G06Q20/4018

RANDOMIZED INPUT DEVICE HEATING
20170061157 · 2017-03-02 ·

A security code input may be obfuscated from a thermal imaging device by randomly heating a random set of inputs of an input device. The security code is inputted on an input device, which communicates with a security system to grant or deny access to a user based on an entry of the security code. The input device includes a plurality of hearing elements. The input device may receive an input from the user. A random set of heating elements including one or more heating elements, are generated from the plurality of heating elements. A temperature is determined for the one or more heating elements of the random set of heating elements. The temperature is then applied to the one or more heating elements of the random set of heating elements of the input device.

RANDOMIZED INPUT DEVICE HEATING
20170061158 · 2017-03-02 ·

A security code input may be obfuscated from a thermal imaging device by randomly heating a random set of inputs of an input device. The security code is inputted on an input device, which communicates with a security system to grant or deny access to a user based on an entry of the security code. The input device includes a plurality of hearing elements. The input device may receive an input from the user. A random set of heating elements including one or more heating elements, are generated from the plurality of heating elements. A temperature is determined for the one or more heating elements of the random set of heating elements. The temperature is then applied to the one or more heating elements of the random set of heating elements of the input device.

Method and system for securing operations and associated user station
12267318 · 2025-04-01 · ·

A method for securing operations is described. In this method a user requests that a service provider device perform an operation, the service provider device transmitting to a certification device a request to validate the requested operation while indicating a key associated with the user. The certification device identifies the user associated with the key and transmits a dynamic code request to the user. A device that generates dynamic codes assigned to the user generates a first version of the dynamic code and transmits it to the certification device, which compares it with a second version of the code in order to decide whether it would or would not be appropriate to inform the service provider device that the requested operation has been validated.

Payment card reconciliation by authorization code
12260405 · 2025-03-25 · ·

A payment processor acting on behalf of a third party administrator to make payment on an adjudicated claim makes a straight through payment to an acquirer for a health care provider's merchant account. Via the authorization process, the payment processor generates an authorization code which is returned to the health care provider on its merchant statement for the payment. Concurrently, the remittance advice from the third party administrator is linked to the same authorization code as the payment by the payment processor which sends the advice in an 835-formatted transmission to the health care provider. Thus, the remittance advice may be linked (reconciled) with the payment on the merchant statement by the common authorization code.

APPLICATION-BASED POINT OF SALE SYSTEM IN MOBILE OPERATING SYSTEMS
20250094993 · 2025-03-20 · ·

Application-based point of sale systems in mobile operating systems. A first application may generate a first URL directed to a second application, a parameter of the first URL comprising an identifier of the first application. A mobile operating system (OS) may access the first URL to open the second application. The second application may receive, from a server, a virtual account number (VAN). The second application may initiate a server on a port and generate a second URL directed to the first application, a parameter of the second URL comprising the port. The OS may access the second URL to open the first application. The first application may establish a connection with the server using the specified port and receive the VAN from the second application via the connection. The first application may autofill the VAN to a form field of a payment form in the first application.

INTEGRATION OF VERIFICATION TOKENS WITH MOBILE COMMUNICATION DEVICES
20250086608 · 2025-03-13 · ·

A method is disclosed. The method includes receiving, by a computer from a portable device via an NFC interaction, a cryptogram, the cryptogram based at least upon a primary account number. The method includes generating, by the computer, a request for dynamic account information, the request comprising the cryptogram, and transmitting, by the computer to a validation entity computer over a communications network comprising the Internet or a cellular phone network. The request comprises the cryptogram. The validation entity computer validates the cryptogram. The method also includes responsive to the validation entity computer validating the cryptogram, receiving, by the computer from the validation entity computer, the dynamic account information over the communications network.

INTEGRATION OF VERIFICATION TOKENS WITH MOBILE COMMUNICATION DEVICES
20250086609 · 2025-03-13 · ·

A method is disclosed. The method includes receiving, by a computer from a portable device via near field communications, a primary account number. The method includes transmitting, by the computer, to a validation entity computer over a communications network comprising the Internet or a cellular phone network, a request for dynamic account information associated with the primary account number. The validation entity computer obtains and sends the dynamic account information to the computer. The method also includes receiving, by the computer from the validation entity computer over the communications network comprising the Internet or the cellular phone network, the dynamic account information and populating a form on the computer with the dynamic account information.

Secure communication of payment information to merchants using a verification token

Disclosed are apparatuses, systems, and methods pertaining to the secure communication of payment information from portable consumer devices, such as credit cards, to online merchants using verification tokens.

PAYMENT DEVICES HAVING MULTIPLE MODES OF CONDUCTING FINANCIAL TRANSACTIONS
20170053267 · 2017-02-23 ·

Payment cards and also the systems and methods for securely managing financial transactions using the payment cards are provided. In one implementation, a payment card includes a first component incorporated into a plastic substrate, wherein the first component is configured to provide details of a first substitute account associated with a cardholder's valid credentials. The payment card also includes at least one additional component incorporated into the plastic substrate. Each of the additional components is configured to provide details of at least one additional substitute account associated with the cardholder's valid credentials. Each substitute account includes details that are distinct from the details of each of the other substitute accounts. Also, at least one of the substitute accounts is provided to a merchant for conducting a financial transaction with the merchant

SYSTEMS AND METHODS FOR MIMICKING POST-PAID USER EXPERIENCE WITH STORED-VALUE CARD ACCOUNTS
20170046679 · 2017-02-16 ·

Systems and methods for using stored-value cards in a manner that mimics post-paid (credit) accounts. The systems and methods disclosed herein allow for the use of a stored-value card to make purchases without requiring the stored-value card to be loaded with funds prior to making a purchase. The systems and methods allow for an unfunded stored-value card to be issued to a consumer at the consumer's request and the funds to be loaded onto a stored-value card at the time of a purchase by the consumer.