Patent classifications
G07F7/10
Multimode retail system
A multimode system for receiving data in a retail environment includes: a secure input module for receiving high security input and low security input from a customer, the high security input to be communicated by the secure input module in cipher text, and the low security input to be communicated by the secure input module in plaintext. The multimode system is adapted to operate in a high security mode and a low security mode. The multimode system is adapted to enter the low security mode upon detection by the multimode system of a security breach condition. In the high security mode, the secure input module accepts low security input and high security input. In the low security mode, the secure input module accepts the low security input and does not accept the high security input.
In-store card activation
A user having an account with a payment provider receives an unregistered payment card that is associated with the payment provider, and that includes a magnetic strip encoded with a number unique to the card and a machine readable code such as a QR/barcode embossed thereon. The user may then open an application on the user's mobile device to capture the number associated with the card by, for example, scanning the QR/barcode, capturing an image of the number, speaking the number into the device, or manually entering the number into the user's device. The user may also authenticate with the payment provider by entering login credentials. The user may then confirm a request to link the number of the card with the user's payment provider account, which activates and links the card to the user account so that the user can immediately use the card for purchases.
Bridge application for user pin selection
Systems and methods related to a bridge application that facilitates interoperability between a remotely-served application and locally connected peripheral devices. The bridge application may execute on a local machine and be addressable at the loop-back address of the local machine. Requests issued to the bridge application may be verified as originating from a trusted source. In turn, requests from a locally performed and remotely-served application may be issued to local hardware resources such as peripheral devices or the like.
Self-centering user interface for inputting information
Techniques described herein are directed to, among other things, utilizing a self-centering user interface to receive information associated with a transaction. For instance, a computing device may receive a first input at a first location of a display. The computing device may then determine a positioning for the user interface, where the user interface may be substantially centered about the first location. In some instances, the computing device may display the user interface using the positioning. The computing device may then receive a second input corresponding to swipe from the first location of the display to a second location of the display. The computing device may then determine a symbol included in the user interface based at least in part on the second input. In some instances, the user interface includes a keypad for entering a personal identification number associated with a payment instrument.
Self-centering user interface for inputting information
Techniques described herein are directed to, among other things, utilizing a self-centering user interface to receive information associated with a transaction. For instance, a computing device may receive a first input at a first location of a display. The computing device may then determine a positioning for the user interface, where the user interface may be substantially centered about the first location. In some instances, the computing device may display the user interface using the positioning. The computing device may then receive a second input corresponding to swipe from the first location of the display to a second location of the display. The computing device may then determine a symbol included in the user interface based at least in part on the second input. In some instances, the user interface includes a keypad for entering a personal identification number associated with a payment instrument.
Systems and methods for digital account activation
A method for registering and activating accounts includes: transmitting a first input from a user regarding opening an account at a financial institution; establishing a communication session based on exchanging encryption keys between the user device and the financial computing system; displaying a graphical user interface (GUI) comprising a request for a user verification; transmitting a received user verification to the financial computing system; updating the GUI to display a request to establish a personal identification number (PIN) for a physical payment card associated with the account; receiving the PIN from the user; transmitting a second input comprising the PIN and a request to provision the account to the user device; receiving a payment token associated with the account before the physical payment card associated with the account of the financial computing system is received by the user; and, storing the payment token for transactions via the user device.
Saver button
The technology described includes a physical, connected device/button, that when pressed or clicked, causes money to be transferred according to a set of rules (i.e., a “one-click” transfer of funds). In some embodiments, each click can cause a small, pre-set increment of money to be transferred from a user's checking account to the user's savings account. In other embodiments, the user can hold the button down for a longer period of time, indicating a request for a larger amount of money to be transferred.
Saver button
The technology described includes a physical, connected device/button, that when pressed or clicked, causes money to be transferred according to a set of rules (i.e., a “one-click” transfer of funds). In some embodiments, each click can cause a small, pre-set increment of money to be transferred from a user's checking account to the user's savings account. In other embodiments, the user can hold the button down for a longer period of time, indicating a request for a larger amount of money to be transferred.
METHODS AND SYSTEMS FOR DECONFLICTING DATA FROM MULTIPLE SOURCES IN COMPUTER SYSTEMS
Methods and systems are described for verifying an identity of a user through contextual knowledge-based authentication. The system described uses contextual knowledge-based authentication. By verifying an identity of a user through contextual knowledge-based authentication, the verification is both more secure and more intuitive to the user. For example, by relying on confidential and/or proprietary information, the system may generate verification questions, the answers to which are known only by the user.
IC CARD, IC CARD PROCESSING SYSTEM, AND COMPUTER-READABLE STORAGE MEDIUM
According to an embodiment, an IC card includes a communication interface and a processor. The communication interface communicates with an IC card processing apparatus. The processor transmits extended format support information indicating whether an extended format is supported for each of commands to the IC card processing apparatus.