Patent classifications
G06Q20/4093
SYSTEM, METHOD, AND COMPUTER-ACCESSIBLE MEDIUM FOR BLOCKING MALICIOUS EMV TRANSACTIONS
An exemplary system, method, and computer-accessible medium can include, for example, storing on a first device an applet configured to generate a digital tag; receiving a request at the first device for information; configuring the digital tag to be associated with at least one of (i) an application or (ii) an input on a second device, such that receipt of the digital tag by a second device causes the application to launch on the second device; and emitting from the first device a digital tag.
System and Method for Processing Card Not Present Transactions
A method for processing card not present (CNP) transactions includes: receiving an authentication transaction request including authentication transaction data associated with a CNP transaction, receiving an authorization transaction request including authorization transaction data associated with the CNP transaction; in response to receiving the authorization transaction data and the authentication transaction data, determining an authorization decision for the CNP transaction; and communicating the authorization decision. Systems for processing CNP transactions are also disclosed.
System and method for identity verification
Representative embodiments set forth techniques for verifying an identity of a primary user of a primary account on a client device. A method may include receiving, for the primary account, a request for identity verification responsive to an action of a secondary account associated with the primary account and identifying a payment registration characteristic of a payment registration associated with the primary account. The method also includes retrieving identity information associated with the primary account based on the payment registration characteristic and, in response to a determination that the identity information corresponds to a verification indicator, verifying an identity of a user of the primary account. The method also includes, in response to verifying the identity of the user of the primary account, generating a payment verification token and associating the payment verification token with an authorization indication for the action of the secondary account.
Virtual token-based settlement providing system, virtual token generation apparatus, virtual token verification server, virtual token-based settlement providing method, and virtual token-based settlement providing program
The present invention relates to a virtual token-based settlement providing system, a virtual token generation apparatus, a virtual token verification server, a virtual token-based settlement providing method, and a virtual token-based settlement providing program. The present invention comprises: a step for receiving a virtual token provided by a virtual token generation means, by a virtual token verification means; a step for extracting multiple detailed codes included in the virtual token by the virtual token verification means; a step for searching for a storage location of an actual card number on the basis of the multiple detailed codes by the virtual token verification means; and a step for transmitting the searched actual card number to a payment settlement service server or a financial company server.
ELECTRONIC PAYMENT METHOD AND SYSTEM
The present disclosure relates to an electronic payment method and to an electronic payment system. A central server generates a secret number based on a payment card number. The central server associates the secret number with a transaction. A copy of the association between the secret number and the transaction is stored at a remote terminal. An access is detected at the remote terminal by acquiring the payment card number at the remote terminal. The remote terminal generates an identifier based on the payment card number. The remote terminal verifies whether the identifier matches the secret number. When the identifier matches the secret number, the remote terminal determines whether a provision of a product or service offered at the remote terminal is authorized based on a content of the transaction.
Systems and Methods for Use in Managing Digital Identities
Systems and methods are provided for managing digital identities associated with users. One exemplary method includes receiving, at a computing device, an encrypted message from a communication device associated with a user where the messaging includes a changed attribute for the user. The method also includes generating a hash of a digital identity for the user with the changed attribute, generating a hash of the digital identity of the user stored in a ledger data structure, and transmitting a request for the user to attest to the changed attribute when the generated hashes do not match. The method then further includes broadcasting a pending status of the digital identity of the user to a relying party for the digital identity, and storing a certification of the changed attribute, received from the relying party in response to the pending status, based on verification of the changed attribute by the relying party.
Method and system for retry processing of controlled payment transactions
A method for retrying processing of a controlled payment transaction includes: storing, in a first database, account profiles, each including data related to a transaction account including an account identifier and account controls; storing, in a second database, the account profiles stored in the first database, wherein data in each account profile in the second database corresponds to data in the corresponding account profile in the first database; receiving an authorization request for a transaction, the request including a specific account identifier and transaction data; determining an approval or denial of the transaction based on the account controls included in a profile in the second database including the specific account identifier and the transaction data if an attempt to determine approval or denial based on the account controls included in a corresponding account profile in the first database fails; and processing the payment transaction based on the determination.
SYSTEM FOR PREDICTING FUTURE PURCHASE USING SEQUENCE PATTERN MINING OF CREDIT/DEBIT DATA
A system for managing generation of an electronic coupon (eCoupon) includes a terminal configured to process a credit/debit card to determine a card number of the credit/debit card; and computer server configured to generate a plurality of transactions from a pool of credit/debit card data, perform sequence pattern mining on the transactions to determine a sequence likely to result in an amount of spending in a pre-defined spending category within a subsequent period of time that exceeds a pre-defined spend threshold, receive the card number across a computer network from the terminal, and generate the eCoupon when existing purchases by the card number include the sequence.
SYSTEM AND METHODS FOR POPULATING A MERCHANT ADVICE CODE
A merchant advice code system and computer-implemented method for populating a merchant advice code in a payment authorization response message includes a memory device for storing data and a processor communicatively coupled to the memory device. The processor is programmed to receive a payment authorization request message including a primary account number relating to the payment account of a cardholder. The processor is programmed to extract a copy of the primary account number from the payment authorization request message and determine whether the primary account number exists in an automated billing service database. In response to determining that the primary account number exists in the automated billing service database, the processor is programmed to store an indicator in the memory device and populate the merchant advice code in the payment authorization response message with the indicator, thereby generating an edited payment authorization response message.
Organic light emitting diode (“OLED”) security authentication system
Aspects of the invention relate to a smart card that leverages emerging technology hardware to enhance secure release of sensitive data associated with the smart card. The smart card may include an OLED display. The device may include one or more biometric sensors. Embodiments may include pairing a device with a portal used to access sensitive data. When accessing the portal, the user may be required to verify that the device is present before gaining access to the sensitive data.