronic payment network, wherein the second payment network is different from the first payment network.

SYSTEMS AND METHODS FOR MANAGING MERCHANT-STORED PAYMENT CREDENTIALS
20210287188 · 2021-09-16 ·

Systems and methods for managing merchant-stored payment credentials are disclosed. In one embodiment, in a financial institution backend comprising at least one computer processor, a method for managing merchant-stored payment credentials may include: (1) receiving, from a customer and in a first user interface, a selection of a merchant that is eligible for financial instrument pushing; (2) opening a second user interface with the selected merchant, wherein the login credentials for the merchant are received from the customer in the second user interface; (3) receiving, from the customer and in the first user interface, a selection of a financial instrument to push; and (4) providing, to an aggregator, financial instrument data for the selected financial instrument. The aggregator pushes the financial instrument data to the merchant.

MULTI-TIERED APPROACH TO DETECT AND MITIGATE ONLINE ELECTRONIC ATTACKS
20210182858 · 2021-06-17 ·

A triaged approach is implemented to detect and prevent electronic attacks against online entities and to reduce latency. Transaction requests are classified into different tiers and are treated differently based on the tier status. For example, transaction requests to conduct transactions with an entity are received from a client system. Characteristics such as rate or amounts of transactions of the transaction requests are analyzed. The characteristics are compared against specified threshold limits to assess whether the specified threshold limits are exceeded. Based on an assessment that at least one of the specified threshold limits is exceeded, a set of computer instructions is selected from different sets of computer instructions for execution on the client system. A result of an execution is received from the client system. Based on the result of the execution, a determination is made whether the transaction requests appear to have originated from a machine-automated submission process.

SYSTEMS AND METHODS FOR PREPAID PAYMENT CARDS AND DIGITAL WALLET

A computing system has a communication interface for receiving, from a gift bag wallet application operating on a cardholder mobile device, a transfer request to transfer a balance of a prepaid payment card to a cardholder account associated with a cardholder digital wallet. A processor of the mobile device is programmed to determine, from the transfer request, the prepaid payment card issuer and a payment network associated with the prepaid payment card. Using the communication interface, the system transmits, to the prepaid payment card issuer, a balance request message for a balance of the prepaid payment card and receives a balance request response message identifying the balance of the prepaid payment card. The system then transfers the balance of the prepaid payment card from the prepaid payment card issuer to the cardholder account associated with the cardholder digital wallet based on cardholder information of the cardholder account included in the transfer request.

BOOKING MANAGEMENT SYSTEM

Secure authentication and delayed transaction processing for booking management systems is provided. Third-party services partner with booking management systems to aggregate and list offerings of the third-party services in a digestible display on a one-stop platform. A booking management system can manage the authentication of payment card information on behalf of any number of such third-party services. The booking management system can maintain and process authentication information associated with traveler payment cards, and provide virtual payment information to the third-party services for delayed transactions. The third-party services may later initiate the delayed transactions using the virtual payment information, without being required to perform authentication processing on the traveler payment card information maintained by the booking management system.

SYSTEMS AND METHODS FOR CONFIGURING DATA TRANSFERS

A processor-implemented method is disclosed. The method includes: receiving a first request to configure a recipient database record for receiving one or more electronic data transfers, the first request including identifying information for the recipient database record; receiving a numerical indicator of value to be transferred via a first electronic data transfer to the recipient database record; sending, to a server configured for processing electronic data transfers, a second request to provide, to a transferor entity, an electronic data transfer authorization request, the second request being a request to transfer value to the recipient database record in a first amount corresponding to the numerical indicator of value; receiving, from the server, an indication of authorization for the electronic data transfer from the transferor entity; and increasing a database record value associated with the recipient database record by the first amount.

Processing authorization request using seasoned data

A system, apparatus, and method for expediting the authorization of an electronic payment transaction. Authorization of a transaction at a node of an authorization network is the result of inferring the trustworthiness of a customer to the transaction using data obtained from a different node of the authorization network. The authorization process is expedited by relying on the previous authentication decision of another node, where the previous decision may have been made based on a different payment device or different user inputs. The invention uses a decision made by a first node in the authorization network as a proxy for the authorization decision at a different node, thereby transferring the trustworthiness of a consumer, consumer's device, payment device, or other aspect of the transaction from the first node to the second.

Automated review system for transactions

Techniques for reviewing transaction information are provided. A reviewer computer can review transactions that are marked for review by a resource provider. The reviewer computer can review the transaction based on user information obtained from third party servers. The reviewer computer can also review the transaction based on historical transaction information obtained from a history database. The reviewer computer can aggregated the user information and the historical transaction information in order to generated a consolidated view.