G06Q20/4097

System, method, and computer program for dynamically identifying a merchant associated with an authorization request for a payment card

The disclosure is directed to a system, method, and computer program for dynamically identify a merchant associated with an authorization request for a payment card, wherein a merchant identifier in the authorization request is unrecognized. A plurality of unique signatures is created for each of a plurality of registered merchants, wherein the signatures for each registered merchant are based on values of merchant attributes associated with the registered merchant. In response to the system receiving an authorization request for a payment card that includes an unrecognized merchant identifier used to process authorization requests, a plurality of unique signatures is generated for the unrecognized merchant based on a combination of merchant attributes in the authorization request. A payment processing system then determines if the signatures match one of the signatures previously created for the registered merchants. If so, the authorization request is identified as originating from the matching registered merchant.

Method and system of billing for charging a vehicle battery leveraging a pre-arranged payment method
20210406880 · 2021-12-30 ·

A method and system provided for a single-action with which the customer places an order and receives goods by the single action of connecting an electrical vehicle (EV) to a charging station according to the business terms associated with this invention, the affiliated organizations that purchase or support the operation of the invention participate in a business “franchise” operation whereby all affiliated organizations increase their revenues as the volume of EV charging events increases.

Method and Control Device for Securely Checking an Electronic Ticket
20220230146 · 2022-07-21 ·

A method for a secure check of an electronic ticket, in which the electronic ticket is stored on a first mobile terminal device allocated to an end consumer, and the ticket is checked using a second terminal device allocated to a ticket inspector or to a control system, wherein the method the following steps: sending a request message from the second terminal device to the first terminal device via a first communication channel; sending a response message from the first terminal device to the second terminal device via a second communication channel, the response message being signed by the first terminal device, and the second communication channel; verifying the signed response message by the second terminal device; and confirming the authenticity of the response message by the second terminal device, if the second terminal device was previously able to verify the authenticity of the signature.

SYSTEMS AND METHODS FOR PROVIDING A TONE-BASED KIOSK SERVICE
20210406855 · 2021-12-30 ·

Embodiments provided herein include systems and methods for providing a tone-based kiosk service. One embodiment of a tone-based kiosk includes a display, a processor, and a memory component. The memory component may be configured to store logic that, when executed by the processor, causes the tone-based kiosk to establish an encrypted connection with the mobile device and broadcast a first tone that includes first encrypted data for rendering a user interface at the mobile device, wherein the first encrypted data includes information related to offerings by the establishment. In some embodiments, the logic causes the tone-based kiosk to provide at least a portion of the user interface for display, receive a second tone that includes second encrypted data that includes instructions navigating the user interface via the mobile phone to create order details for an order, and receive an indication that the order is complete.

SYSTEMS AND METHODS FOR PROVIDING MULTI-FACTOR AUTHENTICATION FOR VEHICLE TRANSACTIONS
20210406893 · 2021-12-30 ·

Methods and systems are employed for completing a transaction via an internet-connected vehicle by leveraging a multi-factor authentication to compare vehicle identification information and user identification information based on stored information. In addition, methods and systems are provided for completing a transaction via an internet-connected vehicle by automatic enforcement of business rules (e.g., parental control spending tools, or employee spending tracking tools).

SYSTEMS AND METHODS FOR PROVIDING MULTI-FACTOR AUTHENTICATION FOR VEHICLE TRANSACTIONS
20210406894 · 2021-12-30 ·

Methods and systems are employed for completing a transaction via an internet-connected vehicle by leveraging a multi-factor authentication to compare vehicle identification information and user identification information based on stored information. In addition, methods and systems are provided for completing a transaction via an internet-connected vehicle by automatic enforcement of business rules (e.g., parental control spending tools, or employee spending tracking tools).

STANDARDIZED IDENTIFIERS FOR MULTIPLE TRANSACTION AUTHORIZATIONS

Examples described herein include systems, methods, instructions, and other implementations for data security. One example includes receiving a checkout communication associated with a secure transaction, where the checkout communication includes a first child merchant identifier associated with a first child merchant system, a second child merchant identifier associated with a second child merchant system, and a parent merchant identifier associated with a parent merchant system. The parent merchant identifier is associated with multiple different child merchant identifiers. The parent merchant system is then authenticated using the parent merchant identifier. The authentication of the parent merchant system is then used to facilitate payments with the multiple different child merchant systems.

Systems and methods for amplifying the strength of cryptographic algorithms

Example embodiments provide systems and methods for increasing the cryptographic strength of an encryption or message-authentication-code-(MAC) generation technique. According to some embodiments, a MAC may be constructed around a shared secret (such as a random initialization number), thereby increasing strength of the MAC against brute force attacks based on the size of the shared secret. The MAC may be combined with randomized data, and may also be encrypted to further bolster the strength of the code. These elements (shared secret, MAC algorithm, and encryption algorithm) may be employed in various combinations and to varying degrees, depending on the application and desired level of security. At each stage, the cryptographic construct operates on the cyptographically modified data from the previous stage. This layering of cryptographic constructs may increase the strength of the group of contrasts more efficiently than applying any one construct with a larger key size or similar increase in complexity.

SYSTEMS AND METHODS FOR DATA SECURITY WITH MODULAR WEBSITE INTEGRATION

Examples described herein include systems, methods, instructions, and other implementations for data security. One example includes receiving a checkout communication received from a merchant system, where the checkout communication does not include client information, and processing the communication to authenticate a validated checkout system. A client token is generated in response to an authentication that the checkout communication is from the validated checkout system and transmitted to allow verification of the merchant system. An account communication is then received including the client token and client information, where the client information is not received from the merchant system. A tokenized client account number is generated and used to allow the merchant system to process the secure transaction without access to the client information.

Method and system for authorization of transactions

A method for transaction authorization includes generation of a master authentication code based on an authorization request for a transaction by a server. The transaction is initiated by a user by way of a transaction application installed on a user-computing device. The server splits the master authentication code into a first authentication code and a second authentication code. The first authentication code is communicated to the transaction application and the second authentication code is communicated to the user by the server. The transaction application generates a response code based on the first authentication code and the second authentication code. The server receives the response code from the transaction application and processes the transaction based on a match between the response code and the master authentication code.