G06Q20/4093

Discounted card not present rates following failed card present attempts
10515354 · 2019-12-24 · ·

Merchants that have access to financial transaction card readers sometimes experience failed card reads when attempting a transaction. The merchant may then perform the transaction by manually entering account information from the financial transaction card, which can cause the merchant to be charged a higher fee than would have been charged if the transaction had been performed with the card reader. Technology is disclosed for providing discounted transaction rates for a card not present transaction following a failed card read. This is accomplished by detecting a failed card read of a financial transaction card through a card reader; detecting a card not present transaction including receiving user input of textual account access data; matching the failed card read with the card not present transaction; and crediting a difference between a fee charged for the card not present transaction and a fee which would have been charged for the attempted transaction.

CRYPTOBIONIC SYSTEM AND ASSOCIATED DEVICES AND METHODS
20190386987 · 2019-12-19 ·

Introduced here are cryptobionic implants designed for implantation within a human body that are capable of facilitating an identity authentication and/or an intent validation process. These cryptobionic implants can be designed to be cryptographically secure. For example, a cryptobionic implant may include a processor configured to encrypt data residing in an internal storage and a transponder configured to transmit the encrypted data to a reader device located outside of the human body for decryption. The reader device (or some other electronic device) may be able to verify the identity of the individual in whom the cryptobionic implant is implanted based on the decrypted data.

Payment authentication system for electronic commerce transactions
11941616 · 2024-03-26 ·

A payment managing system and method for enhancing the security of electronic user payment data can include employing a two factor authentication and keeping e-commerce host system outside the PCI scope. The two-factor authentication can include using a session ID and a one-time token (OTT). The session ID can identify a payment session that is initiated upon initiation of an e-commerce transaction. The payment managing system can provide a computing device initiating the transaction an iFrame to handle input user input data on an information resource. The OTT can be used to tokenize the user input data. The OTT can be included in payment authorization requests sent to the payment managing system. The payment managing system can obtain payment authorization without the user payment data being shared with e-commerce host systems.

SYSTEMS AND METHODS FOR INCORPORATING BREACH VELOCITIES INTO FRAUD SCORING MODELS

A method and system for detecting fraudulent network events in a payment card network by incorporating breach velocities into fraud scoring models are provided. A potential compromise event is detected, and payment cards that transacted at a compromised entity associated with the potential compromise event are identified. Subsequent transaction activity for the payment cards is reviewed, and a data structure for the payment cards are generated. The data structure sorts subsequent transaction activity into fraud score range stripes. The data structure is parsed over a plurality of time periods, and at least one cumulative metric is calculated for each of the time periods in each fraud score range stripe. A plurality of ratio striping values are determined, and a set of feature inputs is generated using the ratio striping values. The feature inputs are applied to a scoring model used to score future real-time transactions initiated using the payment cards.

EVENT-BASED AUTOMATIC TRANSACTION SYSTEM

Systems, apparatuses, and methods of an event-based automatic transaction on behalf of a user include and not limited to, determining, based on a plurality of information sources including a plurality of news information sources independent of a particular physical location, a probability of an event occurring, the probability being based on a predetermined percentage of news information sources indicating that the event is going to occur or is occurring, in response to the probability of the event occurring satisfying a predetermined threshold corresponding to the predetermined percentage, determining a location impacted by the event, in response to determining that the location of the user is proximate to the location impacted by the event, initiating a transaction with a mobile banking client application linked to an authorized financial account on behalf of the user, the authorized financial account being associated with the user and provided by the financial institution computing system.

SYSTEMS AND METHODS FOR CLOUD-BASED TESTING OF POS DEVICES
20240086289 · 2024-03-14 ·

A computer-implemented method for cloud-based testing of a payment network may include receiving a test configuration for testing a payment processing network, configuring a simulated worker generator for generating a plurality of simulated workers according to the received test configuration, reading commands to be executed by each simulated worker among the plurality of simulated workers from a command bank according to the received test configuration, configuring the plurality of simulated workers according to the commands and the received test configuration, starting a swarm test of the payment processing network by the plurality of simulated workers, reading results of the swarm test from the plurality of simulated workers, and saving the results to storage.

System, method, and computer-accessible medium for blocking malicious EMV transactions
11922399 · 2024-03-05 · ·

An exemplary system, method, and computer-accessible medium can include, for example, storing on a first device an applet configured to generate a digital tag; receiving a request at the first device for information; configuring the digital tag to be associated with at least one of (i) an application or (ii) an input on a second device, such that receipt of the digital tag by a second device causes the application to launch on the second device; and emitting from the first device a digital tag.

Systems and methods for artificial intelligence controlled prioritization of transactions

Systems and methods for artificial intelligence transaction priority control are presented. Transaction priority control may be provided in the context of online user accounts maintained by financial institutions. Transaction priority control may be obtained through querying transaction information from a database, applying a predictive model to determine a likely future transaction, assigning a priority score to the future transaction, and approving or denying the future transaction based on the priority score.

Purchase management system and method
11922488 · 2024-03-05 · ·

A purchase management system includes a central database arrangement, a customer interface to the central database arrangement, and a bank specific database module, arranged to communicate with a transaction authorization module within a bank. The central database arrangement is arranged to receive, from a purchasing entity through the customer interface, purchasing rules applying to a purchasing group, and includes central processing means arranged to: add a selected purchasing group as metadata linked to a first transaction ID in the central database arrangement; add the purchasing rules applying to said purchasing group as metadata linked to the first transaction ID in the central database arrangement; and transfer metadata linked to the first transaction ID to the bank specific database module. The bank specific database module is arranged to receive a purchase approval request from the transaction authorization module, which purchase approval request comprises transaction information, including at least the purchase amount, linked to the first transaction ID.

System and method for processing card not present transactions

A method for processing card not present (CNP) transactions includes: receiving an authentication transaction request including authentication transaction data associated with a CNP transaction, receiving an authorization transaction request including authorization transaction data associated with the CNP transaction; in response to receiving the authorization transaction data and the authentication transaction data, determining an authorization decision for the CNP transaction; and communicating the authorization decision. Systems for processing CNP transactions are also disclosed.