Patent classifications
G06Q20/4093
AGGREGATED TRUST FRAMEWORK
A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.
VIRTUAL CODE-BASED CONTROL SYSTEM, METHOD, AND PROGRAM, CONTROL DEVICE, AND CONTROL SIGNAL GENERATING MEANS
The present invention relates to virtual code-based control system, method and program, a control device and a control signal generating means. A control method on the basis of a control signal comprising a virtual code according to an embodiment of the present invention comprises: a control signal receiving step for a control module receiving, from a control signal generating means, a control signal generated by means of combining a plurality of specific codes in accordance with a particular rule; a step for the control module extracting the plurality of specific codes comprised in the virtual code; and a command searching step for the control module searching for a storage location comprising a particular command on the basis of the plurality of specific codes.
Dynamic offline card authorization
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating rules to apply to fare transactions when a fare card reader cannot communicate with an authorization server, for generating historical data and a risk score for a fare card that are used by a fare card reader, with the rules, to determine whether to authorize access to a transit service when the fare card reader cannot communicate with the authorization server, and for selectively permitting or denying access to the transit service using the rules and the historical data or the score for a fare card.
Cryptobionic system and associated devices and methods
Introduced here are cryptobionic implants designed for implantation within a human body that are capable of facilitating an identity authentication and/or an intent validation process. These cryptobionic implants can be designed to be cryptographically secure. For example, a cryptobionic implant may include a processor configured to encrypt data residing in an internal storage and a transponder configured to transmit the encrypted data to a reader device located outside of the human body for decryption. The reader device (or some other electronic device) may be able to verify the identity of the individual in whom the cryptobionic implant is implanted based on the decrypted data.
Determining whether a user has possession of a transaction card and/or whether the user is authorized to possess the transaction card
A device receives a transaction request concerning a transaction and a transaction card from a transaction terminal, and determines, based on the transaction request, information concerning the transaction card. The device sends, based on the transaction request and to a user device, a query concerning possession of the transaction card by a user of the user device, where the query includes an instruction for the user to confirm possession of the transaction card via a component of the user device. The device receives, from the user device and after sending the query to the user device, a response concerning possession of the transaction card by the user, and determines, based on the response and the information concerning the transaction card, whether the user has possession of the transaction card. The device performs, based on determining whether the user has possession of the transaction card, at least one action.
Systems and methods for partial authorization of electronic transactions
A method for managing payment submissions includes receiving, at an acquirer computing system, an authorization request submitted by a merchant computing system for a transaction of a predefined amount, the merchant computing system being associated with a merchant, and the authorization request identifying account information for an account that is associated with a payment card network and an issuer processor; and re-transmitting the authorization request for less than the predefined amount and greater than a configurable threshold value, until the authorization request is approved by the issuer processor or until the authorization request falls below the configurable threshold value.
Authorization control network and method of validating an authorization request
An authorization control network includes an attribute control server and an authorization server. The attribute control server is configured to receive from a communications device a credential and a modification request that includes an account identifier, determine a cardholder attribute from the credential, determine an account attribute associated with the account identifier in a card profile database, determine that the cardholder attribute matches the account attribute, and transmit the modification request to the authorization server. The authorization server is configured to update a limit value with the account identifier in a limit profile database, receive from a POS device an authorization request that includes the account identifier and an authorization value, determine the limit value associated with the account identifier in the limit profile database, generate an authorization response indicating whether the authorization value exceeds the limit value, and transmit the authorization response to the POS device.
SYSTEMS AND METHODS FOR MANAGING MERCHANT-STORED PAYMENT CREDENTIALS
Systems and methods for managing merchant-stored payment credentials are disclosed. In one embodiment, in a financial institution backend comprising at least one computer processor, a method for managing merchant-stored payment credentials may include: (1) receiving, from a customer and in a first user interface, a selection of a merchant that is eligible for financial instrument pushing; (2) opening a second user interface with the selected merchant, wherein the login credentials for the merchant are received from the customer in the second user interface; (3) receiving, from the customer and in the first user interface, a selection of a financial instrument to push; and (4) providing, to an aggregator, financial instrument data for the selected financial instrument. The aggregator pushes the financial instrument data to the merchant.
SERVER, PROGRAM, AND SETTLEMENT TERMINAL MANAGEMENT SYSTEM
A server includes a receiving unit configured to receive, from a settlement terminal capable of performing settlement processing by a credit card, a terminal ID for specifying the settlement terminal and a determination instruction. In response to the receiving unit receives the determination instruction, a determining unit is configured to determine, referring to a storing unit correlating and storing the terminal ID for specifying the settlement terminal and credit settlement related items, whether the settlement terminal specified by the terminal ID received by the receiving unit is usable for credit settlement. The server further includes a transmitting unit configured to transmit a determination result of the determining unit to the settlement terminal specified by the terminal ID received by the receiving unit.
PROXY CHECKOUT AND PAYMENT TRANSACTION SERVICES
A method for using proxy checkout services is discussed. The method includes accessing transaction details of a potential transaction for an item or a first service at a merchant, the potential transaction initiated by a user at a user device at a first location. The method includes responsive to a determination, based on merchant characteristics or user characteristics, that use of proxy services is permitted, initiating proxy services for performing the potential transaction at different user locations. The method includes determining, based on selection criteria, a particular proxy service from the proxy services for initiating a proxy transaction based on the potential transaction using one of different user locations. The method includes causing a user interface of the user device to render a user-selectable option for performing the proxy transaction instead of the potential transaction.