Patent classifications
G06Q20/4018
Secure Transmission of Payment Credentials
A system and method for securely transmitting payment credentials to a payment processor is disclosed. A communications device of a consumer generates a first communicated value having a similar format to a second payment credential portion, and the first communicated value is provided to the payment processor to replace the second payment credential portion in the transmittal of the payment credentials. The communications device receives, from the payment processor, a second communicated value, and generates a payment credential encryption key based at least on the second communicated value. The payment processor generates the encryption key based at least on the first communicated value. The second payment credential portion is encrypted using the encryption key and is transmitted to the payment processor. The second payment credential portion together with a first payment credential portion provided to the payment processor constitute complete payment credentials required to process a financial transaction.
ELECTRONICALLY SIGNING A DOCUMENT USING A PAYMENT CARD
A computerized method electronically signs and authenticates documents using cards with associated private keys. A hash of a document is obtained from a user by a cloud point of sale (POS) server and a document signing request to sign the obtained hash with a card is received. The document signing request is received via the presentation of the card. The server causes the obtained hash to be signed using the private key of the card and an associated signature ID is generated. The signed hash and generated signature ID are stored, and the generated signature ID is provided to the user for use in future authentication of the document. Later, a document authentication request is received that includes the generated signature ID and a hash of a target document to be authenticated. The signed hash is decrypted and compared to the hash of the target document to determine its authenticity.
Adding card to mobile wallet using NFC
A user enables a communication, such as through a tap, between an NFC-enabled payment or funding card and a mobile device. Card information, such as the card number, type, and expiration date, are read by the mobile device. The user is then authenticated through the user device, such as by entering a CVV code, a PIN for the card, a cardholder name, and/or a billing address for the card. If confirmed, the card is added to the user's mobile/cloud wallet.
System and method for simplified checkout
In various embodiments, a system and method for providing simplified checkout are provided. In example embodiments, an identifier that corresponds to a payment account of a user is received at a payment provider system. Account information from the payment account of the user is retrieved from a payment data storage of the payment provider system. The account information is used in a payment transaction involving a merchant system. A payment interface having transaction fields populated with the account information retrieved from the payment account of the user is presented to the user while the user maintains a presence on a webpage of a merchant system.
Method and apparatus for providing real time mutable credit card information and for providing sleep mode functionality
A method for using a smartcard is provided. The smartcard may include a microprocessor chip, a button, a dynamic transaction authorization number, a Bluetooth low energy (BLE) device, and a battery. The battery may power the BLE and the microprocessor chip. The smartcard may also include memory. The memory may store the dynamic transaction authorization number. The smartcard may also include a dynamic magnetic strip. The dynamic magnetic strip may include a digital representation of the dynamic transaction authorization number. The method may include pressing the button. The method may also include transmitting an instruction to a smartphone for a request for a dynamic transaction authorization number. The transmission of an instruction may be in response to the pressing of the button. The method may also include receiving a dynamic transaction authorization number from a smartphone.
Tap to autofill card data
Various embodiments are generally directed to autofilling card data from a contactless card to a form of a computing device. An application may determine that a payment field of a form has received focus. The application may then receive encrypted data from a communications interface of a contactless card associated with an account. The application may then receive, from a server, verification of the encrypted data. The application may then receive, from the server, an encrypted account number associated with the account, and decrypt the encrypted account number to yield the account number. An autofill service of an operating system (OS) executing on the processor circuit, may then autofill the account number to the payment field of the form.
System, method and computer-accessible medium for authentication of rewards information
An exemplary system, method and computer-accessible medium can include receiving information regarding a purchase by a person, receiving financial account information regarding a financial account associated with the person that was used to fund the purchase, generating rewards information associated with the purchase, generating an authentication token(s) based on the financial account information, sending the rewards information and the authentication token(s) over a network, and receiving a confirmation, over the network, that a rewards account associated with the person has been updated.
PAYMENT CARD RECONCILIATION BY AUTHORIZATION CODE
A payment processor acting on behalf of a third party administrator to make payment on an adjudicated claim makes a straight through payment to an acquirer for a health care provider's merchant account. Via the authorization process, the payment processor generates an authorization code which is returned to the health care provider on its merchant statement for the payment. Concurrently, the remittance advice from the third party administrator is linked to the same authorization code as the payment by the payment processor which sends the advice in an 835-formatted transmission to the health care provider. Thus, the remittance advice may be linked (reconciled) with the payment on the merchant statement by the common authorization code.
IDENTIFY FRAUDULENT USE OF PAYMENT METHODS BASED ON A PORTION OF THEIR PRIVATE UNIQUE CODES
A method of detecting potential fraudulent use of identification (ID) items, comprising receiving a partial code of a unique code of each of a plurality of ID items used in a plurality of identification events each associated with timing data, identifying pairs of first and corresponding identification events in which the ID items used have an identical partial code, estimating whether the ID item used in the first identification event of each pair and the ID item used in the corresponding second identification event of the respective pair are different ID items or the same ID item based on whether a time period between the first and second identification events exceeds or not, respectively, a certain time interval, and generating notification(s) indicative of a potential fraudulent use of the same ID item responsive to estimating the same ID item is used in the first and second identification events.
SYSTEMS AND METHODS FOR REGULATING ACCESS TO DATA STORED IN A DATA SOURCE
A regulated computing device for regulating an information data source and verifying access to the information data source is provided. The regulated computing device receives account data from an issuer, the account data corresponding to a cardholder, and stores the account data in the information data source based on an account identifier associated with the cardholder. The regulated computing device receives an update request from a merchant, the update request including the account identifier and requesting the account data of the cardholder, and verifies the update request in response to receiving the update request by applying at least one verification rule and determining that the merchant is a verified merchant. The regulated computing device also generates an update response, the update response including the account data of the cardholder, and transmits the update response to the verified merchant.