Patent classifications
G06Q20/353
System and Computer-Implemented Method for Character Recognition in Payment Card
The present disclosure relates to a system and computer-implemented method for character recognition in a payment card. The method includes receiving an image of a payment card and one or more details associated with the payment card. Further, a derivative of the image is determined based on the one or more details and a horizontal sum of pixel values is determined for a plurality of rows in the image. Furthermore, one or more Regions of Interest (ROIs) are identified in the image by comparing the horizontal sum of pixel values with a predefined first threshold. Subsequently, one or more characters in the one or more ROIs are extracted using one or more peak values in a histogram of the one or more ROIs. Finally, each of the one or more characters extracted from the one or more ROIs is recognized using a trained Artificial Intelligence technique.
PAYMENT METHOD AND SYSTEM THROUGH GENERATION OF ONE-TIME PAYMENT-ONLY NUMBER OF REAL CARD LINKED WITH APPLICATION
Provided are a payment method and system through generation of a one-time payment-only number of a real card linked with an application, wherein in order to make payment safely by generating a one-time payment-only number every payment without leaving card information of a user in a provider's payment terminal or by using the generated one-time payment-only number, when a real card is linked with an application installed on a user terminal and the payment terminal recognizes the real card, a user signature input window, and transaction information about payment performed with a one-time payment-only number generated by a card company server are displayed on a screen of the application of the user terminal, and payment is performed when a signature of the user is input to the signature input window.
SYSTEM AND METHOD FOR USING IMAGE DATA TO TRIGGER CONTACTLESS CARD TRANSACTIONS
A method for controlling a near field communication between a device and a transaction card is disclosed. The method includes the steps of capturing, by a front-facing camera of the device, a series of images of the transaction card and processing each image of the series of images to identify a darkness level associated with a distance of the transaction card from the front of the device. The method includes comparing each identified darkness level to a predetermined darkness level associated with a preferred distance for a near field communication read operation and automatically triggering a near field communication read operation between the device and the transaction card for the communication of a cryptogram from an applet of the transaction card to the device in response to the identified darkness level corresponding to the predetermined darkness level associated with the preferred distance for the near field communication read operation.
Cloud-based virtual wallet NFC apparatuses, methods and systems
The CLOUD-BASED VIRTUAL WALLET NFC APPARATUSES, METHODS AND SYSTEMS (“EAE”) transform user enhanced security transaction initiation requests using EAE components into time-limited, session-specific transaction bounding tokens. In some implementations, the disclosure provides a processor-implemented method of transforming a transaction bounding token request into transaction bounded tokens and purchase authorizations.
System and method for payment terminal optimization
A system includes a processor and a non-transitory computer readable medium coupled to the processor. The non-transitory computer readable medium includes code, that when executed by the processor, causes the processor to receive input from a user of a user device to generate an optimal payment location on an application display, generate a first boundary of the optimal payment location on the application display of the user device based upon a first motion of a payment enabled card in a first direction and generate a second boundary of the optimal payment location on the application display of the user device based upon a second motion of the payment enabled card in a second direction. The first boundary and the second boundary combine to form defining edges of the optimal payment location.
Systems and methods for preventing fraudulent credit card and debit card transactions
A system and method for preventing fraudulent credit card or debit card transactions by coupling a smart phone to the credit card or the debit card, and transmitting identification information from the smart phone to the card. The card is normally disabled such that no transaction may take place unless the card is enabled. The card receives the transmitted identification information and compares that information to corresponding information stored on the card. If the received information matches the stored information, the card is enabled thus allowing the transaction to take place.
System and method for card control
A system and method for card control includes a card control computing system configured to enforce a card control rule based upon transactions made with a payment card. The card control computing system includes a memory unit configured to store information associated with a card control dashboard, and a processing unit configured to cause presentation of the card control dashboard via a display associated with a remote computing device, such that the card control dashboard is associated with the payment card and the card control rule. The card control dashboard includes a user interface. The processing unit is further configured to receive an input via the user interface to activate or deactivate one or more features associated with the card control rule, and trigger the card control rule based upon the one or more features that are activated or deactivated.
Method for processing transaction data, corresponding communications terminal, card reader and program
A method for processing transaction data, implemented by a communications terminal having a touch screen. The method includes: detecting a necessity of entering a piece of personal identification data; transmitting to a card reader connected to the communications terminal a request for supporting a display of a virtual keypad, the request comprising a piece of data representing a passage of the communications terminal from a “master” mode to a “slave” mode of operation, the slave mode leading to implementation of the method for processing transaction data under the exclusive control of the card reader; of entry, by the user on the virtual keypad, of the piece of personal identification data; and receiving, from the card reader, the piece of personal identification data.
Wireless devices for storing a financial account card and methods for storing card data in a wireless device
A non-transitory computer-readable medium stores instructions causing a processor to generate a menu displaying representations of a plurality of cards, the cards having associated card data; receive, from a user input device, a selection corresponding to a selected one of the cards; update the menu to display a representation of the selection; and authorize transmission of the card data associated with the selected card to complete a transaction.
SYSTEMS AND METHODS FOR USER IDENTIFICATION USING GRAPHICAL BARCODE AND PAYMENT CARD AUTHENTICATION READ DATA
A method for authenticating an online transaction or a log-in process is provided. The method comprises: receiving image data of a visual graphical barcode from a user device, and the visual graphical barcode is configured to be displayed on an unauthenticated device for conducting the online transaction; analyzing the image data to obtain a transaction validation identifier (ID); comparing the transaction validation ID to a pre-stored validation ID; comparing a first set of collection data from the user device to a second set of collection data that is pre-stored; and determining whether to approve or reject the online transaction based on (1) a match between the transaction validation ID and the pre-stored validation ID, and (2) a match between the first set of collection data and the second set of collection data that is pre-stored.