G06Q20/4097

Payment card benefit value estimator system and method with transaction-based individual cardholder relevance of selectable benefits

A payment card benefit assessment system and method includes a computing device accepting payment card benefit catalog information from a payment card issuer and payment card transaction data from a payment card processing network. The payment card transaction data is analyzed to group cardholders into one demographic clusters and to determine an estimated benefit value for each of the demographic clusters. Individualized payment card benefit options are presented to an individual cardholder based on the individual cardholder's payment card transactions and the determined estimated benefit value for a corresponding one of the plurality of demographic clusters.

Secure container mutual authentication

Systems and methods for mutual authentication of a user and a container administrator computer system. A container administrator computer system receives a request from a mobile computing device for a user to access a secure container. The request includes a user identifier. The administrator system receives a first authentication factor corresponding to the user. The administrator system authenticates the user by verifying that the first authentication factor matches a first reference authentication factor associated with the user identifier. The administrator system sends a second authentication factor associated with the administrator system to a human-machine interface associated with the secure container or the mobile computing device. The administrator system receives a notification of authentication of the administrator system using the authentication factor. The administrator system transmits an unlock signal to unlock the secure container.

Systems for Securing Transactions Based on Merchant Trust Score
20210374757 · 2021-12-02 ·

Systems for securing transactions based on merchant trust score are disclosed. The system may receive information identifying a merchant from a user device and, in response, retrieve transaction data associated with the merchant and receive website data in response to receiving information identifying the merchant. The system may use a machine learning model to generate a merchant trust score for the merchant, and determine whether the merchant trust score is less than a predetermined threshold. The system may also generate or retrieve an alternative payment method and provide related information or a recommendation to the user device.

COUNTLESS SYSTEM FOR PRE-STAGING AND EXECUTING TRANSACTIONS
20210374766 · 2021-12-02 ·

A system for staging and executing secure, service-based, transactions is provided. The transactions are staged by a mobile device associated with a system user. The system may include a receiver. The receiver receives a communication from the mobile device in order to stage a secure, service-based, transaction. The system may also include a near-field communication (NFC) device mounted in the CSC. The NFC device may communicate with the receiver. When the receiver receives the communication, the receiver sets the NFC device to a staged state. In the staged state, the NFC device performs an NFC handshake with the mobile device. Following the NFC handshake, the receiver receives a signal from the mobile device. The signal includes a biometric confirmation of the identity of the user and an identification of the mobile device. The biometric confirmation may be derived by the mobile device from a biometric parameter associated with the user. The handshake initiates completion of the transaction.

SYSTEM AND METHOD UTILIZING CHAIN OF TRUST

Embodiments of the invention are directed to systems and methods for authenticating a user device using an authenticating device that has previously been associated with a user and/or a credential. The user may initiate a transaction at the user device. An authenticating device associated with the transaction may be sent an authentication request corresponding to the user device. The user may indicate whether or not the user device is authenticated utilizing the authenticating device. If the user device is authenticated, the transaction may proceed. If the user device is not authenticated the transaction may be rejected.

Authentication challenges based on fraud initiation requests

Systems for issuing authentication challenges based on fraud initiation requests are provided. The system may calculate a fraud risk level based on a fraud initiating request comprising identity-based data. In response to the fraud risk level indicating a risk of fraud, the system may generate an authentication challenge based on an authentication challenge type and an authentication challenge delivery channel. The system may transmit the authentication challenge and receive back an authentication challenge response. The system may verify the authentication challenge response and generate an authentication outcome based on the verification.

Payment processing method and apparatus using an intermediary platform
11361284 · 2022-06-14 · ·

A payment processing method and apparatus for using an intermediary platform are described. In one embodiment, the method comprises electronically receiving approval from an intermediary platform associated with a payment processor user of a first authorization request for a first transaction; electronically receiving for approval, at the payment processing system, a second authorization request for a second transaction from a merchant using a payment instrument used by an agent of the service provider; and settling transactions associated with the service provider, including clearing a batch of records corresponding to the service provider on a predetermined time basis by comparing, with a tracking engine of the payment processing system, transaction tracking information associated with authorization requests to net out individual transactions.

SYSTEMS AND METHODS FOR PROVIDING CARD INTERACTIONS
20220180356 · 2022-06-09 ·

A method including receiving a first application user credential associated with a user profile; comparing, for a first match, the first application user credential with a stored second application user credential, wherein the stored second application user credential is associated with a user identity; and responsive to finding a first match, verifying the user identity by performing the following: communicating with a card using near field communication; receiving a public key of a key pair of the card and cardholder identification information of an account holder of the card; instructing the card to generate a digital signature; receiving the digital signature from the card; verifying the digital signature using the public key; and comparing, for a second match, at least a portion of the user identity with at least a portion of the cardholder identification information.

AUTHORIZING USES OF GOODS OR SERVICES USING BONDING AGREEMENT

Aspects described herein include a computer-implemented method (and related system and computer program product) comprising receiving, from a bonding service, an authorization request for a predefined authorized use of a good or service by a user. The authorization request indicates that the user meets one or more predefined criteria for the predefined authorized use. The method further comprises determining one or more penalty conditions of a bonding agreement for the predefined authorized use by the user, and receiving, from the bonding service, a confirmation that the user agrees to meet the one or more penalty conditions of the bonding agreement. The method further comprises receiving, from an owner of the good or service, an authorization of the authorization request, and transmitting, responsive to authorization of the authorization request, a token to the bonding service that enables the user to access the predefined authorized use of the good or service.

System and method for merchant and personal transactions using mobile identification credential

In an example involving a transaction conducted between a first party using a user mobile-identification-credential device (UMD) and a second party using a relying party system (RPS), RPS receives a request from UMD for transfer of an item, requests identification information of the first party from UMD, receives, based on consent of the first party, some or all user ID information associated with a mobile identification credential (MIC) which UMD received from an authorizing party system (APS), receives verification of the received user ID information, uses the verified user ID information to verify or not verify an identity of the first party, grants the request to transfer the item in exchange for payment or another item to be transferred from the first party to the second party when the identity of the first party is verified, and denies the request when the identity of the first party is not verified.