Patent classifications
G06Q20/4037
Token processing system and method
A method is disclosed and includes receiving, by a record server computer from a first processing network computer, a token, a device identifier associated with a user device, a session identifier associated with a registration request, and metadata about the token, and then receiving a metadata request from a second processing network computer in response to the second processing network computer receiving an authorization request message comprising the token, and the device identifier and/or the session identifier. The metadata request comprises at least the device identifier and/or the session identifier. The method also includes retrieving, by the record server computer, metadata associated with the metadata request, and providing the metadata to the second processing network computer. The second processing network computer processes the authorization request message using the token and the metadata.
Order Information Processing Methods, Apparatuses and Systems
Methods, apparatuses and systems for processing order information are disclosed in the embodiments of the present disclosure. The method includes determining, by a first user data processing system, identification information of a second user when processing a service request of the second user; submitting the identification information of the second user to a server, to enable the server to perform credit authority verification on the second user; generating a service order and submitting the service order to the server after receiving a successful verification message; and submitting consumption resource information of the service order to the server, to enable the server to end the service order according to the consumption resource information. Using the embodiments of the present disclosure, efficiency is improved, and second user who is currently dealt with is avoided from waiting for a long period of time.
METHODS AND SYSTEMS FOR REDUCING NETWORK TRAFFIC ASSOCIATED WITH FRAUDULENT TRANSACTIONS
Computer systems and methods for managing the investigation of potentially fraudulent payment card transactions are provided. The computer system includes a memory device for storing data and a processor in communication with the memory device. The computer system is programmed to receive an authorization request message associated with at least one transaction initiated with a payment card. The computer system transmits a scoring request message associated with the at least one transaction to a fraud scoring system. The computer system receives a fraud scoring response associated with the at least one transaction from the fraud scoring system. The fraud scoring response includes a first instruction directing a change to a status of the payment card. The computer system transmits a status change message to a cardholder management system.
SYSTEM AND METHODS FOR IMPROVED PAYMENT ACCOUNT TRANSACTION PROCESS
A payment-enabled mobile device is employed to initiate a transaction at a payment terminal. The payment-enabled mobile device is in communication with the payment terminal via a first communication channel. An indication is received via the payment terminal that the transaction is declined. The indication is displayed on a display component of the payment terminal. A decline reason message is displayed on the payment-enabled mobile device. The decline reason message presents information received by the payment-enabled mobile device via a second communication channel that is different from the first communication channel.
MANAGEMENT OF CRYPTOGRAPHIC TRANSACTIONS
According to an example aspect of the present invention, there is provided an apparatus comprising at least one processing core, at least one memory including computer program code, the at least one memory and the computer program code being configured to, with the at least one processing core, cause the apparatus at least to compile a set of transactions in a block chain based resource management system that have taken place after the most recent block was established, establish a new block in the block chain, and in establishing the new block, for transactions associated with verification accept messages and lacking sufficient resources, cause transferring of the lacking resources from verification nodes having sent the verification accept messages.
SYSTEMS AND METHODS FOR BROKERED AUTHENTIFICATION EXPRESS SELLER LINKS
Systems and methods for providing a transaction authorization from a funds facilitation system for a transaction requested by a user to a merchant system such that the user is not required to input any user authentication information in excess of authentication information required by the merchant system are provided. A system and method can include receiving a transaction request from the merchant system containing a merchant ID, a merchant user ID, and a transaction amount. The system identifies a funds facilitation system user ID based on the merchant ID and the merchant user ID and determines satisfaction of a funds facilitation system user authentication requirement based on the merchant system having a trusted status with the funds facilitation system. A transaction authorization message or transaction denial message is provided to the merchant system based on account information associated with the user and the transaction amount.
Cryptocurrency offline vault storage system
A system includes a memory that may store a customer account associated with a customer and a processor communicatively coupled to the memory. The processor is able to receive a request to deposit a quantity of cryptocurrency into the customer account and associate the quantity of cryptocurrency with the customer account. The processor is also able to deposit the quantity of cryptocurrency into a vault connected to a network and determine a total quantity of cryptocurrency deposited into the vault. The processor may also, in response to determining the total quantity of cryptocurrency deposited into the vault exceeds a threshold, facilitate the disconnection of the vault from the network.
SYSTEMS AND METHODS OF ACCESS CONTROL AND SYSTEM INTEGRATION
Automated provisioning, according to one example embodiment, enables a mutual customer to establish an intelligent and automated connection between an accounting software system and their financial institution. For example, this might be achieved by allowing a financial institution customer to make feeds from their bank accounts available to the accounting software system within financial internet software (e.g., hosted and operated by the customer's financial institution). Once a customer selects the bank account(s) they want to share with the accounting software system, they are passed along to the accounting software system to link the selected bank account with an account they have set up in the accounting software system.
RESOURCE TRANSFERRING METHOD AND APPARATUS
A resource transferring method and apparatus are provided. The method includes receiving a resource transferring request corresponding to a shared specified account sent by any client in multiple clients. The specified account is registered at the server as being associated with the multiple clients, and stores a preset resource. The method also includes determining rights of the multiple clients. The rights include an operation right and an ordinary right, and the operation right is capable of controlling a transfer of the preset resource. The method also includes respectively sending operation information to the multiple clients according to the rights of the multiple clients; and respectively receiving control instructions from at least two clients having the operation right. When a number of the received control instructions are greater than a preset value, the server transfers the preset resource, and returns transferring information of the preset resource to the multiple clients.
Data protection system for online data
A data protection system for online data is described that can be used to obfuscate sensitive data to relieve security compliance requirements for one or more entities involved in processing, storing, and/or communicating the sensitive data to complete an online purchase transaction. The data protection system can receive online purchase data from a client application, and then remove the sensitive information of the online purchase data to sanitize the online purchase data. The data protection system can also maintain the sensitive information, and communicate the sanitized online purchase data to an eCommerce server that then communicates with a payment service provider for payment authorization of the online purchase, where the sanitized online purchase data relieves security compliance requirements at the eCommerce server.