Patent classifications
G06Q20/4018
SYSTEM AND METHOD FOR SIMPLIFIED CHECKOUT
In various embodiments, a system and method for providing simplified checkout are provided. In example embodiments, an identifier that corresponds to a payment account of a user is received at a payment provider system. Account information from the payment account of the user is retrieved from a payment data storage of the payment provider system. The account information is used in a payment transaction involving a merchant system. A payment interface having transaction fields populated with the account information retrieved from the payment account of the user is presented to the user while the user maintains a presence on a webpage of a merchant system.
METHOD FOR SECURING TRANSACTIONAL DATA PROCESSING, CORRESPONDING TERMINAL AND COMPUTER PROGRAM
A method for securing the processing of transactional data is disclosed. The method is implemented within a communications terminal comprising a transactional data processing module. The method has: a step for the detection, by the processing module, of a display of at least one entry area relating to a piece of payment means data; a step for the activation, by the processing module, of a contactless data reading module; a step for the obtaining, by the contactless data reading module, of at least one piece of payment means data coming from a payment means; and a step for the furnishing, at said at least one entry area, of at least one piece of payment means data previously obtained.
System and method for detecting malicious payment transaction activity using aggregate views of payment transaction data in a distributed network environment
Embodiments of systems and methods for fraud prevention in an online distribution network are disclosed. In certain embodiments, service providers that provide forms in association with merchant's web sites for submission of transactions may implement pro-active threat detection based on an aggregate view of transactions in that distributed computer network.
Systems and methods for processing transactions
A system and method that keeps check of financial transactions by maintaining distinct records for a plurality of devices associated with a financial account, in conjunction with performing authentication further to inputting transaction data from a point of sale, the system comprising a communication portion that inputs transaction data received from the point of sale, the transaction data including an account number and one of a CVV number and an expiration date; a device identification portion that identifies a particular device, from which the transaction originated, out of the plurality of devices based on the account number and one of the CVV number and the expiration date; and an authentication portion that performs authentication processing based on a comparison process that utilizes the transaction data, the authentication portion generating an authentication result, and the authentication portion outputting the authentication result. Other transaction data may be used in lieu of the one of a CVV number and an expiration date.
System and method for determining use of non-human users in a distributed computer network environment
Embodiments of systems and methods as disclosed herein may determine that an initiator of a communication on a distributed computer network is an automated script or the like. More particularly, in one embodiment, a web page including a hidden field may be generated in response to a request for the web page. This hidden field is a field included in the web page that is not visible to a human user when the web page is rendered by a browser and presented to the user. By comparing a received value for such a hidden field with an associated value for the hidden field as provided in the web page, the use of an automated script may be detected.
System and method for replacing software
Devices, systems and methods for reconfigurable and/or updatable lightweight embedded devices or systems are disclosed. Via use of such a device, system, or method, various capabilities for a user are provided, simplified, secured, and/or made more convenient. The system may interact with various other devices or systems, including those that are cloud-based or communicate through the cloud, and may utilize various local sensors, in order to provide one or more of improved access, monitoring, or diagnostics, and so forth.
Cross Issuer Cardholder Decline Prevention Method and Apparatus
A system, method, and computer-readable storage medium to alert payment card issuers of anticipated cardholder travel and to identify whether cardholder transactions are taking place within the anticipated cardholder travel region.
SYSTEM AND METHOD FOR CUSTOMER VIDEO AUTHENTICATION TO PREVENT IDENTITY THEFT
A system for pre-authenticating a magnetic stripped card or smart card holder for a non-checking account transaction at the point-of-sale that includes a database that contains sensitive data, corresponding to digital photographic images of said account holders that employs a pre-authentication process whereby all account holders undergo a meticulous comparison with their submitted data against a plethora of objective public, private and internal databases culminating in a video displayed image at some point in the future enabling a merchant to make a visual comparison of the account holder either on site or during a mail order or telephone order transaction corresponding to the pre-authenticated image to prevent identity theft.
Mobile checkout systems and methods
A mobile checkout system and method for completing a purchase transaction to purchase items from an internet merchant. A user browses and selects items for purchase from the merchant through a shopping application or browser (mobile or PC). During the processing of the transaction, a checkout application installed on a mobile communication device is launched. The checkout application receives a checkout token created by a checkout server that identifies the purchase transaction. After user authentication, the system uses this token and communicates with the checkout server to cause the checkout server to complete the purchase transaction, in which payment data is securely transmitted and wherein a one-time-use cryptogram can be part of the payment information.
RANDOMIZED INPUT DEVICE HEATING
A security code input may be obfuscated from a thermal imaging device by randomly heating a random set of inputs of an input device. The security code is inputted on an input device, which communicates with a security system to grant or deny access to a user based on an entry of the security code. The input device includes a plurality of hearing elements. The input device may receive an input from the user. A random set of heating elements including one or more heating elements, are generated from the plurality of heating elements. A temperature is determined for the one or more heating elements of the random set of heating elements. The temperature is then applied to the one or more heating elements of the random set of heating elements of the input device.