G06Q20/4093

SYSTEM AND METHOD FOR IMAGE ANALYSIS FOR PHYSICAL DEFECT DETECTION OF A STORAGE MEDIUM
20220405914 · 2022-12-22 ·

A system for image analysis for physical defect detection of a storage medium of a first card that comprises an apparatus configured to receive the storage medium of the first card and a first server configured to verify issuance of a second card. The apparatus comprises an optical sensor comprising a light transmitter, a receiver, and a first processor. The optical sensor is configured to produce a light to be directed to the storage medium and to determine that the storage medium comprises a physical defect with the first processor based at least in part upon processed electronic signals. The apparatus further comprises a second processor configured to display outputs requesting authorization to issue the second card. The first server is configured to verify issuance of the second card, wherein the first server is communicatively coupled to the apparatus.

Home router authentication device

A user authorization device (or UAD) physically connected to a user's router to aid in the authentication of the user. A bank server polls the user's router to verify that the UAD is connected to the router before granting the user the capability to perform transactions on the user's account that would be otherwise restricted. The bank server implements a set of policies designed by the user that require the UAD to be present for some transactions with the account to be performed. The presence of this device thus adds an extra layer of security to such financial transactions beyond the use of a username and password.

Alternative service access
11526864 · 2022-12-13 · ·

Alternative service access with operations including determining that a system has met a plurality of criteria, including the system having a battery level below a threshold, identifying a merchant, generating an authentication token for authorizing a payment using a payment provider, and sending the authentication token to the payment provider.

SYSTEM AND METHOD FOR HOSTING AND REMOTELY PROVISIONING A PAYMENT HSM BY WAY OF OUT-OF-BAND MANAGEMENT

There is disclosed a payment HSM hosted in a data center and comprising a host interface accessible by a remote end-user entity running a payment application using critical resources protected in the payment HSM, a second interface for main, operational management of the payment HSM by the end-user entity, and an Out-Of-Band, OOB, management interface being distinct and physically isolated from the communication channel of the second interface, and configured to allow secure access to the payment HSM by a third-party entity, distinct from the end-user entity. A resident, remotely configurable provisioning state-machine is implemented in the HSM for the management of the provisioning of the payment HSM for service to one or more end-user entities, under the control of the third-party entity over the OOB management interface.

Systems and methods for incorporating breach velocities into fraud scoring models

A method and system for detecting fraudulent network events in a payment card network by incorporating breach velocities into fraud scoring models are provided. A potential compromise event is detected, and payment cards that transacted at a compromised entity associated with the potential compromise event are identified. Subsequent transaction activity for the payment cards is reviewed, and a data structure for the payment cards are generated. The data structure sorts subsequent transaction activity into fraud score range stripes. The data structure is parsed over a plurality of time periods, and at least one cumulative metric is calculated for each of the time periods in each fraud score range stripe. A plurality of ratio striping values are determined, and a set of feature inputs is generated using the ratio striping values. The feature inputs are applied to a scoring model used to score future real-time transactions initiated using the payment cards.

Using a third party dynamic QR code on a personal mobile device to complete a transaction at an ATM
11521188 · 2022-12-06 · ·

Disclosed herein are system, method, and computer program product embodiments for using a third party dynamic QR code on a personal mobile device to complete a transaction at an ATM. The customer may stage a transaction using a mobile application on a mobile device. Upon the staged transaction being authenticated and approved, a machine readable image may be transmitted to the mobile device. When the customer visits the ATM, the machine readable image on the mobile device may be captured by the ATM and sent to an application server from the ATM. The application server may associate the ATM with the staged transaction that is staged using the mobile application, and send instructions to the ATM to dispense cash according to the staged transaction.

Methods and systems for integrating a loyalty program with a payment card

Embodiments provide a method of integrating a loyalty program with a payment card of a customer. In some implementations, the method includes sending, by a merchant terminal, a payment transaction request to a server system associated with a payment network. The payment transaction request includes a payment transaction amount to be paid to a merchant account from an issuer account of the customer and a consumer identifier linked to the loyalty program associated with the merchant loyalty card. The method includes receiving a notification comprising a payment transaction approval message and a machine-readable script through the payment network. The machine-readable script comprises the consumer identifier and is executable by the merchant terminal. The method further includes storing the consumer identifier associated with the merchant loyalty card with existing customer data in the payment card of the customer by executing the machine-readable script thereby integrating the loyalty program with the payment card.

Data interaction method and device, and offline credit payment method and device

Implementations of the present application provide data interaction and offline credit payment methods and devices. In one implementation, a credit payment code generated by a server is obtained by scanning and parsing a two-dimensional code presented on a mobile computing device for making a payment. The credit payment code is then decrypted based on asymmetric key decryption to obtain a credit payment token. The credit payment token is parsed to obtain security content included in the credit payment token. The payment associated with the credit payment code is then determined to satisfy the security content and the payment is verified with the server that generates the credit payment code at a predetermined time.

System for dynamic prediction of interchange rates for credit card transaction processing

A computer-implemented method for predicting interchange charges includes: retrieving a historical transactions set, where each completed transaction in the set includes transaction features, a bank identification number (BIN), and a corresponding true interchange code; transforming all BINs in the set into a corresponding plurality of BIN features that comprise probabilities; creating a first training set including all transaction features, all pluralities of BIN features, and all true interchange codes associated with the historical transactions set; training a random forest model using the first training set and generating a second training set including rounded BIN features, rounded transaction features, discrete ones of the transaction features, and the true interchange codes; training the random forest model using the second training set to generate a trained random forest model for prediction of the interchange codes; and executing the trained random forest model for new transactions to generate corresponding predicted interchange codes.

Enabling secure internet transactions in an unsecure home using immobile token
11502843 · 2022-11-15 · ·

This specification discloses devices and methods for a security concept that includes an immobile hardware token (e.g., a “wall token” that is fixed within a wall) which ensures that the more sensitive actions of electronic banking (e.g., money transfers of large sums to foreign bank accounts) can only be done from the account owner's home, but not from a remote place. However, other less sensitive (and lower security risk) actions can still be done from anywhere else. In some embodiments, the hardware token includes sensors to ensure that the token is not moved or tampered with, interfaces to provide distance bounding, and a crypto-processor to provide secure authentication. The distance bounding can be used to determine if the authentication device is in close proximity to the hardware token, which can in turn ensure that the authentication device is within the account owner's home.