G06Q20/4097

SYSTEMS AND METHODS FOR PROVIDING STAND-IN AUTHORIZATION

A computer-implemented method for performing a stand-in payment authorization is provided. The method is implemented using a stand-in payment authorization (SPA) computing device. The method includes storing account numbers of predesignated cardholders in an account file that are designated to receive stand-in authorization by the SPA computing device. The method also includes receiving an authorization request data signal redirected to the SPA computing device after the authorization request data signal was submitted to an unresponsive issuing bank computing device. The method further includes generating an authorization response data signal based at least upon a comparison of the account numbers stored in the account file to a candidate account number. The method further includes transmitting the authorization response data signal.

TERMINAL, SERVER, POS TERMINAL FOR PROVIDING BENEFIT ABOUT PRODUCTS USING ADMISSION NUMBER OF CREDIT CARD, PAYMENT SYSTEM COMPRISING THE SAME, CONTROL METHOD THEREOF, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM HAVING COMPUTER PROGRAM RECORDED THEREON
20170345045 · 2017-11-30 · ·

Provided are a terminal, a server, a POS terminal for providing a benefit about a product using an admission number of a credit card, a payment system including the same, a control method thereof, and a non-transitory computer readable storage medium having a computer program recorded thereon. The present invention has advantages of providing a benefit about a product to a client who uses a credit card, by using the admission number of the credit card so that a manufacturer may perform a promotion about the product in accordance with recognition of the product purchased by the client and the client may receive a benefit about the product without performing additional action at the time of making a payment, and the credit card company may conveniently provide a benefit to the client to increase the usage rate of the card.

Payment schemes using light identification for passengers in commercial passenger vehicle

A system for assisting a payment to a passenger on a commercial passenger vehicle is disclosed. The system is located in the commercial passenger vehicle and comprises: an onboard server configured to (1) receive, from a personal electronic device associated with a passenger, a request to process a payment along with payment credential information and (2) operate to authorize the payment; a light sourcing device in communication with the onboard server and configured to receive, from the onboard server, a verification request for the payment credential information, and display a light identification (ID); and the personal electronic device in communication with the onboard server and the light sourcing device and configured to capture an image of the light ID and obtain the verification request corresponding to the payment credential information from the captured image.

Predictive contextual transaction scoring

In one embodiment, a predictive contextual transaction scoring system receives transaction review data associated with person-to-person transactions from a marketplace, the transaction review data including feedback information relating to the person-to-person transaction. The system identifies contextual characteristics of the person-to-person transactions by analyzing the feedback information related to the person-to-person transactions. The system pairs a first party requesting a service to a second party providing the requested service by matching a contextual characteristic of the first party to a contextual characteristic of the second party. The system also predicts a transaction score for a new person-to-person transaction involving the first party and the second party, and provides the predicted transaction score to the marketplace to facilitate pairing of the first party requesting the service.

MESSAGE DELAY ESTIMATION SYSTEM AND METHOD
20220366412 · 2022-11-17 ·

A clearing delay estimate may be employed that provides issuers with an accurate estimate for when a transaction will be cleared, thus providing more transparency to issuers to more efficiently manage funds. An algorithm may be employed to estimate clearance timing information and insert the timing information into communications with the issuer or other parties to a transaction involving a payment device. The estimated clearance timing information may be determined based on machine learning and other artificial intelligence techniques using historical data related to clearance timing for the particular entities involved in each transaction.

SYSTEMS AND METHODS FOR CARD INFORMATION MANAGEMENT
20220368679 · 2022-11-17 ·

Example embodiments of systems and methods for replacing card information. In an embodiment, a system comprises an authentication server in data communication with a network and a database in data communication with the authentication server. The authentication server is configured to receive an authentication signal from a user device via the network, retrieve a list of merchants having transaction history with an account associated with the account card, and transmit an access token to at least one merchant server selected using the list of merchants.

Method and apparatus for performing transactions over a network using cross-origin communication

A transaction is conducted between a merchant site and a customer's electronic device using a payment processor. The merchant site is associated with a client-side application and a server-side application. The client-side application executes on the customer's electronic device. The client-side application electronically sends payment information retrieved from the customer's electronic device to the payment processor. The client-side application does not send the payment information to the server-side application. The payment processor creates a token from the payment information sent by the client-side application. The token functions as a proxy for the payment information. The payment processor electronically sends the token to the client-side application. The client-side application electronically sends the token to the server-side application for use by the server-side application in conducting the transaction. The payment information can thus be used by the server-side application via the token without the server-side application being exposed to the payment information.

SYSTEMS AND METHODS FOR INCENTIVIZING TRANSACTIONS

A method of incentivizing secure transactions that includes receiving future travel location data and future travel time data. The method includes determining bonus multiplier information based on the travel details, where the bonus multiplier information is indicative of a bonus multiplier. The method includes transmitting the bonus multiplier information to a user computing device. The method includes receiving a transaction authorization request associated with a transaction. The transaction authorization request includes transaction location data and transaction time data, and the transaction authorization request includes a transaction amount. The method includes verifying that the transaction location data matches the travel location data and that the transaction time data matches the travel time data. The method includes transmitting an authorization response via the payment network and determining a new rewards points amount by applying the bonus multiplier to the transaction amount.

ID authentication

A method for ID authentication, in which equipment involved in a transaction requests a password from a physically separate but limited-range communicating device, which automatically supplies a password in response to such request and communicates it to the equipment, the password is assessed as valid or invalid and the transaction approved or not accordingly.

SYSTEMS AND METHODS FOR AMPLIFYING THE STRENGTH OF CRYPTOGRAPHIC ALGORITHMS

Example embodiments provide systems and methods for increasing the cryptographic strength of an encryption or message-authentication-code- (MAC) generation technique. According to some embodiments, a MAC may be constructed around a shared secret (such as a random initialization number), thereby increasing strength of the MAC against brute force attacks based on the size of the shared secret. The MAC may be combined with randomized data, and may also be encrypted to further bolster the strength of the code. These elements (shared secret, MAC algorithm, and encryption algorithm) may be employed in various combinations and to varying degrees, depending on the application and desired level of security. At each stage, the cryptographic construct operates on the cyptographically modified data from the previous stage. This layering of cryptographic constructs may increase the strength of the group of contrasts more efficiently than applying any one construct with a larger key size or similar increase in complexity.