G06Q20/4097

User authentication based on account transaction information in text field

Methods, systems, and apparatuses are described herein for authenticating access to an account using questions which allow users to provide textual information about transactions conducted by an account. A machine learning model may be trained to predict the guessability of merchants. A request for access to an account may be received, and transaction data for that account may be received. An authentication question may be presented. For example, a user may be prompted to list places they have shopped recently. A user response comprising text data may be received. The text data may be processed to identify one or more merchants. If the one or more merchant(s) are represented in the transaction data, the machine learning model may be used to determine the guessability of the one or more merchants. An authentication score may be determined based on the guessability, and access to the account may be provided.

DISPLAY APPARATUS HAVING FRAME WITH REGIONS TO DISCHARGE HEAT GENERATED BY PRINTED CIRCUIT BOARD

A transaction is conducted between a merchant site and a customer's electronic device using a payment processor. The merchant site is associated with a client-side application and a server-side application. The client-side application executes on the customer's electronic device. The client-side application electronically sends payment information retrieved from the customer's electronic device to the payment processor. The client-side application does not send the payment information to the server-side application. The payment processor creates a token from the payment information sent by the client-side application. The token functions as a proxy for the payment information. The payment processor electronically sends the token to the client-side application. The client-side application electronically sends the token to the server-side application for use by the server-side application in conducting the transaction. The payment information can thus be used by the server-side application via the token without the server-side application being exposed to the payment information.

METHODS AND SYSTEMS FOR PAYMENTS ASSURANCE

A remote payments assurance system includes a Proxy Service Manager Server, an Authentication Service Manager Server computer, an Acquirer Financial Institution (FI) Server computer, a payment network, and an Issuer financial institution server computer. A storage device of the Proxy Service Manager Server computer stores instructions which causes a processor to receive a consumer authentication request from a merchant device obtained during a card not present (CNP) transaction, transmit the consumer authentication request to the Authentication Service Manager Server computer, establish a secure communications channel between the Proxy Service Manager Server computer and the Authentication Service Manager Server computer, and transmit the consumer authentication request via the secure communications channel to the Authentication Service Manager Server computer. Next, the processor receives a non-repudiable one-time accountholder authentication value (AAV) token, transmits a payment authorization request to the Acquirer FI Server computer, receives a payment authorization message, and transmits a payment authorization message to the merchant device to complete the CNP purchase transaction.

ENHANCED META-SEARCH ENGINE

Systems, methods, and computer program products for enhancing a meta-search engine. In response to one of the results generated by the meta-search engine being selected for purchase via the meta-search engine, and to a fulfillment request including data associated with a first payment form and the selected result being received, the meta or the seller of the product included in the selected result is selected as a merchant. Furthermore, a settlement office is determined that is remote from the meta-search engine. Thereafter, while logged into the settlement office, an electronic record is generated that includes second payment data associated with the fulfillment request and one or more financial items. The first payment form is processed based on the merchant determination, and thereafter, a data feed including the one or more financial items is transmitted to the meta.

Systems and methods for processing off-network transaction messages

A computer-implemented method for applying payment services to a payment transaction over a first payment network using a payment services computer system hosted on a second payment network is provided. The method includes receiving a service request at the payment services computer system from a requestor. The service request has a first format that is readable by the second payment network. The method includes determining, at the payment services computer system, the payment services the service request is registered to receive. The method includes processing the service request by applying the registered payment services to the service request. The method includes generating, at the payment services computer system, a services response. The services response is generated based on the registered payment services and the payment transaction data. The method additionally includes transmitting the services response to at least one of the cardholder and the requestor.

Background communication failover for mobile payments

A mobile point-of-sale terminal includes a payment card reader having a card interface configured to read data from a payment card and transmit the payment card data, along with other transaction information, via a non-internet communication channel to a payment processing system to process the point-of-sale transaction. The mobile point-of-sale terminal may be configured to run a register application configured to receive transaction information, including payment card information from the payment card reader, determine whether an internet connection is available, and, if an internet connection is not available, transmit the transaction information to the payment processing system using a non-internet communication channel.

ESTABLISHING A SECURE CHANNEL WITH A HUMAN USER

A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (PIN) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.

Apparatuses and Methods for Operating a Portable Electronic Device to Conduct Mobile Payment Transactions

Methods for operating a portable electronic device to conduct a mobile payment transaction at a merchant terminal are provided. The electronic device may verify that the current user of the device is indeed the authorized owner by requiring the current user to enter a passcode. If the user is able to provide the correct passcode, the device is only partly ready to conduct a mobile payment. In order for the user to fully activate the payment function, the user may have to supply a predetermined payment activation input such as a double button press that notifies the device that the user intends to perform a financial transaction in the immediate future. The device may subsequently activate a payment applet for a predetermined period of time during which the user may hold the device within a field of the merchant terminal to complete a near field communications based mobile payment transaction.

USER DEVICE COMPRISING A CELLULAR PHONE CONFIGURED TO COMMUNICATE WITH A TERMINAL

Systems and methods for processing transactions using a digital payment platform.

SECURE TOKEN DRIVEN CONDITIONAL ROUTING OF PROCEEDS

Methods and systems for secure token driven conditional routing of proceeds are described. A request to initiate routing of data between remote systems is received by a server computer system, where the request includes an incomplete set of parameters. A validation challenge and a challenge response defined by a first remote computing system are received, and a token that references the first remote computing system and the incomplete parameter set is generated. A validation may then be performed for a second remote computing system using the validation challenge and the challenge response defined by the first remote computing system. The incomplete set of parameters may then be completed by the second remote computing system when the challenge is validated to enable the routing of data according to the complete set of parameters referenced by the token.