Patent classifications
G06Q20/4018
System and method for stand-in processing
A system and method for stand-in processing are provided. The system includes a processor and a memory unit communicatively coupled to the processor. The memory unit is configured to store transaction data received from an acquirer corresponding to a transaction made by a payment card. The processor is configured to determine data representing a point of sale (POS) entry mode of the transaction from the transaction data and, using one or more stand-in rules provided by an issuer of the payment card, process the transaction on behalf of the issuer based on the data representing the POS entry mode. Processing includes approving or declining the transaction.
System for detecting unauthorized access via card characteristic verification
Embodiments of the present invention provide a system for detecting unauthorized access via card characteristic verification. The present invention is configured to identify initiation of a resource distribution event via a resource distribution card at a resource distribution device, identify one or more characteristics of the resource distribution card, determine a first user associated with the resource distribution card based on the one or more characteristics, determine that the resource distribution card of the first user is associated with an issuing entity associated with a resource account of the first user based on the one or more characteristics, and authorize and process the resource distribution event based on determining that the resource distribution card is associated with the issuing entity associated with the resource account associated with the first user.
Efficient concurrent scalar product calculation
A method and system for performing a calculation of a privacy preserving scalar product are provided. A first party and a second party (e.g., a first computer and a second computer) possessing a first vector and a second vector respectively, can concurrently determine the scalar product of the two vectors, without revealing either vector to the other party. Each vector can be masked and then encrypted using a public key of an asymmetric key pair. Using homomorphic encryption operations, the scalar product of the vectors can be determined while the vectors are still encrypted. Each party can compare the scalar product, or a value derived from the scalar product against a predetermined threshold. As an example, two parties can perform the scalar product to compare two biometric templates expressed as vectors without revealing the biometric templates to one another, preserving the privacy of persons corresponding to those biometrics.
Stored-value card management method and system
A computerized system for activating, issuing and otherwise managing transactions and activities pertaining to stored-value cards over a communications network. A central information database is provided for storing stored-value cardholder and card purchaser information received directly from respective stored-value cardholders and card purchasers PCs through a universal central processor via respective communication gateways. The central processor is coupled for communication realtime to multiple unaffiliated stored-value card processing networks normally operated by respective hosts. Each network includes a stored-value card processor coupled to a stored-value card database and multiple respective merchant communication devices. The central processor is programmed for managing the activation and issuance of transactions and activities for the stored-value card through the respective unaffiliated networks. The universal central processor is programmed to issue the stored-value cards directly to the cardholder or card purchaser by download over respective communication gateways. The universal central processor is further programmed for reporting the card activations, issuances, transactions and activities to the cardholders and the merchants thereby providing a universal management system.
SYSTEMS AND METHODS FOR IMAGE CAPTURE VECTOR FORMAT LASERING ENGINE
A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector formatted visible information lasered onto its surface. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format. The systems and methods may receive a request to add a first plurality of visible information to a transaction card and capture an image of the first plurality of visible information. The systems and methods may also map the image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machine.
NFC ENHANCED AUGMENTED REALITY INFORMATION OVERLAYS
Various embodiments are directed to overlaying relevant product information in augmented reality via the use of near-field communication (NFC) and a product selection system. A user may authenticate into an application or user profile. Information about the user in the user profile may be used to determine which products are relevant to the user. Information related to the relevant products may then be displayed to the user in augmented reality, which improves at least the overall shopping and in-store experience.
AUTOMATED REVIEW SYSTEM FOR TRANSACTIONS
Techniques for reviewing transaction information are provided. A reviewer computer can review transactions that are marked for review by a resource provider. The reviewer computer can review the transaction based on user information obtained from third party servers. The reviewer computer can also review the transaction based on historical transaction information obtained from a history database. The reviewer computer can aggregated the user information and the historical transaction information in order to generated a consolidated view.
Integration of verification tokens with mobile communication devices
Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is communicatively coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display.
VOICE TRANSACTION GATEWAY
In an enterprise computing platform, a voice transaction gateway enables electronic commerce vendors to request authorization of a customer's transaction requests without requiring the customer to provide financial and other sensitive information, such as credit card number and other personal information. Customers can pre-register with a voice transaction gateway using their phone number (PH #) to establish an account for authenticating the customer's transaction requests. The vendor invokes the voice transaction gateway to confirm the first and second authentication factors to authenticate the transaction requests using the customer's voice and without the vendor's involvement. The customer benefits from not having to provide sensitive information to the vendor and the vendor benefits from not having to risk liability associated with obtaining sensitive information from the customer.
Adding card to mobile wallet using NFC
A user enables a communication, such as through a tap, between an NFC-enabled payment or funding card and a mobile device. Card information, such as the card number, type, and expiration date, are read by the mobile device. The user is then authenticated through the user device, such as by entering a CVV code, a PIN for the card, a cardholder name, and/or a billing address for the card. If confirmed, the card is added to the user's mobile/cloud wallet.