G06Q20/4018

Behavior based allocation of payment tokens
12147968 · 2024-11-19 · ·

The disclosure describes a campaign director (CD) system associated with a financial institution and an associated campaign manager (CM) unit executing on a mobile device used to facilitate behavior based allocation of payment tokens and activation of payment transactions based on the tokens. The CM unit of the mobile device may be programmed by the CD system at the financial institution to generate tokens according to a token generation model that is a function of financial behavior history associated with a credit card account. When a credit card is used to initiate a payment transaction with a merchant, the CM unit of the mobile device may generate a token for the payment transaction and send the token to the CD system at the financial institution. The CD system then determines whether to activate the payment transaction based on the token and merchant data associated with the payment transaction.

A System For Secure Transaction Processing And A Method Thereof
20240378578 · 2024-11-14 ·

The present disclosure discloses a system (100) and method (200) for secure transaction processing. The system (100) comprises a payment application (102), a memory (106), and a transaction server (108) hosting the application (102). The application (102) facilitates a registered user to generate a request for initiating a payment transaction. The memory (106) stores a list of identifiers associated with registered users and registration details corresponding to each user. The transaction server (108) generates a first one-time verification code/PIN based on the transaction request and sends it to the application (102). The transaction server (108) receives a second verification code/PIN via a second user interface (20), compares the two codes/PINs, and sends transaction data to the issuing bank (30) of the first user, via an acquirer bank (40), for the completion of the payment transaction when the codes/PINs match. The system (100) enables users to carry out payment transactions without entering their sensitive financial accounts.

Proof of affinity to a secure event for frictionless credential management

Systems, methods, and computer-readable media for facilitating frictionless credential provisioning on a user computing device are provided. Special frictionless tokens (e.g. ownership tokens) may be generated for each existing credential in a user's digital wallet. Such tokens may be stored in a user's AE locker (e.g. iCloud keychain) and synchronized across the user's devices using any suitable security features (e.g. using any suitable secure enclave processor (SEP)-based encryption). Such a token, as may be stored in a device's SEP, may be configured only to be read on that physical device. In this manner, the user may no longer need provide further proof of ownership of a credential or be hassled by passing any other challenge, but, instead, the additional security may be achieved using the ownership token, which may use the user's AE or device passcode in association with the user's physical device (and its SEP).

Methods and systems for authentication for high-risk communications

An authentication method includes assigning a risk status to a request received from a remote interaction system, transmitting a notification communication to a device associated with the request, monitoring interaction data from an interaction network, and identifying, from the monitored interaction data, authentication interaction information, the authentication interaction information including a coded sequence and a predetermined authentication identifier. The authentication method also includes comparing the coded sequence in the authentication interaction information to an expected coded sequence and transmitting a verification communication after determining the coded sequence in the authentication interaction information matches the expected coded sequence.

Receipt retrieval based on location
09922325 · 2018-03-20 · ·

A user may request receipts near a current location of the user or a desired location specified by the user. Once a location or address is determined or obtained, a service provider can access a database or other storage to search for receipts for the user within a certain distance from the current user location or desired location. This distance can vary based on results found or density of merchants in the area. The distance can be predetermined by the system or the user. All valid receipts within this distance can then be presented to the user on the user device, such as indications on a map, associated with merchant names and transaction details or summaries, and/or other formats and information.

Prepaid, Debit and Credit Card Security Code Generation System

This invention is a comprehensive Dynamic Security Code (DSC) System (DSC System) that can change the security code of a prepaid, debit, or credit card (Payment Card). In an effort to thwart Card-Not-Present (CNP) fraud, the DSC System provides dynamic security code values (DSC Values) that have a limited use. The DSC Values provided by this DSC System can be calculated by various methodologies and can be used within existing standard payment card infrastructures. The DSC System can also be used with other form factors and in other environments not related to payments such as balance inquiries. The DSC Values can be calculated by a DSC Generator Server or on the card itself.

ORGANIC LIGHT EMITTING DIODE ("OLED") VISUAL AUTHENTICATION CIRCUIT BOARD
20180060866 · 2018-03-01 ·

A circuit board that includes OLED display technology is provided. An OLED display may present light patterns recognizable by a hearing or visually impaired users. The light pattern may be customized by the user. A specific workflow may be associated with a specific light pattern. A light pattern may visually guide a user through a workflow. For example, different menu options may be color coded. High consequence changes may flash with a certain light sequence or pattern. Trusted devices may present a specific light pattern or matrix at login time to confirm that the user is accessing a trusted device.

SYSTEMS AND METHODS FOR CONSUMER MODIFIABLE PAYMENT CARD TRANSACTIONS
20180053157 · 2018-02-22 ·

Systems and methods for acquiring and transferring funds, credits, points, personal identification numbers (PINs), or other value from a funding and/or providing source. The acquired value may be communicated to a point of sale (e.g., delivered via printout at the point of sale) or to an account (e.g., delivered to a mobile application). The acquired value may then be transferred to a physical payment card and/or a virtual payment card maintained in an electronic wallet.

Mobile checkout systems and methods

A mobile checkout system and method for completing a purchase transaction to purchase items from an internet merchant. A user browses and selects items for purchase from the merchant through a shopping application or browser (mobile or PC). During the processing of the transaction, a checkout application installed on a mobile communication device is launched. The checkout application receives a checkout token created by a checkout server that identifies the purchase transaction. After user authentication, the system uses this token and communicates with the checkout server to cause the checkout server to complete the purchase transaction, in which payment data is securely transmitted and wherein a one-time-use cryptogram can be part of the payment information.

METHOD OF RETAINING TRANSACTION CONTEXT
20180047019 · 2018-02-15 ·

Methods of transaction authentication are provided. In one such method, at least one first transaction has been conducted, the or each first transaction generating data including first data comprising authentication data and second data identifying the or each first transaction, wherein a given first transaction is between a merchant and a card holder. A cryptographically signed and/or encrypted token corresponding to the given first transaction and comprising a characteristic of the first transaction has been generated using at least said second data. The cryptographically signed and/or encrypted token has been transmitted to the merchant. The method comprises receiving, from the merchant, data corresponding to a second transaction and in the event that the data corresponding to the second transaction includes the cryptographically signed and/or encrypted token, responsively authenticating the cryptographically signed and/or encrypted token, whereby to determine an authenticated association between the second transaction and a given first transaction.