Patent classifications
G06Q20/4093
Systems and methods for partial authorization of electronic transactions
A method for managing payment submissions includes receiving, at an acquirer computing system, an authorization request submitted by a merchant computing system for a transaction of a predefined amount, the merchant computing system being associated with a merchant, and the authorization request identifying account information for an account that is associated with a payment card network and an issuer processor; and re-transmitting the authorization request for less than the predefined amount and greater than a configurable threshold value, until the authorization request is approved by the issuer processor or until the authorization request falls below the configurable threshold value.
Systems and methods for device and user authorization
Systems and methods are described for authorizing users and/or devices. An example method may comprise receiving, from a user device, a request to access a function associated with a service account. The request may comprise an identifier of the user device. The example method may comprise determining, based on the identifier, a primary authority holder of the service account. The example method may comprise determining that a first record on a first distributed ledger associated with the primary authority holder indicates that the user device is associated with the primary authority holder. The example method may comprise determining that a second record on a second distributed ledger associated with the user device indicates that the user device is associated with the primary authority holder. The example method may comprise granting, based on the request, the first record, and the second record, the user device access to the function.
Fraud Detection and Prevention System
Systems, apparatuses, and methods are described for detecting and preventing suspicious payment card authorization attempts at a merchant level. A computing device may receive a plurality of authorization attempts and store the plurality of authorization attempts in a database. Each authorization attempt may correspond to an attempted transaction and may be associated with a respective merchant. The computing device may generate a database query configured to retrieve a first plurality of authorization attempts corresponding to a first merchant. The database query may be generated based on first criteria corresponding to a first notification rule, and the first criteria may be configured to detect a pattern of authorization attempts at a given merchant and associated with a potential account testing attack. The computing device may determine a suspicious status for the merchant and perform one or more actions associated with the merchant.
Systems and methods for distributing data
Systems and methods are provided for distributing data to multiple data centers within a network based on unique information associated with the data. One example method includes receiving data including a device ID specific to a device of a user and generating, by a filter computing device, a group identifier for the received data based on the device ID. The group identifier is associated with only one of the multiple data centers within the network. The method then includes storing the received data in a data storage device of the one of the multiple data centers based on the group identifier.
Systems and methods for partial authorization of electronic transactions
A method for managing payment submissions includes receiving, at an acquirer computing system, an authorization request submitted by a merchant computing system for a transaction of a predefined amount, the merchant computing system being associated with a merchant, and the authorization request identifying account information for an account that is associated with a payment card network and an issuer processor; and re-transmitting the authorization request for less than the predefined amount and greater than a configurable threshold value, until the authorization request is approved by the issuer processor or until the authorization request falls below the configurable threshold value.
Live card tracking
A method for use with a smart card is provided. The smart card may include a communication interface, a housing, a microprocessor embedded in the housing, a battery for powering the communication interface and the microprocessor, and a nano GPS chip, located within the housing and in electronic communication with the communication interface and the microprocessor. The thickness of the smart card is preferably no greater than 0.8 millimeters (“mm”) and has surface area not greater than 86 mm×54 mm. The method may include determining the location of the smart card in response to a request for a smart card transaction authorization and determining the location of a mobile device associated with a specified user of the smart card. Based on the location of the smart card and the location of the mobile device, the smart card may calculate a location delta between the smart card and the mobile device. If the location delta is greater than or equal to a threshold distance, the smart card may deny the request for smart card transaction authorization.
System and method for dynamic multifactor authentication
A method of authenticating a user. The method comprises the step of sending an authentication request to a remote authentication device and generating a first piece of authentication information. A mobile device receives the first piece of authentication information from either an access terminal or the remote authentication device. The mobile device of the user generating a second piece of authentication information which is at least partially based on the received first piece of authentication information. The second piece of authentication information is sent to the remote authentication devices and the second piece of authentication information validated. If the second piece of authentication information is successfully validated an authentication signal is generated.
Method and system for authenticating digital transactions
A system and computer-implemented method for authenticating digital transactions. The method includes receiving a device registration request and a device attestation response including at least a device integrity status from a device. In response to the device registration request, the method includes providing a device registration response to the device, based on validation of the device integrity status. Further, the method includes receiving a first payment transaction request and an enrolment request from the device via an application to authenticate a second payment transaction request using a first type of authentication technique. Finally, the method includes enrolling the device to the first type of authentication technique and providing a second token to the device based on a result of the first payment transaction request, wherein the second token is used for authenticating the second payment transaction request.
Interface-Specific Account Identifiers
An access management system comprises one or more databases and one or more computers. The one or more databases may store access data, accessor data, restriction data, and/or biometric data. The one or more computers may comprise an account identifier management computer, an authorization server computer, and/or an account management server computer. The account identifier management computer may generate account identifiers for physical or virtual cards. The cards may have interface-specific account identifiers. The authorization server computer may be communicatively coupled to an account access system that is used to obtain account identifiers as input. The authorization server computer may apply one or more restrictions to an account identifier. The account identifier management server computer may enable monitoring account activity and/or generate ephemeral phone numbers that can be used to authenticate callers to call recipients.
SYSTEM AND METHOD FOR ERROR DETECTION AND NOTIFICATION OF A STORAGE MEDIUM
A system for error detection and notification that a storage medium of a first card is defective comprises an apparatus and a first server. The apparatus is configured to receive the storage medium of the first card. The apparatus comprises a first processor configured to receive data from the storage medium as the storage medium is inserted into the apparatus, wherein the received data is encoded into the storage medium. The first processor is configured to determine that the received data is incomplete and display a first output requesting authorization to issue a second card. The first processor is configured to transmit data to a communication network, wherein the transmitted data comprises user input authorizing issuance of the second card and requested data associated with the first card. The first server is configured to verify issuance of the second card, wherein the first server is communicatively coupled to the apparatus.