G06Q20/4097

Systems and methods for cryptographic authentication of contactless cards

Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.

Methods and systems for verifying cardholder authenticity when provisioning a token

A computer-implemented method for verifying cardholder authenticity when provisioning a token is provided. The method uses an authentication server system having a processor and a memory. The method includes receiving, by the processor, a payment card account identifier provided by a payment requestor. The payment card account identifier for identifying a payment account associated with a cardholder. The method also includes determining a plurality of authentication data associated with the payment requestor, and performing an authentication process using the plurality of authentication data. The authentication process is configured to determine if the payment requestor is the cardholder. The method further includes determining an assurance level associated with the authentication process. The assurance level represents a level of confidence in the authentication process. Moreover, the method includes generating a token for the payment account, and storing the token with the payment card account identifier and the assurance level.

USER DEVICE COMPRISING A CELLULAR PHONE CONFIGURED TO COMMUNICATE WITH A TERMINAL

Systems and methods for processing transactions using a digital payment platform.

STORED-VALUE CARD-TO-CARD DIRECT COMMUNICATION
20230043521 · 2023-02-09 ·

A method for performing a card-to-card direct contactless transaction between a first active stored-value smart card (“SVSC”) and a second active SVSC, each comprising an active near-field communication (“NFC”) reader. The method may include activating the first active SVSC by receiving input of a personal identification number (“PIN”) on a keypad located on the first active SVSC, verifying the PIN and further receiving input of a transaction amount on the keypad. The method may further include initiating a wireless NFC communication to perform the transaction by positioning the first active SVSC within a pre-determined distance to the second active SVSC and confirming accuracy of each of the first and second active SVSC using the active NFC reader to retrieve card ID data and confirm accuracy. Following confirming, the method may include directly completing the transaction between the first active SVSC and the second active SVSC.

METHOD FOR PROVISIONING MERCHANT-SPECIFIC PAYMENT APPARATUS

Various embodiments are directed to a method and system for provisioning a merchant-specific payment apparatus, such as a temporary payment card, via a computing device, such as an automated teller machine (ATM). A user, such as a customer, may specify a merchant. A record of known payment acceptance types at that merchant may be returned, which may be used to determine what type of temporary payment card gets issued to the user.

Hands-free transactions with voice recognition

Conducting hands-free transactions comprises a server at a payment processing system, a user computing device, and a merchant computing device. The payment processing system receives a communication from a hands-free payment application on a user device, the communication comprising a first transaction token, an identification of a user account, and a beacon identifier. The merchant may provide a challenge to the user and use the response to identify the token and account of the user. The merchant computing device can use voice patterns of the user to assist in identifying the token and account of the user. The system receives from the merchant computing device a transaction request, the transaction request comprising the first transaction token and transaction data associated with the transaction request. The system determines that the transaction is for an amount less than a configured transaction limit and communicates a request for an authorization of the transaction.

SYSTEMS AND METHODS FOR DIGITAL IDENTITY VERIFICATION

Systems and methods for digital identity verification are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for digital identify verification may include: (1) receiving, from a user electronic device or at a website, an image of an identity document for a user, the identity document comprising an image of the user; (2) processing the identity document with at least one business-specific rule; (3) extracting identity information from the identity document; (4) determining a match rate of the image of the user on the identity document to a captured image; (5) assigning a verification score to the user based on extracted identity information and the match rate; and (6) publishing the verification score to at least one system.

Authorizing uses of goods or services using bonding agreement

Aspects described herein include a computer-implemented method (and related system and computer program product) comprising receiving, from a bonding service, an authorization request for a predefined authorized use of a good or service by a user. The authorization request indicates that the user meets one or more predefined criteria for the predefined authorized use. The method further comprises determining one or more penalty conditions of a bonding agreement for the predefined authorized use by the user, and receiving, from the bonding service, a confirmation that the user agrees to meet the one or more penalty conditions of the bonding agreement. The method further comprises receiving, from an owner of the good or service, an authorization of the authorization request, and transmitting, responsive to authorization of the authorization request, a token to the bonding service that enables the user to access the predefined authorized use of the good or service.

REOCCURRING DIGITAL ASSET-BASED INTERACTION

A method includes initiating a reoccurring digital asset-based interaction between a first and second computing entity of a digital asset-based interaction system, providing, by the first computing entity, first computing entity information to the second computing entity, and storing, by the second computing entity, the first computing entity information. When the reoccurring digital asset-based interaction occurs, the method further includes sending, by the second computing entity, at least a portion of the first computing entity information and second computing entity information to a digital asset-based interaction computing entity, obtaining, by the digital asset-based interaction computing entity, the amount of the digital asset from the first computing entity, locking an amount of system digital asset to back the reoccurring digital asset-based interaction, and sending a confirmation to the second computing entity that the reoccurring digital asset-based interaction is successful.

SMART CODE MODULE OF A DIGITAL ASSET-BASED INTERACTION SYSTEM

A method includes scanning, by a smart code module of a digital asset-based interaction interface of an asset management unit of a computing entity of a digital asset-based interaction system, a scannable code regarding a digital asset-based interaction. The digital asset-based interaction involves the computing entity providing a first amount of digital assets and a second computing entity of the digital asset-based interaction system accepting a second amount of desired assets. The method further includes parsing, by a code parser of the smart code module, the scannable code to determine code information, analyzing, by an asset management unit select module of the smart code module, the code information to determine an asset management unit for processing the digital asset-based interaction, and when the determined asset management unit is not the asset management unit, forwarding, by the smart code module, the code information to the determined asset management unit.