G06Q20/3226

SYSTEMS AND METHODS FOR INTELLIGENT STEP-UP FOR ACCESS CONTROL SYSTEMS
20230052965 · 2023-02-16 ·

Some embodiments may provide systems, methods and computer program code to method to facilitate an interaction involving a user which include determining that a user authentication is required to complete the interaction, identifying at least a first verified device associated with the user, and transmitting an authentication message to the at least first verified device.

Connected car as a payment device

Methods, systems, apparatus, and non-transitory computer readable media are described for using a vehicle as a payment device. Various aspects may include receiving a selection of a stored financial card or financial account at a vehicle head unit. The selected financial card or financial account may be transmitted to a point-of-sale (POS) terminal for making a payment by transmitting a tokenized card number to the POS terminal. The tokenized card number may be transmitted over a very short-range communication link to ensure that the transmission is secure. For example, electronic circuitry may be attached to the exterior of the vehicle, where the electronic circuitry may be within a threshold distance (e.g. one inch, three inches, six inches, one foot, three feet, etc.) of the POS terminal. The tokenized card number may be transmitted from the vehicle head unit to the electronic circuitry and then to the POS terminal.

Disabling mobile payments for lost electronic devices

If a user loses an electronic device that has the capability to conduct financial transactions, the user may report that the electronic device is lost using a lost-device software application to a management electronic device associated with a provider of the electronic device. In response to receiving this information, a disabling command is sent to a payment network associated with the financial account of the user to temporarily disable use of the electronic device to conduct the financial transactions. In particular, the electronic device may include a secure element that stores a payment applet for a financial account, and the disabling command may disable a mapping from a virtual identifier for the financial account to a financial primary account number. Subsequently, if the user finds the electronic device, the user may re-enable the capability (and, thus, the mapping) by providing authentication information to the electronic device.

Provisioning platform for machine-to-machine devices

Techniques described herein include a platform and process for provisioning user information onto a machine-to-machine device in order to enable the machine-to-machine device to conduct transactions utilizing the user information. In some embodiments, a user device is used to relay information between a machine-to-machine device and a provisioning service provider computer. In some embodiments, a machine-to-machine device is connected to the provisioning service provider computer via a network connection. Upon receiving a request to provision the machine-to-machine device, the service provider computer may identify the device from a device identifier. The service provider computer may generate an access credential or token for the machine-to-machine device. The access credential, token, and/or one or more policies may be provisioned onto the machine-to-machine device.

System for user authentication
11556932 · 2023-01-17 · ·

A computer-implemented method of authenticating the identity of a user is provided, where the user is associated with a computer signature and is in possession of a cell phone. The method involves obtaining a current geographical location of the cell phone, determining if the computer signature is associated in a database with a stored geographical location of the phone, and, if the computer signature is associated in the database with a stored geographical location, comparing the stored geographical location to the current geographical location of the phone.

Simulated contactless payment cards providing multiple temporary profiles and corresponding credentials

A bridge service is provided to support multi-user simulated contactless cards that in response to receiving a request to provision a secure element with payment card profile information of a user, provisions a token representing the payment card profile, converts the token representing the payment card profile into a format for the payment application; and provides the payment card profile to the payment application, the payment card profile comprising a single use key. The bridge service enables simulated contactless cards to store payment card information for a user on volatile memory instead of the persistent, secure element memory.

Authorizing a payment with a multi-function transaction card

A multi-function transaction card may include a card body having dimensions that are in accordance with a standard for transaction cards, an output device on the card body, and a secure element within the card body. The multi-function transaction card may pair, via a wireless connection, the multi-function transaction card with a terminal. The multi-function transaction card may receive, from the terminal, information associated with a transaction. The multi-function transaction card may generate, based on the information associated with the transaction, and using a cryptographic key, an authorization request cryptogram (ARQC), wherein the cryptographic key is stored in the secure element. The multi-function transaction card may generate, based on the ARQC, a machine-readable code. The multi-function transaction card may display, using the output device, the machine-readable code.

Systems and methods for activating a transaction card

A method, apparatus, and system of activating and using a contactless card are disclosed. A method includes receiving a transaction card application for a contactless transaction card from an applicant; issuing a contactless transaction card based on the transaction card application, wherein the contactless transaction card comprises a uniform resource locator (URL) embedded thereon; and activating the contactless transaction card in response to receiving information from a contactless communication between the contactless transaction card and a customer device, wherein the contactless communication causes access to a web site associated with the URL.

SYSTEM AND METHOD FOR USING IMAGE DATA TO TRIGGER CONTACTLESS CARD TRANSACTIONS
20230237465 · 2023-07-27 · ·

A method for controlling a near field communication between a device and a transaction card is disclosed. The method includes the steps of capturing, by a front-facing camera of the device, a series of images of the transaction card and processing each image of the series of images to identify a darkness level associated with a distance of the transaction card from the front of the device. The method includes comparing each identified darkness level to a predetermined darkness level associated with a preferred distance for a near field communication read operation and automatically triggering a near field communication read operation between the device and the transaction card for the communication of a cryptogram from an applet of the transaction card to the device in response to the identified darkness level corresponding to the predetermined darkness level associated with the preferred distance for the near field communication read operation.

System, Method, and Computer Program Product for Exchanging Transaction Data

Disclosed are methods for exchanging transaction data, including transmitting a first public encryption key and transaction data associated with a transaction to a computing device via a near field communication (NFC) connection, receiving a second public encryption key and a transaction message associated with the transaction via the NFC connection, and appending the second public encryption key and the transaction message associated with the transaction to a database stored in a memory in communication with at least one integrated circuit, wherein the at least one integrated circuit is powered by an electromagnetic field generated by the computing device. Systems and computer program products are also provided.