Patent classifications
G06Q20/4012
Voice recognition to authenticate a mobile payment
Systems and methods are provided for authenticating mobile payments from a customer account to a merchant. The systems and methods may include a financial service provider receiving a request to authorize an electronic transaction at a point-of-sale. A financial service provider server computer may verify that the customer is present at the point-of-sale using received location data. An image having distorted text such as a captcha may be transmitted to a device at the point-of-sale, and the customer may read the captcha aloud. A voice sample of the customer may be sent to the financial service provider for comparison to stored voice recordings, to verify that the customer's voice sample is authentic if the voice matches a previously generated voice recording for the account. If the voice sample is authentic, the financial service provider may authorize the mobile payment.
System and method for inserting data into an internet browser form
Systems, methods, and computer-readable storage media for inserting payment information into payment forms without user interaction. A system can identify that a user has navigated to a web page operated by a merchant computer system for a merchant and identify a payment form within the web page. The system can then execute a payment request API which generates a query for saved payment credentials for the user from the merchant computer system. When the merchant computer system indicates it does not have the saved payment credentials for the user, the system can identify browser-saved payment credentials stored in the Internet browser, then generate a virtual payment information associated with the browser-saved payment credentials. The virtual payment information can then be inserted into corresponding fields of the payment form without the user entering any additional information.
Systems and methods for identity graph based fraud detection
A method and apparatus for fraud detection during transactions using identity graphs are described. The method may include receiving, at a commerce platform system, a transaction from a user having initial transaction attributes and transaction data. The method may also include determining, by the commerce platform system, an identity associated with the user, wherein the identity is associated with additional transaction attributes not received with the transaction. Furthermore, the method may include accessing, by the commerce platform system, a feature set associated with the initial transaction attributes and the additional transaction attributes, wherein the feature set comprises machine learning (ML) model features for detecting transaction fraud. The method may also include performing, by the commerce platform system, a machine learning model analysis using the feature set and the transaction data to determine a likelihood that the transaction is fraudulent, and performing, by the commerce platforms system, the transaction when the likelihood that the transaction is fraudulent does not satisfy a transaction fraud threshold.
Point of Sale Payment Method
The present disclosure describes making a payment transaction between a customer and a merchant using a payment card of the customer including: transmitting details of the payment transaction from a mobile device to a remote server; capturing at least one image of the payment card using the mobile device of the merchant; transmitting the at least one image of the payment card to the remote server; identifying, by the remote server, the merchant and the payment card captured in the at least one image; and implementing the payment transaction between bank accounts of the customer and the merchant.
METHOD FOR PROCESSING AN AUTHORIZATION TO IMPLEMENT A SERVICE, DEVICES AND CORRESPONDING COMPUTER PROGRAM
A method for processing, by a processing entity, of an authorization to implement a service and/or access an item. The method includes: reception, from a requesting device, of a request for implementing a service and/or accessing an item; searching for an indicator of dependency from at least one piece of data of said request for implementation; when an indicator of dependency is present, obtaining an authorization from a verification device to implement said service and/or access said item.
Systems and methods for automated validation for proprietary security implementations
Systems and methods are disclosed for automated validation for proprietary security implementations. One method includes: receiving, from each of a plurality of merchants, a list of security service providers used by the merchant; enabling connection with the each of the security service providers of the received list of security service providers used by the merchant; receiving, from each of the listed security service provider with connection enabled, security service information as it pertains to the merchant of the plurality of merchants; generating a security service profile for each merchant of the plurality of merchants, based on the received security service information from each security service provider of the received list of security service providers of the merchant; and outputting the security service profile of the merchant of the plurality of merchants to an electronic storage medium.
Cryptocurrency payment network
In one embodiment, a method includes receiving a request for payment associated with a transaction between a first user and a second user, where the request specifies a payment amount in a fiat currency and identifying an indication that the first user intends to satisfy the request for payment using a non-fiat instrument. The method also includes initiating a first transfer of a value corresponding to the payment amount in the non-fiat instrument from a first balance of the first user to one or more service balances of a payment service and initiating a second transfer of a value corresponding to the payment amount in the fiat currency from the one or more service balances of the payment service to a second balance of the second user.
MULTI-SCREEN AUTOMATED TELLER MACHINE (ATM)/AUTOMATED TELLER ASSIST (ATA) MACHINES FOR USE BY WHEELCHAIR USERS
An automated teller machine (ATM) including multiple user screens is provided. The ATM preferably includes an ATM processor, an ATM user information input device and/or an ATM receiver, a customer-facing ATM touch screen configured to display an initial ATM display, an ATM dispenser configured to dispense a cash withdrawal amount in the event that an ATM central processing unit (CPU) receives information relating to a selection of the cash withdrawal amount. The ATM may further include a second, customer-facing, touch screen configured to selectably display an automated teller assist (ATA) display configured to provide a video display of a live teller located at a remote location.
DUPLICATED WIRELESS TRANSCEIVERS ASSOCIATED WITH A VEHICLE TO RECEIVE AND SEND SENSITIVE INFORMATION
A vehicle is provided that comprises two or more radio frequency (RF) antennas and two or more RF transceivers to communicate wirelessly sensitive information associated with a user of the vehicle (the two or more RF antennas being at different physical locations on an exterior of the vehicle). The vehicle determines which one of the two or more RF antennas is receiving a strongest signal from a common signal source, selects a first RF transceiver associated with the RF antenna with the strongest signal to send the sensitive information associated with the user to the common signal source, and sends the sensitive information associated with the user to the first RF transceiver for transmission to the common signal source.
Hardware device for entering a pin via tapping on a touch screen display
A device and associated methods for entering a PIN via tapping are disclosed. The device can be configured to determine a number of taps provided by a PIN holder on a touch sensor in representation of a PIN digit and to store the number of taps as a digit in a sequence that represents the PIN. Indications for interaction with the device can be provided to PIN holders in the form of auditory cues. A visually impaired PIN holder may be able to complete a PIN entry process by following the indications for interaction, tapping on a touch sensor a number of times equal to the value of the digit of the PIN to be entered, and performing gestures mapped to commands for the device.