G06Q20/4097

SECURE MODAL BASED DIGITAL INSTALLMENTS

Examples described herein include systems, methods, instructions, and other implementations for data security with integrated installment payment systems. In one example, account security system receives a checkout communication that includes data describing a validated checkout system of a merchant system. A client token is transmitted in response to an authentication that the checkout communication is from the validated checkout system, and an account communication including the client token and secure client information is received from a client device. An installment payment communication associated with the secure transaction is received from a system other than a merchant system involved in the transaction. The secure transaction is then facilitated following receipt of the installment payment communication.

SYSTEM AND METHOD FOR MERCHANT AND PERSONAL TRANSACTIONS USING MOBILE IDENTIFICATION CREDENTIAL

In an example involving a transaction conducted between a first party using a user mobile-identification-credential device (UMD) and a second party using a relying party system (RPS), RPS receives a request from UMD for transfer of an item, requests identification information of the first party from UMD, receives, based on consent of the first party, some or all user ID information associated with a mobile identification credential (MIC) which UMD received from an authorizing party system (APS), receives verification of the received user ID information, uses the verified user ID information to verify or not verify an identity of the first party, grants the request to transfer the item in exchange for payment or another item to be transferred from the first party to the second party when the identity of the first party is verified, and denies the request when the identity of the first party is not verified.

SYSTEM, METHOD, AND DEVICE FOR DETECTING THAT A USER IS INTOXICATED WHEN PROCESSING PAYMENT CARD TRANSACTIONS

A method and a system are provided for processing payment card transactions in conjunction with a user device configured to detect intoxicated use. The user device includes a behavior detection application which can detect whether a user is intoxicated using the device's motion sensing hardware, user endpoint data, and application level data. When the user attempts a transaction while intoxicated, the user's device can detect that the user is impaired or sober. If impaired, the payment card system can deny the transaction. If sober, the payment card system can offer incentives for certain transactions. The payment card system can also allow sponsoring entities to pay for transactions that incentivize better behavior when a user is intoxicated or support transactions for sober users.

TRANSFER VIA TRANSACTION APP

Systems and methods may generally include sending an executable application, which when executed, automatically causes a monetary transfer. An example method may include performing, at a first user device, a handshake with a second user device, receiving, during the handshake, an operating capability of the second user device, and configuring, based on the operating capability of the second user device, an executable application, which when executed, automatically causes a monetary transfer to occur. The configured executable application may be sent to the second user device for execution.

Method and system of billing for charging a vehicle battery leveraging a single connection action
11151552 · 2021-10-19 ·

A method and system provided for a single-action with which the customer places an order and receives goods by the single action of connecting an electrical vehicle (EV) to a charging station according to the business terms associated with this invention, the affiliated organizations that purchase or support the operation of the invention participate in a business “franchise” operation whereby all affiliated organizations increase their revenues as the volume of EV charging events increases.

Computer-based system for provisioning new accounts using location-based authentication

A method comprises receiving, by a computing device from a customer device, a request to provision a financial account for the customer, associating, by the computing device, a mobile device with the requested financial account, and sending, by the computing device to the mobile device, authentication information for the requested financial account. The method further includes receiving the authentication information by the computing device from a financial terminal that received the authentication information from the mobile device, receiving, by the computing device, first location information of the mobile device, and provisioning, by the computing device and based on the first location information of the mobile device being within a predetermined distance of a location of the financial terminal, the requested financial account for the customer.

SYSTEMS AND METHODS FOR PROCESSING OFF-NETWORK TRANSACTION MESSAGES

A method for applying services hosted on a second interchange network to a transaction initiated over a first interchange network includes transmitting, by a first processor associated with the second interchange network to a requestor computing device, data element layouts usable to map service requests associated with payment transactions received over the first interchange network into the second message format, and for service responses generated by a services platform hosted on the second interchange network. The method also includes receiving a service request from the requestor computing device including request data associated with a transaction initiated on the first interchange network, generating, by the services platform, response data by applying at least one registered service to the service request, and transmitting a services response including the response data, wherein the previously transmitted second data element layout enables the requestor computing device to extract the response data from the services response.

COMPUTER-BASED SYSTEMS CONFIGURED FOR MANAGING AUTHENTICATION CHALLENGE QUESTIONS IN A DATABASE AND METHODS OF USE THEREOF
20210312035 · 2021-10-07 ·

A method executed by a processor may include storing account activity data in a database which identifies prior account activities performed by customers in their respective accounts associated with a financial institution. The database may be accessible only by computing systems of the financial institution. A set of challenge questions may be received for authenticating customers to perform high-risk activities in their respective accounts that are based on prior account activities. A machine learning model may be used to determine an authentication score used for ranking each challenge question in the set of challenge questions. An electronic request may be received from an unverified customer who desires to perform high-risk activities in an account. Challenge questions may be selected based on the ranking. The unverified customer may be verified when correctly answering the selected challenge questions. The verified customer may be allowed to perform high-risk activities in the account.

SELF-SERVICE MODULAR DROP SAFES WITH MESSENGER ACCESS CAPABILITY

Novel modular smart management devices in the form of drop safes include the modular components of a chassis, door and technology cabinet. The drop safes enable retailers to make cash deposits quickly and safely within or near their own facilities. Various technology, including RFID readers, RFID tags, and other equipment allow the drop safes to identify each deposited bag. Employees utilize specialized apps on their mobile devices to facilitate deposit creation and other tasks. Novel methodologies for accessing the drop safes for emptying employ single-use, time-expiration type authorization codes along with other security measures to minimize risk and to provide other benefits. Novel structures along with methodologies for replacing, on-site, modular components with auto-detection of functionality during initialization and re-initialization enables for efficient replacement and upgrading of components, including the upgrading of safes to provide additional functionality.

System for value loading onto in-vehicle device
11182771 · 2021-11-23 · ·

Various embodiments are directed to using a near-filed communication (NFC) contactless card to perform one or more transactions within a vehicle. For example, a user may load value (money, funds, digital currency, etc.) onto an in-vehicle device (transponder, badge, card, etc.) by performing one-tap authentication or one-tap payment, or both, via the contactless card. Thus, even under time-constrained circumstances, payment may be loaded to the in-vehicle device in a quick, efficient, and safe manner.