G06Q20/4018

Random graphical authentication
10990866 · 2021-04-27 · ·

A method for card authentication is provided. Methods may include receiving a card with a graphical representation and a plurality of transaction details at a card reader. Methods may include processing the graphical representation. The processing may identify a representative number. Methods may include deciphering card data from the representative number. Methods may include transmitting the card data and the transaction details for approval and/or denial. Methods may include receiving an approval and/or denial. Methods may include generating an updated graphical representation. Methods may include pushing the updated graphical representation to the card.

Method of distributing tokens and managing token relationships

A method for facilitating a transaction may include generating, via a token server computer, a token for use by a first entity computer, wherein the token is generated in response to a request received from the first entity computer. The method may also include transmitting, via the token server computer, the token to the first entity computer, wherein the first entity computer transmits the token to a second entity computer. The method may also include receiving, at the token server computer and from the first entity computer, data indicative of the second entity computer successfully receiving the token. The data may include a hashed value derived from at least the token, data indicative of an identity of the second entity computer, and writing, by the token server computer, the data indicative of the second entity computer successfully receiving the token to a registry.

STORED-VALUE CARD MANAGEMENT METHOD AND SYSTEM
20210073789 · 2021-03-11 ·

A computerized system for activating, issuing and otherwise managing transactions and activities pertaining to stored-value cards over a communications network. A central information database is provided for storing stored-value cardholder and card purchaser information received directly from respective stored-value cardholders and card purchasers PCs through a universal central processor via respective communication gateways. The central processor is coupled for communication realtime to multiple unaffiliated stored-value card processing networks normally operated by respective hosts. Each network includes a stored-value card processor coupled to a stored-value card database and multiple respective merchant communication devices. The central processor is programmed for managing the activation and issuance of transactions and activities for the stored-value card through the respective unaffiliated networks. The universal central processor is programmed to issue the stored-value cards directly to the cardholder or card purchaser by download over respective communication gateways. The universal central processor is further programmed for reporting the card activations, issuances, transactions and activities to the cardholders and the merchants thereby providing a universal management system.

METHOD FOR INSTANT ISSUANCE CARD PRODUCTION
20210073791 · 2021-03-11 ·

The invention provides a method that allows an issuer system, e.g. of a bank, to have generated a plurality of anonymous accounts and cards for working up a stock and to only personalize them individually if required. In the personalization step at the card issuer, e.g. in the bank branch, a printing of the back side does not have to be performed, instead all the necessary printing of the back side is already effected at the card manufacturer during the manufacturing of the anonymous card. As a result, a simple, low-cost printer without a back-side printing option can be utilized for the personalization of the anonymous card.

Secure element management and electronic device performing same and installation package

An electronic device includes a secure element in which at least one application package is installed and a processor for communicating with the secure element. The secure element further stores a list with which a part or all of identification information of the at least one application package is registered. The processor controls the secure element such that an application package indicated by the identification information registered with the list is uninstalled, in response to a specified event. Various other embodiments recognized from the specification are also possible.

INTEGRATION OF VERIFICATION TOKENS WITH MOBILE COMMUNICATION DEVICES
20210073787 · 2021-03-11 ·

Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is communicatively coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display.

APPARATUS, METHOD AND PROGRAM FOR PROVIDING FINANCIAL TRANSACTION BY VRITUAL CARD NUMBER
20210065163 · 2021-03-04 · ·

Embodiments of the inventive concept described herein relate to a virtual card number-based financial transaction apparatus, a virtual card number-based financial transaction providing method, and a virtual card number-based financial transaction providing program, and more particularly, relate to an apparatus, method, and program that may provide a user with an electronic wallet service in an environment where an infrastructure of a financial transaction service is not established.

MULTIPLE PARALLEL DELINEATED TOPICS OF A CONVERSATION WITHIN THE SAME VIRTUAL ASSISTANT

Provided are embodiments for a computer-implemented method for interacting with a user by an automated response system supporting topic switching and information collection. The computer-implemented method includes receiving a plurality of utterances from the user by the automated response system, and analyzing the utterances to form a first topic thread and an information collection objective. The computer-implemented method also includes utilizing an information collection user interface to gather data to support the information collection objective, and providing responses to the user after the gathered data related to the first topic thread. Also provided are embodiments for a system and computer program product for implementing the techniques described herein.

METHODS AND APPARATUS FOR IMPROVING SECURITY IN NETWORK-SUPPORTED DYNAMIC TRANSACTING
20210081954 · 2021-03-18 ·

A method is provided for authenticating dynamically generated virtual credit card (VCC) data or virtual account number (VAN) data assigned to an electronic account for network distribution to one or more than one transaction device for use in electronic transacting.

Mathematical constant pi dynamic-hybrid CVV authentication method for credit cards
10949855 · 2021-03-16 ·

A computer-implemented method for authenticating credit cards via a mathematical operation of the mathematical constant Pi. Pi is stored in a user-operated computing device connected to a network, wherein an application software performs the said mathematical operation of Pi to select a segment of Pi. The selected Pi segment becomes the Dynamic Card Verification Value (DCVV) of a credit card. The method is dynamic, creating a new DCVV for the user's credit card each time the user operates his/her computer device to purchase products and services online with his/her credit card. To attain the same Pi segment, the issuer of the credit card utilizes in its computer server the same parameters and mathematical operation that the user utilizes on his/her computing device. Consequently, this process provides the user and issuer with a synchronized process to attain the same resulting DCVV to authenticate a credit card.