G06Q20/4093

SYSTEM AND COMPUTER-IMPLEMENTED METHOD FOR IDENTIFYING DEFECTIVE CHIP CARDS THROUGH SUBSTANDARD TRANSACTION EXPERIENCES

A system and computer-implemented method for analyzing chip card transactions to identify defective chip cards and/or defective chip readers in need of replacement. Constraints are established to define a subset of card transactions. From a full set of card transactions the subset is identified consisting of each card transaction falling within the constraints and occurring at a merchant having a chip reader. From this subset the unique chip cards are identified, and for each unique chip card a percentage of fallback transactions is calculated. The percentage of fallback transactions is compared to a maximum value, and if the percentage of fallback transactions exceeds the maximum value, the chip card is identified as defective. Each defective chip card is reported to the card issuer, along with at least a recommendation to replace the defective chip card. A similar process may be used to identify defective chip readers of particular merchants.

ENTITY IDENTIFICATION BASED ON A RECORD PATTERN

The methods described herein are configured to obtain a first record pattern associated with the unidentified entity and select a second record pattern associated with an entity identifier of a known entity. Based on the first record pattern matching the second record pattern, the entity identifier of the known entity is associated to the unidentified entity to indicate that the unidentified entity and the known entity are the same. Determining the entity identifier of the unidentified entity enables the linking of separate identifier systems of data structures to facilitate communication and/or interaction between the data structures.

SYSTEM AND COMPUTER-IMPLEMENTED METHOD FOR IDENTIFYING DEFECTIVE CHIP READERS THROUGH SUBSTANDARD TRANSACTION EXPERIENCES

A system and computer-implemented method for analyzing chip card transactions to identify defective chip cards and/or defective chip readers in need of replacement. Constraints are established to define a subset of card transactions. From a full set of card transactions the subset is identified consisting of each card transaction falling within the constraints and occurring at a merchant having a chip reader. From this subset the unique chip readers are identified, and for each unique chip reader a percentage of fallback transactions is calculated. The percentage of fallback transactions is compared to a maximum value, and if the percentage of fallback transactions exceeds the maximum value, the chip reader is identified as defective. Each defective chip reader is reported to the merchant, along with at least a recommendation to replace the defective chip reader. A similar process may be used to identify defective chip cards.

Computer-Implemented System, Method, and Computer Program Product for Automatically Generating an Account Profile for at Least One User Associated with a Plurality of Account Identifiers
20190188719 · 2019-06-20 ·

A method for automatically generating an account profile for a user or household, including: determining a first key identification data element type; determining a first key identification data element value; determining a linking identification data element type different than the first key identification data element type; determining at least one linking identification data element value; determining at least one second key identification data element value; and generating an account profile for the user or profile, the user account profile comprising a plurality of key identification data element values associated with the at least one user. A system and computer program product for automatically generating an account profile for a user or household are also disclosed.

COMPUTERIZED METHODS AND COMPUTER SYSTEMS FOR VERIFICATION OF TRANSACTIONS

When a payment transaction made by a user, a reminder data file is created including reminder items associated with the payment transaction. At least one of the reminder items is an image. Subsequently, a transaction statement listing one or more payment transactions is provided to the user, in a form in which each listed payment transaction is associated with an embedded link to the corresponding reminder data file, which permits the user to access the reminder data file. Thus, a user who is unable to recognize a payment transaction on the transaction statement, can use the statement to access the corresponding reminder items, to provide the user with a reminder of the details of the transaction.

Validating transactions between entities using LoRaWAN protocol

Transactions between entities may be validated using LoRaWAN communications to more quickly process those transactions. In the example of check depositing, a first entity associated with a check payee may transmit a check clearance request to a second entity associated with a check payor using LoRaWAN communications. The LoRaWAN signaling and communications may be performed between devices within LoRaWAN range. For example, a check depositing device may receive a check deposit where the payor is associated with a different financial institution or entity. Accordingly, the check depositing device may communicate with another device associated with the payor institution or entity using LoRaWAN signals to confirm check clearance.

ACTIONABLE INSIGHTS FOR RESOURCE TRANSFERS

Disclosed are systems and methods that automate management and monitoring of remote resource utilization activity. The systems process incoming transfer instructions, data relating to prior resource transfers, and data relating to end user attributes and activities to generate notifications concerning relevant current transfer activity, expected future transfers, and modifications to optimize ongoing resource utilization and transfer activity. The systems allow resource utilization to be managed effectively, efficiently, and in a secure fashion using encryption and individual computing device authentication techniques.

Purchase management system and method
12026767 · 2024-07-02 · ·

A purchase management system 100 comprises a central database arrangement 110 and a purchasing authorization database module 130, arranged to communicate with a transaction authorization module 405. The central database arrangement 110: receives, from a purchasing entity 200, purchasing rules applying to a purchasing group 250; adds a selected purchasing group 250 as metadata linked to a first transaction ID; adds the purchasing rules applying to said purchasing group 250; and transfers the metadata to the purchasing authorization database module 130. The purchasing authorization database module 130 receives a purchase approval request from the transaction authorization module 405; decides on the purchase approval request based on whether the requested purchase fulfils the purchasing rules; responds to the transaction authorization module 405 with approval or rejection of the purchase approval request; and transfers the transaction information to the central database arrangement 110. The central database arrangement 110 transfers the transaction information to the purchasing entity 200, thereby allowing the information about the purchase to be automatically entered into administrative systems of the purchasing entity 200.

Systems and methods for an authorized identification system

An example method includes receiving an encrypted biometric enrollment data and user identifier data. The encrypted biometric enrollment data includes at least one biometric enrollment sample from a user encrypted using an encryption key. The encryption key is generated based on a user secret and the user identifier is associated with the user. The user identifier is matched with a stored user secret. A decryption key is generated based on the stored user secret. The encrypted biometric enrollment data is decrypted using the decryption key. The at least one biometric enrollment sample is retrieved from the decrypted biometric enrollment data. The at least one biometric enrollment sample is processed using a biometric processing algorithm to generate a biometric reference template. A biometric reference template identifier uniquely identifying the biometric reference template is generated. An encryption key is generated based on the stored user secret and encrypts an enrollment confirmation message.

System and method for wireless payment

The present invention provides a method and system which facilitates easy and smooth detection of available one or more Point-of-sale (POS) terminals automatically at a merchant's site when a user desires to use a user device in order to pay for services/goods availed by the user device. The present invention provides a scalable, easy to use, seamless, and an efficient method to detect the POS terminals over a Wi-Fi network available to the user equipment. Information corresponding to the detected and available POS terminals are presented on the user device so that the user may easily select an appropriate POS terminal and may initiate the further payment process. The one or more available POS terminals are detected by the user device with the help of a first server device and a second server device.