G06Q20/409

MODULAR DEVICE MESH NETWORK FOR ASSOCIATED DEVICE INTEGRATION

Embodiments of the present invention provide a system for facilitating a secure way to allow primary users and secondary users to perform interactions remotely via an automated machine and one or more auxiliary devices on the same local network. In particular, the system may assign exclusive control over an automated device and one or more auxiliary devices to a primary user via a computing device connected to the same local network or virtual private network as the automated machine, and may allow the primary user to communicate via the automated machine with a secondary user who wishes to complete one or more resource interactions.

SYSTEM AND METHODS FOR SIMULTANEOUS RESOURCE EVALUATION AND VALIDATION TO AVOID DOWNSTREAM TAMPERING

Systems, methods, and computer program products are provided for validating a deposit request. The method includes receiving a deposit request from a user device. The deposit request includes a deposit transaction information relating to an intended deposit. The method also includes determining a deposit transaction confidence level based on the deposit transaction information. The deposit transaction confidence level indicates a likelihood of the intended deposit being perfected. The method further includes causing a transmission of an audit request to the user device relating to the deposit request upon determining the deposit transaction confidence level is below a confidence level threshold. The audit request includes a request to confirm one or more details relating to the deposit request. The method still further includes determining a deposit determination based on a response to the audit response. The deposit determination indicates whether the intended deposit will be executed.

METHOD AND APPARATUS FOR SUPPORTING TRANSACTIONS OF PRODUCTS
20230042284 · 2023-02-09 ·

Methods and apparatuses for supporting transactions of products are provided. One of the methods comprises, receiving, by a second terminal, information of a seller that is selling the products, from a first terminal, requesting, by the second terminal, verification of the seller's information from a server, in response to successful verification of the seller's information, acquiring, by the second terminal, a transaction identifier for the products from the server, measuring, by the second terminal, a distance from the first terminal creating, by the second terminal, transaction data including the measured distance and the transaction identifier, requesting, by the second terminal, verification of the transaction data from the server and in response to receiving a message indicating successful verification of the transaction data from the server, performing, by the second terminal, a payment routine for the products.

Facilitating device fingerprinting through assignment of fuzzy device identifiers

Various device attributes associated with a current event may be obtained. Similarity metrics may be determined that indicate a degree of similarity between the device attributes that are associated with the current event and stored device attributes that are associated with previous events and previously created fuzzy device identifiers. A fuzzy device identifier may be assigned to the current event based at least in part on a comparison of the similarity metrics with a threshold. If none of the similarity metrics compare favorably with the threshold, then a new fuzzy device identifier may be created for the current event. However, if at least one of the similarity metrics compares favorably with the threshold, then the previously created fuzzy device identifier whose stored device attributes are most similar to the device attributes that are associated with the current event may be assigned to the current event.

Security and fraud prevention techniques based on detection of a transaction card in an image

In some implementations, a transaction card security system may detect a transaction card in an image, and may perform image processing to identify one or more character sequences or one or more designs that appear on the transaction card. The one or more character sequences or the one or more designs may identify an institution associated with the transaction card and/or a cardholder associated with the transaction card. The transaction card security system may identify the institution or the cardholder associated with the transaction card based on the one or more character sequences or the one or more designs, and may perform one or more actions relating to security of the transaction card based on detecting the transaction card in the image and identifying the institution or the cardholder associated with the transaction card.

INTELLIGENT AUTHENTICATION

Systems and methods for intelligently authenticating payment transactions are disclosed. A user initiates a payment transaction to purchases goods or services from a merchant. The merchant sends a payment initiation request to a server computer in communication with a payment processing network and an issuer. The server computer queries various databases to determine one or more available communication channels that may be used as authentication channels by the issuer. The server computer also determines one or more communication channels, available for use by a mobile device of the user, that may be used as authentication channels to authenticate the payment transaction. The user is provided with a list of available/eligible authentication channels. User selects one of the authentication channels and the issuer is notified of the selection. The issuer uses the selected authentication channel to communicate with the user and authenticate the payment transaction.

SECURE AUTHENTICATION SYSTEM AND METHOD

Methods and systems pertaining secure transaction systems are disclosed. In one implementation, a computer with a verification token associated with a computer can send user authentication data as well as a secure datum to a control server. The verification token may obtain the secure datum from a validation entity. The control server can validate the secure datum and authentication data and can generate a payer authentication response.

METHODS AND COMPUTER SYSTEMS FOR IMPLEMENTING A PAYMENT CARD NETWORK
20180012223 · 2018-01-11 ·

A computer-implemented method of operating a payment card network is proposed in which the expiry date of each payment card is stored, not on or in the payment cards themselves, but as a payment card record within an electronic database. When the payment card is used, the record is accessed using other payment card details to check that expiry date has not passed. The process does not require that the expiry date is read from the payment card. This has the advantage that the payment card does not have to be replaced at the expiry date. Instead, the expiry date can be updated by updating the record. In place of the expiry date, the card has an auxiliary date which is the birthdate of the consumer in the YYMM format.

SYSTEMS AND METHODS FOR POINTS-OF-SALE TRANSACTIONS AND CUSTOM CONTENT

A system may receive a request for user data associated with a user account, transmit the user data in response to the request, and receive an authorization request for a transaction from a merchant device. The authorization request may include transaction data and an item identifier. The system may also approve the transaction in response to a user account having sufficient funds available and store the transaction data and the item identifier in association with the user account.

PAYMENT USING REWARDS POINTS
20230237525 · 2023-07-27 · ·

A method of payment using rewards is provided. The method includes detecting, by a mobile device of a customer, an authentication device based on a short range wireless communication between the mobile device and the authentication device; in response to detecting the authentication device, retrieving, by the mobile device, authentication data of the customer from the authentication device via the short range wireless communication; populating, by the mobile device, a graphical user interface displayed to the customer using the authentication data retrieved from the authentication device; receiving, by the mobile device, a selection from the customer to send the authentication data to an account management system; sending, by the mobile device, the authentication data to the account management system based on the received selection; and receiving, by the mobile device, a payment option for a transaction based on the customer being authenticated using the authentication data.