G06Q20/4093

User registration based on unsupervised learning classification
12475445 · 2025-11-18 · ·

Aspects described herein may relate to methods, systems, and apparatuses for applying machine learning techniques as part of registering, for a user, a payment card with at least one account of a merchant. The machine learning technique may be an unsupervised learning classifier that is configured to determine classifications of merchant groups and/or user groups. Based on a classification, the user may be able to select which merchants to register the payment card. Based on the selection, the payment card may be registered with the user's account at the selected merchants. Further, the registration may be performed based on virtual payment card information configured for use with the merchant. The virtual payment card information may be configured to initiate transactions only with the merchant.

Repurposing a transaction authorization channel to provide fraud notifications

A method for sending a notification indicating fraud using a transaction authorization channel is described. Upon performing a fraud analysis on a first transaction previously authorized by an issuer of an account via the transaction authorization channel, a determination that the first transaction has indications of fraud is performed. In response to determining that the first transaction has indications of fraud, a transaction authorization request message for a second transaction is generated to include a billing descriptor field with data representing a notification of fraud on the account. The transaction authorization request message for the second transaction is sent, via the transaction authorization channel, to an electronic device associated with the issuer of the account so that it will modify the account to include a transaction entry for the second transaction that will be recognized as a fraud notification when an account holder of the account views pending transactions.

Systems and methods for resetting an authentication counter

Systems and methods for counter resynchronization can include one or more servers each including a memory and one or more processors. The one or more servers can be in data communication with a transmitting device. The one or more processors can be configured to determine one or more reset events. The one or more processors can be configured to generate a resync value. The one or more processors can be configured to transmit, via one or more scripts, the resync value to the transmitting device according to one or more prioritization factors and in response to the one or more reset events. The one or more processors can be configured to replace the counter value with the resync value in accordance with the one or more prioritization factors.

Using location-based mapping to enable automated information transfer at a user location

In some implementations, an automated information transfer system may receive an indication of a location of the user device. The automated information transfer system may identify an interacting entity associated with the automated information transfer that is associated with a physical location that is within a threshold proximity of the location of the user device. The automated information transfer system may receive item-specific data associated with the automated information transfer. The automated information transfer system may identify one or more interaction terminals at the physical location associated with the interacting entity. The automated information transfer system may receive authorization information associated with the automated information transfer. The automated information transfer system may perform an action based on whether the authorization information indicates that the automated information transfer is at least one of authorized, conditionally authorized, not authorized, or conditionally not authorized.

Systems and methods for artificial intelligence controlled prioritization of transactions

Systems and methods for artificial intelligence transaction priority control are presented. Transaction priority control may be provided in the context of online user accounts maintained by financial institutions. Transaction priority control may be obtained through querying transaction information from a database, applying a predictive model to determine a likely future transaction, assigning a priority score to the future transaction, and approving or denying the future transaction based on the priority score.

Integrated global tokenization system

An integrated selling system platform includes a point-of-sale application and middleware to perform global tokenization orchestration, that in combination, provide credit card reading device agnostic global token and provisioning operations. The middleware includes communication interfaces, each of which corresponds to a particular communication protocol. The middleware receives a token create request from the point of sale application and directly communicates, via one of the communication protocols, to a point-of-interaction payment device, to receive and securely encrypt the credit card number, then transmit that information to a hosted network token provisioning system to request a network token. Upon receiving the network token, the middleware communicates directly, via one or more protocols, to a global merchant tokenization host, to create a merchant specific token, to be returned by the middleware back to the point-of-sale client to use as a card-on-file payment method.

Transaction cards and computer-based systems that provide fraud detection at POS devices based on analysis of feature sets and methods of use thereof

Transaction cards, systems and methods for performing fraud detection at POS devices based on analysis of feature sets are disclosed. In one embodiment, an exemplary transaction card may comprise one or more sensors configured to collect pre-card-use sensor data regarding a user of the card, circuitry that assembles such data into feature sets and performs fraud detection, and data storage. According to some aspects, the fraud detection may include comparing user specific sensor data, collected for a current transaction, to a user-specific risk profile validation model to determine a risk score for the current transaction, and transmitting the risk score to a card transacting device when a card is presented during a transaction. In some implementations, the risk score may enable the card transacting device to evaluate a risk associated with accepting the transaction card to complete the attempted transaction.

Configuration-based real-time notifications in transaction systems
12561680 · 2026-02-24 · ·

A system that can, using reduced memory resources, receive by a transaction channel monitoring layer, an alert issued by a server application of a server associated with a transaction channel of a transaction system regarding a problem associated with the transaction channel, and subsequently retrieve, by a real-time notification layer, the alert received by the transaction channel monitoring layer. The system can use information contained in the alert, such as for example, an identification of the transaction channel associated with the alert, an alert type, and an alert severity, to automatically determine a form of a notification to be generated, the content of the notification, and at least one recipient of the notification. The system can then automatically generate the notification, and automatically transmit the notification in real-time to the at least one recipient of the notification.

Programmatic approvals of corporate spend and employee expense
12555119 · 2026-02-17 · ·

A method of approving expenditures in real-time, comprising receiving an expenditure request initiated by a user associated with an organization for transferring funds of the organization in exchange for one or more products and/or services, identifying request attribute(s) relating to the user, the value, the funds, the product, the service, a time of reception of the expenditure request and/or a geographical location of the user, analyzing scheduling data obtained from one or more online data sources which is indicative of one or more activity attributes of activity(s) scheduled for the user, automatically determining compliance between the request attribute(s) and one or more expenditure rules predefined for the product(s) and/or service(s) with respect to the activity attribute(s) and transmitting a response to the expenditure request according to the determination which includes approval of the expenditure request in case of compliance and rejection in case of incompliance.

Iot devices

A method of operating an Internet of Things (IoT) device, the IoT device capable of communicating with a third-party system in order to perform an autonomous task subject to authorisation by an IoT authorisation device, the method comprising: sending operating parameters relating to the autonomous task to a user for approval; receiving user-approved operating parameters for the autonomous task; configuring the IoT device to perform the autonomous task within the user approved operating parameters; registering the user approved operating parameters with the IoT device management server to enable the IoT authorisation device to check that the IoT device is operating within the user-approved operating parameters when it performs an autonomous task with the third-party system.