G06Q20/4097

Pre-Staged Transactions with Ultra-Wideband Networking and Haptic Feedback

Timely and optimal user completion of pre-staged transactions is implemented by ultra-wideband (UWB) enabled devices at UWB-enabled ATMs. ATM information, transaction scheduling and user prioritization, transaction notifications, and/or haptic-feedback reminders are provided based on one or more real-time and/or predicted geographical locations and proximities, ATM-specific queue wait times, preference scores, historical usage, ATM resources, and/or other relevant data or preferences.

VIRTUAL SMART CARDS WITH AUDIT CAPABILITY
20180007039 · 2018-01-04 ·

Virtual smart card system includes a virtual smart card server (VSS) which controls access to content respectively associated with a plurality of virtual smart cards. A remote client computer system includes a system level agent which establishes the client computer machine to the VSS as a trusted computer system. A user level agent at the client computer system responds to a request for a virtual smart card operation by causing the client computer system to obtain user authentication information, negotiate with the system level agent to obtain a cookie, and initiate a request to the VSS for the virtual smart card operation. The VSS will perform the virtual smart card operation provided that a security policy is satisfied and will communicate the results to the user level agent.

False fraudulent correction methods and apparatuses

A computer-implemented method and apparatus are provided to reduce false fraudulent declines of transactions. Payment processor (PP) systems may be provided with a request acceptor and a replacement transaction generator. The request acceptor receives a notification of a decline of a first transaction attempted by a cardholder with a merchant, for allegedly fraudulent, and a request to determine whether the first transaction was falsely identified as fraudulent, and if so, to remedy the first transaction. The replacement transaction generator generates, in response to a determination that the first transaction was falsely identified as fraudulent, and the merchant is a false fraudulent reduction partner merchant, a replacement second transaction to replace the declined first transaction. The replacement second transaction may include a bypass authorization code, and made available to the cardholder to use to transact with the merchant bypassing the declined first transaction.

System, Method, and Apparatus for Securely Transmitting Data via a Third-Party Webpage

Provided is a computer-implemented method for securely receiving data via a third-party webpage, including: generating configuration data in response to a request from a first system, the configuration data including a public key of a first key pair; digitally signing the configuration data based on a private key of a second key pair; transmitting the configuration data to the first system, the configuration data including code configured to facilitate the first system to embed a plurality of frames in a webpage, wherein the plurality of frames loads content from a domain that is independent from a domain that hosts the webpage; and verifying the configuration data based on a public key of the second key pair. The computer-implemented method may also include receiving, from a master frame of the plurality of frames, encrypted data. Systems and computer program products are also provided.

Secure modal based digital installments

Examples described herein include systems, methods, instructions, and other implementations for data security with integrated installment payment systems. In one example, account security system receives a checkout communication that includes data describing a validated checkout system of a merchant system. A client token is transmitted in response to an authentication that the checkout communication is from the validated checkout system, and an account communication including the client token and secure client information is received from a client device. An installment payment communication associated with the secure transaction is received from a system other than a merchant system involved in the transaction. The secure transaction is then facilitated following receipt of the installment payment communication.

METHOD AND SYSTEM OF BILLING FOR CHARGING A VEHICLE BATTERY LEVERAGING A PRE-ARRANGED PAYMENT METHOD
20230230074 · 2023-07-20 ·

A method and system provided for a single-action with which the customer places an order and receives goods by the single action of connecting an electrical vehicle (EV) to a charging station according to the business terms associated with this invention, the affiliated organizations that purchase or support the operation of the invention participate in a business “franchise” operation whereby all affiliated organizations increase their revenues as the volume of EV charging events increases.

COMPUTER-BASED SYSTEM FOR PROVISIONING NEW ACCOUNTS USING LOCATION-BASED AUTHENTICATION

A method comprises receiving, by a computing device from a customer device, a request to provision a financial account for the customer, associating, by the computing device, a mobile device with the requested financial account, and sending, by the computing device to the mobile device, authentication information for the requested financial account. The method further includes receiving the authentication information by the computing device from a financial terminal that received the authentication information from the mobile device, receiving, by the computing device, first location information of the mobile device, and provisioning, by the computing device and based on the first location information of the mobile device being within a predetermined distance of a location of the financial terminal, the requested financial account for the customer.

Offline data transfer between devices using gestures
11556264 · 2023-01-17 · ·

A system is provided including a first server storing a first data file for a first user, a second server storing a second data file for a second user, a first data card of the first user registered with the first server and locally storing a portion of the first data file, and a second data card of the second user registered with the second server and associated with the second data file. The first data card detects a pairing gesture between the first and second data cards, and in response, establishes a peer-to-peer connection between the data cards. The first data card subsequently detects a transfer gesture between the first and second data cards, and in response, transmits the portion of the first data file from the first data card to the second data card over the peer-to-peer connection.

ENABLING A FUNCTION OF AN APPLICATION BASED ON A CHARACTERISTIC OF A USER DEVICE
20230004629 · 2023-01-05 ·

In some implementations, a user device may receive, from a user of the user device, a request to initiate an application session that is associated with an application. The user device may provide, to a server device based on receiving the request, an optical code associated with the server device establishing the application session. The user device may output the optical code via an output component. The user device may receive, from the server device, a notification that an agent device has joined the application session via a scan of the optical code from the output component. The user device may enable a function of the application based on the notification indicating that the agent device is capable of facilitating a service via the application session, wherein the service is associated with the function.

Systems and methods for digital identity verification

Systems and methods for digital identity verification are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for digital identify verification may include: (1) receiving, from a user electronic device or at a website, an image of an identity document for a user, the identity document comprising an image of the user; (2) processing the identity document with at least one business-specific rule; (3) extracting identity information from the identity document; (4) determining a match rate of the image of the user on the identity document to a captured image; (5) assigning a verification score to the user based on extracted identity information and the match rate; and (6) publishing the verification score to at least one system.