G06Q20/4093

Proximal distance and usage pattern access management

A method for proximal distance and usage pattern access management includes identifying a first trigger event based on a financial device profile indicating a first proximal distance threshold is exceeded for a first device relative to a second device, where the first device is capable of executing financial transactions. The method further includes querying one or more network devices in the vicinity of the first device to validate the first trigger event. The method further includes responsive to receiving a first validation of the first trigger event from at least one network device from the one or more network devices, applying a first temporal lock on the first device preventing future executions of financial transactions. The method further includes responsive to validating a user associated with the second device, updating the financial device profile based on at least on the first trigger event and a location for the trigger event.

DETECTING LIFE EVENTS BY APPLYING ANOMALY DETECTION METHODS TO TRANSACTION DATA

Machine learning-based anomaly detection methods are used to identify a change in a user's streaming transaction data. If a threshold level of change in the user's transaction data is detected, the user is then identified as potentially having experienced a life event. Then, after a user is identified has having potentially experienced a life event, individual user transactions are processed and analyzed to determine the specific life event the user has most likely experienced. The user is then identified as having experienced the identified specific life event. This information is then used to customize the interactions between the user and the data management system such as questions asked of the user, forms or displays provided to the user, or offers made to the user.

Location Specific Temporary Authentication System
20210029133 · 2021-01-28 ·

Methods and systems for providing temporary and secure authenticated access to content from a content provider, such as data, software, services, streaming content, entertainment, and/or other information. In one embodiment, the present invention contemplates using location specific automatic authentication. The present invention contemplates a system, computer program, and associated processes and methods to provide temporary and private authentication including secure temporary authorization to data, content, software, services, and/or information based on a verification of a user's proximity to a venue.

TECHNIQUES TO PROCESS BIOMETRIC AND TRANSACTION DATA TO DETERMINE AN EMOTIONAL STATE OF A USER WHILE PERFORMING A TRANSACTION

Various embodiments are generally directed to method and devices to receive biometric data and transaction data relating to a transaction, apply a model to the biometric data and the transaction data to determine an emotional state of the user during the transaction, and determine an action associated for the transaction based on the emotional state of the user during the performance of the transaction. Embodiments further include causing performance of the action.

ASSOCIATING MERCHANT DATA OR ITEM DATA WITH A MONETARY TRANSACTION BASED ON A LOCATION OF A USER DEVICE

A device may receive withdrawal data identifying a monetary withdrawal transaction. The device may identify a user associated with the monetary withdrawal transaction based on identity data included in the withdrawal data. The device may store the withdrawal amount in a monetary withdrawal record associated with the user. The device may receive location data indicating a location of a user device of the user during a time period. The location may be associated with a merchant. The device may transmit a notification to the user device requesting identification of a monetary purchase transaction performed with the merchant, and may receive a response that includes purchase data. The device may utilize natural language processing on the purchase data to identify an amount spent in the monetary purchase transaction. The device may associate the amount spent and the merchant with the monetary withdrawal record and perform one or more actions.

Dedicated point of sale over an intermittent network

Disclosed are various embodiments for improvements in customer relationship management and point of sale payment processing at remote event spaces. The system, apparatuses, and methods disclosed herein facilitate the transaction processing of credit cards and other payment vehicles in often remote locations where network connections may be intermittent and suffer from frequent disconnects or interruptions of service. The embodiments disclosed operate to detect network events, dynamically adjust to the event space, and processes the transactions on demand. The apparatuses are equipped to facilitate the event environment and are adapted to execute instructions to facilitate the financial transactions.

IMPROVED PAYMENT AUTHENTICATION SYSTEM FOR ELECTRONIC COMMERCE TRANSACTIONS
20210012333 · 2021-01-14 · ·

A payment managing system and method for enhancing the security of electronic user payment data can include employing a two factor authentication and keeping e-commerce host system outside the PCI scope. The two-factor authentication can include using a session ID and a one-time token (OTT). The session ID can identify a payment session that is initiated upon initiation of an e-commerce transaction. The payment managing system can provide a computing device initiating the transaction an iFrame to handle input user input data on an information resource. The OTT can be used to tokenize the user input data. The OTT can be included in payment authorization requests sent to the payment managing system. The payment managing system can obtain payment authorization without the user payment data being shared with e-commerce host systems.

PAYMENT AUTHENTICATION SYSTEM FOR ELECTRONIC COMMERCE TRANSACTIONS
20210012334 · 2021-01-14 ·

A payment managing system and method for enhancing the security of electronic user payment data can include employing a two factor authentication and keeping e-commerce host system outside the PCI scope. The two-factor authentication can include using a session ID and a one-time token (OTT). The session ID can identify a payment session that is initiated upon initiation of an e-commerce transaction. The payment managing system can provide a computing device initiating the transaction an iFrame to handle input user input data on an information resource. The OTT can be used to tokenize the user input data. The OTT can be included in payment authorization requests sent to the payment managing system. The payment managing system can obtain payment authorization without the user payment data being shared with e-commerce host systems.

Data Processing Method Based on NFC Label, System and Server Thereof

The invention relates to a data processing method based on NFC tag. The method comprises: reading the NFC tag, the NFC tag comprising tag content and tag ID; generating an NFC tag payment request based on the tag content and tag ID; parsing the NFC tag payment request and obtaining an parsing reply to the NFC tag payment request; generating an order generation request based on the parsing reply, wherein the order generation request is for causing an order to be generated based on first account information, current transaction information and second account information; generating the order based on the order generation request; and payment step for performing payment based on the order. According to embodiments of the invention, the payment process can be simplified, also, there is no need to set the NFC-specific reading device in the embodiments of the invention, and the cost of merchants can be reduced.

PURCHASE MANAGEMENT SYSTEM AND METHOD
20240005385 · 2024-01-04 · ·

A purchase management system 100 comprises a central database arrangement 110 and a purchasing authorization database module 130, arranged to communicate with a transaction authorization module 405. The central database arrangement 110: receives, from a purchasing entity 200, purchasing rules applying to a purchasing group 250; adds a selected purchasing group 250 as metadata linked to a first transaction ID; adds the purchasing rules applying to said purchasing group 250; and transfers the metadata to the purchasing authorization database module 130. The purchasing authorization database module 130 receives a purchase approval request from the transaction authorization module 405; decides on the purchase approval request based on whether the requested purchase fulfils the purchasing rules; responds to the transaction authorization module 405 with approval or rejection of the purchase approval request; and transfers the transaction information to the central database arrangement 110. The central database arrangement 110 transfers the transaction information to the purchasing entity 200, thereby allowing the information about the purchase to be automatically entered into administrative systems of the purchasing entity 200.