G06Q20/4093

Biometric transaction system
12073404 · 2024-08-27 · ·

Disclosed is a system for enrolling a user for control of entry to a venue, concert, festival, or event. The system includes a computer configured to execute an application program that, when executed, is configured to: receive a user attribute; create an anonymous client reference (ACR) associated with the user attribute; and receive a biometric template. The biometric template has been determined from an input of a biometric. The enrolling system is further configured to create an association between the biometric template and the ACR, such that on dependence on the bound ACR and biometric template, subsequent single-factor authentication is enabled to control entry to the venue, concert, festival, or event in dependence on the created association.

System, method, and computer program product for predicting a specified geographic area of a user

Provided is a system, method, and computer program product for predicting a specified geographic area of a user. The method includes receiving transaction data associated with a plurality of transactions during a predetermined time interval. The method also includes generating a geographic area prediction model based on the transaction data by determining a verified geographic area for each user, and determining transaction data associated with a plurality of transactions involving each user for a plurality of feature vector parameters, training the geographic area prediction model based on the plurality of feature vector parameters for the verified geographic area for each user, and validating the geographic area prediction model based on the plurality of feature vector parameters for the verified geographic area for each user.

USING A THIRD PARTY DYNAMIC QR CODE ON A PERSONAL MOBILE DEVICE TO COMPLETE A TRANSACTION AT AN ATM
20240273493 · 2024-08-15 · ·

Disclosed herein are system, method, and computer program product embodiments for using a third party dynamic QR code on a personal mobile device to complete a transaction at an ATM. The customer may stage a transaction using a mobile application on a mobile device. Upon the staged transaction being authenticated and approved, a machine-readable image may be transmitted to the mobile device. When the customer visits the ATM, the machine-readable image on the mobile device may be captured by the ATM and sent to an application server from the ATM. The application server may associate the ATM with the staged transaction that is staged using the mobile application, and send instructions to the ATM to dispense cash according to the staged transaction.

Repurposing a transaction authorization channel to provide fraud notifications

A method for sending a notification indicating fraud using a transaction authorization channel is described. Upon performing a fraud analysis on a first transaction previously authorized by an issuer of an account via the transaction authorization channel, a determination that the first transaction has indications of fraud is performed. In response to determining that the first transaction has indications of fraud, a transaction authorization request message for a second transaction is generated to include a billing descriptor field with data representing a notification of fraud on the account. The transaction authorization request message for the second transaction is sent, via the transaction authorization channel, to an electronic device associated with the issuer of the account so that it will modify the account to include a transaction entry for the second transaction that will be recognized as a fraud notification when an account holder of the account views pending transactions.

TRANSACTION CARDS AND COMPUTER-BASED SYSTEMS THAT PROVIDE FRAUD DETECTION AT POS DEVICES BASED ON ANALYSIS OF FEATURE SETS AND METHODS OF USE THEREOF
20240265400 · 2024-08-08 ·

Transaction cards, systems and methods for performing fraud detection at POS devices based on analysis of feature sets are disclosed. In one embodiment, an exemplary transaction card may comprise one or more sensors configured to collect pre-card-use sensor data regarding a user of the card, circuitry that assembles such data into feature sets and performs fraud detection, and data storage. According to some aspects, the fraud detection may include comparing user specific sensor data, collected for a current transaction, to a user-specific risk profile validation model to determine a risk score for the current transaction, and transmitting the risk score to a card transacting device when a card is presented during a transaction. In some implementations, the risk score may enable the card transacting device to evaluate a risk associated with accepting the transaction card to complete the attempted transaction.

Systems and methods for device and user authorization

Systems and methods are described for authorizing users and/or devices. An example method may comprise receiving, from a user device, a request to access a function associated with a service account. The request may comprise an identifier of the user device. The example method may comprise determining, based on the identifier, a primary authority holder of the service account. The example method may comprise determining that a first record on a first distributed ledger associated with the primary authority holder indicates that the user device is associated with the primary authority holder. The example method may comprise determining that a second record on a second distributed ledger associated with the user device indicates that the user device is associated with the primary authority holder. The example method may comprise granting, based on the request, the first record, and the second record, the user device access to the function.

Smart card systems and methods utilizing multiple ATR messages
10147091 · 2018-12-04 · ·

A system and method for facilitating communication between a smart card and a terminal, the method comprising receiving a first ATR message at a first time that is within a first predetermined clock cycles after a reset; waiting for a second ATR message indicative of a successful biometric authentication from the smart card; receiving the second ATR message at a second time that is within a second predetermined clock cycles after the first time; and exchanging transaction-related messages with the smart card.

SYSTEMS AND METHODS FOR PROCESSING OFF-NETWORK TRANSACTION MESSAGES

A computer-implemented method for applying enrichment services hosted on a second interchange network to a payment transaction initiated over a first interchange network is provided. A transfer process module hosted on the first interchange network receives a first service request from a requestor, formatted in accordance with a first set of proprietary communications standards associated with the first payment network, and transforms the first service request to a second service request formatted in accordance with a second set of proprietary communications standards associated with the second payment network. An enrichment services computer system hosted on the second interchange network receives the second service request and generates a first service response formatted in accordance with the first set of proprietary communications standards. The first service response is transformed at the transfer process module to create a second service response formatted in accordance with the second set of proprietary communications standards.

FOLDING CONTACTLESS CARD PAYMENT AUTHENTICATION

A folding mechanism is used to authenticate purchases when making transactions using a contactless smart card. By folding the contactless card in a precise manner, the electrical resistance of the antenna circuit of the contactless card is changed by bypassing the card's built-in resistors. A user may set a folding orientation as the password of the contactless card. This folding orientation determines the electrical resistance of the card necessary to authenticate a purchase.

FOLDING CONTACTLESS CARD PAYMENT AUTHENTICATION

A folding mechanism is used to authenticate purchases when making transactions using a contactless smart card. By folding the contactless card in a precise manner, the electrical resistance of the antenna circuit of the contactless card is changed by bypassing the card's built-in resistors. A user may set a folding orientation as the password of the contactless card. This folding orientation determines the electrical resistance of the card necessary to authenticate a purchase.