G06Q20/4093

Utilizing machine learning and a network of trust for crowd and traffic control and for mapping a geographical area

A device may receive application data associated with transaction applications of client devices and transaction card data associated with transaction cards. The device may receive geographical data identifying a geographical area associated with users of the client devices and the transaction cards. The device may determine, based on the application data, the transaction card data, and the geographical data, location data identifying geographical locations of the users in the geographical area. The device may determine, based on the location data, quantity data identifying quantities of the users located on multiple paths of the geographical area. The device may process the geographical data, the location data, and the quantity data, with a machine learning model, to identify a path with less than a threshold quantity of users in the geographical area. The device may perform one or more actions based on the path.

PAYMENT AUTHENTICATION SYSTEM FOR ELECTRONIC COMMERCE TRANSACTIONS
20240232868 · 2024-07-11 · ·

A payment managing system and method for enhancing the security of electronic user payment data can include employing a two factor authentication and keeping e-commerce host system outside the PCI scope. The two-factor authentication can include using a session ID and a one-time token (OTT). The session ID can identify a payment session that is initiated upon initiation of an e-commerce transaction. The payment managing system can provide a computing device initiating the transaction an iFrame to handle input user input data on an information resource. The OTT can be used to tokenize the user input data. The OTT can be included in payment authorization requests sent to the payment managing system. The payment managing system can obtain payment authorization without the user payment data being shared with e-commerce host systems.

Self-service payment card security system

A payment card security system includes a payment card provider account system communicatively coupled to a payment card transaction device and a mobile device. The payment card transaction device sends an indication that a payment card is being used to perform a transaction. The payment card provider account system includes processors that receive the indication that the payment card is being used to perform the transaction from the payment card transaction device. The processors also send a notification indicating that the payment card is being used to perform the transaction. The processors further enable authorization of the transaction via the mobile device. In this manner, the payment card security system may prevent or reduce the occurrence of suspicious transactions as they are occurring, rather than waiting until after they have occurred.

SYSTEMS AND METHODS FOR INTELLIGENT THREAT DETECTION AND PREVENTION IN POINT-OF-SALE TERMINALS
20240257134 · 2024-08-01 ·

Systems and methods for intelligent threat detection and prevention in point-of-sale terminals are disclosed. According to an embodiment, a method for intelligent threat detection and prevention in point-of-sale terminals may include: (1) receiving, by a backend computer program and from a threat collector agent executed on a point-of-sale terminal for a merchant, merchant behavioral activity involving a payment application executed by the point-of-sale terminal that was captured by the threat collector agent; (2) identifying, by the backend computer program, fraud or a threat from the merchant behavioral activity by providing the merchant behavioral activity to a trained merchant behavioral threat modeler; and (3) executing, by the backend computer program, a preventative action in response to the identified fraud or threat.

PURCHASE MANAGEMENT SYSTEM AND METHOD
20240257222 · 2024-08-01 · ·

A purchase management system includes a central database arrangement, a customer interface, and a bank specific database module that communicates with a transaction authorization module within a bank. The central database arrangement is arranged to receive, from a purchasing entity through the customer interface, purchasing rules applying to a purchasing group, and includes central processing means arranged to: add a selected purchasing group as metadata linked to a first transaction ID in the central database arrangement; add the purchasing rules applying to said purchasing group as metadata linked to the first transaction ID in the central database arrangement; and transfer metadata linked to the first transaction ID to the bank specific database module. The bank specific database module is arranged to receive a purchase approval request from the transaction authorization module, which purchase approval request comprises transaction information, including at least the purchase amount, linked to the first transaction ID.

System and method for selectively initiating biometric authentication for enhanced security of access control transactions
10229408 · 2019-03-12 · ·

A method and system of selectively initiating biometric security based on thresholds is described. The method includes retrieving an access security level associated with an access domain and an access permission level associated with an electronic portable transaction device, comparing the access security level and access permission level, and, if the access security level exceeds the access permission level, initiating a biometric authentication process.

PAYMENT CARD TRANSACTION AUTHORISATION SYSTEM AND PROCESS

Embodiments of the present invention can simplify the use of payment cards by capturing or generating an electronic image of a customer's payment card at the time of requesting a payment card transaction, and processing the electronic image to automatically determine required payment card information, including the payment card number, account name, and expiry date printed or otherwise represented on the payment card.

ALTERNATIVE SERVICE ACCESS
20190066078 · 2019-02-28 ·

Alternative service access with operations including determining that a system has met a plurality of criteria, including the system having a battery level below a threshold, identifying a merchant, generating an authentication token for authorizing a payment using a payment provider, and sending the authentication token to the payment provider.

System, Method, and Computer Program Product for Authorizing a Transaction

Provided is a computer-implemented method for remotely authorizing a transaction. The method includes receiving a transaction request including at least one user identifier, determining an authorizing user of a plurality of authorizing users based at least partially on the at least one user identifier, determining whether the authorizing user is online, communicating, to a user device associated with the at least one authorizing user, an authorization request message, wherein, if the authorizing user is online, the authorization request message includes a mobile device message configured to prompt the authorizing user to provide an approval of the transaction request, and wherein, if the authorizing user is offline, the authorization request message includes an automated telephone call configured to audibly prompt the authorizing user to provide an approval of the transaction request, and completing the transaction in response to receiving an approval of the transaction request from the authorizing user.

Folding contactless card payment authentication

A folding mechanism is used to authenticate purchases when making transactions using a contactless smart card. By folding the contactless card in a precise manner, the electrical resistance of the antenna circuit of the contactless card is changed by bypassing the card's built-in resistors. A user may set a folding orientation as the password of the contactless card. This folding orientation determines the electrical resistance of the card necessary to authenticate a purchase.