G06Q20/4018

System and method for customer video authentication to prevent identity theft
09792608 · 2017-10-17 ·

A system for pre-authenticating a magnetic stripped card or smart card holder for a non-checking account transaction at the point-of-sale that includes a database that contains sensitive data, corresponding to digital photographic images of said account holders that employs a pre-authentication process whereby all account holders undergo a meticulous comparison with their submitted data against a plethora of objective public, private and internal databases culminating in a video displayed image at some point in the future enabling a merchant to make a visual comparison of the account holder either on site or during a mail order or telephone order transaction corresponding to the pre-authenticated image to prevent identity theft.

Stored-Value Card Management Method and System
20170270514 · 2017-09-21 ·

A computerized system for activating, issuing and otherwise managing transactions and activities pertaining to stored-value cards over a communications network. A central information database is provided for storing stored-value cardholder and card purchaser information received directly from respective stored-value cardholders and card purchasers PCs through a universal central processor via respective communication gateways. The central processor is coupled for communication realtime to multiple unaffiliated stored-value card processing networks normally operated by respective hosts. Each network includes a stored-value card processor coupled to a stored-value card database and multiple respective merchant communication devices. The central processor is programmed for managing the activation and issuance of transactions and activities for the stored-value card through the respective unaffiliated networks. The universal central processor is programmed to issue the stored-value cards directly to the cardholder or card purchaser by download over respective communication gateways. The universal central processor is further programmed for reporting the card activations, issuances, transactions and activities to the cardholders and the merchants thereby providing a universal management system.

Methods and Apparatus for Enabling Secure Network-Based Transactions
20170249631 · 2017-08-31 ·

A card reader has an input interface for accepting output from an output interface of transaction card, and a tip-ring pin as an integral part of the card reader, adapted to plug into a microphone port of a cellular telephone. The input interface accepts data from the transaction card, and provides that data to the tip-ring pin as an analog, variable-voltage signal.

Enhanced security credit card system
20170200163 · 2017-07-13 ·

A system for enhanced security credit card has rechargeable battery, memory, processor, LCD display, thumbprint pad, magnetic swipe strip, multi-pin connector and USB port. The card is activated by the thumbprint of an authorized user, thereby turning on the blank LCD display to show a card number, expiration date, and CVV value. Additionally, the multi-pin connector is activated and inserted into credit card processing machine connector for a short time of about 30 seconds. This connection uploads the PIN value, photograph and credit limit of the user on the processing machine display, verifying the user's identity and authorizing the credit card purchase. The use of a magnetic strip for credit card purchase also requires a PIN value, which is provided by insertion of a thumbprint activated credit card multi-pin connector. The enhanced security is provided by thumbprint activation, blank LCD display of the credit card number, expiration date and CVV value, insertion of the multi-pin connector and visual verification of the card holder with a photograph of the user.

UNIQUE CODE FOR TOKEN VERIFICATION
20170200165 · 2017-07-13 ·

A method for tokenizing credentials is disclosed. In addition to a token, a verification value can be provided for each interaction. The verification value can be generated based at least in part on a dynamic data element. The dynamic data element may be kept secret, while the verification value can be distributed for use during an interaction. When the verification value is used, it can be validated by re-creating the verification value based at least on the stored dynamic data element.

AUTHENTICATING PAYMENT CREDENTIALS IN CLOSED LOOP TRANSACTION PROCESSING
20170200149 · 2017-07-13 ·

Presentation of an open-loop smart chip-based payment device is obtained at a terminal-reader assembly in a closed-loop transit environment. Verification of cryptographic credentials associated with the open-loop smart chip-based payment device is carried out at a transit payment network interface processor within the closed-loop transit environment. A financial check of an account associated with the open-loop smart chip-based payment device is performed. Responsive to determining that the verification and financial check are successful, access to the transit environment is granted to a holder of the open-loop smart chip-based payment device.

METHOD, SERVER AND SYSTEM FOR AUTHORIZING A TRANSACTION
20170193500 · 2017-07-06 · ·

To authorize a transaction, a first device sends to a first server a transaction-authorization request accompanied with an Id-PAN relating to a user account, and including an identifier of a second device. The first server sends to a second server a user-authorization request accompanied with the Id-PAN and transaction data. The second server sends to the second device a request for user approval including the transaction data and the user account data. The second device requests whether the device user approves a requested transaction. The second device sends to the second server a request for authorizing the transaction and data relating to user approval. The second server verifies whether the requested transaction is approved by the user. The second server sends to a server a verification result including a transaction authorization or refusal.

SYSTEMS AND METHODS FOR DATA DESENSITIZATION
20170186007 · 2017-06-29 ·

Systems and methods are provided to identify payment data and desensitize the payment data by a secure card reader. Desensitization of the payment data may include replacing sensitive information such as discretionary data with zeroes or other predetermined values. Desensitization may also include replacing sensitive information with fraud detection data such as merchant identifying information. Desensitization of the payment data may leave certain payment data intact for customer tracking or other non-payment related purposes.

Stored-value card management method and system

A computerized system for activating, issuing and otherwise managing transactions and activities pertaining to stored-value cards over a communications network. A central information database is provided for storing stored-value cardholder and card purchaser information received directly from respective stored-value cardholders and card purchasers PCs through a universal central processor via respective communication gateways. The central processor is coupled for communication realtime to multiple unaffiliated stored-value card processing networks normally operated by respective hosts. Each network includes a stored-value card processor coupled to a stored-value card database and multiple respective merchant communication devices. The central processor is programmed for managing the activation and issuance of transactions and activities for the stored-value card through the respective unaffiliated networks. The universal central processor is programmed to issue the stored-value cards directly to the cardholder or card purchaser by download over respective communication gateways. The universal central processor is further programmed for reporting the card activations, issuances, transactions and activities to the cardholders and the merchants thereby providing a universal management system.

SYSTEM AND METHOD FOR DETECTING MALICIOUS PAYMENT TRANSACTION ACTIVITY USING AGGREGATE VIEWS OF PAYMENT TRANSACTION DATA IN A DISTRIBUTED NETWORK ENVIRONMENT

Embodiments of systems and methods for fraud prevention in an online distribution network are disclosed. In certain embodiments, service providers that provide forms in association with merchant's web sites for submission of transactions may implement pro-active threat detection based on an aggregate view of transactions in that distributed computer network.