G06Q20/4018

USING ON-DEMAND APPLICATIONS TO GENERATE VIRTUAL NUMBERS FOR A CONTACTLESS CARD TO SECURELY AUTOFILL FORMS

A first application may output a form comprising payment fields. An operating system (OS) may receive, from a contactless card, a uniform resource locator (URL) comprising encrypted data. A second application received from the URL by the OS may be executed. The second application may transmit the encrypted data to an authentication server, the authentication server to verify the encrypted data. The second application may receive, from a virtual account number server, a virtual account number, an expiration date associated with the virtual account number, and a CVV associated with the virtual account number. The second application may provide the virtual account number, expiration date, and CVV to an autofill service of the OS. The autofill service of the OS may autofill the virtual account number the payment fields of the first application.

TAP TO AUTOFILL CARD DATA

Various embodiments are generally directed to autofilling card data from a contactless card to a form of a computing device. An application may determine that a payment field of a form has received focus. The application may then receive encrypted data from a communications interface of a contactless card associated with an account. The application may then receive, from a server, verification of the encrypted data. The application may then receive, from the server, an encrypted account number associated with the account, and decrypt the encrypted account number to yield the account number. An autofill service of an operating system (OS) executing on the processor circuit, may then autofill the account number to the payment field of the form.

DYNAMIC VERIFICATION METHOD AND SYSTEM FOR CARD TRANSACTIONS
20200226608 · 2020-07-16 ·

Disclosed are methods and systems for payment card transactions, where a Card Verification Value (CVV) or Card Verification Code (CVC) is generated dynamically as part of a tokenized session.

SYSTEM AND METHOD FOR DETERMINING USE OF NON-HUMAN USERS IN A DISTRIBUTED COMPUTER NETWORK ENVIRONMENT

Embodiments of systems and methods as disclosed herein may determine that an initiator of a communication on a distributed computer network is an automated script or the like. More particularly, in one embodiment, a web page including a hidden field may be generated in response to a request for the web page. This hidden field is a field included in the web page that is not visible to a human user when the web page is rendered by a browser and presented to the user. By comparing a received value for such a hidden field with an associated value for the hidden field as provided in the web page, the use of an automated script may be detected.

Method, server and system for authorizing a transaction
10699268 · 2020-06-30 · ·

To authorize a transaction, a first device sends to a first server a transaction-authorization request accompanied with an Id-PAN relating to a user account, and including an identifier of a second device. The first server sends to a second server a user-authorization request accompanied with the Id-PAN and transaction data. The second server sends to the second device a request for user approval including the transaction data and the user account data. The second device requests whether the device user approves a requested transaction. The second device sends to the second server a request for authorizing the transaction and data relating to user approval. The second server verifies whether the requested transaction is approved by the user. The second server sends to a server a verification result including a transaction authorization or refusal.

SYSTEM FOR DATA SET TRANSLATION OF ACCOUNTS
20200195644 · 2020-06-18 ·

Systems and methods are described that allow users to continue utilizing their user accounts and user devices associated with a first authorization entity for transactions conducting with a second authorization entity. A processor server computer may translate a first data set including first account identifier and a first verification value associated with a first authorization entity during authorization processing into a second data set including a second account identifier and a second verification value that can be processed by a second authorization entity. The processor server computer may modify an authorization request message based on the translated data set. The processor server computer may also enable the authorization request message to be routed to an appropriate authorization entity during authorization processing.

SYSTEMS AND METHODS FOR OPTIMIZING TRANSACTION AUTHORIZATION CONVERSION RATE
20200193438 · 2020-06-18 · ·

A method for optimizing transaction authorization conversion rates includes retrieving payment transaction parameters and authorization results for a plurality of past payment transactions, generating authorization success factors for each of a plurality of payment transaction parameters based on the retrieved payment transaction parameters and authorization results, receiving, at an acquirer processor, a payment transaction from a merchant, modifying one or more parameters of the payment transaction according to the generated authorization success factors, and submitting the modified payment transaction to a financial institution for processing.

Authorizing a payment transaction using seasoned data

A system, apparatus, and method for expediting the authorization of an electronic payment transaction. Authorization of a transaction at a node of an authorization network is the result of inferring the trustworthiness of a customer to the transaction using data obtained from a different node of the authorization network. The authorization process is expedited by relying on the previous authentication decision of another node, where the previous decision may have been made based on a different payment device or different user inputs. The invention uses a decision made by a first node in the authorization network as a proxy for the authorization decision at a different node, thereby transferring the trustworthiness of a consumer, consumer's device, payment device, or other aspect of the transaction from the first node to the second.

SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS

Example embodiments of systems and methods for data transmission between a contactless card, a client device, and one or more servers are provided. The contactless card may include one or more processors and memory. The memory may include one or more applets. The client device may include one or more processors and memory. The client device may be in data communication with the contactless card. One or more servers may be in data communication with the client device. A first set of information may be transmitted from the contactless card to the client device. The first set of information may include one or more links to activate the contactless card. The client device may be configured to receive the first set of information from the contactless card. Upon validation of the first set of information, the contactless card may be activated.

DATA AGGREGATION SERVICES FOR PAYMENT CARDS

Systems and methods for verifying the current status of a payment card are provided that may efficiently aggregate and distribute non-visible information regarding a recovered payment card. More particularly, the systems and computer-implemented methods of the present invention permit the efficient aggregation of the non-visible payment account data associated with a payment card and the distribution of such data to investigators in possession of the card. Such systems and methods for verifying a payment card typically involve: (a) aggregating payment account data associated with the payment card in an aggregated data storage site; (b) obtaining visible verification data associated with the payment card from an investigator; (c) verifying the visible verification data associated with the payment card; (d) retrieving the payment account data from the aggregated data storage site; and (e) submitting the payment account data to the investigator.