A wearable computing device reads near-invisible one- or two-dimensional barcodes having a size of 100 microns to one millimeter. The device includes a magnifying lens, a digital camera, a processor, program memory and a wireless communication module, all supported on a wearable device body. The wearable device body may be an eyeglass frame, a watch body or wristband, a headband or sweatband or a cap or other headgear, among other possibilities. Applications of the wearable computing device include unattended shopping in a physical retail store.
A method for conveying auditable information regarding provenance of a product that is cryptographically accurate while retaining complete anonymity of product and participant on a blockchain includes: receiving a product identifier; generating a digital token by applying a hashing algorithm to the product identifier; generating an entry value by applying the hashing algorithm to a combination of an event identifier and the digital token; generating a digital signature by digitally signing a data package using a private key of a cryptographic key pair, where the data package includes at least a blockchain address, the event identifier, and the digital token; and transmitting the blockchain address, the digital signature, and the entry value to a node in a blockchain network.
A system and method for sensing a seat occupancy by an individual and executing an ecommerce transaction via the individual's mobile device for the cost of a ticket based on the occupied seat. For example, an attendee enters a multiplex and chooses a theater and a seat from which to watch a movie, or a passenger enters a station and chooses a train and a seat in which to travel. In both cases, the occupancy of the seat is detected, an amount owed is determined based on the occupancy of the seat, and an ecommerce transaction is initiated via the mobile device to pay the amount. The determination of the amount may be delayed for a period after the individual has stopped moving to ensure they have made their final choice. The individual may be required to verify a relevant characteristic, such as age or membership in a discounted group.
A computer-implemented method for secure multi-datasource query job status notification that includes accessing notification characteristics for a query job status. Occurrence of the query job status and a present security level may be determined. Based on the notification characteristics, a notification may be generated at least in part by omitting available data based on the present security level. Based at least in part on the occurrence of the query job status, transmission of the notification to an end user computing device may be directed.
The disclosure herein describes authentication of a user based on device-based user authentication data for transactions associated with a payment account. A service receives a registration message including device-based user authentication data and a payment account identifier. Based on the device-based user authentication data matching an authentication data type of issuer-approved data types, the device-based user authentication data is linked with the payment account. An authentication request associated with a transaction from the payment account is received including device-based user authentication data of the user. The user is authenticated based on the device-based user authentication data of the authentication request matching the device-based user authentication data linked with the payment account, whereby authentication of the identity of the user for the transaction is delegated to the service by the issuer of the payment account based on the linking of the device-based user authentication data with the payment account.
A method for double anonymization of data includes: receiving, by a first computing system, a plurality of first data sets, each including a set identifier and personally identifiable information; anonymizing, by the first computing system, each of the first data sets, by hashing the set identifier included in each first data set to obtain a hashed identifier and deidentifying the personally identifiable information; transmitting, by the first computing system, the plurality of anonymized first data sets to a second computing system, wherein the second computing system is distinct and separate from the first computing system; anonymizing, by the second computing system, each of the anyonmized first data sets, by hashing the hashed identifier to obtain a double-hashed identifier; and storing, in the second computing system or a third separate and distinct computing system, the plurality of double anonymized first data.
A method for automatically provisioning data for an opaque blockchain based on prior consent includes: receiving a consent request including transaction criteria and at least two digital signatures, the first digital signature generated by a regulating entity and the second digital signature generated by a moderating entity in a blockchain network; validating the first and second digital signature; digitally signing the received consent request using a private key of a first cryptographic key pair; transmitting the digitally signed consent request to the regulating entity; receiving a query request from the regulating entity, the query request including an executable query; executing the executable query to identify transaction data for electronic transactions in compliance with the transaction criteria; and transmitting the identified transaction data to the regulating entity.
A method for real-time invoice updating and account-to-account payment includes: receiving invoice data based on presentation of an invoice by a distributor to a recipient at a delivery location, modification of the invoice by the recipient, and acceptance of the invoice by the recipient; generating a request for payment (RFP) message based on the invoice data; transmitting the RFP message to a financial institution associated with the recipient via a financial institution of the distributor; receiving, from the financial institution associated with the distributor, a payment confirmation for the invoice based on a real-time payment from the financial institution associated with the recipient; generating reconciliation data based on the payment confirmation and the invoice data; and transmitting the reconciliation data to a computing device of the distributor and a computing device of the recipient.
A method and a system for facilitating transactions are provided. A first payment mode is linked to one or more payment modes by a server. A first authorization option presented on a graphical interface of a terminal device enables a user to initiate a transaction using the first payment mode. One or more unique identifiers of the one or more payment modes, respectively, are communicated to the terminal device by the server based on a transaction request of the transaction. A first unique identifier, associated with a second payment mode that is linked to the first payment mode, is selected from the one or more unique identifiers. A selection notification indicating the selection of the first unique identifier is received by the server and a transaction amount of the transaction is charged to the second payment mode, when the transaction is authorized.
A device profiling computer system for determining and analyzing characteristics of devices used in payment transactions includes a processor, a device profiling database in communication with the processor, and a memory coupled to the processor. The device profiling computer system is configured to receive a set of first transaction data associated with a first transaction initiated by a cardholder at an online merchant wherein the cardholder initiates the first transaction using a cardholder computing device and wherein the set of first transaction data includes a set of first device characteristic data related to the cardholder computing device, analyze the set of first transaction data to determine a set of device characteristics, and update a device record stored in a device profiling database with the set of first transaction data wherein the device record is associated with the set of device characteristics.
A system and method for secure and intuitive payment transactions at an ecommerce merchant website with a client device. The system has a trusted platform that hosts a Mediator site and Manifest database that includes a plurality of Manifest files. Each Manifest file includes a unique identifier and mapped payor information for a payment entity. The platform uses the Manifest to validate trusted payment entities and provide the Mediator site. The Mediator site generates cookies with payor information from the Manifest files, which are transmitted stored on user devices. These cookies are employed to facilitate trusted and intuitive transactions at merchant websites using dynamic interface objects presented on the user's client device interface.
Embodiments provide payment transaction methods, and systems by dynamically pushing payment transaction data to a Payment Service Provider (PSP). Method includes receiving, by a server system associated with a payment network, a payment transaction request including a payment transaction data and a PSP identifier (ID) of PSP during a payment transaction initiated from a user device using a merchant application. The method includes fetching, by the server system, a corresponding Uniform Resource Locator (URL) of the PSP using the PSP ID of the PSP from a merchant portal database. The merchant portal database at least includes a list of one or more URLs stored against respective one or more PSP IDs pre-generated based on linking respective one or more PSPs to a merchant profile. The method includes sending, by the server system, the payment transaction data to a PSP server using the corresponding URL for processing the payment transaction.
Embodiments provide methods, and systems for facilitating message format discovery in online transaction processing. A method includes receiving, by a server system associated with a payment network, a message comprising a payment service request via a communication channel from an application in a message format of a plurality of message formats. The server system includes a rule engine and a rule data dictionary. The method includes applying, by the server system, one or more rules fetched by the rule engine from the rule data dictionary until the message format is identified. At least one rule of the one or more rules is applied based on matching one or more characters of the message with a pattern corresponding to the at least one rule. Upon successful identification of the message format, the method includes facilitating, by the server system, processing of the payment service request.
Provided are a payment card, system and method for storing and reading tokenized payment account information from a payment card. In an exemplary embodiment, a payment card may include a substrate forming a body of the payment card, and an electronic chip attached to or included in the substrate. According to various exemplary embodiments, the electronic chip may include a storage storing tokenized payment account information corresponding to a payment account linked to the payment card. The electronic chip may be read by a payment terminal and may provide the tokenized payment information to the payment terminal during reading.
An automatic billing enrollment (ABE) computing device and methods for automatically enrolling a merchant in a bill paying application are provided. The ABE computing device receives a payment transaction associated with a cardholder account, identifies a merchant associated with the payment transaction, and determines whether the merchant is enrolled with a bill pay application associated with the cardholder account by performing a database lookup of enrolled merchants. The ABE computing device then transmits a message to a user device associated with the cardholder account indicating that the identified merchant is not enrolled by the cardholder with the bill pay application and includes an option for the cardholder to enroll the merchant. To enroll the merchant, the ABE computing device determines merchant-associated data elements required by the bill pay application to enroll the merchant, retrieves the data elements, and inputs the data elements into the bill pay application.
The disclosure herein describes managing multiple clusters within a container environment using a control cluster. The control cluster includes a single deployment model that manages deployment of cluster components to a plurality of clusters at the cluster level. Changes or updates made to one cluster are automatically propagated to other clusters in the same environment, reducing system update time across clusters. The control cluster aggregates and/or stores monitoring data for the plurality of clusters creating a centralized data store for metrics data, log data and other systems data. The monitoring data and/or alerts are displayed on a unified dashboard via a user interface. The unified dashboard creates a single representation of clusters and monitor data in a single location providing system health data and unified alerts notifying a user as to issues detected across multiple clusters.
Described herein is a computing device for applying merchant promotions to a push payment transaction. The computing device includes a processor and a memory. The processor is configured to receive a promotion request message. The promotion request message includes a merchant ID and an initial push payment transaction amount. The processor retrieves, from the memory, a merchant promotion and applies the retrieved merchant promotion to an initial transaction amount to determine an updated transaction amount. The processor then transmits a promotion response message, receives an authorization message and initiates a transfer of funds. The promotion response message includes the merchant ID and the updated transaction amount. The authorization message authorizes the push payment transaction in the updated transaction amount. The funds are transferred in the updated payment amount from the user account with the originating institution to the merchant account at the receiving institution.
An insight data computing system for generating a pre-chargeback record for a payment transaction between a customer and a merchant is provided. The payment transaction is authorized over a payment processing network based on transaction data submitted over the payment processing network. The transaction data is stored by the payment processing network in a historical transaction database. The insight data computing system includes an insight data interface computing device programmed to (i) receive, via an insight communication channel other than the payment processing network, an insight data message including insight data and transaction link data, (ii) store the insight data in an insight database, (iii) link the insight data to the transaction data by matching the transaction link data in the insight data to the transaction data in the historical transaction database, and (iv) generate the pre-chargeback record including the transaction data and the linked insight data.
Provided herein is a method for monitoring message content processed over a payment processor for a cardholder using a rules engine computing device. The rules engine computing device is associated with the payment processor that maintains a transaction history database that includes records for a plurality of payment transactions, and each of the records including a payment account number (PAN), a merchant identifier, and a transaction amount. The method includes (i) receiving a message from a registration computing device indicating that the cardholder is enrolled in a transaction monitoring service; (ii) associating the at least one PAN with the transaction monitoring service; (iii) querying the transaction history database to retrieve records including the at least one PAN; (iv) identifying a subset of transactions from the retrieved records; and (v) transmitting a list of the identified subset of transactions to at least one of the cardholder and the registration computing device.
The disclosure herein describes deploying an application cluster based on a cluster definition and service templates. A cluster definition is obtained from a repository and a cluster is created on a cluster platform based on the cluster definition. A cluster type of the cluster is identified based on the cluster definition and a service set is determined from a service map based on the identified cluster type, the service map including at least one cluster type mapped to at least one service. A service deployment template of each service of the service set is obtained and each service of the service set is deployed on the created cluster based on the obtained service deployment templates, whereby the cluster is configured for use according to the cluster type. Using service deployment templates mapped to cluster types enables efficient, flexible automated deployment of clusters with a wide variety of configurations.
A dispute scoring computing device for generating chargeback dispute scores is provided. The dispute scoring computing device extracts historical transaction data and account profile data for a plurality of transactions associated with an account, and generates a chargeback dispute prediction model for the account based on the extracted data. The dispute scoring computing device further receives a candidate chargeback for a transaction initiated with a merchant using the account, extracts transaction data from the candidate chargeback, and determines, using the generated chargeback dispute prediction model, a chargeback dispute score indicating a likelihood that the candidate chargeback, if disputed by the merchant, would result favorably for the merchant.
The disclosure herein describes handling tokenization requests associated with electronic transactions at a payment network at a throttled processing rate. Tokenization requests are received by tokenization stream brokers from request sources. The tokenization requests include primary account numbers (PANs) to be tokenized. The tokenization requests are then consumed from the tokenization stream brokers, at a request storage rate, for storage in a request data store. Tokenization operations are then performed, at a request processing rate, based on the tokenization requests stored in the request data store. The tokenization operations include providing at least the primary account numbers to be tokenized to issuers associated with the tokenization requests at issuer tokenization rates associated with the issuers, whereby the request processing rate is throttled for compatibility with capabilities of the system and the issuers without unnecessary limitations placed on request sources.
A computer-implemented method for payment network-based cash back processing can include receiving, by processing circuitry, transaction information related to a cardholder transaction with a merchant. The processing circuitry can identify whether the transaction qualifies for a cash back offer selected from a set of one or more cash back offers. The processing circuitry can calculate a cash back amount associated with the merchant based on information contained in the merchant and offers database. The processing circuitry can calculate a cardholder billing amount, an issuer settlement amount, an acquirer settlement amount, a refund amount, and a program fee amount. The processing circuitry can generate a refund message including the refund amount to be processed to the cardholder and a fee message for fee collection. The processing circuitry can receive a program fee, receive an issuer settlement amount from an issuer, send the acquirer settlement amount to a merchant acquirer, and send the program fee amount to a third party.
A method for propagating configuration data using a blockchain includes: storing a blockchain comprised of a plurality of blocks, each being comprised of a block header having a timestamp and one or more configuration transactions; receiving one or more configuration data items; generating a new configuration transaction for each configuration data item; hashing a most recent block identified based on the timestamp included in the respective block header to generate a previous block hash value; hashing a combination of the new configuration transactions and/or data associated therewith to generate a current block hash value; generating a new block header, the new block header including a current timestamp, the previous block hash value, the current block hash value, and a digital signature; generating a new block comprised of the new block header and each new configuration transaction; and updating the blockchain by appending the new block.
There is presented a method, a computing device and a computing system for establishing secure communication between computing devices. A method for a first computing device to establish trusted communication with a second computing device comprises the first computing device sending a request to create a secure channel to the second computing device, the request comprising a first cryptographic element and a device identifier. The first computing device receives a channel identifier from the second computing device in response to the request, and a notification over a secure channel using the device identifier, the notification comprising a channel identifier and a second cryptographic element. The first computing device compares the channel identifier received in the response to the request and the channel identifier received in the notification and, if the first computing device determines that the two channel identifiers match, the first computing device deriving a secret key using the first cryptographic element and the second cryptographic element.
Disclosed method comprises receiving from a user interface, a request to generate an optimized space dataset; generating a first instruction configured to receive a first dataset comprising at least one of a space allocated to the product, product attribute, and product performance value corresponding to a plurality of institutions; automatically calculating an elasticity range based on the space allocated to the product; calculating an unbounded asymptote and elasticity values; upon the unbounded elasticity value being outside the elasticity range, dynamically adjusting the elasticity value based on the elasticity range; iteratively calculating a bounded asymptote value based on the second dataset data points until the asymptote value is within the adjusted elasticity range; and generating a graphical representation to illustrate an optimized space trend comprising plurality of data points.
A method for validating access to data files using a combination of secure data values includes: storing at least a first check value and a seed value in an account profile; receiving a data request message including at least a first data value, a second data value, a timestamp, and a data file request from a computing device; identifying a second check value using a predetermined algorithm applied to at least the seed value and the timestamp; validating the first data value using the first check value and the second data value using the second check value; and transmitting one or more data files indicated in the data file request to the computing device upon successful validation of the first data value and the second data value.
A computer-implemented method for managing configuration sets for computer applications. The method includes connecting with a utility application via an application programming interface (API) associated with the utility application. The method additionally includes obtaining, via the API, a configuration set for the utility application. The configuration set includes one or more configurations associated with end-user functions of the utility application. The method additionally includes communicatively connecting with a datasource storing a plurality of managed configurations. The method additionally includes comparing the configuration set obtained for the utility application with the managed configurations stored in the datasource. The method further includes identifying differences between the configuration set obtained for the utility application with the managed configurations stored in the datasource. Based on the identified differences, configurations may be provisioned to or removed from the utility application. In addition, updated configurations may be downloaded from the utility application to the configuration datastore.
A method for facilitating foreign transactions through inter-currency exchanges and geographical matching includes providing a platform to consumers located in different countries, where a consumer in a first country that desires a product from a second country is matched to a consumer in the second country that desires a product in the first country; the consumers are matched and transactions initiated by the platform to provide transfer of any necessary payment to ensure that each consumer can make the purchase on behalf of the other consumer in their own country, for shipping to the consumer in the other country, negating the need for the consumers to make any international purchases directly while still availing themselves of foreign products without involving merchants and minimizing the effect and amount of cross-border transactions.
Systems and methods are provided for use in facilitating fund transfers between source accounts and destination accounts. One exemplary method includes capturing a computer-readable indicia representative of: a destination account identifier specific to a destination account of a first party and a name of the first party associated with the destination account and, in response to the captured indicia, displaying the name of the first party as a confirmation that the first party is associated with the destination account. The method also includes identifying a source account identifier associated with a source account based on a selection of the source account or on the source account being a default account, and compiling and transmitting a transfer request for a fund transfer based on: the destination account identifier, the source account identifier associated with the identified source account, and a payment amount for the fund transfer.
A method for subverting open transmission of personally identifiable information through the use of tokenization includes: receiving a token request from an issuing financial institution; identifying a digital token; mapping the identified digital token to a primary account number; transmitting the identified digital token to the issuing financial institution; receiving a data request from a third party, wherein the data request includes the identified digital token; replacing the identified digital token in the data request with the mapped primary account number; transmitting the data request including the mapped primary account number to the issuing financial institution; receiving a data package including one or more items of personally identifiable information; and forwarding the data package.
A computer-implemented for preparing a customer invoice using a computing system including at least one processor communicatively coupled to a memory device is provided. The method includes (i) receiving a batch file of usage data on a first schedule, wherein the first schedule repeats a plurality of times before a billing cycle ends, (ii) identifying a first set of usage events having a first characteristic, wherein the first characteristic requires that a per usage rule be applied to each of the first set, (iii) retrieving the first per usage rule from a memory device, (iv) applying the retrieved first per usage rule to each of the first set to generate modified usage events in accordance with the first schedule, (v) aggregating the modified usage events, and (vi) storing the aggregated modified usage events in the memory device in accordance with the first schedule for retrieval when the billing cycle ends.
Systems and methods are provided for establishing fixed currency conversion rates for transactions in connection with authorization and clearing of the transactions. One exemplary method includes receiving a currency conversion request in association with an authorization request for a transaction, identifying a currency conversion rate (CCR) for the transaction based on a rate file stored in a data structure in association with an identifier for the transaction, determining a converted transaction amount based on a transaction amount included in the authorization request and the CCR, and passing the converted transaction amount to an authorization network. The method also includes receiving a conversion request in connection with clearing the transaction, retrieving the CCR from the data structure based on the identifier, and determining a clearing transaction amount based on the transaction amount as included in a clearing record and the CCR received from the data structure.
Systems and methods are provided for using of a single source codebase synchronized between two divergent computing environments. In some embodiments, a version control repository may be utilized to track changes to mainframe source code and synchronize the changed mainframe source code files with a set of source code files stored in the version control repository.
A method for generating a dynamic username includes receiving a static component of a dynamic username and a selection of a dynamic parameter component of the dynamic username from a user. The static component and the selected dynamic parameter component are combined in a predetermined order, based on a user selected option. The dynamic username is produced from the combined static component and the selected dynamic parameter component based on the predetermined order. A rule for producing the dynamic username is generated. The rule defines the predetermined order of the static component and the selected dynamic parameter component. The static component and the rule are stored in a credential database with the rule being associated with the static component.
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
FACILITATION OF REAL-TIME PAYMENT NETWORK TRANSACTIONS
A request for payment message is received. The message includes transaction data. A transaction identifier is generated. The transaction data is stored in association with the transaction identifier. The transaction identifier is transmitted to an acquirer bank. A request to retrieve data is received from a payer's bank. The request to retrieve data includes the transaction identifier. At least some of the transaction data is transmitted to the payer's bank. A confirmation is received from the payer's bank. The confirmation indicates that a real-time payment has been made in accordance with the request for payment message.
A method for periodic aggregation of blockchain transactions for reduced processing times and bandwidths includes: storing at least a cryptographic key pair comprising a private key and a public key and a plurality of unspent blockchain transactions, each unspent blockchain transaction including at least an output address and transaction amount; generating a digital signature using the private key; generating a recipient address using the public key; generating a new blockchain transaction after satisfaction of a trigger condition, the new blockchain transaction including each of the plurality of unspent blockchain transactions as inputs, the digital signature, the recipient address, and a transfer amount based on a summation of the transaction amount for each of the unspent blockchain transactions; and transmitting the new blockchain transaction to a node in a blockchain network.
A job scheduling system includes a primary job scheduler and a secondary scheduling gatekeeper. The primary job scheduler provides primary scheduling primitives. The primary job scheduler is configured to activate a first job on an activation date determined based on a primary scheduling definition of the first job, and execute a secondary scheduling gatekeeper to evaluate whether a target program associated with the first job is executed during the activation. The gatekeeper provides enhanced scheduling primitives that include scheduling primitives not in the primary scheduling primitives. The gatekeeper is configured to evaluate a secondary scheduling definition of the first job to determine whether the first job should continue to execution and return the enhanced scheduling result to the primary job scheduler. The secondary scheduling definition is configured using the set of enhanced scheduling primitives. The system causes the execution of the target program based on the result.
There is provided an authentication system for validating identity credentials of a user attempting to access a resource provided by a remote resource provision system. The authentication system includes an input configured to receive, from the resource provision system, an authentication request comprising a cryptographic representation of digital identity data of the user and an associated token identifier, where the digital identity data comprises at least one image of an identity credential of the user. The system also includes a processor configured to: determine a pre-stored cryptographic identifier corresponding to the token identifier; and compare the received cryptographic representation with the pre-stored cryptographic identifier. The system further includes an output configured to transmit, to the remote resource provision system and in response to determining a match between the received cryptographic representation and the pre-stored cryptographic identifier, an authentication confirmation indicating successful validation of the digital identity data.
An automated identity verification computing device, system and method receives an encrypted renewal request from a user computing device including a biometric value, a digital passport object identifier, and request data. The computing device, system and method retrieves trusted biometric data based on the digital passport object identifier from an identity database, determine a verification score based on the trusted biometric data and the biometric value, and generates a renewal package including the verification score, the digital passport object identifier, and the request data. The computing device, system and method transmit the renewal package to a sponsoring authority computing device.
Systems and methods for facilitating access of interchange parameter data files through a centralized microservice system that integrates a plurality of interchange network systems with a plurality of payment processing applications. The microservice system comprises a plurality of microservices and a plurality of payment processing application modules hosting the plurality of payment processing applications. The microservice system accesses interchange related information sourced from the plurality of interchange network systems and stores the interchange related information in the plurality of microservices. A plurality of financial entities gets registered with the microservice system for availing services associated with the plurality of payment processing applications. The plurality of payment processing application sends a request to the microservice system to access the interchange related information required for processing of the payment transactions requested by the financial entities. The microservice system provides access of the interchange related information in response to receipt of the request.
A system for maintaining individual immunization records. The system includes a tracking vehicle storing a first instance of a user record a terminal including an electronic processor and a memory. The electronic processor is configured to communicate with the tracking vehicle, obtain a second instance of the user record stored in the memory of the terminal and determine whether immunization data in the first instance or the second instance is more recent. When the first instance of the user record from the tracking vehicle includes more recent immunization data than the second instance of the user record stored in the memory, the electronic processor is configured to update the user record stored in the memory of the terminal with the more recent immunization data in the first instance of the user record of the tracking vehicle.
G16H 10/60 - ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
G16H 15/00 - ICT specially adapted for medical reports, e.g. generation or transmission thereof
G16H 20/10 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
A method of transaction selection is described for a transaction conducted between a user computing device adapted for use as a payment device and a terminal. The user computing device supports a plurality of payment cards. Steps at the user computing device include the following: establishing communication with the terminal; receiving transaction related information from the terminal; performing a card selection operation using the transaction related information to select a preferred payment card for performing the transaction; and identifying to the terminal preferred applications for performing the transaction based on the preferred payment card. An associated method of card selection is described, along with corresponding steps performed at the terminal. User computing devices and terminals adapted to carry out these methods are also described.
The invention provides methods, systems and computer program products for identity authentication for payment card based payment transactions. A payment card may be configured for payor identity authentication for the purpose of an electronic payment transaction(s), and may comprise (i) sensors to measure card handling parameters, (ii) an authentication signature generator, configured to generate and store a biometric identity signature associated with an authorized cardholder—which signature is based on a first set of card handling parameter data received from the sensors, (iii) a card handling data comparator configured to receive a second set of card handling parameter data from the sensors, retrieve the biometric identity signature associated with the authorized cardholder, and compare the second set of card handling parameter data with data extracted from the retrieved biometric identity signature, and (iv) an authentication decision generator configured to generate an identity authentication decision based on the comparison.
Embodiments provide methods, and systems for facilitating microservices for cryptographic operations. A method includes receiving, by a server system, a cryptographic service request from at least one application of a plurality of applications over a network communication channel. The cryptographic service request comprises a cryptographic operation to be performed and a cryptographic keys index being an identifier of the at least one application. The method includes generating, by the server system, a cryptographic operation command for the cryptographic operation. The method includes sending, by the server system, the cryptographic operation command to a Hardware Security Module (HSM) communicatively connected to the server system to perform the cryptographic operation. The method includes receiving, by the server system, a response from the HSM for the performed cryptographic operation. The method includes sending, by the server system, the response for the performed cryptographic operation to the at least one application.
Disclosed herein are systems and methods of individual level learning that include receiving purchase event data from a merchant device that indicates that a purchase event occurred by a user on a user device, and transmitting the purchase event data to an analytics server. The methods may also include processing the purchase event data. The processing may include calculating a time gap for each of two sequential purchase events in a list of purchase events, and calculating an average duration of consecutive events by averaging all of the purchase events in the list of purchase events. The method may determine a purchase hazard probability that a purchase event will occur on a given day, when the average duration of consecutive events is larger than a standard deviation of the event occurring. When the purchase hazard probability is above a threshold, the system may push a message to the user device.
Systems and methods for use in monitoring performance of payment networks through use of distributed computing. One example method includes generating metrics and/or events associated with a deployed region of the agent, correlating the metrics and/or events over at least one time interval, the time interval dependent on at least one of historical data related to the deployed region and a known event, detecting, at the agent, at least one variance in the metrics and/or events over the at least one time interval based on a statistical analysis with at least one tolerance, and publishing sampled data, to an associated collector, based on at least one of a sampling rule and the at least on variance.
Systems and methods are provided for facilitating network transactions. One exemplary method includes receiving, by a computing device, via a first wireless connection, a credential from a mobile device where the credential is specific to an account associated with the mobile device. The method also includes determining an identifier of the mobile device, compiling an authorization request for the network transaction, where the authorization request includes the identifier and the credential, and transmitting the authorization request to a first party for authorization. The method further includes; receiving an authorization reply in response to the authorization request, where the authorization reply includes a result for the network transaction and the identifier, and transmitting, via a second wireless connection, a notification, including the result of the network transaction, to the mobile device, based on the identifier included in the authorization reply. The first wireless connection is different than the second wireless connection.
A method for providing analytics for a physical customer based on processed remote transactions includes: storing transaction data entries, each including a time, date, additional value, and data; receiving a notification including a detection time, detection date, and identification value; identifying a first transaction data entry where the date matches the detection date, the additional value matches the identification value, and the time is within a predetermined period of the detection time; identifying a subset of transaction data entries related to the first transaction data entry based on a correspondence in at least one of: the additional value and the transaction data included in the first transaction data entry and each entry in the subset; determining analytics based on the transaction data included in the subset; and transmitting the analytics to a third party device.
Embodiments provide a methods and systems to eliminate or make optional the computation of IRD value for the acquiring bank or the issuing bank. The method includes receiving, by a server system, at least one transaction clearing file for at least one payment transaction from at least one of an acquiring server or an issuing server. The transaction clearing file comprises a data field for an IRD value, an acquiring BIN and an issuing BIN. The method further includes determining whether the data field for IRD value in the at least one transaction clearing file comprises an identifier or an empty space indicating request for determination of the IRD value. The method further includes computing the IRD value for the at least one payment transaction upon determining that IRD value data field comprises the identifier or the empty space.
A frictionless shopping platform supports modular systems to outfit any physical store with a secure self-checkout experience. The frictionless shopping platform can communicate with a kiosk or mobile application to obtain customer information including payment information; a shopping sensor platform that tracks a user in the store to obtain anonymous shopper identification and associated shopping cart items; and a financial services provider to affect payment.
A method for posting of auditable, immutable data to a blockchain includes: receiving a blockchain comprised of a plurality of blocks, each block being comprised of at least a block header and one or more transaction values, wherein each transaction value includes at least a transaction hash; receiving a data file associated with a specific transaction hash included in a block in the blockchain, wherein the data file includes one or more variables; modifying at least one of the one or more variables included in the data file; generating a new hash value via application of one or more hashing algorithms to the modified data file; generating a new transaction value based on at least the generated new hash value and the specific transaction hash; digitally signing the generated new transaction value; and electronically transmitting the signed new transaction value.
A cryptographic method of performing a tokenised transaction between a payment offering party and a payment accepting party is described. The tokenised transaction is mediated by a transaction scheme. The payment accepting party is provided with a merchant identity and a merchant certificate associated with that identity by the transaction scheme provider. The payment accepting party provides the merchant identity and transaction seed data to the payment offering party. The payment offering party validates the merchant identity and uses the merchant identity and the transaction seed data to generate a cryptogram for the tokenised transaction. The payment offering party provides the cryptogram to the payment accepting party for transmission to the transaction scheme provider for authorisation of the tokenised transaction. A suitable user computing device and merchant computing device for acting as payment offering party and payment accepting party respectively are also described.
Systems, methods and computer program code are provided for receiving a token and a request to generate a sub-token based on the token, identifying an association between the token and a primary account number (PAN) of a user, generating a sub-token associated with the token and the PAN, and providing the sub-token for use in a payment transaction.
A method for facilitating peer-to-peer payments includes receiving, by a server, a payment request initiated by a payer for making a payment of an amount to a payee. The payment request includes social identifiers of the payer and the payee. Based on the social identifiers, the server retrieves a set of links or social graphs of the payer and payee. Based on the set of links or the social graphs, the server determines a first link that is indicative of a set of intermediaries connecting the payer and the payee. The server facilitates the transfer of the amount from a first financial account of the payer to a second financial account of the payee by a way of a set of intermediary financial accounts of the set of intermediaries indicated by the first link.
The invention provides methods, systems and computer programs for dual layer identity based access control implemented within systems that implement a micro-service architecture. The invention involves (i) receiving at a first resource server (a) a request for a first processor implemented service, (b) a primary access token generated by the primary identity authentication server, and (c) validation information corresponding to the primary access token that is transmitted by the primary identity authentication server, (iv) responsive confirming validity of the primary access token, transmitting to a secondary identity authentication server, a request for generation of a secondary access token, (v) receiving the secondary access token at the first resource server, and (vi) transmitting to a second resource server within the server system, a request for a second processor implemented service implemented by said second resource server.
A computing device for providing risk-based decisioning to a merchant during payment card transactions is provided herein. The computing device is programmed to receive, from the merchant, transaction data associated with a payment card transaction. The computing device is further programmed to compute a risk score for the payment card transaction based at least in part on the transaction data and infrastructure data associated with the payment card transaction. The computing device is also programmed transmit an indication of acceptable risk to the merchant if the risk score satisfies a first pre-defined threshold. The computing device is still further programmed to initiate an authentication challenge of the suspect consumer if the risk score satisfies a second pre-defined threshold.
A message routing and processing computing device and associated methods for routing and processing computer messages are disclosed. The message routing and processing computing device stores payment account identifiers and associated message routing instructions and is configured to receive a computer message including a payment account identifier. Based, at least in part, on the payment account identifier, the message routing and processing computing device determines a message route for the message and routes the message accordingly.
According to some embodiments, apparatus and methods are provided comprising a connector attachment including a housing, wherein the connector attachment is selectively connectable to a mobile device; and a first token stored within the connector attachment, wherein the first token is operative to execute a transaction with a second token. Numerous other aspects are provided.
A computer-implemented method for detecting potentially compromised payment cards is provided. The method uses a processor in communication with a memory. The method includes storing a plurality of tokens. Each token includes merchant identification data corresponding to a first merchant. The method also includes transmitting the plurality of tokens to the first merchant and receiving an authorization request message from a merchant. The authorization request message includes a token and a merchant identifier corresponding to the merchant. The method further includes determining that the received token is one of the plurality of tokens associated with the first merchant, determining that the merchant identifier does not correspond to the first merchant, transmitting a message including instructions to decline the transaction, and attaching a potentially compromised flag to the first merchant. The potentially compromised flag indicates a heightened probability of fraudulent activity.
A method for opening a secured lockbox through a digital signature includes: storing, in a memory of a computing device in a lockbox, a public key of a cryptographic key pair; receiving, by an input device of the computing device, a digital signature from an external communication device; validating, by a processing device of the computing device, the digital signature using the public key of the cryptographic key pair; and transmitting, by a transmitter of the computing device, a signal to an electronic locking mechanism of the lockbox interfaced with the computing device; and opening, by the electronic locking mechanism of the lockbox, an electronic lock granting access to contents of the lockbox upon receipt of the signal.
A DACD for controlling access to data resources in a high latency network is provided. The DACD includes a high latency network interface for connecting with a remote network, and a local network interface for connecting with a local network. Communications with the local network have a lower latency than communications with the remote network. The DACD is programmed to receive using the local network interface a request including a resource identifier that identifies a data resource which may be safely accessed by at most one server device at a time, query an activation database on the local network with the resource identifier to determine that the resource identifier is in a deactivated status, broadcast using the high latency network interface a broadcast request that includes the resource identifier, and update the activation status for the resource identifier in the database to an activated status for the local network.
Provided are systems and methods enabling enrollment in promotions via a tokenization platform. In one example, the method may include establishing a network communication channel between a tokenization platform and a digital wallet of a user device, transmitting a promotion from the tokenization platform to the digital wallet on the user device via the established network communication channel, receiving authorization to accept the promotion at the tokenization platform from the digital wallet on the user device, and identifying tokenized payment account information of the digital wallet stored at the tokenization platform and automatically transmitting information about the tokenized payment account information of the digital wallet information from the tokenization platform to a promotion enrollment system associated with the promotion. The example embodiments use existing payment network infrastructure to provide seamless promotional enrollment through a tokenization platform instead of a standalone website.
A method of performing a contactless transaction between a payment device and a terminal is described. The method comprises establishing a data connection between the payment device and the terminal and then establishing if the payment device and the terminal both support an enhanced security architecture. If they do not, they will then perform the contactless transaction according to a basic transaction flow using a first cryptographic system. If they do, they will perform the contactless transaction according to an enhanced transaction flow using a second cryptographic system. The first cryptographic system and the second cryptographic system comprise different asymmetric cryptographic systems. Suitable payment devices and terminals, and methods at the payment devices and terminals, are described.
A method for verification of a bearer of a credential device at a device reader is described. The method comprises first establishing a digital communication channel with the credential device, and then determining a set of verification options for the bearer and providing the set of verification options to the credential device over the digital communication channel. The credential device then selects a verification option from the set of verification options and communicates this to the device reader. The device reader can then verify the bearer of the credential device in accordance with the selected verification option. Methods at both the credential device and the device reader are described, as are suitably programmed credential devices and device readers.
A method for processing an encoded one-time number via payment rails includes: receiving, by a receiving device interfaced with a computing system, a one-time number, wherein the one-time number is comprised of at least an identification value and a remaining value; executing, by a querying module of the computing system, a query on a memory of the computing system to identify a routing number based on at least a portion of the one-time number; generating, by a generation module of the computing system, a data value, wherein the data value includes at least the identified routing number and the remaining value; and electronically transmitting, by a transmitting device of the computing system, the generated data value to an external system via payment rails associated with a payment network.
Systems and methods are provided for use in facilitating network transactions. In connection therewith, a server receives a request from an application of a requestor mobile device and polls sender mobile devices for location data, where a subset of the sender mobile devices is within a defined distance of the requestor mobile device. The server then receives a response from one of the subset of sender mobile devices and presents the response to the application of the requestor mobile device. Upon acceptance of the response, the server transmits the acceptance to the sender mobile device, thereby enabling delivery of an amount requested to a requestor user associated with the requestor mobile device in exchange for a digital transaction from an account of the requestor user to an account of a sender user associated with the sender mobile device.
A method for providing performance assessment of terminal devices is provided. A user initiates, by way of a service application that runs on a user device of the user, a first request for obtaining risk scores or connectivity scores of the terminal devices. The first request may include terminal identifiers of specific terminal devices or information pertaining to a specific geographical area. The user device communicates the first request to a server. The server determines the risk scores or the connectivity scores based on the first request. The server transmits, to the user device, a first response that includes the risk scores or the connectivity scores. The user device displays the risk scores or the connectivity scores to the user based on the first response, thereby providing the performance assessment of the terminal devices.
A method for facilitating a transaction with a one-time number includes: receiving a first transaction request, wherein the first transaction request includes a plurality of data elements including at least a first data element configured to store a zero transaction amount and a second data element configured to store a primary account number; parsing the primary account number stored in the second data element included in the received first transaction request; generating a one-time value, wherein the one-time value includes a predetermined number of digits and a subset of the predetermined number of digits is a reference to the processing server; storing a data entry comprised of at least the parsed primary account number and the generated one-time value; and transmitting the generated one-time value in response to the received first transaction request.
A system for training and applying deep learning to generate offer recommendations within a payment card network includes a propensity engine configured to train a machine learning model using neural collaborative filtering. The model is trained based on payment card transaction data providing indications of cardholder interactions with merchants, the model is configured to generate offer recommendations for cardholders of payment cards made available by merchants. The system also includes a model serving engine configured to apply available offer data to the model, thereby generating a set of offer recommendations matching one or more available offers with one or more cardholders. The system also includes an execution and fulfilment engine configured to deliver an available offer to a cardholder and fulfill the available offer when activated by the cardholder.
A method for awarding blockchain mining fees based on recycling efforts includes: receiving recycling data for each of a plurality of mining systems including an amount of recycled materials associated with the respective mining system; receiving validation data for each mining system from third party entities including, for each mining system, a confirmation of the amount of recycled materials for the respective recycling data; selecting one of the mining systems, which is weighted based on the amount of recycled materials for the respective mining system compared to a total amount of recycled materials for all mining systems; and receiving a new block generated by the selected mining system including a block header and a plurality of blockchain data values including a blockchain data value corresponding to a blockchain transaction for payment of mining fees for the new block to a wallet associated with the selected mining system.
A method for distributing controlled tokens to a secondary mobile device includes: storing account profiles, each including an account identifier, set of token credentials, and an associated mobile device identifier; receiving a token distribution request from a first mobile device including a first mobile device identifier, recipient mobile device identifier, specific account identifier, and account controls; identifying a specific account profile including the specific account identifier and first mobile device identifier; generating a single use identification value and reservation identifier; transmitting the single use identification value to the first mobile device; transmitting the reservation identifier to a second mobile device associated with the recipient mobile device identifier; receiving the reservation identifier and the single use identification value from the second mobile device; verifying the reservation identifier and single use identification value received from the second mobile device; and transmitting a new set of token credentials to the second mobile device.
A null-amount payment account system transaction is performed in cooperation with a user payment device presented by a user. In response to successful completion of the transaction, a download of data is received regarding the user.
A method for processing redundant blockchain transactions for linked wallets includes: storing blockchain data associated with a blockchain including a plurality of blocks, each block including a block header and blockchain data values, each data value corresponding to a processed blockchain transaction; receiving a new blockchain data value including an input transaction, recipient address, and transaction amount; confirming each input transaction based on a corresponding blockchain data value; identifying a plurality of blockchain wallets linked to the recipient address, and, for each wallet, an additional recipient address; generating a mirror blockchain data value for each linked wallet including the input transaction, transaction amount, and the additional recipient address identified for the respective linked wallet; and transmitting the new blockchain data value and each mirror blockchain data value to one or more nodes in a blockchain network associated with the blockchain.
An authentication server computing device is provided. The authentication server computing device is configured to receive a transaction request from an audio interface device, generate a first audio file including a first audio transmission, wherein the first audio transmission includes a primary security artifact and at least one secondary security artifact and the primary security artifact is an encoding of a one-time password, store a reference data file including the first audio transmission, transmit the first audio file to a verified user computing device associated with the account identifier, receive a second audio file from the audio interface device, wherein the second audio file includes a second audio transmission, verify the second audio transmission by comparing the second audio transmission to the reference data file including the primary security artifact and the at least one secondary security artifact, and authorize the transaction based on verifying the second audio transmission.
A transaction takes place between a first device and a second device. There is an authorisation system associated with the first device and a transaction support system associated with the second device. The transaction support system and the authorisation system are connected by a transaction infrastructure. A communication path is provided between the second device and the transaction support system. The second device is adapted to take the following actions. It performs a transaction with the first device and receives and generates transaction data. It splits the transaction data into basic transaction data and enhanced transaction data. It provides the basic transaction data to the transaction support system over the communication path. It also provides the enhanced transaction data by a separate route to the authorisation system for reconciliation with the processed transaction provided by the transaction support system for use by the authorisation system in authorising the transaction.
A method for redeeming vouchers includes receiving, by a server, a voucher redemption request for redeeming a voucher and a first set of purchase requests for a first set of purchases. The voucher is associated with a voucher value. When the voucher is a discount voucher, the voucher value is a minimum purchase amount, and when the voucher is a gift voucher, the voucher value is a gift amount. The server selects one or more purchase requests from the first set of purchase requests such that a sum of purchase amounts associated with the selected one or more purchase requests is greater than or equal to the voucher value. The server initiates a redemption of the voucher against the selected one or more purchase requests.
A method of constructing a workflow is described. The method is carried out by a programmed processor and a memory of a computing apparatus using a workflow processing language. One or more hooks are provided in the workflow processing language. Each hook is adapted to provide a programming interface to one of one or more applications. An input stream is received and converted into an input object that can be processed by the workflow processing language. A workflow with hooks to one or more applications is then used. The one or more hooked applications are used through the programming interface provided by the respective hook to prepare and provide an output stream. The computer apparatus adapted to construct and perform such workflows is also described.
A method for evaluating adherence to funding rules includes: storing transaction data entries, each including a controlled payment number (CPN), a merchant category code, transaction date, and transaction data, where the CPN is subject to a first spend control setting a maximum spend amount during a predetermined time interval; identifying a group of transaction data entries that includes a transaction date within a predetermined period of time; identifying a subset of the group of transaction data entries where the merchant category code is one of a set indicated in a funding adherence rule; determining an adherence score for the CPN based on a ratio of a number of transaction data entries in the subset to a number of transaction data entries in the group; and modifying the first spend control to adjust the maximum spend amount based on the adherence score and funding adherence rule.
Methods and a computer system for dynamically generating an embedded payment interface are described herein. The method includes obtaining rules that define a desired configuration of the embedded payment interface. The method also includes storing rules, storing a default interface template having a default configuration, and receiving an access message indicating that the webpage is accessed at a remote computing device, the access message including a plurality of data elements associated with the webpage and the access of the webpage by the remote computing device. The method also includes accessing the default interface template, generating customization commands that define an output configuration of the embedded payment interface by applying the rules to data elements, applying the customization commands to the default interface template to produce a payment interface having the output configuration corresponding to the desired configuration, and embedding the payment interface in the accessed webpage.
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object or an image, setting a parameter value or selecting a range
G06F 3/0482 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance interaction with lists of selectable items, e.g. menus
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR SPLIT PAYMENT CARD ACCOUNT TRANSACTIONS
The invention relates to methods, systems and computer program products for splitting a transaction payment between multiple payment cards or accounts while simultaneously availing of installment repayment facilities. The invention involves (i) receiving from a terminal device, information describing a payment transaction for implementation based on the plurality of payment card accounts, (ii) obtaining from each issuer, authorization for disbursement of a corresponding payment tranche, (iii) obtaining from one or more issuers associated, installment repayment arrangements offered by said one or more issuers, (iv) receiving from the terminal device, information identifying installment repayment arrangements that have been accepted by a payor, and (v) storing in a database, the information describing the payment transaction and the information identifying the one or more installment repayment arrangements that have been accepted by the payor.
A method and a system for processing transactions is provided. A terminal device executes a terminal action analysis on a transaction initiated at the terminal device by way of a transaction card. The terminal device compares a fraud count of the terminal device with a threshold fraud limit. If the fraud count exceeds the threshold fraud limit, the terminal device selects a first action from a set of actions for processing the transaction. When the first action is to authorize the transaction online, the terminal device transmits transaction details of the transaction to an acquirer server. The transaction details are indicative of a result of the terminal action analysis. The acquirer server generates an authorization request including a fraud indicator and updates the fraud indicator from a first value to a second value. The acquirer server communicates the authorization request, including the updated fraud indicator, to an issuer for authorization.
A computing device for risk-based analysis of a payment card transaction is provided herein. The computing device includes a processor communicatively coupled to a memory. The computing device is programmed to receive a request for authentication of the payment card transaction. The payment card transaction includes a suspect consumer presenting a payment card from a digital wallet of a privileged cardholder. The computing device is also programmed to identify fraud feature data from the digital wallet. The computing device is further programmed to compute a fraud score for the payment card transaction based at least in part on the fraud feature data. The computing device is still further programmed to provide the fraud score for use during authentication of the suspect consumer.
A computer-implemented method is provided for removing access to data, comprising: receiving a request from the user to delete the user data; suspending control of the user data; generating a second database comprising the user data under full control of the user; deleting the user data from the database; and, on request re-integrating the user data into the same database or integrating into a further database. By providing a database under complete control of the user and outside the control of any database manager or service provider, users are given more freedom to decide what to do with their data. They can choose to protect it, or to monetize it themselves by selling it or licensing it. They can also create a plurality of copies, allowing sales to more than one database manager or service provider.
A method of obtaining a digital product or service at a computing device is described. The computing device has a service application for the digital product or service installed on it. The service application obtains a valid authentication from a user. The service application also obtains a request for the digital product or service from the user. After this, the service application prepares a transaction authorisation request comprising a payment application cryptogram. This payment application cryptogram comprises a customer verification from the valid authentication of the user and transaction details for authorisation and settlement of a transaction for the digital product or service through a transaction processing system. The service application provides the transaction authorisation request to the transaction processing system for authorisation and settlement. A suitable computing device is also described.
A method and a system for offering value-added services on a transaction initiated at a terminal device is provided. The method includes generating a reference identifier for the transaction by a server. The server stores the reference identifier and service details of the value-added services that are applicable on the transaction in a database, and communicates the reference identifier to the terminal device. The server receives a service request for offering a first value-added service on the transaction from the terminal device. The service request includes the reference identifier. Based on the reference identifier included in the service request, the server retrieves the service details of the first value-added service from the database and communicates a service response including the retrieved service details to the terminal device. Based on the service response, the first value-added service is offered on the transaction.
During recent years, chip-based transactions has been changing from mainly physical, like a chipcard, to mainly virtual, such as a software application on a mobile device. Although such mobile devices are very powerful compared to a conventional chip card, the data interactions with POI terminals must still be compliant with relevant specifications and standards such as the EMV standards.
During recent years, chip-based transactions has been changing from mainly physical, like a chipcard, to mainly virtual, such as a software application on a mobile device. Although such mobile devices are very powerful compared to a conventional chip card, the data interactions with POI terminals must still be compliant with relevant specifications and standards such as the EMV standards.
A computer implemented transaction method is provided that enables a first application to be switched with a second application whilst the transaction is in progress, and without loss of information relating to the transaction. The switching process can be facilitated by either instructing a user to remove an identification device, such as a mobile phone or a chipcard, out of a field produced by a terminal and subsequently return the identification device to within the field produced by the terminal, or turning an antenna of the identification device off, waiting a predetermined length of time and turning the antenna back on again. This enables the transaction to be completed using an optimal application whilst also providing a positive user experience throughout.
A data controller computing device is configured to receive, from a voice-controlled (VC) computing device, a shared payment initialization request identifying a primary user payment account associated with the VC computing device. The DC computing device creates a shared payment account linked in a database to the primary user payment account. The DC computing device also receives secondary user information, and links in the database at least one secondary user payment account to the shared payment account. Additionally, the DC computing device transmits a shared payment account identifier to the VC computing device. The DC computing device receives, via a payment network, a transaction authorization request including the shared payment account identifier, a merchant identifier, and a transaction amount. The DC computing device applies respective portions of the transaction amount against each of the primary user account and the at least one secondary user payment account.
A system and method of modifying an execution of a processing system during runtime are provided. The method uses a computing device having at least one processor and at least one memory device and includes receiving an indication of data or instructions being available for modifying the execution of the processing system during runtime, determining at least one data element associated with the indication of data or instructions, generating metadata based on at least one of the indication and the determined at least one data element, and periodically executing a job, the job reads the metadata and modifies a workflow of the processing system based on the metadata.
The invention comprises systems, methods and computer program products for implementing a payment wallet based electronic payment transaction. The invention comprises (i) receiving from a wallet application a payment amount, a payment wallet account associated with a payor, and a payee account, (ii) identifying a plurality of payment accounts associated with the identified payment wallet account, (iii) for each identified payment account, retrieving from a corresponding issuer server, information identifying available funds in said payment account, (iv) transmitting account information corresponding to one or more of the identified payment accounts to the client terminal, (v) receiving from the client terminal, input identifying a selected payment account from among the identified payment accounts, and (vi) transmitting to an issuer network associated with the selected payment account, a payment initiation request for effecting payment of the payment amount from the selected payment account to the payee account.
A method for providing additional security for a blockchain wallet through the use of a dynamic pseudo key confirmed through digit positioning includes: storing digit pairs, each including a predefined value and a character position; receiving a dynamic pseudo key and transaction information, where the key includes characters in set positions and the transaction information includes a destination address and data value; validating that the dynamic pseudo key has not been used for a prior blockchain transaction; validating that the characters in set positions in the dynamic pseudo key includes the predefined value in the corresponding character position for each of the digit pairs; generating a digital signature using a private key after successful validation of the dynamic pseudo key; and transmitting the digital signature and transaction information to a node in a blockchain network associated with a blockchain.
Methods, apparatus and systems for upgrading an untrusted channel to a trusted channel. In an embodiment, a verifier server computer receives a request to verify an untrusted channel address from a first service component that is associated with a Consumer identifier, retrieves a trusted channel address from a verifier database, and then generates a one-time password witness value. The verifier server computer then splits the one-time password witness value into a first portion and a second portion, and transmits the first portion to the first service component and transmits the second portion to the second service component. The process includes receiving a recomposed value from the first service component, splitting the recomposed value into a first recomposed value and a second recomposed value, generating a reverted one-time password value, determining that the reverted one-time password value equals the one-time password witness value, and then transmitting an authentication message to the first service component confirming authentication of the consumer enabling upgrading of the untrusted channel to a trusted channel.
An auto-enrollment billing updater (AEBU) computing device for enrolling enrollees in an automatic updating program is provided. The AEBU computing device is configured to receive, from an acquirer computing device, an account update request for updated account data for a set of account identifiers including an input acquirer identifier and an input merchant identifier, perform a lookup within a transaction database using a combination of the input acquirer identifier and the input merchant identifier, wherein the transaction database includes transaction data involving a plurality of cardholders and a plurality of merchants, identify as a merchant enrollee the merchant included within the transaction database having a stored acquirer identifier and a stored merchant identifier combination that matches the input acquirer identifier and the input merchant identifier combination included in the request, and automatically enroll the merchant enrollee in the automatic updating program when the merchant enrollee is identified.
A method for authorization of multiple transactions using a single authentication process is described. The method includes determining that a user is an authorized user based on user credentials associated with the user; authorizing a transaction device identified by the authorized user for future electronic transactions with one or more restrictions; and providing previously stored payment card information associated with a user account of the authorized user for electronic transactions initiated at the authorized transaction device in accordance with the one or more restrictions.
A first data processing apparatus comprising: communication circuitry configured to transmit data to or receive data from a second data processing apparatus using electromagnetic induction when the first data processing apparatus is brought into proximity to the second data processing apparatus; a storage medium; and processing circuitry configured: to control the communication circuitry to transmit first data indicative of a user of the first data processing apparatus to the second data processing apparatus; to control the communication circuitry to transmit second data to or receive second data from the second data processing apparatus, the transmission or reception of the second data occurring in response to the completion of a predetermined data processing event; to control the communication circuitry to receive third data from the second data processing apparatus, the third data being received in response to the completion of the predetermined data processing event and being digitally signed by the second data processing apparatus, wherein the digital signature of the third data is generated using the first data and the third data; and to store the received third data in the storage medium.
A method is provided for communicating a non-speech message as audio from a first device to a second device such that information can be passed between the first and second device. The method includes: encoding the non-speech message as a dissimilar speech message having a plurality of phonemes; transmitting the speech message over one or more audio communications channels from the first device; receiving the speech message at the second device; recognizing the speech message; and decoding the dissimilar speech message to the non-speech message. By using existing audio functionality, and the increasingly more reliable voice recognition applications, an improved method is provided for sharing complex data messages using commonly available communication channels.
G10L 19/00 - Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
G10L 13/04 - Methods for producing synthetic speech; Speech synthesisers - Details of speech synthesis systems, e.g. synthesiser structure or memory management
METHOD AND SYSTEM FOR ACCOUNT SECURITY OF RECYCLED PHONE NUMBERS
A method for validating a message recipient includes: storing, in a memory of a processing server, a device profile, wherein the device profile is related to a mobile computing device and includes at least a device identifier, and token validation data; receiving, by a receiver of the processing server, a data signal from an external system that is encoded with a message packet, wherein the message packet includes at least the device identifier, a device token, and a content message; validating, by a processing device of the processing server, the device token using at least the token validation data; and electronically transmitting, by a transmitter of the processing server, the content message to the mobile computing device.
A method for using the active connection of connected devices for additional security in the conveyance of sensitive data from a computing device includes: storing sensitive data; storing one or more device identifiers, wherein each device identifier is associated with a connected device separate from the computing device; receiving a user instruction requesting use of the sensitive data; detecting one or more active communication channels between the computing device and external connected devices; identifying, for each of the detected one or more active communication channels, a device identifier associated with the respective external connected device; verifying that at least one of the identified device identifiers is included in the one or more stored device identifiers; and transmitting the sensitive data after the verification.
A method for processing cash-withdrawal transactions is provided. When available cash at a terminal device is less than a first amount that a user wants to withdraw, the terminal device presents a first option to the user to receive a first part of the first amount, which the terminal device is falling short of, as a voucher or a credit in a digital wallet. When the first option is selected, the terminal device displays a list of digital wallets and vouchers to the user. The terminal device communicates a first request to the payment network indicating a selection of the first option and one of a voucher or a digital wallet. Based on the first request, the payment network initiates crediting of the first part in the digital wallet or procuring of the voucher, with the terminal device dispensing the remaining part of the first amount as cash.
G07F 19/00 - Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 30/02 - Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination