Patent classifications
G06Q20/4093
Repurposing a transaction authorization channel to provide fraud notifications
A method for sending a notification indicating fraud using a transaction authorization channel is described. Upon performing a fraud analysis on a first transaction previously authorized by an issuer of an account via the transaction authorization channel, a determination that the first transaction has indications of fraud is performed. In response to determining that the first transaction has indications of fraud, a transaction authorization request message for a second transaction is generated to include a billing descriptor field with data representing a notification of fraud on the account. The transaction authorization request message for the second transaction is sent, via the transaction authorization channel, to an electronic device associated with the issuer of the account so that it will modify the account to include a transaction entry for the second transaction that will be recognized as a fraud notification when an account holder of the account views pending transactions.
PROCESSING TRANSACTIONS INVOLVING CARD READER DEVICES
A method and apparatus for processing a commerce transaction performed with a terminal reader for reading a card are disclosed. In one embodiment, the method includes receiving transaction information for a merchant regarding a transaction involving the terminal reader without the terminal reader having an assigned terminal identifier (TID) that is used for transaction authorization and assigning the terminal reader a pre-allocated TID for the merchant as the assigned TID, where the pre-allocated TID is selected from a group of one or more pre-allocated available terminal IDs (TIDs) associated with the merchant, and using that pre-allocated TID to obtain authorization for the transaction.
Systems and methods for an authorized identification system
An example method includes receiving an encrypted biometric enrollment data and user identifier data. The encrypted biometric enrollment data includes at least one biometric enrollment sample from a user encrypted using an encryption key. The encryption key is generated based on a user secret and the user identifier is associated with the user. The user identifier is matched with a stored user secret. A decryption key is generated based on the stored user secret. The encrypted biometric enrollment data is decrypted using the decryption key. The at least one biometric enrollment sample is retrieved from the decrypted biometric enrollment data. The at least one biometric enrollment sample is processed using a biometric processing algorithm to generate a biometric reference template. A biometric reference template identifier uniquely identifying the biometric reference template is generated. An encryption key is generated based on the stored user secret and encrypts an enrollment confirmation message.
Dynamic code payment card verification
Embodiments described herein disclose methods and systems for authorizing a payment card transaction using dynamic codes. The system can receive a request for authorization of a transaction using the payment card. The request can identify a verification code associated with the payment card and an identifier of the payment card, and the payment card can have an associated dynamic code accessible to a user via a channel. The verification code can be compared with a value of the dynamic code at the time of the transaction. The system can determine whether the user of the payment card accessed the channel within a time period prior to receiving the request for authorization. In response to the verification code matching the dynamic code at the time of the transaction and determining that the user accessed the channel within the time period prior to receiving the request, the system can authorize the transaction.
NO AUTHENTICATION PAYMENT AND SEAMLESS AUTHENTICATION
An easy authentication or payment is made by creating an account associated with a particular web browser or device that accesses an on-line page. Payments are made, such as for full-access viewing of an article or viewing content without visible ads, by selecting a payment button on the on-line page. Selection can be with a specific swiping motion or device motion previously defined for the user. Once selected, the payment is made without the user having to authorize or authenticate. The motion can be used independently to authorize or authenticate the user through the device.
COMMODITY PURCHASE SYSTEM, RELAY SERVER, AND REGISTRATION DEVICE
A commodity purchase system for assisting a customer not at a store in making purchase, includes a first terminal configured to capture an image of commodities in the store, a server configured to acquire commodity information about one of the commodities, and a second terminal configured to display the information and issue a request for purchase of said one of the commodities, and issue a settlement request for settling purchase of commodities purchased by the customer. The server is further configured to, upon issuance of the settlement request, cause the first terminal to output a screen through which a delivery method of the purchased commodities can be selected, calculate the payment amount and a reward for a user of the first terminal based on the selected delivery method, and perform settlement processing based on the payment amount and output reward information indicating the reward.
PROXIMAL DISTANCE AND USAGE PATTERN ACCESS MANAGEMENT
A method for proximal distance and usage pattern access management includes identifying a first trigger event based on a financial device profile indicating a first proximal distance threshold is exceeded for a first device relative to a second device, where the first device is capable of executing financial transactions. The method further includes querying one or more network devices in the vicinity of the first device to validate the first trigger event. The method further includes responsive to receiving a first validation of the first trigger event from at least one network device from the one or more network devices, applying a first temporal lock on the first device preventing future executions of financial transactions. The method further includes responsive to validating a user associated with the second device, updating the financial device profile based on at least on the first trigger event and a location for the trigger event.
VIRTUAL TOKEN-BASED SETTLEMENT PROVIDING SYSTEM, VIRTUAL TOKEN GENERATION APPARATUS, VIRTUAL TOKEN VERIFICATION SERVER, VIRTUAL TOKEN-BASED SETTLEMENT PROVIDING METHOD, AND VIRTUAL TOKEN-BASED SETTLEMENT PROVIDING PROGRAM
The present invention relates to a virtual token-based settlement providing system, a virtual token generation apparatus, a virtual token verification server, a virtual token-based settlement providing method, and a virtual token-based settlement providing program. The present invention comprises: a step for receiving a virtual token provided by a virtual token generation means, by a virtual token verification means; a step for extracting multiple detailed codes included in the virtual token by the virtual token verification means; a step for searching for a storage location of an actual card number on the basis of the multiple detailed codes by the virtual token verification means; and a step for transmitting the searched actual card number to a payment settlement service server or a financial company server.
SYSTEMS AND METHODS FOR CLOUD-BASED TESTING OF POS DEVICES
A computer-implemented method for cloud-based testing of a payment network may include receiving a test configuration for testing a payment processing network, configuring a simulated worker generator for generating a plurality of simulated workers according to the received test configuration, reading commands to be executed by each simulated worker among the plurality of simulated workers from a command bank according to the received test configuration, configuring the plurality of simulated workers according to the commands and the received test configuration, starting a swarm test of the payment processing network by the plurality of simulated workers, reading results of the swarm test from the plurality of simulated workers, and saving the results to storage.
SYSTEMS AND METHODS FOR DISTRIBUTING DATA
Systems and methods are provided for distributing data to multiple data centers within a network based on unique information associated with the data. One example method includes receiving data including a device ID specific to a device of a user and generating, by a filter computing device, a group identifier for the received data based on the device ID. The group identifier is associated with only one of the multiple data centers within the network. The method then includes storing the received data in a data storage device of the one of the multiple data centers based on the group identifier.