G06Q20/4037

ZERO-STEP AUTHENTICATION USING WIRELESS-ENABLED MOBILE DEVICES
20210216995 · 2021-07-15 ·

A zero-step authentication system and method which uses wireless mobile devices to automatically make payments in a secure manner without requiring the customer to handle his or her mobile device. The system and method uses a payment facilitation device at the business location which automatically detects and recognizes registered mobile devices, displays a photo of the customer to a business employee for identity confirmation, and automatically deducts payments for purchases from a pre-authorized customer account. The customer account is managed by a payment processing server, which stores the customer account data, makes appropriate deductions, sends confirmation of deductions to the customer's mobile device, and automatically refills the customer's account by making pre-authorized charges to the customer's banking institution.

Systems and methods for payment collection from third party source

Systems and methods for P2P transaction functionality include payment collection from a third party source. A system includes at least one processor and a storage medium storing instructions that, when executed by the one or more processors, cause the at least one processor to perform operations including receiving transaction information from a vendor where a card was used and analyzing the transaction information. The operations also include sending one or more requests for repayment to one or more P2P service systems, receiving repayment information, regarding one or more repayments, from the one or more P2P service systems and, based on the repayment information, applying the one or more repayments to the transaction performed on the card.

Application integration for contactless payments

Application integration for contactless payments is described. In an example, a payment making platform can provide a transaction code to a payment processing platform. The transaction code can be presented at a point-of-sale of a transaction between a customer and a merchant associated with the payment processing platform. Upon detecting an interaction between the transaction code and a computing device of the customer, the payment making platform and the payment processing platform can exchange data to enable the customer to participate in the transaction via the computing device of the customer. In some examples, the payment making platform and the payment processing platform can process a contactless payment for the transaction by transferring funds associated with an account of the customer from the payment making platform to the payment processing platform for depositing into an account of the merchant.

Systems and methods for electronic database communications

A system for managing a financial account in a low cash mode. The system may include a memory storing instructions, and a processor configured to execute the instructions to perform operations. The operations may include providing an interface; providing a notification to a user when a balance in the first account is deemed to be in low cash mode; presenting, when the first account balance is deemed to be in low cash mode, an option for a transfer request; receiving, a selection of the option for the transfer request to connect the first account with a second account; transferring funds from the second account to the first account; notifying the user that funds have been transferred from the second account to the first account; and further notifying the user that the balance in the first account is greater than the threshold value.

METHOD AND SYSTEM FOR CURRENCY-AGNOSTIC REAL-TIME SETTLEMENT

A method for real-time settlement of financial institutions for a standard electronic payment transaction using a blockchain network includes: receiving a response message for a financial transaction from an issuing institution via payment rails including a transaction amount, issuer identifier, and acquirer identifier; identifying a public key using the acquirer identifier and a private key using the issuer identifier; generating a destination address using the public key and a digital signature using the private key; transmitting a blockchain transaction request to a node in a blockchain network using an alternative communication network including the destination address, digital signature, and transaction amount; receiving a confirmation message from the node including a transaction hash value; modifying the response message to include the transaction hash value; and transmitting the modified response message to an acquiring institution using the payment rails.

POST-PURCHASE CREDIT OFFER AND TENDER SWITCH

Disclosed embodiments may provide a framework to implement post-purchase tender switches. For example, following a transaction made with a particular payment instrument, a customer may be offered the ability to apply for a preferred payment instrument and/or to switch his or her tender type to the preferred payment instrument for the previous transaction.

TRUSTED PAIR AUTHENTICATION WITH EDGE-COMPUTING DEVICES

Apparatus and methods are provided for executing a rules-based authentication of an electronic transaction. The method may include receiving first and second payment authorization parameters and second payment authorization parameters. The method may also include receiving from a Point of Sale device a request for payment information and a purchase amount. The method may also include, determining if first or second parameters are satisfied. The first parameters may include a first time range, a pairing of the electronic device to a first apparatus, a first geolocation of the electronic device, and a first maximum transaction value. The second parameters may include a second time range, a pairing of the electronic device to a second apparatus, a second geolocation of the electronic device, and a second maximum transaction value, wherein the second time range does not include the first time range.

Content anti-piracy management system and method

A software and/or hardware facility that can be used by content owners to assert ownership of content so that copyright friendly websites and services can take action against copyright piracy effectively, efficiently and is scalable is disclosed. The facility makes available to all content owners watermarking/fingerprinting technology so an identifier (e.g., a unique code) can be embedded in the content (e.g., video/audio portion of each video content asset). The facility utilizes blockchain technology to add information related to each unique identifier in a database and allows an authorized user (e.g., the owner) to update the information through a blockchain transaction.

Method, System, and Computer Program Product for Account Verification
20200402068 · 2020-12-24 ·

A method, system, and computer program product for account verification that receive, from a verification system, an account verification response corresponding to an account verification request, the account verification request being associated with an account identifier, and the account identifier being associated with account data; predict, based on the account data, at least one of: (i) a probability score including a probability of a future transaction associated with the account identifier being authorized and (ii) a preferred billing date associated with a probability of the future transaction associated with the account identifier being authorized on that preferred billing date; and communicate, to a requesting system, the account verification response and the at least one of: (i) the probability score and (ii) the preferred billing date.

Secure and efficient payment processing system

A method is provided for facilitating session-based authentication for a plurality of e-commerce transactions for an account holder. The method includes registering a plurality of account holders, receiving, from an account holder of the plurality of account holders, user input setting the account privilege information for an account corresponding to the account holder, and receiving a transaction request for an e-commerce transaction between the account holder and a merchant, the transaction request comprising transaction details including a transaction value and a transaction time, and, in response to the transaction request, performing, with at least one computer system, an authentication process. The method further includes processing the e-commerce transaction in response to completing the authentication process, receiving at least one subsequent transaction request for at least one subsequent e-commerce transaction, and determining to bypass the authentication process for the at least one subsequent transaction.