G06Q20/4018

NFC enhanced augmented reality information overlays
12020312 · 2024-06-25 · ·

Various embodiments are directed to overlaying relevant product information in augmented reality via the use of near-field communication (NFC) and a product selection system. A user may authenticate into an application or user profile. Information about the user in the user profile may be used to determine which products are relevant to the user. Information related to the relevant products may then be displayed to the user in augmented reality, which improves at least the overall shopping and in-store experience.

SYSTEMS AND METHODS FOR ORDERING AND PAYMENT
20240202734 · 2024-06-20 · ·

Systems and methods for product ordering and payment are disclosed. Via use of the system, ordering and payment for items and services is simplified, secured, and made more convenient. Exemplary systems suggest orders, for example based on the location of the user, health information, and the like, and may automatically place orders with merchants. Payment may be made directly to the merchant from a user device, or indirectly through a payment issuer.

TRANSACTION AUTHORIZATION USING BIOMETRIC IDENTITY VERIFICATION
20240202727 · 2024-06-20 ·

A system for card not present (CNP) transaction authorization includes a smart card having a biometric sensor, a processor, and memory, the processor and memory comprising logic, a host device configured to communicate with the smart card, the host device configured to provide temporary power to the smart card, the biometric sensor and logic configured to capture one or more current biometric features corresponding to a current user identity sample, compare the one or more current biometric features to a previously obtained biometric feature corresponding to a previously obtained user identity sample, and if the one or more current biometric features matches the previously obtained biometric feature, generate an authorization signal that identifies the current user identity sample as belonging to an authorized user, the authorization signal corresponding to a user initiated successful biometric user authentication, the logic configured to generate a temporary passcode for display on the host device, the temporary passcode being used to authorize at least one transaction, the temporary passcode being generated from a combination of the authorization signal, fixed information previously stored securely on the card, and a dynamically changing variable, the temporary passcode being capable of being shared between the host device and the smart card.

Tap to autofill card data

Various embodiments are generally directed to autofilling card data from a contactless card to a form of a computing device. An application may determine that a payment field of a form has received focus. The application may then receive encrypted data from a communications interface of a contactless card associated with an account. The application may then receive, from a server, verification of the encrypted data. The application may then receive, from the server, an encrypted account number associated with the account, and decrypt the encrypted account number to yield the account number. An autofill service of an operating system (OS) executing on the processor circuit, may then autofill the account number to the payment field of the form.

Tap to autofill card data

Various embodiments are generally directed to autofilling card data from a contactless card to a form of a computing device. An application may determine that a payment field of a form has received focus. The application may then receive encrypted data from a communications interface of a contactless card associated with an account. The application may then receive, from a server, verification of the encrypted data. The application may then receive, from the server, an encrypted account number associated with the account, and decrypt the encrypted account number to yield the account number. An autofill service of an operating system (OS) executing on the processor circuit, may then autofill the account number to the payment field of the form.

CARD ISSUING WITH RESTRICTED VIRTUAL NUMBERS

Various embodiments are directed to applying, via contactless card authentication, one or more restrictions to a virtual card number and generating the card number for use by a recipient. The one or more restrictions may be specifically personalized to the recipient and may include, for example, a merchant restriction, an amount restriction, a time period restriction, or a location restriction. The generated virtual card number along with the applied one or more restrictions may be consumed in various ways, such as writing the number to a blank card, transmitting the number directly to the recipient's computing device, etc., all via near-field communication.

METHOD AND WEB SERVER FOR PROVIDING CARD PAYMENT SIMPLE AUTHENTICATION SERVICE
20190156341 · 2019-05-23 ·

Provided is a method of a card company server simplifying a user identity verification procedure in a card payment, the method including steps of: (a) when a service registration request including card information, ID information, password information, and user terminal identification information are received from a user terminal, matching and storing the pieces of information included in the service registration request; and (b) when a card payment approval request including the stored user terminal identification information is received from the user terminal, performing a process of automatically inputting the ID information into the user terminal.

METHOD OF DISTRIBUTING TOKENS AND MANAGING TOKEN RELATIONSHIPS
20190147439 · 2019-05-16 ·

A method for facilitating a transaction may include generating, via a token server computer, a token for use by a first entity computer, wherein the token is generated in response to a request received from the first entity computer. The method may also include transmitting, via the token server computer, the token to the first entity computer, wherein the first entity computer transmits the token to a second entity computer. The method may also include receiving, at the token server computer and from the first entity computer, data indicative of the second entity computer successfully receiving the token. The data may include a hashed value derived from at least the token, data indicative of an identity of the second entity computer, and writing, by the token server computer, the data indicative of the second entity computer successfully receiving the token to a registry.

Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions

Methods for operating a portable electronic device to conduct a mobile payment transaction at a merchant terminal are provided. The electronic device may verify that the current user of the device is indeed the authorized owner by requiring the current user to enter a passcode. If the user is able to provide the correct passcode, the device is only partly ready to conduct a mobile payment. In order for the user to fully activate the payment function, the user may have to supply a predetermined payment activation input such as a double button press that notifies the device that the user intends to perform a financial transaction in the immediate future. The device may subsequently activate a payment applet for a predetermined period of time during which the user may hold the device within a field of the merchant terminal to complete a near field communications based mobile payment transaction.

Security system incorporating mobile device

In some embodiments, a first server computer may be provided. The first server computer may comprise a processor and a computer readable medium coupled to the processor. The computer readable medium may include code executable by the processor for implementing a method. The method may include the step of electronically receiving an authorization request message that includes a first device verification value from a merchant for a first transaction, where the first device verification value may have been received by the merchant from a mobile device based on an interaction between the mobile device and an access device. In some embodiments, the mobile device may have received the first verification value based on a first request. The method may further include the step of determining by a data processor if the first device verification value corresponds to a stored device verification value.