G06Q20/4012

Token processing with selective de-tokenization for proximity based access device interactions

A method includes providing an initial communication, by an access device to a user device. The access device can receive the user identifier and the access token and receive a secret associated with the user. The access device can determine, using the user identifier and/or the access token, if the transaction is authorized by an authorizing entity computer associated with the access device or by an authorizing entity not associated with the access device. If the transaction is authorized by the authorizing entity computer associated with the access device, the access device can transmit an authorization request message comprising the user identifier, the secret, and the access token to the authorizing entity computer. The authorizing entity computer validates the secret, retrieves a real credential of the user using the user identifier, and authorizes the transaction.

Using a nested random number-based security ecosystem for block chains for electronic cash tokens and other embodiments
11710122 · 2023-07-25 · ·

Methods, systems, and apparatuses for block chain security schemes for electronic cash tokens are described herein.

FINANCIAL TERMINAL THAT AUTOMATICALLY RECONFIGURES INTO DIFFERENT FINANCIAL PROCESSING TERMINAL TYPES
20230237452 · 2023-07-27 ·

An improved financial terminal automatically reconfigures into different financial processing terminal types. In one embodiment, the terminal comprises a housing; a card reader configured to accept at least a portion of a card having an integrated circuit; at least one display; at least one processor; and at least one memory configured to store machine readable code, the machine readable code comprising a first kernel corresponding to a first transaction type and a second kernel corresponding to a second transaction type.

Trusted service manager (TSM) architectures and methods
11521194 · 2022-12-06 · ·

A client device comprises a first secure element and a second secure element. The first secure element comprises a first computer-readable medium having a payment application comprising instructions for causing the client device to initiate a financial transaction. The second secure element comprises a second computer-readable medium having a security key, a payment instrument, stored authentication data and instructions for generating a secure payment information message responsive to the payment application. The secure payment information message comprises the payment instrument and is encrypted in accordance with the security key.

Multi-factor automated teller machine (ATM) personal identification number(PIN)

An automated teller machine (ATM) may include an input component and one or more processors. The input component may be configured to detect multi-factor input associated with an account. The multi-factor input may include at least two of: a sequence of characters input via the input component, a force with which at least one character, of the sequence of characters, is input via the input component, a length of time over which at least one character, of the sequence of characters, is input via the input component, or a combination of at least two characters, of the sequence of characters, that are input concurrently via the input component. The ATM may receive the multi-factor input, validate the multi-factor input in association with the account, and selectively permit or deny access to one or more actions associated with the account based on validating the multi-factor input.

Method and device for implementing password-free EMV contact transaction
11568387 · 2023-01-31 · ·

A method for realizing an EMV contact transaction without a password, wherein said method is implemented by an EMV IC card and a terminal, wherein when a terminal receives transaction information, it sets a password-free function setting; performs an offline data validation and limitation; performs terminal risk management and a behavior analysis; determines, on the basis of the password-free function setting, whether to perform online processing and performs transaction termination processing; the password-free function setting comprises: when an optional kernel configuration flag in an application parameter corresponding to the current application acquired is set and the transaction amount in the transaction information is greater than a password-free IC card transaction limitation amount, the current application is configured so that verifying the cardholder's PIN is obviated. The present invention allows password-free small-amount transactions, and obviates to upgrade IC cards.

Payment transaction methods and systems enabling verification of payment amount by payment card

Embodiments provide a method of facilitating a payment transaction with a payment card of a customer. The method includes receiving a payment transaction request initiated at a merchant terminal. The payment transaction request comprising at least a merchant transaction amount associated with a purchase entered at a merchant terminal, a PIN of the payment card provided by the customer via a keypad and a customer transaction amount provided by the customer via the keypad. The method includes facilitating verification of facilitating verification of the PIN with a stored PIN. The method further includes, upon successful verification, determining whether the merchant transaction amount conforms to the customer transaction amount. The method further includes facilitating a payment transaction associated with the payment transaction request if the merchant transaction amount conforms to the customer transaction amount.

Payment systems and methods for in-store and online purchases
11568409 · 2023-01-31 ·

Systems and methods for implementing payments or mobile payments. In an aspect of in-store purchase, a merchant sends a payment amount and merchant account info to transaction center. A buyer sends a code and buyer account info to transaction center. The code represents the merchant. In an aspect of online purchase, an e-commerce merchant provides options for a buyer to use names other than a first name plus a surname. In one embodiment, a buyer submits a shortened name or nickname for online purchases when a given payment service is used as a payment method.

METHOD AND SYSTEM FOR OPERATING A MOBILE POINT-OF-SALES APPLICATION
20230028625 · 2023-01-26 ·

A method for operating a mobile Point-of-Sales (mPOS) application includes: an application frontend, for starting a transaction, captures transaction data associated with the transaction to be started and transmits a transaction request to the application backend via the connection; an application backend transmits an authorization request and a layout for a human machine interface for entering a personal key to the application frontend; the application frontend provides the human machine interface with the received layout, captures the personal key entered via the human machine interface, and generates and transmits a transaction authorization comprising the captured personal key to the application backend; and the application backend checks the captured personal key and, depending on the check, completes the transaction. touchscreen

System and method for performing financial transactions using a wireless personal assistant

Aspects of the present disclosure involve systems, methods, devices, and the like for performing financial transactions. In one embodiment, a system is introduced that enables a communication between a user and a wireless personal assistant. The communication occurs through the use of a vocal command which is recognized and authenticated by the wireless personal assistant for the request and transfer of a monetary amount between a user and a contact. The communication occurs using a financial institution associated with the user and linked with the wireless personal assistant for the manipulation of funds from the user account.