G06Q20/385

Platform for management of user data

A system, method, device, and platform for managing data. Data associated with a user received from one of a number of sources. The data is automatically confirmed as applicable to a user. The data is added to a data set associated with the user. A determination is made whether the data set is complete after adding the data to the data set. One or more tokens are created based on the data set of the user.

Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts
11595374 · 2023-02-28 · ·

A permissions management system is disclosed for enabling a user to securely authorize a third-party system to access user account data and initiate transactions related to a user account, without disclosing to the third-party system account credentials. The system enables the user to also securely de-authorize the third-party system. For example, records may be automatically generated that securely store account information, including one or more permissions related to the account and/or the third-party. A token associated with a record may be shared with the third-party system, but neither the record itself, nor the user account credentials, may be shared with the third-party. Accordingly, the third-party may request user account data and/or initiate transactions by providing the token, but does not itself know, e.g., the user account credentials. Further, the user may set various permissions related to the token, and may also revoke the token (e.g., de-authorize the third-party), thus providing increased security to the user's account.

System and method for inserting data into an internet browser form

Systems, methods, and computer-readable storage media for inserting payment information into payment forms without user interaction. A system can identify that a user has navigated to a web page operated by a merchant computer system for a merchant and identify a payment form within the web page. The system can then execute a payment request API which generates a query for saved payment credentials for the user from the merchant computer system. When the merchant computer system indicates it does not have the saved payment credentials for the user, the system can identify browser-saved payment credentials stored in the Internet browser, then generate a virtual payment information associated with the browser-saved payment credentials. The virtual payment information can then be inserted into corresponding fields of the payment form without the user entering any additional information.

SECURE AUTHENTICATION SYSTEM AND METHOD

Methods and systems pertaining secure transaction systems are disclosed. In one implementation, a computer with a verification token associated with a computer can send user authentication data as well as a secure datum to a control server. The verification token may obtain the secure datum from a validation entity. The control server can validate the secure datum and authentication data and can generate a payer authentication response.

SYSTEM AND METHOD OF PROVIDING TOKENIZATION AS A SERVICE
20180005228 · 2018-01-04 ·

Systems, devices, apparatuses, and methods for providing tokenization as a service are provided. Embodiments of the invention involve decoupling “tokenization service” from other services offered by a merchant service provider, and offering the tokenization service as a stand alone service. In accordance with an embodiment, a merchant service provider can receive payment data associated with a transaction between a consumer and a first entity. The merchant service provider can generate a payment token that represents the payment data and transmit a copy of the payment token to the first entity. The first entity can then transmit the payment token and order information to a second entity specified in the transaction. The merchant service provider can subsequently receive a request to complete the transaction from the second entity. The request can include the copy of the payment token from the second entity.

TOKEN AND CRYPTOGRAM USING TRANSACTION SPECIFIC INFORMATION
20180006821 · 2018-01-04 ·

Systems and methods for token processing are disclosed. An access device can provide access device data to a mobile communication device. The communication device generates a token request including the access device data and communication device data and sends the token request to a server computer. The server computer returns a token and a token cryptogram to the mobile communication device. The token and the cryptogram may be used in a transaction.

SYSTEM AND METHOD FOR PROCESSING AN ONLINE TRANSACTION REQUEST
20180012208 · 2018-01-11 ·

A computer server includes a transaction processor that is configured to receive from a POS terminal an incoming authorization request that includes an original numeric value, a token cryptogram and an identification number identifying an identity token; confirm that the token cryptogram was generated from the original numeric value and a cryptographic key associated with the token; determine primary and secondary numeric values from the original numeric value and a user profile associated with the identification number; confirm that the secondary numeric value is not greater than the balance in a loyalty points account associated with the identification number; transmit to an authorization server a revised authorization request that includes the identification number and the primary numeric value; and receive from the authorization server a confirmation message confirming that the primary numeric value is not greater than the balance in a payment account associated with the identification number.

Multi-network tokenization systems and methods

A computing system for electronically managing a token across multiple computer networks is described. The computing system includes a processor in communication with at least one memory device. The processor is programmed to generate a token associated with a payment account, the token having a format that simulates a format of a checking account identifier, and receive a payment request including the token, the payment request processed over a first network. The processor is also programmed to apply a set of rules to the payment request, determine that the payment request satisfies the set of rules, and convert the token into a payment account identifier using the set of rules. The processor is further programmed to transmit an authorization request message to a second network, receive authorization of the authorization request message from the second network, and provide authorization of the payment request to the first network.

Transaction resolution data platform

Methods, systems, and apparatuses are described herein for the direct sharing and use of transaction data separately from transaction authorization processes. Transaction metadata associated with a transaction may be received and validated. Authorization information corresponding to the transaction may be received. The degree to which the transaction metadata is tested may be based on a predicted time of receipt of the authorization information. The transaction metadata and authorization information may be correlated. A computing device may determine whether to authorize the financial transaction based on the authorization information and the correlated transaction metadata. All or portions of the transaction metadata may be provided to one or more users after the transaction has been authorized or denied.

Network token system

Embodiments of the invention are directed to methods, apparatuses, computer readable media and systems for providing, along with a token, a token assurance level and data used to generate the token assurance level. At the time a token is issued, one or more Identification and Verification (ID&V) methods may be performed to ensure that the token is replacing a PAN that was legitimately used by a token requestor. A token assurance level may be assigned to a given token in light of the type of ID&V that is performed and the entity performing the ID&V. Different ID&Vs may result in different token assurance levels. An issuer may wish to know the level of assurance and the data used in generating the level of assurance associated with a token prior to authorizing a payment transaction that uses the token.