Patent classifications
G06Q20/4093
DETERMINING WHETHER A USER HAS POSSESSION OF A TRANSACTION CARD AND/OR WHETHER THE USER IS AUTHORIZED TO POSSESS THE TRANSACTION CARD
A device receives a transaction request concerning a transaction and a transaction card from a transaction terminal, and determines, based on the transaction request, information concerning the transaction card. The device sends, based on the transaction request and to a user device, a query concerning possession of the transaction card by a user of the user device, where the query includes an instruction for the user to confirm possession of the transaction card via a component of the user device. The device receives, from the user device and after sending the query to the user device, a response concerning possession of the transaction card by the user, and determines, based on the response and the information concerning the transaction card, whether the user has possession of the transaction card. The device performs, based on determining whether the user has possession of the transaction card, at least one action.
Retail financial system testing system and methods
In some embodiments, apparatuses and methods are provided herein useful to testing retail financial system transactions. In some embodiments, a system comprises an automated robotic testing device configured to retrieve a selected card from a physical media library, interact, via the selected card, with a point-of-sale terminal, the point-of-sale terminal configured to receive from the selected card, information associated with the selected card, and transmit, to an external banking institution, the information, and a control circuit configured to determine the selected card, transmit, to the automated robotic testing device, the indication of the selected card, receive one of an authorization and a lack of authorization, in response to receipt of 1) authorization, cause the transaction to be completed, and 2) the lack of authorization, cause the transaction to be voided, determine whether a test associated with the transaction was successful, and log an indication of whether the test was successful.
SYSTEMS AND METHODS FOR PARTIAL AUTHORIZATION OF ELECTRONIC TRANSACTIONS
A method for managing payment submissions includes receiving, at an acquirer computing system, an authorization request submitted by a merchant computing system for a transaction of a predefined amount, the merchant computing system being associated with a merchant, and the authorization request identifying account information for an account that is associated with a payment card network and an issuer processor; and re-transmitting the authorization request for less than the predefined amount and greater than a configurable threshold value, until the authorization request is approved by the issuer processor or until the authorization request falls below the configurable threshold value.
Systems and methods for processing off-network transaction messages
A computer-implemented method for applying enrichment services hosted on a second interchange network to a payment transaction initiated over a first interchange network is provided. A transfer process module hosted on the first interchange network receives a first service request from a requestor, formatted in accordance with a first set of proprietary communications standards associated with the first payment network, and transforms the first service request to a second service request formatted in accordance with a second set of proprietary communications standards associated with the second payment network. An enrichment services computer system hosted on the second interchange network receives the second service request and generates a first service response formatted in accordance with the first set of proprietary communications standards. The first service response is transformed at the transfer process module to create a second service response formatted in accordance with the second set of proprietary communications standards.
Identifying high risk computing operations
This specification discloses techniques for risk identification. One example method includes receiving, by a client device, a risk identification request identifying a requested service operation and service data associated with the requested service operation; retrieving, by the client device, service data corresponding to the risk identification request; determining, by the client device, service indicator data associated with the service data; analyzing, by the client device, one or more of the service data and the service indicator based on a risk identification rule or a risk identification model to produce a risk result; and determining, by the client device, whether the requested service operation is a high risk operation based at least in part on the risk result.
Blocking fraudulent transactions in an NFC device
The invention relates to an NFC device configured for receiving a request to perform a transaction. In response to receiving the request, sensor data from one or more sensors of the NFC device is fed into a first classifier. The sensor data comprises environment parameters of the NFC device. The first classifier determines if sensor data provided as input to the first classifier were sensed in a transaction-typical environment or in a transaction-atypical environment. In case the first classifier determines that the sensor data is indicative of a transaction-atypical environment, the first classifier blocks the transaction or requests a user to confirm the transaction and blocks the transaction until the confirmation is received.
SYSTEM AND METHOD FOR WIRELESS PAYMENT
The present invention provides a method and system which facilitates easy and smooth detection of available one or more Point-of-sale (POS) terminals automatically at a merchant's site when a user desires to use a user device in order to pay for services/goods availed by the user device. The present invention provides a scalable, easy to use, seamless, and an efficient method to detect the POS terminals over a Wi-Fi network available to the user equipment. Information corresponding to the detected and available POS terminals are presented on the user device so that the user may easily select an appropriate POS terminal and may initiate the further payment process. The one or more available POS terminals are detected by the user device with the help of a first server device and a second server device.
Techniques to process biometric and transaction data to determine an emotional state of a user while performing a transaction
Various embodiments are generally directed to method and devices to receive biometric data and transaction data relating to a transaction, apply a model to the biometric data and the transaction data to determine an emotional state of the user during the transaction, and determine an action associated for the transaction based on the emotional state of the user during the performance of the transaction. Embodiments further include causing performance of the action.
Systems and methods for use in managing digital identities
Systems and methods are provided for managing digital identities associated with users. One exemplary method includes receiving, at a computing device, an encrypted message from a communication device associated with a user where the messaging includes a changed attribute for the user. The method also includes generating a hash of a digital identity for the user with the changed attribute, generating a hash of the digital identity of the user stored in a ledger data structure, and transmitting a request for the user to attest to the changed attribute when the generated hashes do not match. The method then further includes broadcasting a pending status of the digital identity of the user to a relying party for the digital identity, and storing a certification of the changed attribute, received from the relying party in response to the pending status, based on verification of the changed attribute by the relying party.
PURCHASE MANAGEMENT SYSTEM AND METHOD
A purchase management system includes a central database arrangement, a customer interface to the central database arrangement, and a bank specific database module, arranged to communicate with a transaction authorization module within a bank. The central database arrangement is arranged to receive, from a purchasing entity through the customer interface, purchasing rules applying to a purchasing group, and includes central processing means arranged to: add a selected purchasing group as metadata linked to a first transaction ID in the central database arrangement; add the purchasing rules applying to said purchasing group as metadata linked to the first transaction ID in the central database arrangement; and transfer metadata linked to the first transaction ID to the bank specific database module. The bank specific database module is arranged to receive a purchase approval request from the transaction authorization module, which purchase approval request comprises transaction information, including at least the purchase amount, linked to the first transaction ID.