G06Q20/4097

CONTACTLESS CARD EMULATION SYSTEM AND METHOD
20210344495 · 2021-11-04 · ·

A system and method are described that enables mobile devices (e.g. including but not limited to a mobile phone or the like), to intercept and respond to contactless card authentication requests, allowing mobile devices to be used in place of contactless cards. Enabling mobile phone devices to emulate contactless cards decreases issues related to lost or damaged cards, enabling a single device to be used to provide tokens related to multiple different contactless cards, and leverages functionality of the mobile device to provide dual-factor authentication.

SYSTEMS AND METHODS FOR USING INFORMATION FROM WEARABLE DEVICES
20210342811 · 2021-11-04 ·

Systems and methods for the of use information from application programming interfaces on wearable devices in third party applications are provided. A system comprising a user device, data storage, an application programming interface and an application is provided. In this system, there is a user device that includes a health monitor. The health monitor includes sensors and associated software that enable it to obtain health information about the wearer of the user device. In this system, there is data storage on the user device that stores the health information as user health data. In this system, there is an application programming interface on the user device that enables the health monitor to share the user health data with other applications executing on the user device.

Self-service modular drop safes

Novel modular smart management devices in the form of drop safes include the modular components of a chassis, door and technology cabinet. The drop safes enable retailers to make cash deposits quickly and safely within or near their own facilities. Various technology, including RFID readers, RFID tags, and other equipment allow the drop safes to identify each deposited bag. Employees utilize specialized apps on their mobile devices to facilitate deposit creation and other tasks. Novel methodologies for accessing the drop safes for emptying employ single-use, time-expiration type authorization codes along with other security measures to minimize risk and to provide other benefits. Novel structures along with methodologies for replacing, on-site, modular components with auto-detection of functionality during initialization and re-initialization enables for efficient replacement and upgrading of components, including the upgrading of safes to provide additional functionality.

URL-based authentication for payment cards
11777933 · 2023-10-03 · ·

Systems, methods, articles of manufacture for authentication of payment cards. A server may assign, in a database, an expected card identifier to a contactless card, the contactless card associated with an account. The server may receive, from a client device, a request comprising a uniform resource locator (URL), a parameter of the URL comprising a card identifier, wherein the URL is transmitted by the contactless card to the client device. The server may extract the card identifier from the URL and compare the extracted card identifier to the expected card identifier in the database. The server may determine, based on the comparison, that the extracted card identifier matches the expected card identifier. The server may authenticate the request based on the extracted card identifier matching the expected card identifier, and transmit, to the client device, an indication specifying that the request was authenticated.

User authentication based on account transaction information in text field

Methods, systems, and apparatuses are described herein for authenticating access to an account using questions which allow users to provide textual information about transactions conducted by an account. A machine learning model may be trained to predict the guessability of merchants. A request for access to an account may be received, and transaction data for that account may be received. An authentication question may be presented. For example, a user may be prompted to list places they have shopped recently. A user response comprising text data may be received. The text data may be processed to identify one or more merchants. If the one or more merchant(s) are represented in the transaction data, the machine learning model may be used to determine the guessability of the one or more merchants. An authentication score may be determined based on the guessability, and access to the account may be provided.

Message delay estimation system and method

A clearing delay estimate may be employed that provides issuers with an accurate estimate for when a transaction will be cleared, thus providing more transparency to issuers to more efficiently manage funds. An algorithm may be employed to estimate clearance timing information and insert the timing information into communications with the issuer or other parties to a transaction involving a payment device. The estimated clearance timing information may be determined based on machine learning and other artificial intelligence techniques using historical data related to clearance timing for the particular entities involved in each transaction.

Network appliance with secure element

Described herein is a network apparatus with secure element and related systems, methods, and apparatuses. A described method includes receiving a request to perform a transaction. The method also includes obtaining confirmation that a network address associated with the request corresponds to a registered physical address. The method further includes obtaining account data and conducting a transaction using the account data.

METHOD AND APPARATUS FOR MIGRATING PAYMENT CARD, ELECTRONIC DEVICE, SERVER AND MEDIUM

The present application discloses a method and an apparatus for migrating payment card, an electronic device, a server and a medium. The method for migrating payment card includes: receiving payment card migration operation after an account is logged in on the first electronic device; displaying, in response to payment card migration operation, at least one device identifier which is an identifier of a target electronic device on which the account had been logged in; receiving a first selecting operation for a target device identifier of the at least one device identifier; and sending, in response to the first selecting operation, the target device identifier to a server, to cause the server to migrate a payment card bound to a second electronic device to the first electronic device, wherein the second electronic device is an electronic device corresponding to the target device identifier of at least one target electronic device.

CODE GENERATION AND TRACKING FOR AUTOMATIC DATA SYNCHRONIZATION IN A DATA MANAGEMENT SYSTEM
20220405720 · 2022-12-22 ·

There are provided systems and methods for code generation and tracking for automatic data synchronization in a data management system. A user associated with an entity, such as an employee of an organization, may purchase an item utilizing a payment instrument or card provided by the organization. In order to provide proper expense allocation, the organization may require receipt matching and storage per use of the payment instrument. An expense management system may provide digital code generation and output on a corresponding physical or digital receipt so that when the receipt is provided to the expense management system, the codes may be matched to backend data stored by the system. The receipts may be processed by extracting text data from an image of a receipt to determine the codes. The codes may then be used to search a database of codes to match to digital transaction data.

SYSTEM AND METHOD FOR GENERATION OF VIRTUAL ACCOUNT-LINKED CARD
20230360022 · 2023-11-09 ·

Embodiments of systems and methods for generating virtual account-linked cards are described. A virtual account-linked card may be generated in response to a determination that a physical account-linked card has been forgotten at a card reader and ingested by the card reader. A virtual account-linked card may be restricted such that it can only be used to execute a transaction with authorized transaction partners identified in a database.