Patent classifications
G06Q20/4093
METHOD AND SYSTEM FOR FACILITATING PAYMENT TRANSACTIONS
A method for facilitating payment transactions includes receiving a transaction request for a payment transaction initiated at a payment terminal device using a transaction card of a user. A predefined category of the user is identified based on the transaction request and a service application is remotely activated in a first operation mode on a user device of the user such that the first operation mode is associated with the identified predefined category. Payment transaction messages associated with the payment transaction are communicated to the activated service application, which translates the payment transaction messages to a predefined message format. In response to the payment transaction messages, first authentication information is received from the activated service application such that the first authentication information is entered by the user in the predefined message format. The payment transaction is processed based on successful authentication of the user.
Distributed Ledger Arrangement For Supporting Service Transactions In An Industrial System
A distributed ledger arrangement for supporting service transactions in an industrial system includes: a plurality of nodes of a network, each configured to maintain a distributed ledger copy; a plurality of machine-to-ledger interfaces, each configured to receive, from a device acting as service provider and/or service consumer in the industrial system, service condition inquiries and requests to record transactions; and one or more manager-to-ledger interfaces, each configured to receive, from a device owner authorized to specify service conditions with effect on the devices, requests to record service conditions.
Antifraud resilient transaction identifier datastructure apparatuses, methods and systems
The Antifraud Resilient Transaction Identifier Datastructure Apparatuses, Methods and Systems (“ARTID”) transforms PIN, unique user identifying device datastructure inputs via ARTID components into secure payment authorization outputs. The ARTID includes a virtual secure element datastructure transaction apparatus, comprising, a memory, a component collection in the memory, and a processor disposed in communication with the memory, and configured to issue a plurality of processing instructions from the component collection stored in the memory. ARTID includes instructions to: obtain request to generate a tamper resistant asset account from a requestor, and instantiate a new tamper resistant asset account, wherein the account is populated with the requestor identifier, unique requestor device identifier, a secure cryptographic element for the tamper resistant account. ARTID also includes instructions to provide a message to generate a new physical account card and an associated virtual account card associated with the tamper resistant asset account, and obtain a request to engage the virtual account card in a transaction, wherein the request includes the user access credential. ARTID also includes instructions to generate a card access event message from the request to engage the virtual account card, provide the card access event message to a payment network, and obtain a card access event authorization response.
Entity-based controls for value transfer cards
In an aspect, a computing system is configured to: send, to a transfer rail server, a request for stored card data associated with a value transfer card; receive stored card data identifying an entity having a stored representation of the value transfer card; provide user interface data to a client device, the user interface data causing the client device to display a user interface that includes an entity listing that is based on the stored card data, the user interface including a selectable option to add an entity-based control to the identified entity; receive, from the client device, an instruction to apply an entity-based control to an identified one of the entities in the stored card data; and in response to receiving the instruction to apply the entity-based control, implement the entity-based control to affect use of the value transfer card by the identified entity and not affect use of the value transfer card by other entities.
Dynamic point of sale (‘POS’) transaction processing for networked computing devices
Disclosed are various embodiments for improvements in customer relationship management and point of sale payment processing at remote event spaces. The system, apparatuses, and methods disclosed herein facilitate the transaction processing of credit cards and other payment vehicles in often remote locations where network connections may be intermittent and suffer from frequent disconnects or interruptions of service. The embodiments disclosed operate to detect network events, dynamically adjust to the event space, and processes the transactions on demand. The apparatuses are equipped to facilitate the event environment and are adapted to execute instructions to facilitate the financial transactions.
Transaction cards and computer-based systems that provide fraud detection at POS devices based on analysis of feature sets and methods of use thereof
Transaction cards, systems and methods for performing fraud detection at POS devices based on analysis of feature sets are disclosed. In one embodiment, an exemplary transaction card may comprise one or more sensors configured to collect pre-card-use sensor data regarding a user of the card, circuitry that assembles such data into feature sets and performs fraud detection, and data storage. According to some aspects, the fraud detection may include comparing user specific sensor data, collected for a current transaction, to a user-specific risk profile validation model to determine a risk score for the current transaction, and transmitting the risk score to a card transacting device when a card is presented during a transaction. In some implementations, the risk score may enable the card transacting device to evaluate a risk associated with accepting the transaction card to complete the attempted transaction.
Hierarchical blockchain architecture for global trade management
Described is a reactive hierarchical blockchain architecture, system, and methodology for Global Trade Management (GTM). The system includes a comprehensive suite of GTM applications and leverages multi-national content to deliver efficient cross-boarder transactions anywhere in the world. The tiered computer-implemented system and method allow development of distributed GTM blockchain solutions capable of processing enormous amounts of global content at scale to meet huge transaction volume. The hierarchical blockchain architecture further assures scalability of the GTM solutions described herein by reducing the need for performing extensive calculations on multiple blockchain nodes. The GTM blockchain systems can be standalone or they can feed information into on or more main International Trade (ITC) blockchains. Smart contracts for specific GTM operations are segregated among appropriate childchains and verified by integrated GTM applications executed on permissioned nodes. Various embodiments can store, analyze, and track GTM endorsements and events to help coordinate and maintain contractual obligations of service partners as well as monitor their performance.
REPURPOSING A TRANSACTION AUTHORIZATION CHANNEL TO PROVIDE FRAUD NOTIFICATIONS
A method for sending a notification indicating fraud using a transaction authorization channel is described. Upon performing a fraud analysis on a first transaction previously authorized by an issuer of an account via the transaction authorization channel, a determination that the first transaction has indications of fraud is performed. In response to determining that the first transaction has indications of fraud, a transaction authorization request message for a second transaction is generated to include a billing descriptor field with data representing a notification of fraud on the account. The transaction authorization request message for the second transaction is sent, via the transaction authorization channel, to an electronic device associated with the issuer of the account so that it will modify the account to include a transaction entry for the second transaction that will be recognized as a fraud notification when an account holder of the account views pending transactions.
Security tool
A processor receives global positioning system data from a mobile device of a user of an account. The processor further receives information from a vendor, indicating that a transaction using the account was attempted. The processor determines, based on historical transaction and location information, and current transaction information, a probability that the transaction is fraudulent. In response, the processor rejects the transaction, and deactivates a card and mobile wallet of the user. The processor also sends a notification to the mobile device requesting a voice confirmation. The processor receives the voice confirmation, splits it into a set of voice characteristic data and determines, based on voice characteristic data stored in memory, that the voice confirmation was generated by the user. In response, the processor reactivates the card and the mobile wallet and stores a set of information describing the transaction in memory.
Authorization control network and method of validating an authorization request
An authorization control network includes at least one computer server. The server(s) receives a cardholder credential and a profile modification request from a communications device, and determines an account attribute by querying a profile database with an account identifier. The server(s) rejects the modification request if the server determines from the account attribute that a limit profile associated with the account identifier is linked to a cardholder credential other than the received cardholder credential. The server(s) then receives from a POS device an authorization request that includes the account identifier and an authorization value. If the server(s) determines that the authorization value does not exceed a limit value saved in the limit profile and does not exceed a credit amount associated with the account identifier in a transactions database, the server(s) generates an authorization response confirming authorization of the authorization value, and transmits the authorization response to the POS device.