G06Q20/4093

Secure electronic entity integrating life span management of an object
10134217 · 2018-11-20 · ·

A secure electronic entity, adapted to store at least one object, includes a unit for measuring the passage of time as from a reference date associated with the object. It includes a unit for storing a life span assigned to the object co-operating with the time measuring unit so as to compare the time elapsed and the life span. It further includes an updating and invalidating unit, to update the object life span or to temporarily or permanently disable the object if the comparison shows that the time elapsed exceeds the life span. The invention is in particular applicable to smart cards.

DATA INTERACTION METHOD AND DEVICE, AND OFFLINE CREDIT PAYMENT METHOD AND DEVICE
20180330354 · 2018-11-15 · ·

Implementations of the present application provide data interaction and offline credit payment methods and devices. In one implementation, a credit payment code generated by a server is obtained by scanning and parsing a two-dimensional code presented on a mobile computing device for making a payment. The credit payment code is then decrypted based on asymmetric key decryption to obtain a credit payment token. The credit payment token is parsed to obtain security content included in the credit payment token. The payment associated with the credit payment code is then determined to satisfy the security content and the payment is verified with the server that generates the credit payment code at a predetermined time.

Dynamic offline card authorization

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating rules to apply to fare transactions when a fare card reader cannot communicate with an authorization server, for generating historical data and a risk score for a fare card that are used by a fare card reader, with the rules, to determine whether to authorize access to a transit service when the fare card reader cannot communicate with the authorization server, and for selectively permitting or denying access to the transit service using the rules and the historical data or the score for a fare card.

FINGERPRINT SCANNER SECURITY DEVICE

Methods, systems and computer program products for identifying stolen payment cards using a fingerprint scanner are provided. Aspects include receiving, by a transaction processing terminal, a payment card and scanning, by the fingerprint scanner, a surface of the payment card and capturing fingerprints disposed on the surface of the payment card. Aspects also include comparing, by a processor, the captured fingerprints to one or more authorized fingerprints associated with the payment card. Based on detecting that the captured fingerprints are different than the one or more authorized fingerprints, aspects further include determining whether the payment card has been reported stolen. Based on a determination that the payment card has been reported stolen, aspects include creating and transmitting an alert of an attempted use of the payment card.

FINGERPRINT SCANNER SECURITY DEVICE

Methods, systems and computer program products for identifying stolen payment cards using a fingerprint scanner are provided. Aspects include receiving, by a transaction processing terminal, a payment card and scanning, by the fingerprint scanner, a surface of the payment card and capturing fingerprints disposed on the surface of the payment card. Aspects also include comparing, by a processor, the captured fingerprints to one or more authorized fingerprints associated with the payment card. Based on detecting that the captured fingerprints are different than the one or more authorized fingerprints, aspects further include determining whether the payment card has been reported stolen. Based on a determination that the payment card has been reported stolen, aspects include creating and transmitting an alert of an attempted use of the payment card.

MULTI FACTOR AUTHENTICATION RULE-BASED INTELLIGENT BANK CARDS

System, method, and computer program product to implement four factor authentication rule-based intelligent bank cards, by receiving valid authentication information for a card associated with an account, capturing an image of a person presenting the card, applying an algorithm to the image to determine that the image capture was successful, and the image can be used by a facial recognition algorithm, verifying that the image matches an image of an authorized user of the account, analyzing image data of the image with a facial emotion recognition algorithm to detect an emotion expressed by the person in the image, identifying an emotion rule associated with the account and the emotion, providing, by the processor, an alert to a person associated with the account, wherein the alert is specified as part of the emotion rule, and restricting access to the account.

Rendering transaction data to identify fraud detection rule strength

Techniques of identifying fraud detection rule strength involve varying the rendering of a graph from transaction data. Along these lines, a rules server computer provides a general graph from a group of transaction entries defining a group of fraudulent and authentic transactions on an electronic display. A user defines selection criteria that the rules server computer applies to the group of transaction entries to generate a subgroup of transaction entries. From the subgroup of transaction entries, the rules server computer provides a focused graph on the electronic display from the subgroup of transaction entries defining a subgroup of the group of fraudulent and authentic transactions. A ratio of the number of fraudulent transactions to the number of authentic transactions represented in the focused graph identifies the strength of the selection criteria for use in a fraud detection rule.

APP CARD-LINKED REPRESENTATIVE CARD, AND PAYMENT SYSTEM AND PAYMENT METHOD THEREOF

The present invention relates to a representative card linked with app cards, a payment system and a method thereof. The payment system comprises: a customer terminal which is connected to a card company server system through an app or web and is capable of replacing a main payment card with one selected among at least one or more app cards registered in the app or web in real time; a standard representative card which can be used online or offline as the representative of the app cards; an authorization network in which an authorization or purchase request is made based on the representative card; and a card company server system which performs an authorization or purchase process based on the main payment card of the registered app cards linked with the representative card.

TRACKING SYSTEM

A tracking system, the system including one or more electronic processors, in communication with non-transitory computer readable data storage, which are configured to track a first device by receiving, from a second device, first message data representing a notification that the first device is missing; retrieving, from the data storage, account information associated with the first device; sending, to a payment processing system, second message data representing a tracking request; receiving, from the payment processing system, information associated with a location of the first device; determining, at a tracking server, location of the first device; and sending, to the second device, third message data representing location of the first device to the second device.

COGNITIVE CONTROLLED CREDIT CARD AUTHORIZATION
20180276670 · 2018-09-27 ·

Embodiments include method, systems and computer program products for credit card authorization. Aspects include receiving, by a processor, credit card information for a consumer. A consumer profile is received that includes one or more spending categories. Each of the one or more spending categories is associated with one or more spending restrictions. A request to authorize a charge for the credit card is received and a spending category for the charge is determined. The charge is authorized based on a determination that the charge does not violate any of the one or more spending restrictions associated with the spending category for the charge.