G06Q20/3823

Payment integrated loyalty system

A payment integrated loyalty system including a point of sale terminal comprising a card reader, a communication subsystem configured to wirelessly communicate with a payment instrument, and configured to communicate over a network with at least a first and second server. The payment integrated loyalty system includes a processor in communication with the communication subsystem and card reader, configured to receive, through the communication subsystem, a payment instrument identifier associated with the payment instrument, and obtain a fingerprint based on one-way encrypting the payment instrument identifier. The processor is further configured to receive, from the first server via the communication subsystem, a loyalty balance associated with the fingerprint and to complete the financial transaction based on an updated amount based on the loyalty balance.

SYSTEM AND METHOD FOR MANAGING TRANSACTIONS IN DYNAMIC DIGITAL DOCUMENTS
20230045774 · 2023-02-09 · ·

A system software and method which relates to the field of computing technology or business process models or computer systems or distributed computer systems or computer networks relating to general purpose devices that can be programmed to carry out a set of data table or hash table updates, validations or modifications supporting, enabling or executing public and private services, financial transactions and commercial applications. More specifically, the present invention is directed to distributed and decentralized computing in which said distributed network is supported and encrypted by cryptographic technology, hash functions and distributed public or private keys or other related technology. System and methods for managing dynamic electronic documents on a private distributed ledger comprise establishing a dynamic electronic document comprising a first state object, wherein the state object references a prior approved first transaction; proposing a second transaction comprising as an input the first state object and as an output a transaction command to alter the state object as well as what parameters are required to validate the second transaction; validating the proposed second transaction; and updating the state object on a private distributed ledger to reference the second transaction.

METHOD AND APPARATUS FOR SUPPORTING TRANSACTIONS OF PRODUCTS
20230042284 · 2023-02-09 ·

Methods and apparatuses for supporting transactions of products are provided. One of the methods comprises, receiving, by a second terminal, information of a seller that is selling the products, from a first terminal, requesting, by the second terminal, verification of the seller's information from a server, in response to successful verification of the seller's information, acquiring, by the second terminal, a transaction identifier for the products from the server, measuring, by the second terminal, a distance from the first terminal creating, by the second terminal, transaction data including the measured distance and the transaction identifier, requesting, by the second terminal, verification of the transaction data from the server and in response to receiving a message indicating successful verification of the transaction data from the server, performing, by the second terminal, a payment routine for the products.

Mobile wallet systems and methods using trace identifier using card networks

A mobile wallet computer server receives a fund access request from a user device. The fund access request is made in connection with a payment transaction. The mobile wallet server generates a tokenized card number, transmits the tokenized card number to the user device, and receives receive the tokenized card number from a card network computer system after having been routed from the user device via a merchant computer system and via an acquirer processor computer system. The mobile wallet computer server converts the tokenized card number to the actual credit card account number of the user and transmits the actual credit card account number to the card network computer system to process the payment transaction.

Illicit proceeds tracking system

A computerized method produces an identity code to identify each subject stored in the computer systems connected to a computer network while protecting the privacy and confidentiality of the subject. A central computer system receives an identity code of a suspect of a financial crime and sends the identity code to all computer systems connected to the computer network. The computer systems that have the matched identity code send the requested information to the central computer system. As a result, law enforcement organizations can eliminate crimes and financial institutions can recover the money stolen from them. In addition, law enforcement organizations and financial institutions can identify money launderers that are missed by their anti-money laundering transactional monitoring systems.

VIRTUAL SMART CARDS WITH AUDIT CAPABILITY
20180007039 · 2018-01-04 ·

Virtual smart card system includes a virtual smart card server (VSS) which controls access to content respectively associated with a plurality of virtual smart cards. A remote client computer system includes a system level agent which establishes the client computer machine to the VSS as a trusted computer system. A user level agent at the client computer system responds to a request for a virtual smart card operation by causing the client computer system to obtain user authentication information, negotiate with the system level agent to obtain a cookie, and initiate a request to the VSS for the virtual smart card operation. The VSS will perform the virtual smart card operation provided that a security policy is satisfied and will communicate the results to the user level agent.

METHODS FOR SECURE TRANSACTIONS
20180012215 · 2018-01-11 ·

The present invention relates to a method for a secure transaction utilizing a portable radio communication device (10), wherein both parts in the secure transaction are protected against fraudulent actions, among other things by use of a common transaction identity on a predefined transaction server.

Method, apparatus, and computer-readable medium for secured multi-lateral data exchange over a computer network

A method and apparatus for secured, multi-lateral, assured data transfer over a computer network for the assured exchange of data between counterparties related to qualifying transactions, the method being accomplished by a distributed computing system including a distributed ledger platform and an off-chain data host platform. On-chain authorization tokens are used to track data access rights, enforce access policies, and control distribution of encryption keys.

Secure remote payment transaction processing including consumer authentication

Embodiments of the invention are directed to methods, apparatuses, computer-readable media, and systems for securely processing remote transactions. One embodiment is directed to a method of processing a remote transaction initiated by a communication device. The method comprising a server computer receiving a payment request including encrypted payment information that is encrypted using a first key. The encrypted payment information including security information. The method further comprises decrypting the encrypted payment information using a second key, obtaining an authentication response value for the remote transaction from an authentication computer associated with an issuer, updating the decrypted payment information to include the authentication response value, re-encrypting the decrypted payment information using a third key, and sending a payment response including the re-encrypted payment information to a transaction processor. The transaction processor decrypting the re-encrypted payment information using a fourth key and initiating a payment transaction using the decrypted payment information.

SYSTEMS AND METHOD FOR PAYMENT TRANSACTION PROCESSING WITH PAYMENT APPLICATION DRIVER
20180012213 · 2018-01-11 · ·

A pre-certified payment application driver code configured to satisfy requirements of a particular level of a credit card data security certification compliance may be integrated with first and second POS applications to generate first and second integrated applications, respectively, as a fully integrated, tested and production-ready solution. Each integrated application meets all levels of data security compliance requirements and enables data security-compliant transactions with end-to-end encryptions by enabling, in response to a POS application initiating a payment transaction, a payment terminal to share an encryption key with a payment server. Each integrated application can receive payment data encrypted with the encryption key, transmit the encrypted payment data to the payment server for processing the payment transaction using the encrypted payment data, and receive a processing result of the payment transaction from the payment server and communicate the processing result to the POS application.