G06Q20/4093

SYSTEMS AND METHODS FOR GENERATING CUSTOMER TRANSACTION TEST DATA THAT SIMULATES REAL WORLD CUSTOMER TRANSACTION DATA
20200058077 · 2020-02-20 ·

Systems and methods for generating customer transaction test data that simulates real world customer transaction data are disclosed. In one embodiment, a method may include (1) generating an account type reference file defining a plurality of account types; (2) generating a transaction type reference file defining a plurality of transaction types; (3) generating a plurality of customer test data records based on at least one of the plurality of parameters, wherein each customer test data record comprises a plurality of data fields, the data in each data field having a format that simulates real-world data; (4) verifying a uniqueness of each of the plurality of customer records; (5) generating a random number of accounts for each customer test data record based on the account type reference file; and (6) generating a random number of transactions for each account based on the transaction type reference file.

INJECTING USER CONTROL FOR CARD-ON-FILE MERCHANT DATA AND RECURRING PAYMENT TRANSACTION PARAMETERS BETWEEN ACQUIRER PROCESSORS AND ISSUER PROCESSORS OVER DATA COMMUNICATION NETWORKS
20200058031 · 2020-02-20 ·

Updates to a payment card of the specific card user that will affect subsequent payments to the COF merchants has occurred are detected based on receiving a notification from an issuer processor. In response, payment credentials can be automatically updated with the COF merchants for the specific card user.

VIRTUAL TOKEN-BASED SETTLEMENT PROVIDING SYSTEM, VIRTUAL TOKEN GENERATION APPARATUS, VIRTUAL TOKEN VERIFICATION SERVER, VIRTUAL TOKEN-BASED SETTLEMENT PROVIDING METHOD, AND VIRTUAL TOKEN-BASED SETTLEMENT PROVIDING PROGRAM
20200051070 · 2020-02-13 · ·

The present invention relates to a virtual token-based settlement providing system, a virtual token generation apparatus, a virtual token verification server, a virtual token-based settlement providing method, and a virtual token-based settlement providing program. The present invention comprises: a step for receiving a virtual token provided by a virtual token generation means, by a virtual token verification means; a step for extracting multiple detailed codes included in the virtual token by the virtual token verification means; a step for searching for a storage location of an actual card number on the basis of the multiple detailed codes by the virtual token verification means; and a step for transmitting the searched actual card number to a payment settlement service server or a financial company server.

Antifraud Resilient Transaction Identifier Datastructure Apparatuses, Methods and Systems
20200051089 · 2020-02-13 ·

The Antifraud Resilient Transaction Identifier Datastructure Apparatuses, Methods and Systems (ARTID) transforms PIN, unique user identifying device datastructure inputs via ARTID components into secure payment authorization outputs. The ARTID includes a virtual secure element datastructure transaction apparatus, comprising, a memory, a component collection in the memory, and a processor disposed in communication with the memory, and configured to issue a plurality of processing instructions from the component collection stored in the memory. ARTID includes instructions to: obtain request to generate a tamper resistant asset account from a requestor, and instantiate a new tamper resistant asset account, wherein the account is populated with the requestor identifier, unique requestor device identifier, a secure cryptographic element for the tamper resistant account. ARTID also includes instructions to provide a message to generate a new physical account card and an associated virtual account card associated with the tamper resistant asset account, and obtain a request to engage the virtual account card in a transaction, wherein the request includes the user access credential. ARTID also includes instructions to generate a card access event message from the request to engage the virtual account card, provide the card access event message to a payment network, and obtain a card access event authorization response.

System and method for dynamic multifactor authentication

A method of authenticating a user. The method comprises the step of sending an authentication request to a remote authentication device and generating a first piece of authentication information. A mobile device receives the first piece of authentication information from either an access terminal or the remote authentication device. The mobile device of the user generating a second piece of authentication information which is at least partially based on the received first piece of authentication information. The second piece of authentication information is sent to the remote authentication devices and the second piece of authentication information validated. If the second piece of authentication information is successfully validated an authentication signal is generated.

Systems and methods for partial authorization of electronic transactions
10552841 · 2020-02-04 · ·

A method for managing payment submissions includes receiving, at an acquirer computing system, an authorization request submitted by a merchant computing system for a transaction of a predefined amount, the merchant computing system being associated with a merchant, and the authorization request identifying account information for an account that is associated with a payment card network and an issuer processor; and re-transmitting the authorization request for less than the predefined amount and greater than a configurable threshold value, until the authorization request is approved by the issuer processor or until the authorization request falls below the configurable threshold value.

SYSTEM, METHOD, AND PROGRAM FOR DISPLAYING REGISTRATION STATUS OF CREDIT CARD
20200013066 · 2020-01-09 ·

The system collects the registration status of a credit card in an EC site and organizes and displays the registration status by a credit card. The system receives a credit card to be registered, registers the received credit card in a predetermined EC site, collects the registration status of the plurality of credit cards registered in the plurality of EC sites, the plurality of credit cards being received and registered in the EC sites, and organizes and displays the collected registration status by a credit card.

Payment service authentication for a transaction using a generated dynamic verification value

Methods and systems for dynamically generating a verification value for a transaction and for utilizing such value to verify the authenticity of the payment service application. The dynamically created verification value may be generated on a payment device, such as an integrated circuit credit card or smart card, embedded into the payment data, and transmitted to a point of sale terminal. Alternatively, payment data is sent by a payment device to a point of sale terminal, which generates a verification value and embeds it into the payment data. The embedded verification value is used by a service provider to verify the authenticity of the transaction. The methods and systems may be used in a contactless (wireless) environment or a non-wireless environment.

Systems and methods for use in managing digital identities

Systems and methods are provided for managing digital identities associated with users. One exemplary method includes receiving, at a computing device, an encrypted message from a communication device associated with a user where the message includes a changed attribute for the user. The method also includes generating a first hash of a first digital identity for the user with the changed attribute and generating a second hash of a second digital identity of the user stored in a ledger data structure. And, in response to the first hash not matching the second hash, the method then includes broadcasting a pending status of the first digital identity to a relying party for the second digital identity, and storing a certification of the changed attribute, received from the relying party in response to the pending status, based on verification of the changed attribute by the relying party.

Network neighborhood topology as a predictor for fraud and anomaly detection

An improved technique involves generating, from historical transaction data, a relational graph that represents connections between users who initiate transactions and transaction devices used to carry out the transactions. By supplementing traditional relational database models with a tool such as a graph database, a risk analysis server is able to express users and transaction devices as nodes in a graph and the connections between them as edges in the graph. The risk analysis server may then match the topology of the graph in a neighborhood of the user initiating the transaction to a known topology that is linked to an indication of risk. In some arrangements, this topology is an input into a risk model used to compute a risk score for adaptive authentication.