G06Q20/4097

Systems and methods for facilitating network transactions based on user authentication
10915904 · 2021-02-09 · ·

Systems and methods are provided for facilitating payment account transactions in virtual settings. One exemplary method includes prompting, by a computing device, a selection of a product for purchase from a user in a virtual reality setting where the virtual reality setting is provided by the computing device. The method further includes transmitting an authentication request to a directory server for a purchase transaction for the product. In response, the computing device receives an authentication response for the purchase transaction from the directory server. When the authentication response includes an authentication value, the computing device compiles and transmits an authorization request for the purchase transaction for the selected product, where the authorization request includes the authentication value. When the authentication response includes an indication that a challenge is required, the computing device instead causes a device associated with the user to carry out the challenge in the virtual reality setting.

COMPUTER-BASED SYSTEMS CONFIGURED FOR MANAGING AUTHENTICATION CHALLENGE QUESTIONS IN A DATABASE AND METHODS OF USE THEREOF
20210073371 · 2021-03-11 ·

A method executed by a processor may include storing account activity data in a database which identifies prior account activities performed by customers in their respective accounts associated with a financial institution. The database may be accessible only by computing systems of the financial institution. A set of challenge questions may be received for authenticating customers to perform high-risk activities in their respective accounts that are based on prior account activities. A machine learning model may be used to determine an authentication score used for ranking each challenge question in the set of challenge questions. An electronic request may be received from an unverified customer who desires to perform high-risk activities in an account. Challenge questions may be selected based on the ranking. The unverified customer may be verified when correctly answering the selected challenge questions. The verified customer may be allowed to perform high-risk activities in the account.

PAIRING MERCHANT POINT OF SALE WITH PAYMENT READER TERMINAL VIA SERVER APPLICATION PROGRAMMING INTERFACE

A merchant uses a merchant point of sale (POS) device to identify items or services for purchase by a customer, and costs for each. One or more payment amounts are sent from the merchant POS device to a checkout server using an application programming interface (API), which the checkout server sends on to an authorized payment terminal device that then reads payment information from a payment object and sends the payment information back to the checkout server. The checkout server processes the transaction and confirms transaction completion to the merchant POS device and payment terminal device.

SELF-SERVICE MODULAR DROP SAFES

Novel modular smart management devices in the form of drop safes include the modular components of a chassis, door and technology cabinet. The drop safes enable retailers to make cash deposits quickly and safely within or near their own facilities. Various technology, including RFID readers, RFID tags, and other equipment allow the drop safes to identify each deposited bag. Employees utilize specialized apps on their mobile devices to facilitate deposit creation and other tasks. Novel methodologies for accessing the drop safes for emptying employ single-use, time-expiration type authorization codes along with other security measures to minimize risk and to provide other benefits. Novel structures along with methodologies for replacing, on-site, modular components with auto-detection of functionality during initialization and re-initialization enables for efficient replacement and upgrading of components, including the upgrading of safes to provide additional functionality.

SYSTEM AND APPLICATION SERVER FOR SECURE GUEST CHECKOUT

A system for initiating secure guest checkout includes an application server; and an untrusted user interaction device that is in communication with the application server. The untrusted user interaction device has a unique device identifier that is registered with the application server. The untrusted user interaction device is configured to: receive input data relating to a selection of one or more items; transmit, to the application server, the selection of one or more items and the unique device identifier, for creation of a cart at the application server; communicate a pairing code received from the application server, the pairing code being associated with the cart; and wirelessly broadcast identifier data including, and/or derived from, the unique device identifier; such that a computing device that receives the identifier data and the pairing code can verify the unique device identifier and retrieve the cart from the application server for initiation of a secure remote commerce (SRC) checkout process at an SRC initiator.

Electronic device for controlling specified functions based on electromagnetic signal detection and method thereof
10911100 · 2021-02-02 · ·

An electronic device is provided. The electronic device includes a first sensor configured to obtain an electromagnetic (EM) signal from an external device, a first communication module configured to provide a magnetic stripe transmission (MST) signal, a processor, and a memory coupled with the processor, wherein the memory is configured to store instructions which, upon execution, instruct the processor to control the first communication module to transmit, to the external device, the MST signal which is predetermined corresponding to the external device based on the obtained EM signal.

TOKENIZATION OF CONTACTLESS CARDS

The disclosure describes systems and methods for tokenizing a contactless payment card. A token requesting device receives contactless card data associated with the contactless payment card and transmits a token request message to a token service system. The token service system generates a contactless token for the contactless payment card. The contactless token is associated with the contactless card data, for example, in a token vault. The token requesting device establishes a wireless communication connection with the contactless payment card. The contactless token is then written to a token data portion of the contactless payment card memory device and a pointer stored in the token data portion of the contactless payment card memory device is updated to point to the contactless token.

SYSTEM AND METHOD FOR GENERATION OF VIRTUAL ACCOUNT-LINKED CARD
20210027277 · 2021-01-28 ·

Embodiments of systems and methods for generating virtual account-linked cards are described. A virtual account-linked card may be generated in response to a determination that a physical account-linked card has been forgotten at a card reader and ingested by the card reader. A virtual account-linked card may be restricted such that it can only be used to execute a transaction with authorized transaction partners identified in a database.

SYSTEM FOR VALUE LOADING ONTO IN-VEHICLE DEVICE
20210019731 · 2021-01-21 · ·

Various embodiments are directed to using a near-filed communication (NFC) contactless card to perform one or more transactions within a vehicle. For example, a user may load value (money, funds, digital currency, etc.) onto an in-vehicle device (transponder, badge, card, etc.) by performing one-tap authentication or one-tap payment, or both, via the contactless card. Thus, even under time-constrained circumstances, payment may be loaded to the in-vehicle device in a quick, efficient, and safe manner.

Systems and methods for identity verification
10891626 · 2021-01-12 · ·

Systems and methods are disclosed for identity authentication using credit card information supplied by a subject with independently determined address information. According to an example implementation, a method is provided that can include receiving, from a client, personally identifying information (PII) related to a subject, where the PII includes at least a subject-supplied name and subject-supplied credit card information. The method can include querying one or more public or private databases with the PII, and receiving, in response to the querying, independent occupancy address information related to the subject. The method can include requesting credit card verification from an authorizing entity, where the requesting includes sending the subject-supplied credit card information and the independent occupancy address information to the authorizing entity. The method can include generating a pass/fail indication responsive to verification information received from the authorizing entity, and sending the pass/fail indication to the client.