Entries |
Document | Title | Date |
20080201261 | SYSTEM AND METHOD FOR ELECTRONIC PAYMENT PROCESSING - A method for electronically processing payments made to a plurality of merchants in a plurality of payment modes includes: (a) receiving information on the payments into a server; (h) processing the information into an automated clearinghouse file; (c) validating the automated clearinghouse file; and (d) sending the automated clearinghouse file from the server to an automated clearinghouse. Fraud is reduced, and rules are simplified and standardized. | 08-21-2008 |
20080208746 | MANAGEMENT OF FINANCIAL TRANSACTIONS USING DEBIT NETWORKS - Methods and systems are disclosed of enrolling a customer to perform an action. A first piece of information is received at an authentication processor from an over-the-air processor. The first piece of information was provided to the over-the-air processor by the customer from a mobile electronic device. A second piece of information is received at the authentication processor from a server different from the over-the-air processor. The second piece of information was provided to the server by the customer. The first and second pieces of information are associated by the authentication processor to enroll the customer. | 08-28-2008 |
20080208747 | Method for restricting a use of a credit or debit card - A method for restricting a use of a credit or debit card when buying an item, comprising an allocation to said card of an identifier and associated therewith a series of restrictions relating to a buying behaviour, said series of restrictions being stored within an item restrictions database, remote from a point of sale where said item is sold, and wherein when a holder of said card offers said card for payment purpose of said item to be bought, there is checked whether at least one of said restrictions would form an obstacle for paying said item by using said card, and, if at least one of said restrictions would form such an obstacle, said payment by using said card being declined, and wherein upon each payment with said card, said series of restrictions being downloaded from said item restriction database and temporarily stored into a data processing system of said point of sale, said checking being performed by said data processing system of said point of sale. | 08-28-2008 |
20080208748 | Transaction system and method - A transaction system having security parameters can authorize transactions based on a merchant category code, a card verification value code, a geographic location, a monetary value range, a transaction mode, an account access parameter, a class of goods, or a class of services, for example. | 08-28-2008 |
20080208749 | METHOD AND SYSTEM FOR ENABLING COMMERCE USING BRIDGE BETWEEN REAL WORLD AND PROPRIETARY ENVIRONMENTS - A system, apparatus, and method is provided for enabling commerce transactions, and other forms of commercial activity among participants in a gaming or other forms of virtual environment and the real world, or between a participant in one virtual environment and a participant in a second virtual environment, using or taking advantage of the services of an Identity Bridge or Gateway. In particular, a real-time commercial activity system is implemented through user interface interactions, and middle-ware interactions. A financial transaction between the users is facilitated through a third party finance service provider, using proprietary identities of the users. Since the system obtains and verifies the relationship between proprietary and real identities of the users, the financial transaction can be facilitated in a secure and trusted fashion without revealing real identities. | 08-28-2008 |
20080215488 | Payer-Based Account Porting To Portable Value Distribution Systems And Methods - A value distribution method includes enrolling a payee into a source program through which the payee receives funds from a payer. The source program includes a stored value account into which the payer deposits the payee's funds. The stored value account has account information associated therewith. The method also includes receiving a porting trigger, and, in response to the porting trigger, establishing a target program for the payee. The target program includes a target account into which entities in addition to the payer may deposit funds. The method also includes porting at least a portion of the account information from the source program to the target program. | 09-04-2008 |
20080222038 | Location Based Authentication System - An improved location based authentication (LBA) system for detecting fraudulent transactions committed by means of misuse of payment cards is disclosed. The improved LBA system performs a series of transaction analysis and generates a fraud-score which provides an indication as whether to authorize an attempted transaction. The system is designed to increase profitability of credit card companies by reducing the accumulated losses due to fraud. In one embodiment, the system detects fraud by analyzing the behavior patterns of card holders and merchants. | 09-11-2008 |
20080222039 | MONEY-TRANSFER TECHNIQUES - A technique for transferring money between a customer and a beneficiary comprises a money-transfer company, and a plurality of selling agents and paying agents. The money-transfer company maintains a server, a database, and a communications interface for communicating, via a telephone network and/or the Internet, with data terminals located at the selling and paying agents' sites. Customer transaction cards are distributed to customers. These cards have a visible card number and a corresponding alphanumeric card code stored in, e.g., a magnetic strip. In response to a customer's request, the money-transfer company activates the customer's transaction card by loading customer and beneficiary information into a corresponding transaction card record stored in the database. A selling agent initiates a money-transfer request from a data terminal. Specifically, the selling agent enters a monetary amount and swipes the customer's card in a magnetic strip reader located on the data terminal. Upon receiving the money amount and the customer's card code, the company creates a corresponding and unique transaction record associating the customer, his (her) card and the beneficiary, in the database and returns a fund pick-up (“folio”) number to the customer. The customer discloses the folio number to the beneficiary, who, with this number and appropriate personal identification, collects the transferred money from a paying agent. The customer can use the same transaction card to make subsequent money transfers, in any amount, to the same beneficiary. | 09-11-2008 |
20080228648 | SYSTEM FOR PERSONAL AUTHORIZATION CONTROL FOR CARD TRANSACTIONS - An authorization system allows for cardholder-provided parameters to a personal authorization subsystem. The parameters can be selected by the cardholder to limit the authorizations that would otherwise be granted on the card. The parameters can indicate limits by frequency, dollar amount, merchant, geographic location, time of day, combinations thereof, or the like. Authorization for a given transaction, even where authorized by an issuer and a network operator, might be denied based on self-constraints set by the cardholder. In some variations, messages are sent to the cardholder based on constraints set by the cardholder and transactions might be approved and messaged, or denied and messaged. | 09-18-2008 |
20080235136 | SYSTEM FOR PERSONAL AUTHORIZATION CONTROL FOR CARD TRANSACTIONS - An authorization system allows for cardholder-provided parameters to a personal authorization subsystem. The parameters can be selected by the cardholder to limit the authorizations that would otherwise be granted on the card. The parameters can indicate limits by frequency, dollar amount, merchant, geographic location, time of day, combinations thereof, or the like. Authorization for a given transaction, even where authorized by an issuer and a network operator, might be denied based on self-constraints set by the cardholder. In some variations, messages are sent to the cardholder based on constraints set by the cardholder and transactions might be approved and messaged, or denied and messaged. | 09-25-2008 |
20080243690 | Money Transfer System And Messaging System - A system for transferring funds from a sender to a recipient with a recorded message is disclosed. In one step the method includes receiving a request for a fund transfer from the sender. The sender may make the request for a fund transfer at a transaction processing device. In another step a payment is received from the sender for the fund transfer and a payment confirmation is transmitted to the host computer system. An identifier may then be assigned to the fund transfer. A recorded message from the sender may be received and at least a copy of the recorded message may be transmitted to a host computer system. The recorded message may then be associated with the fund transfer. A request, including the identifier, may be received from the recipient to receive the recorded messaged. In another step the recorded message may be sent to the recipient. | 10-02-2008 |
20080243691 | PERSONALLY CUSTOMIZABLE CREDIT CARD ACCOUNTS - Account holders may specify vendor-specific charge restrictions for charging transactions against their accounts, where each vendor-specific charge restriction includes a unique identifier for the corresponding vendor to which the charge restriction is applicable. The charge restriction may be an exclusion from approval of all charge authorization requests, an amount limit on charge authorization requests which may be approved, a “rebill” limit on the number of times subsequent charge authorization requests may be approved, or a combination of such restrictions and/or other restrictions. When a charge authorization request is received for a charge against an account having vendor-specific charge restrictions set by the account holder, the vendor identifier is extracted from the charge authorization request and employed to determine whether any charge restrictions are applicable to the requesting vendor. The vendor-specific charge restrictions for a particular vendor may be specified by the account holder either before or after an initial charge transactions involving that vendor, with the vendor identifier either manually entered by the account holder or automatically extracted from an account transaction record. | 10-02-2008 |
20080249938 | SYSTEM AND METHOD FOR MERCHANT DISCOVERY AND TRANSFER OF PAYMENT DATA - A method and system are provided for communicating with a merchant server and transferring payment data in a transaction between a mobile device and a merchant server. A user of the mobile device has a user identifier registered with the system and the merchant server has a merchant identifier registered with the system. The method comprises the steps of: receiving the merchant identifier from the mobile device; determining a merchant server address associated with the merchant identifier; establishing a communication channel with the merchant server; exchanging interactive information requests and responses between the merchant server and the mobile device; determining payment data associated with the user identifier; and providing the payment data to the merchant server. | 10-09-2008 |
20080249939 | Systems and Methods for Using Interactive Devices for Identification, Security, and Authentication - A computer implemented method of using data from 1 or more physical devices to process business logic. The devices can comprise of things like a mobile phone or hand set, a cell phone system tower, a GPS satellite, cable systems set top box, a business machine like a merchant's credit card processing machine or a unique personal communication device. The data received from the different device(s) is analyzed by a server(s) to determine things like location, best practice, fraud, identification, secure data ownership, payment verification and the presence of a device owner's actual control of the physical device or a physical asset. | 10-09-2008 |
20080249940 | Transaction Accounting Processing System and Approach - Accounting data is classified to facilitate transaction processing and management. According to an example embodiment, data based rules are implemented for generating transaction data using stored rules and identified valid accounting codes. Transaction information is processed as a function of the rules and generated transaction data (e.g., for classifying expenses under generated valid accounting codes). This approach involves, for example, identifying data based rules and valid accounting codes to use in processing received transaction information and in generating/applying accounting codes to the transaction information. | 10-09-2008 |
20080249941 | TRANSACTION CARD SYSTEM AND APPROACH - A deferred-type payment approach facilitates transaction card management and processing. According to an example embodiment, a user's transaction card purchases are authorized against a purchase limit associated with a consideration-bearing (e.g., interest-bearing) account. The purchases are tracked and, at the end of a billing cycle, provided to the user via a statement or other informative approach. During a payment time period after the end of the billing cycle, the user is afforded an opportunity to review tracked purchases and provide funds to cover the purchases. If the user does not provide funds for the purchases during the payment time period, funds are automatically transferred from the consideration-bearing account to cover the purchases at the end of the payment time period. In this regard, purchases made with the transaction card against the consideration-bearing account are not assessed against the consideration-bearing account until after the billing cycle has ended. | 10-09-2008 |
20080255992 | Double recognizing method by means of telephone number and identification code for online credit card transactions over the internet - The present invention relates to a “double recognizing method by means of telephone number and identification code for online credit card transactions over the internet,” in which the credit card holder not only registers a “self-chosen code” by himself/herself for VBV (Verified By VISA) or MSC (MasterCard SecureCode) network identity verification but also registers another set of “telephone number and identification code” by himself/herself for serving as an exclusive personal double identity recognizing information for online credit card transactions. The credit card issuing bank registers and stores the set of “telephone number and identification code” on a double recognizing database after checking truth of the related identity certificate provided by the credit card holder. When the credit card issuing bank handles the online credit card transaction of the credit card holder over the network, the credit card issuing bank not only proceeds the check on the “self-chosen code” used in the original VBV or MSC verification system but also performs the double check on the “telephone number and identification code” used in the telecommunications transceiving processor platform of the internal credit card double recognizing computer system, for example by sending out a short message to the credit card holder for requesting him/her to immediately reply by another short message to his/her “telephone number and identification code.” | 10-16-2008 |
20080255993 | Mobile payment and accounting system with integrated user defined credit and security matrixes - A platform that accommodates financial transactions and is accessible via mobile phone networks, Internet and traditional methods is linked to user defined credit and security matrixes. Credit risk tolerance factors consider the qualifications, characteristics, and profile of counterparties. Security risk tolerance factors consider the user's willingness to use a particular financial platform in an environment where abuse, fraud, theft, and other security factors are of concern. In both cases the user creates matrixes that describe risk tolerance and financial transactions must successfully pass through the filters designed by the user. The system can be used alone or linked to bank accounts, credit and debit accounts, etc. This provides a higher level of security and risk control in a mobile or Web-based environment. By giving customers way to control risk, use of new electronic methods of payment and other financial transactions can be accommodated in a more comfortable, secure, and efficient manner. | 10-16-2008 |
20080262967 | Information processing method and device thereby - An information processing method, includes steps of detecting a use range set for one of digital money expressed in digital data and a use right of the digital money, and a use status of one of the digital money and the digital money right when one of the digital money and the digital money use right is used, determining whether the use status falls within the use range, and permitting the use of one of the digital money and the digital money use right if the use status falls within the use range or not permitting the use of one of the digital money and the digital money use right if the use status falls out of the use range. | 10-23-2008 |
20080270303 | Method and system for detecting fraud in financial transactions - Detecting fraud in financial transactions. The systems and methods manage a fraud detection alert in a fraud queue; automatically locate the associated financial account data; display workflows on a graphical user interface; automatically navigate through workflows; ensure compliance with predetermined rules specific to a account-provider, business, or regulation; store all activity and data related to each fraud detection alert; and automatically update the fraud queue. The systems and methods include a fraud analyst workstation, a workflow engine, a host computer system, and a workflow database. The fraud analyst workstation communicates with the workflow engine, which stores and applies the predetermined rules. The workflow engine communicates with the host computer system to access the financial account data. The workflow engine communicates with a workflow database, which stores all activity and data related to each fraud detection alert for purposes of tracking, billing, and research. | 10-30-2008 |
20080270304 | FUNDS TRANSFER SYSTEM AND METHOD - Using a single source money management system customers may automate their committed spending. A money management account and a discretionary fund account are established in response to a customer's request to participate in the system. A financial institution receives money on a periodic basis from a customer's predictable payment system. The money is then deposited/transferred to the money management account, retained in the money management account as required for bill payment, and/or deposited/transferred into the discretionary fund account if it is “excess.” Bills are paid on a customer determined schedule directly from the money management account using the money retained in the money management account. A loan account may also be established in response to a customer's application for a loan account. A financial institution grants a loan for a loan purchase in response to a customer's application for a loan purchase. The system and/or the financial institution handles payment for the loan purchase and repayment of the loan from the loan account from the money management account. The present invention may include a secure internet shopping system that includes a vendor web system and a financial institution web system. Each vendor offers goods and/or services. The financial institution web system permits customer authorization of payment to a selected vendor. | 10-30-2008 |
20080275819 | System and Method for Transaction Payment in Multiple Languages and Currencies - The invention relates to a method and system for transaction payment wherein user identification data from an identification module ( | 11-06-2008 |
20080275820 | Apparatus and method for providing account security - An account security apparatus, including a memory device for storing a limitation or restriction on a use of at least one of a cable television account, an electrical utility account, a gas utility account, a fuel oil utility account, an insurance account, a subscription accounts for a good, product, or service, a health care insurance account, a pharmacy account, a social security account, and a credit report account, transmitted to a receiver from a communication device associated with an individual account holder, and a processing device for processing an authorization request for a transaction or a use of the account. The processing device utilizes the limitation or restriction automatically stored in the memory device in processing the authorization request and generates a signal containing information for authorizing or disallowing the transaction or the use of the account. | 11-06-2008 |
20080288403 | PIN ENCRYPTION DEVICE SECURITY - An apparatus and method for securing transaction data, includes reading token data from a token using a read apparatus and encrypting the token data at the read apparatus, sending the encrypted token data to a security module over a communication link, and verifying the integrity of the communication link based on encrypted token data. The apparatus and method can further include receiving authentication data for the token and encrypting the authentication data within the security module, and combining the encrypted token data and encrypted authentication data into a transaction data stream. In various embodiments, a detection apparatus with plurality of read structures (for example, read gaps), can be used to provide additional information in verifying the integrity of the communication link comprises determining whether the read structures are detecting token data with a spatially diversity in accordance with a geometry of the read structures. | 11-20-2008 |
20080288404 | METHOD AND SYSTEM FOR PAYMENT AUTHORIZATION AND CARD PRESENTATION USING PRE-ISSUED IDENTITIES - Systems and methods for authenticating a party are disclosed. A transaction may be initiated between a relying party and a presenter. The relying party can send the presenter a message with transaction information and requirements for authentication. The presenter can forward the message to a third party, which can authenticate the presenter to the relying party. | 11-20-2008 |
20080288405 | Systems and Methods for Automatic and Transparent Client Authentication and Online Transaction Verification - Systems and methods are described for providing fraud deterrents, detection and prevention during e-commerce, e-transactions, digital rights management and access control. Fraud deterrent levels may be automatically selected by a requesting transaction approval entity server (and can be related to level of risk, or security, related to fraud) or may be selected by a consumer. These deterrent levels can determine the manner in which the transaction occurs as well as the types of information that must be provided and validated for successful approval of the transaction. The client can associate their credit card with a specific device, an e-identity, such as an instant messaging identity, and the e-identity is contacted as a part of finalizing a payment transaction so that a client response of ‘approve’ or ‘reject’ can be obtained. The anti-fraud technology also provides for management and storage of historical transaction information. Entity-to-client communication occurs according to merchant permission parameters which are defined by the client and which enable messages sent by the entity to be automatically allowed, rejected, and managed in other ways as well. | 11-20-2008 |
20080294556 | MOBILE COMMERCE SERVICE - A payment system processes payments so that vendors and consumer may have an increased degree of confidence as to the security of the transaction. More precisely, a consumer enters a messaging address through which the user may receive communications on a wireless device using a vendor point of sale system. The consumer identifies goods for purchase and the vendor generates a transaction total for the identified goods. The consumer's messaging address is received and a transaction request is received at an intermediary server operated by a wireless carrier. The transaction request is presented to the consumer in a display on the wireless device. The consumer uses the wireless device to authorize the transaction request and transmits the authorization to the intermediary server. The intermediary server receives the authorization and transfers, based on receiving the authorization, resources to the vendor to pay the transaction amount. | 11-27-2008 |
20080294557 | Data Processing System And Method - A method of authenticating a transaction, comprising providing details of a card to a merchant; providing transaction identifying information to a data processing device; and sending the transaction identifying information to a third party using the data processing device. | 11-27-2008 |
20080294558 | PORTABLE ELECTRONIC APPLIANCE, DATA PROCESSOR, DATA COMMUNICATION SYSTEM, COMPUTER PROGRAM, DATA PROCESSING METHOD - Aimed at providing a portable electronic appliance and a data processor capable of preventing stealing of electricity, a mobile phone terminal, which is a portable electronic appliance of the present invention supplied with electric power from the specific commercial power source, is brought into functional interruption by a data processor, the data processor executes account settlement of supplied power while keeping the mobile phone terminal in functional interruption, and upon completion of the account settlement, the data processor unlocks the functional interruption of the mobile phone terminal, so that an authorized contractor of the commercial power source is prevented from being unreasonably charged with power rate charged up in the mobile phone terminal, and stealing of electricity by the user of the mobile phone terminal may be avoidable. | 11-27-2008 |
20080301050 | REAL TIME ACCOUNT UPDATE - A method is used in a system that includes a financial service provider coordinating accounts issued by an issuer to cardholders requesting credit from merchants. Each merchant has an acquirer with whom the financial service provider also coordinates the accounts. The method can be performed by a merchant sending a transmission to its acquirer including a request for a transaction against one account to which the merchant receives a denial or prior to receiving such a denial. The merchant then requests information from the financial service provider who responds by sending the requested information, upon which the merchant determines whether to extend the credit. When the method is performed by a financial service provider, in response to the denial received by one merchant or prior to such denial, the financial service provider receives a transmission from the merchant including a request for information about the account. In response, the financial service provider sends the merchant the requested information. | 12-04-2008 |
20080301051 | Internet fraud prevention - A method of detecting malware on a computer and comprising scanning a system memory of the computer, and/or code being injected into the system memory, for known strings indicative of banking trojans. These strings may be Universal Resource Locators and/or partial Universal Resource Locators. | 12-04-2008 |
20080313078 | SYSTEM AND METHOD FOR VERIFICATION OF SITE LOCATION USING AN APPLICATION-SPECIFIC USER INTERFACE ON A PERSONAL COMMUNICATION DEVICE - Systems and methods for preventing fraud during a purchase transaction performed at a retail device are disclosed. According to one system and method, an identifier is received from an application-specific user interface executing on a personal communication device, wherein the identifier is associated with the retail device. Location information associated with the personal communication device is received, and the location information associated with the personal communication device is compared to location information associated with the retail device. It is determined whether the personal communication device and the retail device are located proximately to one another. The purchase transaction is authorized if the personal communication device and the retail device are located proximately to one another. | 12-18-2008 |
20080313079 | SYSTEM AND METHOD FOR PROXIMITY PAYMENT TRANSACTION BETWEEN A WIRELESS COMMUNICATION DEVICE AND A POINT OF SALE TERMINAL IN CONJUNCTION WITH A TRUSTED PARTY - A method for proximity payment transaction between a wireless purchasing device and a point of sale terminal in conjunction with a trusted party. The wireless communication device initiates a proximity payment application for a transaction between the wireless purchasing device and the point of sale terminal. The wireless communication device transmits the first authentication code to the point of sale terminal. A first code is inputted at the point of sale terminal as a watermark on the superimposed photo image of the user, wherein the superimposed photo image is displayed on the wireless purchasing device. The point of sale terminal transmits a first code and the first authentication code to the trusted party via a second communication network. The point of sale terminal receives an approval message from the trusted party for approving the transaction between the wireless purchasing device and the point of sale terminal. | 12-18-2008 |
20080313080 | Method and Apparatus for Controlling the Transfer of Private Information in a Communication System - Methods and systems for selectively transferring confidential or private information to a user of a communication device are disclosed. In an exemplary method, a trigger event is detected at a first communication device, resulting in the retrieval of a data object for transmission to a second communication device. If the data object includes private or confidential information, consent of a user of the first communication device is required before the data object may be sent to the second communication device. In some embodiments, consent is obtained by explicitly requesting consent from a user. In others, consent may be deemed under pre-determined circumstances. | 12-18-2008 |
20080313081 | Method and Apparatus for Payment Service Using Bar Code - A method and apparatus for a payment served based on a card of a purchaser instead of a wire or wireless card inquiry apparatus or a payment gateway program owned and managed by a merchant. The method includes confirming merchandising member store information provided after a merchant registers on a finance company for a member store to generate and provide merchandising member store identification information. Upon receipt of a transaction request made by a purchaser receiving a transaction bar code generated to include the merchandising member store identification information and detailed transaction information using a financial transaction card of the purchaser and the transaction bar code, the transaction bar code is read out to collect the merchandising member store identification information and then verify member store information of the corresponding merchant. An approval of a transaction made by the purchaser for the merchant is requested to a finance company. | 12-18-2008 |
20080319904 | SEEDING CHALLENGES FOR PAYMENT TRANSACTIONS - Systems, methods, and apparatus are provided for authenticating a consumer using challenge questions. A response to a challenge question is verified via seeding the challenge question, receiving response, and deductively determining the answer. The verified response and challenge question may then be used to authenticate a consumer as part of an authorization process. | 12-25-2008 |
20080319905 | SECURE MOBILE PAYMENT SYSTEM - The present invention provides a method for conducting a transaction that includes receiving a pseudo account identifier that corresponds to a primary account identifier. The pseudo account identifier may be received at a portable wireless device and may be generated by a remote server computer. The portable wireless device can receive the pseudo account identifier over a first network and provide the pseudo account identifier to an access device. The access devices generally comprises a reader that can receive the pseudo account identifier, and thereafter send a message to request authorization of a transaction. The authorization request message may include the pseudo account identifier and is sent to a payment processing network. The authorization request message is sent to the payment processing network over a second network. The payment processing network may then process the authorization message and return a response that indicates if the transaction is authorized or not. | 12-25-2008 |
20080319906 | BIOMETRIC IDENTIFICATION DEVICE - The invention is directed towards methods, systems and apparatuses, see FIG. | 12-25-2008 |
20080319907 | SECURE TRANSACTION METHOD AND SYSTEM INCLUDING BIOMETRIC IDENTIFICATION DEVICES AND DEVICE READERS - The invention is directed towards methods, systems and apparatuses, see FIG. | 12-25-2008 |
20090006254 | VIRTUAL PREPAID OR CREDIT CARD AND PROCESS AND SYSTEM FOR PROVIDING SAME AND FOR ELECTRONIC PAYMENTS - A virtual credit card, as a set of data, free of a physical substrate, the data being adapted to authorize a person who is in possession thereof to pay for a product or service, in particular in the framework of an online transaction, the data set being produced on the basis of a credit card account or a pre-payment and in response to a user authentication procedure involving an evaluation of biometric features of a user, in particular of his/her voice profile, and being available at a telecommunication terminal, in particular a mobile phone, of the authenticated user. | 01-01-2009 |
20090012898 | Location based credit card fraud prevention - A method is provided for blocking an unauthorized use of a payment instrument for a transaction. The method includes: establishing a transaction location ( | 01-08-2009 |
20090012899 | SYSTEMS AND METHODS FOR GENERATING AND MANAGING A LINKED DEPOSIT-ONLY ACCOUNT IDENTIFIER - Embodiments relate to systems and methods for generating and managing a deposit-only account identifier that can be portably linked to one or more transaction accounts, at the account holder's discretion. A deposit-only account identifier can be a virtual identifier, such as a temporary or permanent account number. The account holder can publish the virtual identifier to desired persons, financial institutions, or other parties to permit those entities to transmit funds to the deposit-only account. The account holder can move received funds to one or more linked transaction accounts, such as bank checking accounts, money market accounts, or others. Details regarding the underlying account(s) such as geographic location, currency, balances or other information can be retained in confidence, visible only to the account holder. Received funds can be distributed to underlying accounts according to criteria such as the currency or amount of the received funds, time of receipt, or other rules. | 01-08-2009 |
20090018959 | METHODS AND SYSTEMS FOR EXCHANGING AND/OR TRANSFERRING VARIOUS FORMS OF VALUE - Methods and systems for exchanging various forms of value, including coins, currency, credit, debit, and/or bank account funds, for prepaid cash cards, credit cards, phone cards, and the like. In one embodiment, a value exchange machine includes a coin input region, a coin sorting/counting apparatus, a card reader, and a communications facility configured to communicate with a remote computer network. In another embodiment, a value exchange system includes one or more of the value exchange machines connected to one or more remote computers via a communications link. A user wishing to purchase, for example, a prepaid cash card can visit one of the value exchange machines, select the desired transaction, and pay for the card with coins, currency, a credit card, a debit card, and/or bank account funds. After confirming payment, the value exchange machine dispenses the card to the user. | 01-15-2009 |
20090024526 | ELECTRONIC REGISTRATION AND TRANSACTION SYSTEM - One preferred embodiment provides mobile device based registrations and transactions by providing an aggregator, in the form of a server connected to the internet for collecting and selectively distributing user data. The aggregator may obtain the user data through the mobile network operator, a third party data source (e.g., a credit reporting bureau), or from one-time user input with the aggregator. The user can selectively transmit their user data quickly (e.g., with the selection of a single link) via their mobile device between the aggregator and a third party content provider (e.g., a gambling site, adult content site, banking site, etc.). | 01-22-2009 |
20090024527 | MERCHANT-INITIATED ADJUSTMENTS - Tools for adjusting a debit transaction, which can allow a payee to adjust the amount of the transaction without having to provide cash back to the payor. Instead, the refund amount may be applied as a credit against the debit transaction. In an aspect, the credit may be for any amount up to the original amount of the check (less any credit already applied). Optionally, one or more security and/or anti-fraud measures may be implemented, e.g., ensuring that the check is not subject to a collection proceeding and/or ensuring that the requested credit is not more than the amount of the check itself). | 01-22-2009 |
20090024528 | METHOD AND SYSTEM FOR CHARITABLE FUND RAISING IN CONJUNCTION WITH GAME-OF-CHANCE PARTICIPATION BY DONORS - A method for making a contribution to a charitable organization through a financial transactions device by a participant having an account with a financial institution accessible through the financial transaction device. The method comprising: (a) the participant conducting a financial transaction at the financial transactions device, the financial transaction involving the financial institution; (b) the participant solicited to make a contribution to the charitable organization through the financial transactions device; (c) the participant making the contribution by deduction from the participant's account at the financial institution; (d) crediting the contribution to an account of the charitable organization; (e) soliciting the participant to participate in a game of chance through the financial transactions device; (f) the participant selecting a game entry object or automatically receiving the game entry object; (g) closing participation in the game of chance; (h) selecting a game winning object; (i) comparing the participant's game entry object with the game winning object; (j) declaring the participant to be a winner if there is a predetermined relationship between the game entry object and the game winning object; and (k) crediting a prize amount, if any, to the participant's account. | 01-22-2009 |
20090024529 | WIDE AREA NETWORK PERSON-TO-PERSON PAYMENT - According to the invention, transferring money using a computer network is disclosed. In one step, information is saved on credit received for a first user ( | 01-22-2009 |
20090030840 | METHOD FOR LIMITING DEBIT CARD TRANSACTIONS - A method for limiting debit card transactions includes establishing a limited debit card account linked to a financial funding account. A frequency period for funding the limited debit account and a maximum holding amount for the limited debit account are established by an individual. A debit card linked to the limited debit account is issued to the individual for making withdrawals and purchases. Based on a predetermined method and time period interest is paid by the entity maintaining the limited debit account, to the individual. Also, upon expiration of the frequency period funds are transferred from the financial funding account to the limited debit account to return the limited debit account to the designated maximum holding amount. | 01-29-2009 |
20090037333 | Credit cards system and method having additional features - A credit card system is provided which has the added feature of providing additional limited use credit card numbers and/or cards. These numbers and/or cards can be used for a single or limited use transaction, thereby reducing the potential for fraudulent reuse of these numbers and/or cards. The credit card system finds application to “card remote” transactions such as by phone or Internet. Additionally, when a single use or limited use credit card is used for “card present” transactions, so called “skimming” fraud is eliminated. Various other features enhance the credit card system, which will allow secure trade without the use of elaborate encryption techniques. Methods for limiting, distributing and using a limited use card number, controlling the validity of a limited use credit card number, conducting a limited use credit card number transaction and providing remote access devices for accessing a limited use credit card number are also provided. | 02-05-2009 |
20090043706 | Money wiring address billing worldwide shipper online fraud detection system - A money wiring, address billing, online fraud detection system. A billing system that is of the utmost simplicity, ease of use. A billing system which bills and wires money with the actual numbers of a consumer's shipping address, and bills and wires money with the actual numbers of a consumer's telephone number. A system which wires money with a valued customer date and account expiration date. A billing system which uses all of these unique numbers to wire a consumer money, to prevent misuse of the billing systems numbers. | 02-12-2009 |
20090048972 | System and Method for an Emergency Reserve During a Covered Event Using Actuarial Data - A system and method for providing emergency conditional credit to a customer of a financial institution. The system includes a customer site and a financial institution. The financial institution determines actuarial data using past history of customers incurring specified events, the actuarial data useable to predict future specified events, determines a cost for offering an emergency reserve (ER) product using the actuarial data, determines a qualification standard for the ER product, and offers the ER product to a person at the customer site. An emergency reserve protection (ERP) feature that provides protection that cancels any ER balance on a monthly basis during a covered event may also be offered to customers. One or more vendor sites may be used to handle some of the processing or managing of the ER and ERP product offerings. | 02-19-2009 |
20090048973 | System for making funds available for gaming - A system for making funds available for gaming which includes a terminal which is configured to read customer information from a card. The terminal includes an input/output unit configured to allow the customer to select a quasi-cash transaction and to generate an order authorizing the quasi-cash transaction. The system also includes a station which is configured to retrieve the order and information verifying the identity of the customer and, when the identity of the customer is verified, is configured to, at the customer's option (1) obtain an electronic endorsement from the customer and place the electronic endorsement in an electronic image or (2) print out a hard copy of a check for endorsement by the customer. | 02-19-2009 |
20090048974 | WIDE AREA NETWORK PERSON-TO-PERSON PAYMENT - According to the invention, transferring money using a computer network is disclosed. In one step, information is saved on credit received for a first user ( | 02-19-2009 |
20090048975 | Method Of Billing A Purchase Made Over A Computer Network - A method of effecting a sale over a computer network in which it is determined whether a user passes fraud control before effecting a sale over a computer network. Information associated with a method of payment, such as credit card information, debit card information, checking account information, a telephone service account, a cable television account, a utility service account, or an Internet service provider account, is requested from the user after the user passes the fraud control. Information associated with the method of payment is received from the user in real time. Method-of-payment information is communicated to a payment authorization database, which can be located locally or remotely. The method-of-payment information includes the received information associated with the method of payment. Payment authorization information associated with the method of payment is received from the payment authorization database. A sale transaction is completed when the payment authorization information is affirmative. Sale charge information associated with the sale effected over the computer network is transmitted to the payment authorization database when the sale transaction is complete. The sale charge information includes information for charging the method of payment an amount representing a charge for the sale. | 02-19-2009 |
20090055319 | Novel card-less, name-less, number-less, and paper-less method and system of highly secure completely anonymous customer-merchant transactions - In this novel method the online authentication of an authorized user is accomplished without transmitting any of the user's personal information over the public or private networks. The method is so versatile that it can be deployed not only for conducting online financial transactions, but any conceivable form of virtual and physical authentication of a user, such as physical access to a locked facility, ticket less travel, driver's license or passport verification. Since the personal user information is never revealed or transmitted through the networks the method secures the transaction from online frauds without the need for data encryption. | 02-26-2009 |
20090063345 | System and Method for Facilitating a Financial Transaction with a Dynamically Generated Identifier - Instead of a PIN which is associated with an account and provides access to an account, a dynamically generated card identifier (dynamic CID) is used to verify that the consumer currently possesses the transaction card at the time of purchase and/or is the true card owner. At the time of purchase, a token generates a dynamic CID, which changes with each transaction. A consumer enters the dynamic CID into a pre-existing CID field in an electronic order form. The merchant then sends the dynamic CID to a card authorization system within an authorization request. The card authorization system issues a response to a merchant system via a pre-existing authorization message indicating that the transaction card and dynamic CID have been validated, thereby adjusting the fraud risk associated with the transaction. | 03-05-2009 |
20090063346 | REAL TIME ACCOUNT UPDATE - A method is used in a system that includes a financial service provider coordinating accounts issued by an issuer to cardholders requesting credit from merchants. Each merchant has an acquirer with whom the financial service provider also coordinates the accounts. The method can be performed by a merchant sending a transmission to its acquirer including a request for a transaction against one account to which the merchant receives a denial or prior to receiving such a denial. The merchant then requests information from the financial service provider who responds by sending the requested information, upon which the merchant determines whether to extend the credit. When the method is performed by a financial service provider, in response to the denial received by one merchant or prior to such denial, the financial service provider receives a transmission from the merchant including a request for information about the account. In response, the financial service provider sends the merchant the requested information. | 03-05-2009 |
20090063347 | REAL TIME ACCOUNT UPDATE - A method is used in a system that includes a financial service provider coordinating accounts issued by an issuer to cardholders requesting credit from merchants. Each merchant has an acquirer with whom the financial service provider also coordinates the accounts. The method can be performed by a merchant sending a transmission to its acquirer including a request for a transaction against one account to which the merchant receives a denial or prior to receiving such a denial. The merchant then requests information from the financial service provider who responds by sending the requested information, upon which the merchant determines whether to extend the credit. When the method is performed by a financial service provider, in response to the denial received by one merchant or prior to such denial, the financial service provider receives a transmission from the merchant including a request for information about the account. In response, the financial service provider sends the merchant the requested information. | 03-05-2009 |
20090070261 | SYSTEM FOR IDENTIFYING AN INDIVIDUAL AND MANAGING AN ACCOUNT - The present invention provides a method for managing an account for an unidentified individual by communicating with the unidentified individual who is using a device to communicate which transmits an identifier associated with the origin of the communication, obtaining from the unidentified individual a group of characters associated with the unidentified individual's personal information, comparing the group of characters to a database including a plurality of personal information associated with a plurality of individuals, identifying from the plurality of individuals one individual whose plurality of personal information includes the group of characters associated with the unidentified individual, and managing an account for the identified individual in an account database. | 03-12-2009 |
20090070262 | ACH-ENABLED MICROPAYMENTS - A method and a system for arranging for micropayment of transaction amounts related to micro-transactions transacted by a user are provided. In example embodiments, the method may include analyzing transaction conditions (e.g., availability of a stored value, a valid bank account, an Automated Clearing House (ACH) funding, a credit card account, or a transaction risk assessment result, associated with the user, and monetary value of the micro-transaction) and selecting a micropayment option for charging the transaction amount from a group of micropayment options, based on the transaction condition. The method may also include automatically applying the selected micropayment option for charging the transaction amount. According to example embodiments, the system may include a transaction analysis module and a payment processor. | 03-12-2009 |
20090070263 | PEER TO PEER FUND TRANSFER - Systems and methods that facilitate using a first mobile device to initiate a funds transfer to a second device. One mobile to consumer payment embodiment allows a person enter into a store and pay for that person's purchases using that person's cell phone. Other mobile consumer payment embodiments include strictly consumer-to-consumer transactions, for example, but not limited to, the idea that a person can go to a garage sale and purchase from the garage sale seller by using a cell phone. Put broadly one peer-to-peer payment embodiment includes the ability for somebody to be able to send a payment to another person whenever and wherever. | 03-12-2009 |
20090070264 | Data processing card based copy bill payment capability - A method of authorizing and processing payment for a print job for a preferred user includes determining that a preferred data processing card has funds. If there are no funds, adding funds or obtaining information from the preferred user to access or establish a preferred user account to authorize processing of the print job; enabling the running of a print job at a print device; debiting funds from the account; and enabling completing at least a portion of the print job. A method of processing at least one of processing and payment information for a print job includes providing a data processing card that includes computer-readable data relating to processing information and/or payment information for a print job, wherein the payment information indicates at least one payment source associated with a user, and wherein the card further includes computer-readable data corresponding to user information relating to processing and/or payment for a print job. | 03-12-2009 |
20090070265 | SYSTEM AND METHOD FOR CASHBACK FUNDING - In an example embodiment, a system is provided for a cashback funding of an account. The system comprises a transaction receiving module to receive a request to process a transaction amount, wherein the transaction amount is funded by a debit card. The system further comprises a transaction authorization module to make a pre-authorization request to the debit card, wherein the pre-authorization request exceeds the transaction amount by a predetermined value and is to receive an approval for the pre-authorization request. The system further comprises a cashback funding module to offer a cashback amount in excess of the transaction amount but less than the predetermined value. In response to an acceptance of the cashback offer by a user, the cashback funding module is to make an authorization request for the total amount, and in response to an approval of the authorization, is to fund the account with the funds in excess of the transaction. | 03-12-2009 |
20090076959 | SYSTEM AND METHOD FOR BROKERING AD HOC PERSONAL IDENTIFICATION TRANSACTIONS BETWEEN TWO CONSENTING PARTIES - Disclosed is a computer-based system and method for conducting ad hoc personal identification, or ID, transactions between at least two or more persons by means of a personal identification transaction apparatus attached to at least two communications channels. The personal identification transaction apparatus is intended to assist the interaction between two persons by brokering an identification transaction thus alleviating the exchange of detailed information necessary to confirm an identity, particularly that portion of a person's identity that is related to the purpose of the interaction between two persons. A component of the personal identification transaction apparatus includes a identification transaction order generation unit that provides a score associated with each user party to the transaction, as well as the transaction itself. | 03-19-2009 |
20090094157 | Account Protection With One Sided Access - A first account number and a second account number are created for an account. The first and second account numbers are associated with the account and can be used for transactions with the account. A first subset of operations is associated with the first account number and a second subset of operations is associated with the second account number. A subset of operations includes operations that are restricted to a party that has access to the account number. Accordingly, the first party that has access to the first account number is restricted to the operations found in the first subset of operations when transacting with the account. Also, a second party that has access to the second account number is restricted to the second subset of operations when transacting with the account. | 04-09-2009 |
20090099966 | METHOD AND SYSTEM FOR VERIFYING USE OF A FINANCIAL INSTRUMENT - A system of verifying a purported registrant's ownership or control of a payment instrument includes a communication device, a memory and a processor coupled to the communication device and to the memory. A payment instrument verification module stored in the memory and executable by the processor is adapted to receive information relating to the payment instrument from a registrant, initiate a financial transaction involving the payment instrument via the communication device, generate a dispute amount for the financial transaction, receive via the communication device a notification from a financial institution of the registrant that the financial transaction has been disputed by a comparison amount and compare the comparison amount with the dispute amount for purposes of verifying the payment instrument. | 04-16-2009 |
20090106150 | UNIFIED IDENTITY VERIFICATION - Apparatus, systems, and methods are disclosed that operate to register one time, at a financial entity, information comprising an identity uniquely associated with an individual having a financial account held by the financial entity. Additional actions include receiving a request at the financial entity from a requesting party to authenticate a customer purporting to be the individual, authenticating, by the financial entity, the customer as the individual by matching a token presented by the customer to the identity uniquely associated with the individual, and providing to the requesting party a previously-authorized portion of a profile associated with the individual. Additional apparatus, systems, and methods are disclosed. | 04-23-2009 |
20090106151 | Fraud prevention based on risk assessment rule - A system, method, and computer-readable storage medium configured to import fraud prevention rules from an issuer and implement them in real-time at a payment processor. Usually, a card issuing bank either approves or declines financial transaction; however, in embodiments of the present invention, the issuing bank creates fraud prevention rules, and the payment processor implements the created rules. A payment processor apparatus comprises a network interface, and a verification engine. The verification engine includes a transaction driver, and a real time decisioning processor. The network interface is configured to receive a fraud prevention rule from a payment card issuing bank, and to receive a proposed financial transaction from an acquiring bank. The transaction driver receives the fraud prevention rule. The real time decisioning processor compares the proposed financial transaction from the acquirer and the fraud prevention rule to determine whether the proposed financial transaction should be declined. | 04-23-2009 |
20090106152 | MONEY TRANSFERS UTILIZING UNIQUE RECEIVER IDENTIFIER - Methods, systems, and machine-readable media are disclosed for financial transfers utilizing a unique identifier to facility flexible payment options for the transaction. According to one embodiment, a method for supporting a money transfer transaction can comprise receiving a request to initiate the money transfer transaction. The request can include a unique identifier for a recipient of the money transfer transaction. A destination for transferring funds for the money transfer transaction to the recipient can be determined based at least in part on the unique identifier for the recipient. The funds for the money transfer transaction can be transferred to the determined destination and the recipient can be notified of availability of funds at the determined destination. | 04-23-2009 |
20090106153 | SECURING CARD TRANSACTIONS - A system for approving transaction card transactions in which a card reader associated with a transaction approving authority (TAA). A source for complementary security data is linkable to the TAA can send data to the TAA, and a database linkable to the TAA keeps renewable security data of a user. A database linkable to the TAA keeps records of geographical locations of subscribed businesses. The system of the invention is applicable as a countermeasure against identity theft. | 04-23-2009 |
20090112765 | SYSTEM AND METHOD FOR VALIDATION OF TRANSACTIONS - A financial institution may flag suspicious transactions that are conducted using an NFC-enabled mobile phone. The account holder establishes a second PIN that is separate from the primary PIN used by the customer to authenticate transactions. When a transaction is flagged, a message is sent to the customer at the mobile phone requesting entry of the second PIN. If the second PIN is not correctly entered, activity on the account is suspended. | 04-30-2009 |
20090112766 | DEVICE INCLUDING MULTIPLE PAYMENT APPLICATIONS - Embodiments of the invention are directed to a method, a system, a device and a computer-readable media for selecting one or more payment application at the point-of-sale and using the select one or more payment applications to conduct a transaction. One embodiment is directed to a method for automatically selecting one or more payment applications to use in a transaction so that the selected payment applications give the consumer an optimized benefit or benefits. | 04-30-2009 |
20090112767 | ESCROW SYSTEM AND METHOD - A system and method for conducting purchasing transactions using escrow. A central processing entity secures the terms to a purchasing transaction on behalf of the various parties to the transaction. Once the terms of the purchasing transaction are agreed upon, the central processing entity holds any funds used in the transaction in escrow until confirmation is received that a supplier's contractual obligations have been fulfilled. | 04-30-2009 |
20090112768 | PAYMENT TRANSACTION USING MOBILE PHONE AS RELAY - Systems and methods of conducting a payment transaction using a mobile phone as a relay. The systems and methods receive transaction information associated with a transaction at a mobile communication device from a merchant. They send the transaction information with the mobile communication device to an issuer associated with the mobile communication device. The issuer thereafter sends an authorization response message to the merchant. | 04-30-2009 |
20090119212 | REQUEST MONEY SOCIAL NETWORKING APPLICATIONS - In some example embodiments, a system and method is illustrated as including receiving a funds request that contains an identifier to uniquely identify a first member of a social networking community, the funds request including an amount of funds requested. Further, this method may include receiving a funds authorization from a grantor of funds. Additionally, this method may include transmitting a funds transfer instruction based upon the funds authorization. Moreover, this method may include transferring the amount of funds requested from an account held by the grantor of funds to an account held by the first member of a social networking community. | 05-07-2009 |
20090119213 | ON-LINE AUTHORIZATION IN ACCESS ENVIRONMENT - A method is disclosed. The method includes interacting with a gate access device that is capable of preventing access to a location, where the gate access device subsequently sends an authorization request message to an issuer for approval, the authorization request message including a request to charge a predetermined amount of money to pay for access to a location, and entering the location if the gate access device receives an authorization response message indicating that the charge is authorized. | 05-07-2009 |
20090119214 | METHOD AND DEVICE FOR EXCHANGING VALUES BETWEEN PERSONAL PROTABLE ELECTRONIC ENTITIES - A method and a portable electronic device enables a debitor to transfer a monetary or other amount to a creditor, in particular via a near-field wireless communication module. After receiving information for authenticating the debitor via the communication module and after receiving data linked to the monetary or other amount, a transaction request including the data is created and sent. The transaction request is advantageously sent via a mobile telephone network or via a data communication network. | 05-07-2009 |
20090132416 | TAGGING VIRTUAL CURRENCY - Technologies are described herein for providing tagging virtual currency and processing payments made by the virtual currency. In an example, a virtual currency unit is received as payment for a good or service. Whether the virtual currency unit is associated with a tag is determined. Upon determining that the virtual currency unit is associated with a tag, whether the tag permits a utilization of the virtual currency unit as payment for the good or service is determined. Upon determining that the tag permits the utilization of the virtual currency unit as payment for the good or service, the payment of the virtual currency unit for the good or service is processed. Upon determining that the tag prohibits the utilization of the virtual currency unit as payment for the good or service, the payment of the virtual currency unit for the good or service is denied. | 05-21-2009 |
20090132417 | SYSTEM AND METHOD FOR SELECTING SECURE CARD NUMBERS - Embodiments of the present disclosure provide a plug-in feature for a browser that allows for secure financial transactions on a communication network. The plug-in feature generates secure card numbers (e.g., single and multi-use credit card numbers) to pay for purchases. The plug-in feature auto-fills billing and shipping information. The plug-in feature allows a user to store receipts in an efficient and convenient manner to track online shopping activities. The plug-in feature may be implemented in a toolbar of a browser. | 05-21-2009 |
20090132418 | ELECTRONIC PAYMENT PROCESSING SYSTEM - In general, in one aspect, parties associated with a merchant profile may be provided access to a system utilized to create merchant profiles. The system may accept data related to a merchant account from the parties and may validate the data. If any required information is missing or invalid the system may notify the parties. Once all the data is received and validated the system processes the data to create the merchant profile. The merchant profile may be stored in the system for the merchant. The merchant profile may be associated with a unique ID associated with a payment handler utilized by the merchant. The merchant or associated parties may utilize the unique ID to configure the payment handler including downloading processor software. The system may utilize the unique ID to manage and control use of the payment handlers and the processor applications. | 05-21-2009 |
20090138400 | Electronic traveler's check - The electronic traveler's check system and method includes an electronic traveler' check card that is usable to retrieve money from point of service locations and banks. The system has a database of user information, such as a pin number and the user's passport number, which is used to verify the identity of the user before a transaction can take place. An emergency credit feature is provided to enable transaction completion when a cardholder's account has insufficient cash funds. | 05-28-2009 |
20090138401 | Electronic traveler's check - The electronic traveler's check system and method includes an electronic traveler' check card that is usable to retrieve money from point of service locations and banks. The system has a database of user information, such as a pin number and the user's passport number, which is used to verify the identity of the user before a transaction can take place. An emergency credit feature is provided to enable transaction completion when a cardholder's account has insufficient cash funds. | 05-28-2009 |
20090144198 | MONEY TRANSFER USING AN AUTOMATED BANKING MACHINE - Money is transferred from a provider to a requester using automated banking machines. The provider accesses an automated banking machine to identify the requester to whom the money will be transferred and the amount of money to be transfer. The requester is notified of a generated confirmation code. The requester then accesses another automated banking machine to receive the money transfer amount using the confirmation code. After the requester has been verified, the requester selects where the funds are to be transferred. | 06-04-2009 |
20090150286 | POINT OF SALE AUTOMATIC SAVINGS PROGRAM CONTRIBUTION SYSTEM USING BIOMETRICS PAYMENT AND AUTHENTICATION WITH SMART CARDS, ELECTRONIC PAYMENT, AND WIRELESS MECHANISMS - The present invention relates to integrated financial network systems and more particularly pertains to a biometrics automatic method of automatically contributing monies by means of actual cash or electronic cash equivalents into an investment, savings, purchasing, payment, charity, loan, mortgage, insurance premium, or loyalty program upon making a purchase using biometrics for identification of the purchaser, identification of contribution preferences, and authentication. The invention includes a computer implemented method of processing a financial transaction executed by first person including identifying the person via biometric identification and verification methods, using biometric identification and financial transaction information to access user payment accounts, preferences for contribution, determining an automatic savings amount from the financial transaction by applying a contribution calculation, and contributing the calculated amount to an investment, savings, purchasing, payment, charity, loan, mortgage, insurance premium, or loyalty account. transactions, applying a pre-specified fixed dollar amount for each occurrence of a completed transaction, applying a pre-specified fixed dollar amount and total number of occurrences of a plurality of completed transactions, applying a percentage of a purchase amount of an individual pending transaction in the hands of a payment clearinghouse or payment instrument issuer, applying a pre-specified fixed dollar amount for each individual occurrence of a pending transaction in the hands of a payment clearinghouse or payment instrument issuer, applying a specified dollar amount for the transaction event, rounding up transactions to a higher amount increment, or rounding up plurality of completed transactions. | 06-11-2009 |
20090150287 | System and method for providing supplemental transaction processing services to users of a primary financial services system - A supplemental financial transaction processing system operates in conjunction with one or more primary financial services systems for purposes of providing supplemental financial transaction processing services to users of the primary financial services system. The supplemental financial transaction processing system comprises a secure web services system and a supplemental transaction server. The secure web services system comprises at least one financial transaction method available to the primary financial services system. Upon receipt of a method call for a financial transaction, the supplemental financial transaction processing system: i) associates a unique redirect URL to the method call; and ii) returns the unique redirect URL to the primary financial services system. The primary financial services system may then pass the unique redirect URL through a secure connection with its client. The supplemental transaction server, upon a client requesting an HTTPS connection to the unique redirect URL, verifies the validity of the unique redirect URL. If valid, a web document object is provided for rendering by the client. The web document object comprises: i) the financial institution defined transaction values (at least one); ii) user interface control script for rendering of controls for obtaining user entry of at least one client defined transaction value; and iii) transaction control script. The transaction control script comprises instructions for i) creating a financial transaction; ii) validating the financial transaction; and iii) posting the validated transaction back to the supplemental financial transaction server. | 06-11-2009 |
20090150288 | Systems and Methods for Authorizing an Allocation of an Amount Between Transaction Accounts - A financial account issuer facilitating transactions between accounts is disclosed. The invention provides sellers with an irrevocable method of receiving funds from a purchaser and for improving purchaser willingness to transact with an unknown party. The invention also enables the allocation of a portion or all of a charge or loyalty points to different transaction accounts issued by different issuers, or to sub-accounts. | 06-11-2009 |
20090157547 | FINANCIAL TRANSACTION AUTHENTICATION SERVERS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR FACILITATING FINANCIAL TRANSACTIONS BETWEEN BUYERS AND SELLERS - A financial transaction authentication server includes a wireless network interface that is configured to receive fund transfer requests from a buyer via a wireless communications terminal, a wireless terminal location module that is configured to identify the respective locations of the buyer and a seller, and a transaction authorization processor configured to authorize a transfer request if the geographic locations of wireless terminals of the buyer and seller are within a predetermined geographical proximity of each other. The wireless network terminal location module identifies the geographic locations of respective wireless terminals of the buyer and seller. The transaction authorization processor authorizes a fund transfer request if the respective locations of buyer and seller wireless terminals are within a predetermined geographical proximity and suspends a fund transfer request if respective locations of buyer and seller wireless terminals are not within a predetermined geographical proximity of each other. | 06-18-2009 |
20090157548 | MULTIPLE PARTY ON-LINE TRANSACTIONS - A role associated with one or more parties involved with a purchase transaction is received. A routing rule associated with the purchase transaction is also received, the routing rule defining how the purchase transaction is routed among the one or more parties. The purchase transaction is processed based on the role of each party and the routing rule. | 06-18-2009 |
20090157549 | USING A MOBILE PHONE AS A REMOTE PIN ENTRY TERMINAL FOR CNP CREDIT CARD TRANSACTIONS - A computer implemented method, computer program product, and data processing system for authorizing a financial transaction with an account. A request to perform the financial transaction with the account is received. The financial transaction is authorized responsive to receiving a pre-determined code from a mobile communication device associated with a user who has authority to authorize the financial transaction. | 06-18-2009 |
20090157550 | System and method for managing foreign payments using separate messaging and settlement mechanisms - Managing foreign payments using separate conduits for messaging and payments. An originating depository financial institution can create an F3X message designating a fixed amount of foreign currency to be credited to, or debited from, a receiving depository financial institution. The originating depository financial institution transmits the F3X message to a domestic gateway operator via an ACH network. The domestic gateway operator then forwards the F3X message to a foreign gateway operator. Separately, the originating depository financial institution transmits a payment to the foreign gateway operator either directly or via a correspondent financial institution. The foreign gateway operator matches the payment to the F3X message and transmits the payment to the receiving depository financial institution. | 06-18-2009 |
20090164373 | System and Method of Preventing Password Theft - A method and system for securely accessing an account using a security device that includes: (1) receiving a request via a payment device for access to an account having account information, wherein the request includes an account number; (2) generating randomly a numeric value; (3) displaying the numeric value; (4) prompting data entry of a combined PIN via the payment device, wherein the combined PIN is a combination of the numeric value and the PIN; (5) uncombining the numeric value from the entered combined PIN to provide an uncombined PIN; (6) comparing the uncombined PIN to the PIN; and (7) permitting access to the account information based on the comparison. | 06-25-2009 |
20090164374 | System and Methods for One Time Check Numbers - Various embodiments are directed to third-party payment services including the ability to arrange and pay for goods or services with a printed paper check using facilities hosted by the third-party payment service. In one embodiment, a third-party payment services system may be arranged to provide access to a third-party payment account linked to a source of funds for the third-party payment account. The third-party payment services system may receive a request to transfer funds from the third-party payment account to a recipient using a printed check and may receive a use limitation for the check. A unique number to be printed on the check may be derived and associated with the third-party payment account. A payment request for the check may be verified using the unique number when use limitations for the check have been observed. Other embodiments are described and claimed. | 06-25-2009 |
20090164375 | SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR PERFORMING MASS TRANSIT MERCHANT TRANSACTIONS - Methods, systems and computer program products are provided for enabling access to mass transit systems using a financial transaction instrument including reading an identifier including financial payment information from the financial transaction instrument and determining whether the identifier is stored in a database. Access to a holder of the financial transaction instrument is provided based on the determining. | 06-25-2009 |
20090171842 | Techniques For Conducting Financial Transactions Using Mobile Communication Devices - The present invention advantageously combines communications aspects of mobile devices with financial transaction system capabilities in a novel manner. This advantageous combination enables a user to automatically initiate a financial transaction with a merchant upon the user being located in a particular geographic vicinity. Numerous types of transactions can be enabled using the present invention. | 07-02-2009 |
20090171843 | UNIVERSAL FUNDING CARD AND DELAYED ASSIGNMENT OF A FUNDING INSTRUMENT FOR A FINANCIAL TRANSACTION - A universal funding card and the delayed assignment of a funding instrument for a financial transaction are described herein. In one embodiment, a system for facilitating a financial transaction comprises a communications interface; a database storing data regarding a user and a plurality of funding instruments associated with that user; and a payment processing system configured to receive a request for payment authorization from a merchant via the communications interface, to authorize payment to the merchant prior to selection of a funding instrument, and after authorizing payment to the merchant, receive instructions regarding a funding instrument to debit for the payment. | 07-02-2009 |
20090171844 | SYSTEM AND METHOD OF A PASSPHRASE ACCOUNT IDENTIFIER FOR USE IN A NETWORK ENVIRONMENT - A system and method for facilitating a financial transaction over a network including use of a passphrase account identifier is described herein. In one embodiment, a system for facilitating a financial transaction over a network comprises a communication interface; and a payment provider system configured to receive via the communication interface a passphrase account identifier from a merchant system, match the passphrase account identifier to a corresponding funding instrument number of a corresponding funding instrument, communicated the corresponding funding instrument number to an issuer system, receive from the issuer system a notification indication of one of acceptance of the funding instrument or decline of the funding instrument, and communicate back to the merchant system the notification indication. | 07-02-2009 |
20090171845 | METHODS AND SYSTEMS FOR CARDHOLDER INITIATED TRANSACTIONS - A cardholder-initiated financial transaction using a cardholder controlled input device in communication with a payment card network and a database is disclosed. The cardholder uses a payment card issued to the cardholder by an issuer bank. An exemplary method includes the steps of storing merchant data within the database including data identifying the merchants registered to utilize the card network and receiving from the input device transaction data relating to the financial transaction. The transaction data includes an authorization request and merchant identifying data that identifies the merchant involved in the transaction. The method further includes determining that the identified merchant is registered to utilize the card network by comparing the transaction data with the merchant data stored in the database, forwarding the authorization request to the issuer bank, receiving a response to the request from the issuer bank, and automatically forwarding the response to the input device. | 07-02-2009 |
20090171846 | Contactless Payment Through Satellite Radio Devices - A method and system for making a purchase using a payment card and a satellite radio. The method includes: broadcasting information relating to goods or services for sale via a satellite radio; receiving a request to purchase goods or services via a satellite radio that includes a payment card account number; identifying subscriber account information based on the payment card account number; submitting a request for payment authorization; receiving an authorization and delivering the goods or services to a purchaser. The system includes: a satellite radio that has a receiver and a transmitter; radio programming that includes an advertisement for the sale of goods or services; a payment card with a microprocessor chip or a magnetic stripe that contains account information and a payment card reader connected to the satellite radio for reading the account information from the microprocessor chip or magnetic stripe. | 07-02-2009 |
20090177581 | METHOD OF CASH-LESS, CARDLESS PURCHASE TRANSACTION USING MOBILE PHONES - The method of cash-less purchase transaction using mobile phone comprising steps of: —customer requesting for purchase at outlet; —merchants verifying if customer is registered with telco's cash product service; —merchant informing the customer of the purchase price to e paid; —merchant sending in a SELL command on his device to a telco containing merchant's PIN, amount of the purchase, and customer's mobile phone number; —customer receiving SMS confirmation query of the amount to be paid from telco; —customer's mobile phone number; —customer replying to the SMS of his confirmation with his PIN; —merchant receiving confirmation from telco of the deduction from customer's mobile phone cash account; —merchant releasing product to the customer; —customer receiving confirmation of the deduction via SMSD sent to his mobile phone; —alternatively, merchant using mobile phone device informing customer of the merchant's mobile number which the customer can send his virtual cash to; —customer sending the amount via SMS to 2882+the 10 digit mobile number of the merchant; —the subscriber and the merchant then getting simultaneous SMS acknowledgment of the transfer with confirmation number | 07-09-2009 |
20090177582 | IDENTITY AUTHENTICATION FOR FINANCIAL TRANSACTIONS - A financial services and transaction network including multiple networked validation stations and remote terminals allows users to access a number of financial services and transactions. A user visiting a remote terminal indicates a desired service or transaction. The user provides any currency or funding information needed for the selected service, after which the remote terminal issues the user a transaction voucher. The user can take this transaction voucher to any of the validation stations in order to authenticate the user's identity and activate the voucher. Once the voucher is activated, the user or a recipient of the voucher can present the voucher at any remote terminal to receive funding or otherwise complete the transaction or service, subject to recipient authentication. The user provides necessary information using the remote terminal or validation station, or supplies the information using the voucher, which is collected upon performance of the requested service or transaction. | 07-09-2009 |
20090192939 | METHOD OF TRANSFERRING DATA AND CORRESPONDING DEVICE - The method of transferring data between a first and a second set of elements via a switch that includes a set of paths each associated with a weighting coefficient representing a data stream for each path. The method includes a credit flow control between the first set of elements and the switch and a credit flow control between the switch and the second set of elements. An available credit coefficient is computed for each element of the first set on the basis of a credit allocated by each element of the second set and of the weighting coefficient of each path. | 07-30-2009 |
20090192940 | SYSTEM FOR PROVIDING CARDLESS PAYMENT - The method and system of the invention provide a variety of techniques for using a selected alias and a selected personal identification entry (PIE) in conjunction with use of a transaction card, such as a credit card, debit card or stored value card, for example. A suitable number or other identification parameter is selected by the account-holder as an alias. The account-holder is then required to choose a PIE for security purposes. The alias is linked to the account-holder's credit card number via a database. When the account-holder enters into a transaction with a merchant, the physical card need not be present. The account-holder simply provides his or her alias and then the PIE. This can be done at any point of sale such as a store, catalog telephone order, or over the Internet. The alias and PIE are entered and authorization is returned from the credit card company. | 07-30-2009 |
20090198615 | Method, Device, and System for Completing On-Line Financial Transaction - A method for conducting a secure transaction over a network includes the steps of receiving a price and a transaction identifier from a merchant, the transaction identifier identifying a purchase selection made by a user, receiving a user identifier from a user, receiving a financial institution selection from the user, initiating a communication session with the selected financial institution, receiving a financial-institution user-identifier from the user, communicating the financial-institution user-identifier to the selected financial institution, communicating to the selected financial institution a request to transfer funds, receiving the funds from the selected financial institution, and sending the funds to the merchant. | 08-06-2009 |
20090198616 | Method and System for Transferring Money in Business-to-Business Internet Transactions - A method for enabling two businesses to complete a transaction that includes payment from one business (the buyer) to another business (the seller). A payment enabler operates the money transfer service over a computer network of nodes, such as the Internet. Typically, the buyer and the seller use the money transfer service of the payment enabler to consummate a transaction that they have arranged over the computer network through a business-to-business transaction facilitator that enables businesses to arrange deals over the computer network. During registration with the payment enabler, a buyer typically provides information about a bank account from which the seller will be paid, and the seller typically provides information about a bank account for receiving the funds from the buyer. The payment enabler facilitates payments for transactions between businesses by enabling the employees of a business registered with the payment enabler to direct the various phases of the payment process on behalf of the business for which those employees work. A super user employee, identified by the business during registration with the payment enabler, has the power to register other employees of the business with the payment enabler and to specify the privileges that the payment enabler should grant each employee to act on behalf of the business. | 08-06-2009 |
20090210344 | SYSTEM AND METHOD FOR PROVIDING DATA FOR USE IN REDUCING FRAUDULENT TRANSACTIONS BETWEEN HOLDERS OF FINANCIAL PRESENTATION DEVICES AND MERCHANTS - System and method for providing an address verification response associated with a financial presentation device being used to conduct a transaction with a merchant. The system includes a memory storing addresses of holders of financial presentation devices and a date corresponding to a last change of address associated with each financial presentation device, and an address verification program which is operable to receive a request from the merchant to verify an address associated with the financial presentation device; determine a temporal indicator identifying a time period since a holder of the financial presentation device last changed the address; and provide the determined temporal indicator with the address verification response to the merchant. | 08-20-2009 |
20090216676 | INTEGRATED MOBILE TRANSACTION SYSTEM AND METHODS THEREOF - An architectural transaction arrangement for facilitating transactions is provided. The arrangement includes a set of transaction-enabled devices and an integrated mobile transaction system. The integrated mobile transaction system is configured to include at least a set of interfaces, which is configured for managing interaction between the set of transaction-enabled devices and the integrated mobile transaction system. The integrated mobile transaction system is also configured to include a format converter, which is configured to convert data packets into a format readable by at least one of the set of transaction-enabled devices and the integrated mobile transaction system. The integrated mobile transaction system is further configured to include a transaction module, which is configured to process the transactions (e.g., financial transactions, non-financial transactions, etc.) and a set of databases, which is configured for at least storing data about a set of in-system users of the integrated mobile transaction system. | 08-27-2009 |
20090216677 | System and Method for Virtual Capital Operation - A system for virtual capital operation over a network such as the internet includes a platform for a transaction between a first user and a second user of the system, a data processor for processing the flow of virtual currency occurred at the transaction between the first user and second user, and a trust company to allow real currency to be stored therein or withdrew therefrom in response to the flow of real currency occurred at the transaction, wherein the data processor generates an amount of virtual currency in response to an amount of real currency entrusted to the trust company. | 08-27-2009 |
20090240624 | RISK DETECTION AND ASSESSMENT OF CASH PAYMENT FOR ELECTRONIC PURCHASE TRANSACTIONS - A system and methods are provided which allow consumers to pay for ecommerce transactions through online bill payment and for merchants to determine that payments are not fraudulent. The system and methods do not rely on personal or confidential customer information relating to credit-cards and/or bank account routing information, date of birth and/or social security number. A risk manager can perform risk assessment for the cash payment based on order information and non-confidential purchaser information included in a cash payment request. In response to receiving an indication of the cash payment from the purchaser, a determination is made whether the cash payment is a good payment based on the risk assessment. The cash payment is released to a merchant in response to a determination that the cash payment is a good payment. | 09-24-2009 |
20090254480 | SYSTEM AND METHOD FOR PREVENTING GIFT FRAUD - A gift card uses a fraud code stored on a magnetic stripe of the card to prevent fraudulent transactions. When the gift card is purchased at a POS terminal at a merchant location, a gift card account number stored on the magnetic stripe is read, and sent to a gift card system. The gift card system activates the card and generates the fraud code and returns it to the POS terminal, where a card encoder writes the fraud code onto the magnetic stripe. When the gift card is used to conduct a transaction, the transaction is permitted only if a valid fraud code is stored on the magnetic stripe. | 10-08-2009 |
20090259589 | METHOD AND SYSTEM FOR MANAGING A FLEXIBLE SPENDING ACCOUNT - A method and system for facilitating a redemption of a benefit provided by an organization for the purchase of non-prescription items from a retail store including associating a plurality of non-prescription items with a list; linking a plurality of members with the list, receiving a request for an account balance check of a member for one or more non-prescription items on the list that were presented for purchase by the member; determining if an account balance for the member has sufficient funds to cover the non-prescription items on the list that were presented for purchase by the member; and transmitting to the retail store an approval for the purchase by the member of the one or more non-prescription items on the list if the retrieved account balance for the member had sufficient funds to cover the non-prescription items on the list that were presented for purchase. | 10-15-2009 |
20090259590 | Vending System - A vending system server for a vending system for selling products or services, from at least one vending machine connected to a network, to purchasers having mobile communicators configured to communicate with the network by wireless data packet network connection, comprises an operator server, connected to the network by an operator network connection, wherein the operator server is configured to (1) receive via the operator network connection a communication from a mobile communicator of identifying data of a vending machine at which the mobile communicator is located, without receiving personal identification information from the mobile communicator, (2) transmit, via the operator network connection to the mobile communicator, vending machine identification information, (3) receive, via the operator network connection, authorization information from an external authorization center, and (4) authorize the vending machine to supply a good or service in response to the authorization information. | 10-15-2009 |
20090265273 | Transaction authorization - A transaction authorization method and system. The system includes a host coupled to a plurality of transaction request channels (telephone, PC, and the like) for receiving and authorizing transaction requests for a specific self-service terminal. The system also includes a self-service terminal coupled to the host for receiving a transaction message therefrom. The transaction message includes a transaction identifier and a customer identifier, so that the self-service terminal is operable to provide a customer with a transaction amount from the transaction identifier in response to the customer entering details matching the contents of the customer identifier. | 10-22-2009 |
20090265274 | Automated Transaction Processing System and Approach with Currency Conversion - Transaction management for contract and contract-related approaches is facilitated. According to an example embodiment of the present invention, a transaction management system automatically sets contract terms including currency conversion terms for a transaction based on business rules previously established between parties to a transaction. In one implementation, the transaction management node automatically derives a contract term including a pricing-related term for a transaction between a buyer and seller using contract information therefor. The pricing-related term is used to set a price for the transaction, and a currency conversion term is used to convert the set price (or a portion of the set price corresponding to a particular transaction party) into a different currency. | 10-22-2009 |
20090265275 | SYSTEMS AND METHODS FOR TIME VARIABLE FINANCIAL AUTHENTICATION - The systems and methods of the invention provide a technique for authenticating a finance related transaction. The method may include providing a token which contains a token counter, the token counter periodically advancing to generate a changing token value, the token counter being synchronized to a base counter that generates an authenticating value; transforming the token value into a token output sequence using logic; and outputting at least part of the token output sequence to an authenticating authority, the authenticating authority having access to the authenticating value. Further, the method includes the authenticating authority verifying the validity of the transaction based on the token output sequence and the authenticating value, from which the authenticating authority obtains a verification sequence using the logic, the verifying the validity including the authenticating authority comparing the token output sequence to the verification sequence to determine if there is a match between the token output sequence and the verification sequence. | 10-22-2009 |
20090265276 | METHOD FOR AUTHORIZING AT LEAST ONE TRANSACTION BY A BANK SYSTEM - The invention relates to a method and a system for authorizing at least one transaction by a bank system, wherein at least one client application handled by the bank system is connected to at least one server application outside the bank system. With the help of the client application, at least one transaction item provided for selection by the server application is selected. Furthermore, authorization of the transaction of at least one selected transaction item is requested during a bank application of the bank system. The transaction is authorized with the help of the bank application. | 10-22-2009 |
20090271316 | Mailing kiosk with safeguards and methods of use - A self service kiosk for mailing prohibited items from TSA checkpoints has the following features: an easy-to-touch screen, full computerization, visual and auditory prompts, clearly displayed shipping options, an automatically calculated price, an instantly-produced address/postage label and payment receipt, secure credit card processing, daily emptying by the USPS, transaction logging and cumulative accounting reports, built in communications and UPS backup, built in security features, built in slot for mail acceptance, provision of US Priority and Express Mail service, and a heavy duty plate steel vault for security. | 10-29-2009 |
20090276359 | Multi-Product-Multi-Channel Payment Platform System and Method - Described herein is a multi-product-multi-channel payment platform system and apparatus that extends the capability of current online banking/funds-transfer systems. Different types of financial accounts are modeled in a financial management system to enable types of online, electronic funds transfer transaction that were not previously possible. Among novel elements of the system and apparatus disclosed is the enablement of real-time application of rules to different types of financial accounts and/or products across channels, such as how much money may be deposited or withdrawn in a period of time. | 11-05-2009 |
20090281947 | METHOD AND SYSTEM FOR MOBILE COMMERCE - An authorization subscriber identification module card, including: (a) a subscriber identification module chip; and (b) a near field communication chip, connected to the subscriber identification module chip, wherein the near field communication chip is adapted to update a balance value in a memory of the authorization subscriber identification module card in response to balance updating information, and to transmit a near field communication confirmation transmission to an external system; wherein the authorization subscriber identification module card is further adapted to provide identification information to a charging authority server; to receive a balance updating information from the charging authority server; and to update the balance value in response to charging information. | 11-12-2009 |
20090281948 | COMMUNICATION DEVICE INCLUDING MULTI-PART ALIAS IDENTIFIER - Methods and systems are disclosed for allowing financial transactions to be conducted using consumer devices. In some embodiments, the consumer device is a mobile communication device, such as a mobile phone. A payer initiates a transaction by sending a payment request message from a mobile phone which specifies the payee and amount to be paid. Payees are identified by unique aliases, which are maintained in a database. The aliases, in turn, are comprised of multiple parts. Each part of the alias may identify a relevant aspect of the transaction. For example, one part of the alias may identify the payee and another part of the alias may identify the financial institution of the account of the payee. Methods for assembling the enrollment and alias database are included. | 11-12-2009 |
20090287607 | Method and Apparatus for Verifying the Legitimacy of a Financial Instrument - An apparatus and method for verifying the legitimacy of a financial instrument used by a shopper is disclosed. A seller accepts details about goods and services to be delivered, and information about a financial instrument to be used in a purchase by a shopper. Identifier information is send to a financial institution issuing the instrument. The legitimate user of the instrument must access the instruments issuer's database to obtain the identifier information and derive verification information needed to answer a question posed by the seller. If the shopper can prove possession of the verification information then the goods are shipped or delivered to the shopper and payment is settled. The questions used to prove the shopper has the verification information may come in a variety of forms such as simple math equations, anagrams, or word to symbol matching problems. In each case, the answer may be chosen from a set of displayed results via a computer network thereby eliminating the need for typing by the owner/shopper. | 11-19-2009 |
20090299902 | METHOD OF AND SYSTEM FOR COMMUNICATING LIABILITY DATA IN A TELECOMMUNICATIONS NETWORK - The present invention relates to a method of and system for managing financial liability in a telecommunications network wherein a service requester ( | 12-03-2009 |
20090299903 | Non-Cash Cash-on-Delivery Method and System - The present invention provides a method and system for non-cash cash-on-delivery. In the conventional process of the cash-on-delivery in logistics, a wireless communication apparatus is provided to read the information of the identification docket number and a non-cash payment tool, and the information is transported to the logistics server so as to accomplish the mechanism of the collecting-and-paying for another with a financial institution. | 12-03-2009 |
20090307133 | Online Payment System for Merchants - A payment system that utilises the Internet to gain access to an Internet banking system enabling a user to purchase merchandise bought through an online merchant or merchant who has Internet access in their store is disclosed. The payment system may also be utilised to provide a means for a user to retrieve and view balances and account transaction information for their bank accounts and to transfer funds between accounts. The system uses a “virtual pin-pad” which provides a web-based, stand-alone method of payment that is independent of banks and capable of performing real-time currency conversions. | 12-10-2009 |
20090307134 | PERFORMING AUTOMATICALLY AUTHORIZED PROGRAMMATIC TRANSACTIONS - Techniques are described for facilitating interactions between computing systems, such as by performing transactions between parties that are automatically authorized via a third-party transaction authorization system. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. After one or more of the parties to a potential transaction supply reference tokens for the parties, the transaction authorization system can determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied. | 12-10-2009 |
20090307135 | PERFORMING AUTOMATICALLY AUTHORIZED PROGRAMMATIC TRANSACTIONS - Techniques are described for facilitating interactions between computing systems, such as by performing transactions between parties that are automatically authorized via a third-party transaction authorization system. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. After one or more of the parties to a potential transaction supply reference tokens for the parties, the transaction authorization system can determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied. | 12-10-2009 |
20090313168 | System and Method for Authorizing Financial Transactions with Online Merchants - A system for authorizing a financial transaction of a financial presentation device such as a credit or debit card being presented from a customer to an online merchant. The system includes a peripheral device having a processor configured to generate a dynamic verification value for the card which changes for each financial transaction, and to transmit the dynamic verification value to a user computer via an I/O interface during an online transaction. The system also includes an authentication computer having a memory for storing information used to generate a comparison verification value, a communication device for receiving the dynamic verification value originating from the peripheral device, a processor and an authentication module executable by the processor adapted to generate the comparison verification value using information stored in memory. The authentication computer determines whether to authorize the financial transaction based on whether the comparison verification value matches the received dynamic verification value. | 12-17-2009 |
20090319427 | Methods for electronic payments using a third party facilitator - Methods for processing payments electronically over a network-based system wherein a third party or intermediary simplifies payment transactions by making them on behalf of individuals to the end payment recipient without providing individual account information as the basis for the payment. | 12-24-2009 |
20090319428 | Authorizing An Electronic Payment Request - An electronic payment request is authorized using a plurality of electronic codes. A first code is requested from a user on receipt of a payment request made with a payment card configured with one or more details of one or more devices in the possession of one or more owners of the card. The payment is refused in the event the first code does not substantially match a predefined second code. A third code is requested from the one or more devices with whose details the payment card is configured if the first code substantially matches the second code. The third code is compared with a predefined fourth code. The payment is refused in the event the third code does not substantially match the fourth code, while the payment is authorized in the event the third code substantially matches the fourth code. | 12-24-2009 |
20090327131 | DYNAMIC ACCOUNT AUTHENTICATION USING A MOBILE DEVICE - Providing dynamic authentication of a user requesting access to a system via a mobile device is disclosed. An account holder tailors a set of customized security challenges and responses. When a request for account authentication is received from a mobile device, the system conducts a multi-step user authentication process that includes dynamically selecting and prompting the user with the custom security challenges. | 12-31-2009 |
20090327132 | INCREMENTAL FACTORIZATION-BASED SMOOTHING OF SPARSE MULTI-DIMENSIONAL RISK TABLES - A system for classifying a transaction as fraudulent includes a training component and a scoring component. The training component acts on historical data and also includes a multi-dimensional risk table component comprising one or more multidimensional risk tables each of which approximates an initial risk value for a substantially empty cell in a risk table based upon risk values in cells related to the substantially empty cell. The scoring component produces a score, based in part, on the risk tables associated with groupings of variables having values determined by the training component. The scoring component includes a statistical model that produces an output and wherein the transaction is classified as fraudulent when the output is above a selected threshold value. | 12-31-2009 |
20090327133 | SECURE MECHANISM AND SYSTEM FOR PROCESSING FINANCIAL TRANSACTIONS - A system for secure processing payment transactions between merchants and customers, via financial institutions, the system comprising apparatus for generating global transaction identifiers each of which is recognized by the merchants as a transaction ID and by the financial institutions as a fundable entity, and methods useful in conjunction therewith. | 12-31-2009 |
20090327134 | SYSTEMS AND METHODS FOR GEOGRAPHIC LOCATION NOTIFICATIONS OF PAYMENT TRANSACTIONS - A method and system for providing geographic location notifications of payment transactions is disclosed. One embodiment of the invention is directed to a method including receiving an authorization request message associated with a transaction, the transaction associated with a portable consumer device and an access device at a merchant. A geographic location of the transaction is determined. It is determined whether a notification message indicating that the transaction is occurring is required. Upon determining that the notification message is required, the notification message is sent to a notification device operated by a consumer and the notification device receives the notification message substantially simultaneously with the merchant's receipt of an authorization response message. A graphical depiction of the notification message is displayed on a map on the notification device. | 12-31-2009 |
20090327135 | CREDIT CARD PAIRED WITH LOCATION IDENTIFIABLE DEVICE FOR POINT OF SERVICE FRAUD DETECTION - A method and apparatus for identifying attempted fraud using a consumer account in real time, the method comprising the steps of determining when a consumer account is used to attempt to obtain a resource from a resource provider, determining whether a consumer apparatus that is associated with the consumer account is located at a location associated with the resource provider and indicating that the resource provider should provide the resource when the consumer apparatus is at a location associated with the resource provider. | 12-31-2009 |
20100005026 | Method of communication implemented by a dating network - A method that permits a user of a dating network to request to communicate with another user of the network via a preset message, where the user making the request pays for the request and the same user may request a refund up to a point in time prior to the other user responding to the request to communicate or a preset period has expired. | 01-07-2010 |
20100005027 | SYSTEM AND METHOD FOR ASSESSING RISK - An improved data handling system is disclosed that facilitates the collection, storage and distribution of information for use by one or more recipient performing a process such as assessing the risk associated with a transaction. A system for handling information includes an administrator for facilitating communication with a subscriber and an information acquisition engine that is for facilitating communication with one or more provider of information and an information assimilator that is for facilitating communication with a database. The system is configured to facilitate receiving a request from the subscriber defining one or more set of information and one or more provider of information to be received by the information acquisition engine and combined by the information assimilator into an information suite to be stored in a database. | 01-07-2010 |
20100017329 | SYSTEMS, METHODS AND DEVICES FOR SELLING TRANSACTION INSTRUMENTS - The present invention generally relates to a system and method for distributing an open transaction instrument. The system includes the steps of: accessibly offering for sale, in a retail environment, the open transaction instrument; selling a selected open transaction instrument; and enabling the use of the open transaction instrument. The transaction instrument may be, for example, an open pre-paid card. Furthermore, accessibly offering the open pre-paid card for sale, in one exemplary embodiment, is performed by hanging the pre-paid card on a rack. The distribution of the open transaction instrument may also comprise the step of sending a message, in substantially real time, causing the pre-paid open transaction instrument to be funded but not activated. Also, in accordance with further exemplary embodiments of the present invention, an issuer system is suitably configured to leverage existing infrastructure for inventory and related processes. | 01-21-2010 |
20100023454 | Transaction Authorization - One embodiment provides a computer-implemented method for transaction authorization within a security service. The computer-implemented method intercepts a request by a security service, wherein a transaction identifier is cached to form a cached transaction identifier, and requests the requester to authenticate to form an authentication request. The computer-implemented method further determines whether the requester was authenticated, and responsive to a determination the requester was authenticated, receives authentication information, including an associated transaction identifier. The request is intercepted and the cached transaction identifier inserted. The computer-implemented method further determines whether the cached transaction identifier is equivalent to the authentication information, including an associated transaction identifier, and responsive to a determination that the cached transaction identifier is equivalent to authentication information, including an associated transaction identifier, passes the request to the application. | 01-28-2010 |
20100023455 | DYNAMIC ITINERARY-DRIVEN PROFILING FOR PREVENTING UNAUTHORIZED CARD TRANSACTIONS - A method and system for preventing unauthorized card transactions via dynamic itinerary-driven profiling. Authorization record(s) including authorized geographic locations and authorized periods of time are received from a travel reservation system (TRS). The authorization record(s) identify an itinerary specified by a travel booking(s) purchased via the TRS using a debit or credit card. The itinerary specifies that the cardholder is scheduled to be in the authorized geographic locations for the authorized periods of time. In response to receiving a request for an authorization of a card transaction, a location and date associated with the card transaction are retrieved from the request. The card transaction is rejected based on a determination that the retrieved location is not within the authorized geographic locations and/or the retrieved date is not within the authorized periods of time. A notification of the retrieved location and retrieved date is logged and displayed. | 01-28-2010 |
20100030688 | TRANSACTION PROCESSING USING A GLOBAL UNIQUE IDENTIFIER - A Globally Unique IDentifier (GUID) is used to match an authorization request with an authorization response for a transaction between a merchant and a consumer upon an account within a payment processing system where the payment amount is unknown until after the merchant receives the authorization response that includes the GUID. After receiving the authorization response and when the payment amount is known, the merchant forms a transmission that has information for delivery to an issuer of the account. This information is sufficient for the issuer to forward the payment amount from the account to pay the merchant for the transaction. While including the GUID and the payment amount, the information does not include an identifier of the account. | 02-04-2010 |
20100030689 | Transaction authentication system and method - The invention teaches the verifying a financial transaction by requiring an account holder to verify the transaction when the transaction is tagged for verification. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. 37 CFR 1.72(b). | 02-04-2010 |
20100049655 | METHOD AND SYSTEM FOR SECURELY EXECUTING A CHARGE TRANSACTION - A method for securely executing a charge transaction establishes an encrypted communication link between the mobile telecommunication device and a host by utilizing executable program code in the mobile telecommunication device. The method transmits data related to a charge transaction request from the host to the mobile telecommunication device via the encrypted communication link, and further transmits a second of at least two in combination unique data sets from the mobile telecommunication device to the host via the encrypted communication link as authorization for the charge transaction to be executed, and even further transmits from the host to a payment service provider, data related to the charge transaction request, the received second data set and a, in combination with the received second data set unique first data set stored at the host. The method completes the charge transaction if the first and second data sets in combination authorize the charge transaction. | 02-25-2010 |
20100057616 | System and Method of Recurring Payment Transactions - A system and method for a recurring payment transaction is provided. A system of authenticating a recurring payment transaction may include an adaptive payment server that includes one or more processors configured to retrieve account information, which may include a payment date and an identification of a communication device of a payor. The adaptive payment server may initiate a communication to the communication device on or before the payment date and communicate at least a portion of the account information to the communication device. The adaptive payment server may receive, from the communication device, approval information and determine whether to initiate payment of the recurring payment transaction using the approval information. The adaptive payment server may initiate payment of the recurring payment transaction based on the determination. | 03-04-2010 |
20100057617 | FINANCIAL DOCUMENT PROCESSING SYSTEM - A system for processing deposits and/or withdrawals in a financial institution accepts a plurality of documents, including currency bills, at an input receptacle of a document-processing device, converts the image of at least some of the documents to electronic data representing the image. The currency bills are denominated by the document processing device, and the total value of the bills included in each deposit is accumulated. Whenever the total value of the bills in a deposit exceeds a prescribed value, a report may be generated containing at least an identification of the specified account, the total value of the bills in the deposit, and the serial numbers of the bills. The serial numbers may be extracted from images of the bills. | 03-04-2010 |
20100063927 | METHOD AND SYSTEM FOR CLEARING FINANCIAL INSTRUMENTS - A method and system for electronically clearing financial instruments through a clearing system in which a per item cost of clearing instruments varies with the time of day. The method may include the steps of receiving electronic files of items containing data scanned from financial instruments including an amount of each instrument, applying a rule to sort the items by determining, for each of the associated financial instruments, whether the item be stored or forwarded for clearing the instrument without storage. The rule may include a step of determining whether an amount of the instrument exceeds a predetermined value, and if the amount of the instrument exceeds the predetermined value, forwarding the instrument for clearing without storage. If the amount of the instrument does not exceed the first predetermined value, the associated rule may cause the system to store the item representing the instrument for forwarding at a later time when the per item fee for clearing is lower. The threshold amount may vary depending upon the per item fee charged at the time the item is received by the system, in a case where the per item fee charged changes over the course of a business day, and different time intervals may have different threshold amounts. The system may include a control system for receiving the associated electronic files from a scanning device and have a processor programmed to apply a rule to sort the files by determining, for each of the instruments, whether the associated electronic file should be stored or forwarded for clearing, a gateway server for receiving the associated electronic files from the scanning devices and transmitting the files to the control system, and an image export server for receiving the associated electronic files from the control system, converting the files to a preferred format, storing the files in storage, retrieving the files from storage for clearing and transmitting the files to the Federal Reserve for clearing. | 03-11-2010 |
20100063928 | ELECTRONIC CHECK CASHING SYSTEM - Methods and systems for cashing electronic checks are disclosed. One method includes receiving credential information from a user at an automated system communicatively connected to a checking account information database, and validating the credential information. The method further includes obtaining checking account information from the checking account information database, the checking account information corresponding to a checking account associated with the credential information and having been at least partially previously entered into the checking account information database from a system separate from the automated system. The method also includes receiving a request to cash an electronic check, and determining whether to fulfill the request to cash the electronic check. | 03-11-2010 |
20100063929 | Personal Information Protection Method, Personal Information Protection System, Processing Device, Portable Transmitter/Receiver and Program - A prescribed virtual person was created for allowing a real person (user) in the actual world to pretend to be the virtual person (virtual person) and act as the virtual person when acting on a network and registered in a database | 03-11-2010 |
20100070414 | PAYMENTS USING PRE-PAID ACCOUNTS - The present invention extends to methods, systems, and computer program products for payments using pre-paid accounts. Embodiments of the invention provide a single, universal payment method that cannot be physically stolen, that minimizes the risk of information theft, and which can be used to make both small and large payments. The universal payment method is more convenient, more efficient, and less expensive to use because it requires no exchange mechanism from one payment form to another. In addition, to the extent that prior-to-payment funds are controlled by the businesses to whom payment is to be made, the buying power is increased. | 03-18-2010 |
20100076890 | GUI-BASED WALLET PROGRAM FOR ONLINE TRANSACTIONS - Provided is a method and a GUI-based software application that acts as a wallet with network interconnectivity for enabling a user to securely and seamlessly conduct transactions with his or her online financial transaction program by means of a computer or a wireless handheld device without having to depend on an Internet browser. | 03-25-2010 |
20100076891 | Superior identification system by changing word or number codes - A system and method for identification purposes or for preventing unauthorized use of a credit/debit card and its numbers. For each new transaction, a new PIN code is needed. After usage, the code is deleted and the card and its numbers cannot render a transaction until a new code has been established. The PIN code can consist of numbers, letters or a word. The user/card holder can be in charge of generating each new code. When entering the code, a new code can be entered at the same time which replaces the last code. The new code could also be entered at a later time by using a phone or the internet. During communication between parties over, such as a telephone or over the internet, only a portion of the card number would be included in the communication, along with a predetermined password. In an enhanced version intercepting the new code or seeing what digits are used by the card holder would be worthless since a secret digit only known by the true cardholder would have to be added to the last code when used for the next transaction. The system also describes a manner of quickly entering letters on an existing numbered keypad. In this manner, easy to remember words can be used. | 03-25-2010 |
20100076892 | INTERMEDIARY PAYMENT SYSTEM AND METHOD FOR GAMING - A method for enabling consumers in a gaming context to push funds from a traditional open loop account to a closed loop account, and back. At the request of a consumer, funds are transferred to an open loop account of an intermediary payment system that holds or keeps track of virtual closed loop accounts for each consumer and virtual closed loop accounts for individual games, casinos or gaming establishments. The consumer may use an associated closed loop card to place a bet at the gaming establishment that will cause funds to be transferred from the consumer's virtual closed loop account to the gaming establishment's closed loop account. Thereafter, the funds are transferred from the intermediary payment system to an open loop account belonging to the gaming establishment. | 03-25-2010 |
20100082484 | Proxy-Based, Transaction Authorization System - A system is disclosed that features a transport vehicle in which a responsive object is present, such as a truck in which a cellphone is present, in which the object is equipped to provide location or other state information when queried. The transport vehicle is outfitted with a proxy that represents the responsive object. The proxy is configured such that it is better able than the responsive object to estimate the responsive object's location or state. The vehicle is also outfitted with i) sensors that detect the responsive object and ii) sensors that detect state information of the vehicle. The object sensors are able to query the object in the same way as the querying device would query that object in the prior art. Using information from the sensors, the proxy then responds to the query on behalf of the responsive object, and an authentication device processes the query. | 04-01-2010 |
20100082485 | Portable point of purchase devices and methods - Systems, methods, and devices for conducting sales transactions are provided. Embodiments include handheld, portable, electronic, point of purchase devices configured to acquire identification information from articles to be purchased, to determine a purchase price, and to acquire payment information for the purchase price. The point of purchase devices may include one or more input devices such as a near field communication device, a camera, a scanner, and a biometric sensor for acquiring the identification information and/or the payment information. In some embodiments, the near field communication device may be detachable from the point of purchase device. The point of purchase devices also may contain communication interfaces, such as a near field communication interface, a local area network interface, a short message service interface, and a personal area network interface, for transmitting the information to an external server. | 04-01-2010 |
20100082486 | MOBILE PAYER AUTHENTICATION - An address of a computing device for conducting a transaction with a merchant on an account of an account holder is used to obtain display attributes of the computing device. An authentication request is formatted using the obtained display attributes of the computing device. The formatted authentication request is sent for delivery to the logical address of the computing device. In response to the formatted authentication request, authentication information for the account holder is received from the logical address of the computing device. A validation attempt is performed on the received authentication information for the account holder. If the received authentication information for the account holder was successfully validated by the performance of the validation attempt, the authentication response is transmitted for delivery to a logical address for the merchant. | 04-01-2010 |
20100082487 | SYSTEMS AND METHODS FOR MANAGING A VIRTUAL CARD BASED ON GEOGRAPHICAL INFORMATION - A method for using a virtual card is provided. In one example, the method includes identifying a geographic identifier for a mobile computing device and matching the geographic identifier with at least one virtual card associated with the mobile computing device. The method further includes triggering at least one virtual card feature based on a matched geographic identifier. In some examples, the at least one virtual card feature includes presenting the at least one virtual card with the matched geographic identifier. In other examples, the at least one virtual card feature includes a security feature including selectively enabling a virtual card transaction based on the at least one virtual card with the matched geographic identifier. | 04-01-2010 |
20100088231 | METHOD FOR PERFORMING A DIGITAL CASH TRANSACTION - A method for performing a digital monetary transaction between a payer and payee comprising the steps of receiving a digital-cash value requested to be withdrawn from an account of a payer; generating a digital-cash code that is associated with the requested digital-cash value and communicating the digital-cash code to the payer; receiving the digital-cash value and the digital-cash code from a payee requesting to deposit the amount specified by the digital-cash value; comparing the received digital-cash value and the digital-cash code to confirm an association; and transferring funds of the amount specified by the digital-cash value to the payee. A system including a central digital-cash system and a network interface preferably can preferably operate the method. | 04-08-2010 |
20100094754 | SMARTCARD BASED SECURE TRANSACTION SYSTEMS AND METHODS - Systems and methods for authorizing financial transactions are described. A request for execution of the financial transaction from a requesting party includes at least one biometric signature of the requesting party and the request is authorized based on identification of the biometric signature in a repository of signatures and a history of prior transactions executed on behalf of the requesting party. The repository may include signatures stored in encrypted form on a smartcard. | 04-15-2010 |
20100094755 | PROVIDING PAYMENT DATA TOKENS FOR ONLINE TRANSACTIONS UTILIZING HOSTED INLINE FRAMES - A method comprising providing an inline frame (iFrame) and secure cross domain messaging for collecting sensitive payment data regarding access to monies held for an end user, the iFrame is embedded directly within a website maintained by a business entity; collecting the sensitive payment data via the iFrame; storing the sensitive payment data in an electronic database; associating a payment data token with the sensitive payment data; providing the payment data token to the business entity; receiving a request from the business entity to transfer at least a portion of the monies to the business entity; receiving the payment data token from the business entity with the request; retrieving the sensitive payment data from the electronic database; and transferring the at least a portion of the monies to the business entity utilizing the retrieved sensitive payment data via a backend payment gateway. | 04-15-2010 |
20100094756 | SYSTEM AND METHOD FOR RAPID FINANCIAL TRANSACTIONS THROUGH AN OPEN FINANCIAL EXCHANGE OR WIRE TRANSFER - A system and method for transferring funds. An electronic request for a transfer of funds between a sending account and a destination account is received. A determination is made whether the sending account and the destination account are with a destination bank controlling the destination account. The funds are transferred from the sending account to a receiving account of the service provider. The funds are transferred from a service provider account at the destination bank to the destination account in response to determining that the sending account and the destination account are not with the destination bank. A service provider is compensated for the transfer of funds and the transfers are recorded in a database in response to completion of the electronic request. | 04-15-2010 |
20100094757 | ELECTRONIC VALUE EXCHANGE USER DEVICE AND THIRD-PARTY DEVICE - A user device for performing an exchange of an electronic value with another user device is provided. The user device includes an agreement unit configured to acquire offer information corresponding to at least a first random number, from another user device, generate a second random number, generate session information, generate agreement object information, generate an electronic signature, and output agreement information including at least the agreement object information, the session information, and the electronic signature. The user device further includes a second confirmation unit and an abort request unit. The second confirmation unit is configured to acquire from another user device, first confirmation information, perform a verification on a predetermined verification item, and output second confirmation information. The abort request unit is configured to generate an electronic signature and output abort request information. | 04-15-2010 |
20100100482 | Intermediate Data Generation For Transaction Processing - An indirect transaction processor performs rules based processing to verify online transactions. The indirect transaction processor can match indirect indirect data sets to valid data sets used in conventional transaction approval to provide users anonymity in transactions. User approval of transactions can also be implemented, as can other business rules to permit delegated approval and authorization. | 04-22-2010 |
20100100483 | AUTOMATIC RESTITUTION OF TRANSACTION FEES, PUNISHMENT OF NON-PAYING BIDDERS, AND MANAGEMENT OF APPEALS - A method and system for resolving disputes between parties involved in a network-based transaction is described. One aspect of the present invention seeks to automatically facilitate the restitution of value to parties of the transaction, for example, facilitated by a network-based commerce platform or involving a network-based payment service, where a dispute has arisen with respect to the transaction. | 04-22-2010 |
20100100484 | PRODUCT LEVEL PAYMENT NETWORK ACQUIRED TRANSACTION AUTHORIZATION - A flexible spending account system can be implemented according to one embodiment of the invention so as to automatically substantiate purchases made at a retailer merchant. For example, according to one embodiment of the invention, a method of authorizing products for purchase can be implemented by determining via a computer that a product requested for purchase at a point of sale by a consumer matches a qualified product category under the flexible spending account, sending an authorization request message for requesting use of said flexible spending account of said consumer, wherein said authorization request message comprises a total purchase amount field and a first qualified amount field for a first type of qualified items. | 04-22-2010 |
20100114773 | Systems, Methods, And Apparatus For Using A Contactless Transaction Device Reader With A Computing System - Embodiments of the invention may relate to systems, methods, and apparatus for using a contactless transaction device reader with a computing system. According to one embodiment, a system for conducting a transaction on a personal computing system using a contactless transaction device may include a communications interface operable to connect with a network, a memory, a contactless transaction device reader operable to communicate wirelessly with a contactless transaction device, and a processor in communication with the memory, the communications interface, and the contactless transaction device reader. The processor may be operable to cause the contactless transaction device reader to read information from the contactless transaction device, to verify that the user's authority, to provide transaction information, based at least in part on the information read from the contactless transaction device, when conducting a transaction, and to transmit at least a portion of the transaction information to an entity. | 05-06-2010 |
20100114774 | CHARGEBACK DECISIONING SYSTEM - A chargeback received from a merchant processor, which includes a plurality of data elements related to details of a transaction, is automatically processed. At least one of the plurality of data elements is compared with at least one related data element in each of a plurality of stored chargebacks. Similarities are then identified between the compared data elements of the received chargeback and the stored chargebacks. The received chargeback is then accepted or represented based on the similarities identified. | 05-06-2010 |
20100114775 | TEXT AUTHORIZATION FOR MOBILE PAYMENTS - A system and method enables trusted sources to easily approve requests for money transfers by simply typing in a yes or equivalent. | 05-06-2010 |
20100114776 | ONLINE CHALLENGE-RESPONSE - Embodiments of the invention enable cardholders conducting an online transaction to be authenticated in real-time using a challenge-response application. The challenge-response application can be administered by an issuer or by a third party on-behalf-of an issuer. A challenge question can be presented to the cardholder, and the cardholder's response can be verified. The challenge question presented can be selected based on an analysis of the risk of the transaction and potentially other factors. A variety of dynamic challenge questions can be used without the need for the cardholder to enroll into the program. Additionally, there are many flexible implementation options of the challenge-response application that can be adjusted based on factors such as the location of the merchant or the location of the consumer. | 05-06-2010 |
20100114777 | Administration of Dual Component Financial Instruments - Methods and systems for administering a dual component financial instrument (DCFI) are described. The DCFI includes a revolving loan component and one or more installment loans. A holder of the DCFI account can use the revolving loan to pay for expenses, e.g., educational expenses. At predetermined intervals, e.g., annually on the anniversary date of the DCFI account, a new installment loan is automatically created on behalf of the account holder to pay off the revolving loan. Automatically creating an installment loan to pay off the revolving loan frees up the revolving loan for use by the borrower to pay for expenses during the next interval, e.g., the next school year, and allows the lender to quickly and efficiently securitize portions of the funds provided to the borrower. | 05-06-2010 |
20100114778 | SECURE AUTHENTICATION AND PAYMENT SYSTEM - A transaction and payment and processing system securely conducts transactions over the public telephone network. The transactions may be between and among entities of any type such as individuals, merchants, utilities, banks, etc. Nothing more than access to a telephone is required after initial registration of a user. | 05-06-2010 |
20100114779 | METHOD AND SYSTEM FOR PROVIDING FLEXIBLE FINANCING - Methods and systems for providing flexible financing are disclosed. In one embodiment, the present invention relates to a business card product with a customer activated credit line extension for accommodating large ticket purchases where the credit line extension may be linked to other business loan/lease products so that balances may be transferred to a customer's preferred financing product (or products). The purchases may be considered secured or unsecured loans/leases that may be capitalized as well as appreciate and depreciate in value. The purchases may include various types of revenue producing property, such as computer, office equipment, office furniture, copiers, farm equipment, and other types of revenue producing property. | 05-06-2010 |
20100121764 | TRANSACTION NOTIFICATION SYSTEM AND METHOD - In embodiments, there is a method and system for providing a notification to a purchaser or user regarding the substance of a transaction. In an embodiment, a notification may be by mail, phone call, phone message, text message, email, or other notification. In an embodiment directed to a gift card, a notification may contain any suitable information, including, but not limited to, identifying that the gift card has been activated, used, and/or identifying the particular items purchased with the gift card. | 05-13-2010 |
20100125522 | Interactive Web-Portal Interface Method and System - An e-service interactive web-portal providing a method and system that enables consumers to selectively perform point-of-sales (POS) transactions through an e-financial agent which allows payments to be made without having to utilize cash, credit/debit cards or checks, to manage and access electronic personal documents over mobile devices, and to create a virtual/mirror image of a mobile device's stored information (contacts, calendar entries, music, photos, ring tones, etc.) with options to duplicate a mobile device's content onto another device in case of theft, loss or damage, and/or make VoIP phone calls through the virtual mobile device. | 05-20-2010 |
20100131408 | System and Method of Validating a Relationship Between a User and a User Account at a Financial Institution - A system and method for validating a relationship between a user and a user account at a financial institution includes a data communication device, a memory, a processor coupled to the memory, and an account validation module executable by the processor. The account validation module generates a verification identifier for storage in the memory and is provided to the user, and subsequently receives a user initiated financial transaction involving the user account at the financial institution. The received financial transaction includes a comparison identifier supplied by the user. The account validation module determines whether the comparison identifier corresponds to the verification identifier for purposes of validating the relationship between the user and the user account maintained at the financial institution. | 05-27-2010 |
20100131409 | IDENTIFICATION VERIFICATION WITH USER CHALLENGE - Methods and apparatus for conducting user identity verification are disclosed. An example method includes requesting, from a user, a name and user identifying information associated with the provided name. The example method also includes querying a trusted database based on the provided name and the user identifying information and determining if a match exists in the database between the provided name and the user identifying information. In the event a match exists, the example method includes presenting a challenge to the user, the challenge being based on the user identifying information and determining a verification status of the user's identity based on a result of the challenge. The example method further includes designating the user's identity as verified or unverified in accordance with the verification status. | 05-27-2010 |
20100138344 | MOBILE BARCODE GENERATION AND PAYMENT - An application on user's mobile device (having a display screen) generates a one-time use and time-limited barcode on the display when the user enters a PIN. The barcode can be scanned to make purchases at a point of sale (POS). | 06-03-2010 |
20100138345 | FINANCIAL TRANSACTION SYSTEM HAVING LOCATION BASED FRAUD PROTECTION - A financial transaction authorization server comprises a database of records of fixed-location transaction participants, and transaction authorization means in communication with the database of records. Each record of the database of records is associated with a respective one of the fixed-location transaction participants and identifies a physical location of the associated fixed-location transaction participant. The transaction authorization means is configured to (i) receive a request from one of the fixed-location transaction participants for completion of a financial transaction; (ii) receive current location information of a mobile-location transaction participant associated with the financial transaction; and (iii) authorize the transaction in accordance with a correlation between the received current location information and physical location of the fixed-location transaction participant. | 06-03-2010 |
20100138346 | Automatic Savings Program - A computer implemented method of processing a financial transaction executed by first person includes determining an automatic savings amount from the financial transaction by rounding up the amount of the financial transaction to the nearest dollar. The method further includes debiting the calculated savings amount from an account of the first person and crediting the savings amount to an account of a second person. | 06-03-2010 |
20100138347 | Account Transaction Management Using Dynamic Account Numbers - A method and a system for managing account transactions aim to effectively prevent account information from being compromised. The system generates a dynamic account number corresponding to a true account number of an account of a user and sends the dynamic account number to the user. The system stores the corresponding relationship between the true account number and the dynamic account number. The system conducts an account transaction requested by the user according to the dynamic account number supplied by the user and the corresponding relationship. The account can be a bank account, and the dynamic account number may be valid for a one-time use or set to expire after a certain period of time or a certain number of uses. The method and the system can make account transactions more reliable and safer, and effectively prevent user account information from malicious access. | 06-03-2010 |
20100145854 | SYSTEM AND METHOD TO ENABLE A SECURE ENVIRONMENT FOR TRUSTED AND UNTRUSTED PROCESSES TO SHARE THE SAME HARDWARE - The invention relates to systems and or methodologies for enabling a secure environment for trusted and untrusted processes to share the same hardware. A separation component segregates, isolates, or otherwise separates trusted and untrusted processes and/or scripts to ensure that payment card industry and PIN entry device security standards are maintained. | 06-10-2010 |
20100145855 | PAYMENT ACCOUNT PROCESSING WHICH CONVEYS NON PURCHASE RELATED DATA EXCHANGES - An enhanced payment processing system is configured to process non-sales related requests. For example, such requests may pertain to a consumer's application for a payment account, a request for identification of a payment account assigned to a specified consumer, a transfer of a monetary amount between two payment accounts, a payment to be applied to an account, and a change of an expiration date for a portable payment device. A merchant formulates a non-sales related request which is sent through the payment processing system to an account issuer. The account issuer receives the non-sales related request, complies with that request, and formulates a reply. The reply is sent back through the payment processing system to the merchant. | 06-10-2010 |
20100145856 | AUTOMATED MERCHANT PERFORMANCE RATING FOR PAYMENTS ON ACCOUNT - A business derives its cost to pay accounts payable (A/P) with a corporate card versus other payment methods, which derivation may be pre-populated by a general category . The business identifies each merchant to whom the business owes A/P who but does not accept the corporate card. A weighting factor is derived for each such merchant from costs of paying with and without the corporate card, as well as from its history of past payments to the merchant. The benefit to the business is derived, using the corresponding weighting factor, for each such merchant in paying the corresponding A/P to the merchant with the corporate card. Where the benefit exceeds a predetermined threshold, information is sent to each such merchant sufficient for the merchant to receive payment of the corresponding A/P with the corporate card. | 06-10-2010 |
20100145857 | DYNAMIC HOLD DECISIONING USING ADJUSTED DEPOSIT AMOUNT - Embodiments of the present invention relate to methods and apparatuses for determining, communicating, and/or executing hold decisions for deposit items. For example, a method is provided that includes: (a) receiving information associated with a deposit item; (b) determining an actual deposit amount identified by the deposit item; (c) determining a payee account to receive the deposit item and a drawer account on which the deposit item is drawn; (d) determining a hold limit for the payee account; (e) determining an adjusted deposit amount for the deposit item based at least partially on: (i) the actual deposit amount identified by the deposit item, and (ii) one or more characteristics associated with the drawer account, and (f) determining a hold decision for the deposit item based at least partially on a comparison of the adjusted deposit amount to the hold limit. | 06-10-2010 |
20100153269 | SYSTEM, METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR INTERFACING A MULTI-CARD RADIO FREQUENCY (RF) DEVICE WITH A MOBILE COMMUNICATIONS DEVICE - An interface for a mobile communication device is provided, including at least one memory unit configured to store read/write data associated with transaction accounts, at least one user interface software application, and at least one contactless communication protocol application. A radio frequency identifier unit having an antenna communicates with a radio frequency identifier reader through a contactless transaction account communications channel distinct from a mobile communications channel of the mobile communication device. An input/output interface unit communicates with a corresponding input/output interface unit of the mobile communication device and provide access to and control of the at least one memory unit and the radio frequency identifier unit by a processor of the mobile communication device. | 06-17-2010 |
20100153270 | AUTHENTICATION OF MESSAGE RECIPIENTS - A user receives a message via a network service platform at their mobile handset. The user is required to input a PIN, password or other authentication data, before the received message is displayed. The service platform generates a partial encryption key and embeds this within a message which is subsequently encrypted and transmitted to the receiving device. The receiving device or handset receives the message and decrypts it using a previously stored pseudo-random seed, combined with a user entered PIN. The receiving device or handset extracts the partial key delivered with the message and uses this key data to generate a new pseudo-random seed which, in turn, is used to generate a sequence of characters in apparently random order. This sequence of characters or numbers is presented in a text-only form with a cursor or other highlighting method selecting the first character in the pseudo-random sequence. The user is then able enter their PIN by using cursor control keys, such as the right/left keys. The device or handset validates the data entry, assuming that the secure data is valid, displays the message content. | 06-17-2010 |
20100153271 | Method and System for Manual Authorization - Embodiments provide systems, apparatus, methods, computer program code, and means for performing manual authorizations. | 06-17-2010 |
20100153272 | MOBILE DEVICE INITIATED TRANSACTION - One embodiment of the invention is directed to a method including receiving an alias identifier associated with an account associated with a presenter, determining an associated trusted party using the alias identifier, sending a verification request message to the trusted party after determining the associated trusted party, and receiving a verification response message | 06-17-2010 |
20100161488 | METHODS AND SYSTEMS FOR BIOMETRIC VERIFICATION - Pursuant to some embodiments, methods, systems, apparatus, computer program code and means for verifying a cardholder during a transaction involving a transaction device and a terminal are provided. Pursuant to some embodiments, the invention includes transmitting biometric rule information from a transaction device to a terminal, the biometric rule information defining a biometric sample to be acquired at the terminal, receiving, from the terminal, a detected biometric sample. The detected biometric sample is compared to a biometric reference template stored in the transaction device, and the cardholder is verified if the detected biometric sample matches the biometric reference template. | 06-24-2010 |
20100169213 | METHODS AND SYSTEMS FOR DEPOSITING VALUE-BEARING INSTRUMENTS IN A FINANCIAL ACCOUNT, AND PRODUCTS THEREBY - Methods, systems and products thereby for depositing a value-bearing instrument in a financial account remotely from a financial institution are disclosed. The system may include a processor configured to receive an electronic image of the value-bearing instrument, determine a user's financial account information, and transmit the electronic image or a replica thereof to a financial institution for processing. The products include computer readable mediums for providing instructions to cause the processor to perform the operations above. As such, the methods, systems and products embodied in the present disclosure allow a user to deposit value-bearing instruments without traveling to their financial institution, and allow financial institutions to reduce in-person transactions and associated personnel costs while receiving timely deposits into their asset management control. | 07-01-2010 |
20100169214 | SYSTEM AND METHOD TO INITIATE FUNDING OF MULTIPLE MERCHANT ACCOUNTS - A system to initiate funding of a plurality of merchant accounts may include one or more computers configured to receive input specifying at least one payment item having a payment amount, determine a convenience fee based on the at least one payment amount, select a first merchant account based on the at least one specified payment item, and select a second merchant account associated with the convenience fee. The one or more computers may also be configured to receive a single input specifying credit card information, link the payment amount, received credit card information and the first merchant account to form a first transaction, and link the convenience fee, received credit card information and second merchant account to form a second transaction. The one or more computers may further be configured to submit the first and second transactions to a credit card authorization network, receive response data from the credit card authorization network for the first and second transactions indicating whether the first and second transactions are authorized, and generate output representing a receipt for the first and second transactions if the first and second transactions are authorized. | 07-01-2010 |
20100169215 | UNIVERSAL MERCHANT PLATFORM FOR PAYMENT AUTHENTICATION - A method is provided for supporting processing of a transaction conducted between a first party and a second party. The first party accepts payment via a plurality of different payment options selectable by the second party, and the plurality of different payment options are associated with a plurality of different authentication protocols prescribed therefor. The method includes: receiving payment information over a communications network at a server operatively connected to the communications network, the payment information identifying a particular payment option used by the second party for the transaction, and the server being equipped to format and route messages over the communications network in different manners to accommodate the plurality of different authentication protocols; determining from the payment information received at the server which of the different authentication protocols is prescribed for the type of payment option identified in the payment information; selecting, in accordance with the determination, a particular authentication protocol from the plurality of different authentication protocols supported by the server; and, obtaining an authentication determination for the transaction in accordance with the selected authentication protocol, including formatting messages and routing the formatted messages over the communications network in accordance with one or more mandates of the selected authentication protocol. | 07-01-2010 |
20100169216 | SYSTEMS AND METHODS FOR PROCESSING PAYMENTS WITH PAYMENT REVIEW FEATURES - Methods and systems of processing a plurality of payments. One method can include receiving the plurality of payments from a plurality of customers, the plurality of payments payable to at least one receiver, determining a first set of payments included in the plurality of payments to automatically accept based on validation parameters, determining a second set of payments included in the plurality of payments to reject based on the validation parameters, determining a third set of payments included in the plurality of payments to conditionally accept based on the validation parameters, and electronically prompting at least one user to accept or reject payments included in the third set of payments. | 07-01-2010 |
20100174647 | METHOD AND APPARATUS FOR INITIATING A FUNDS TRANSFER USING A MOBILE DEVICE - The invention is directed to a method and apparatus for initiating an electronic funds transfer. The system includes a first mobile device, a payment engine, and a payment repository. The first mobile device includes functionality to display a notification of a sales transaction, obtain an authorization from the consumer to the electronic funds transfer based on the notification, instantiate a transfer entry form to obtain a transfer entry package, where the transfer entry package comprises the notification, a verification of the authorization, and consumer financial account information. The payment engine is operatively connected to the first mobile device and includes functionality to transmit the notification to the consumer of a sales transaction, generate the transfer entry form based on the authorization, and transmit the transfer entry package to a depository financial institution. The payment repository is operatively connected to the payment engine and includes functionality to store a record of the transfer entry package and the authorization. | 07-08-2010 |
20100174648 | SECURE REAL-TIME BUSINESS PROCESSING SYSTEMS - The present disclosure provides a dynamic business system comprising a business intelligence processing module; a dynamic rules module coupled to said business intelligence module; a dynamic collaboration engine coupled to said dynamic rules module and said business intelligence processing module; a data mining and expert knowledge module coupled to said interoperable system wherein said expert knowledge module can effect a portion of a data set to undergo real-time modification. The system data output and reporting is provided via a secure online method providing real-time interoperability among disconnected facilities. Additionally, the dynamic business system described provides dynamic and real-time decision making capabilities based on third party's available data set wherein data output and reporting is provided via a secure online method providing real-time interoperability among disconnected facilities. | 07-08-2010 |
20100174649 | METHODS AND SYSTEMS FOR VALIDATING ONLINE TRANSACTIONS USING LOCATION INFORMATION - A method comprising: obtaining a service point location, the service point location being associated with a logical identifier assigned to end-user equipment used in an attempt to make an online transaction; obtaining at least one authorized transaction point location, the at least one authorized transaction point location being associated with transaction object information provided via the end-user equipment; comparing the service point location to each of the at least one authorized transaction point location; and performing an action related to validation of the online transaction based on a result of the comparing. Also provided is an apparatus for implementing this method. | 07-08-2010 |
20100174650 | ELECTRONIC SETTLEMENT SYSTEM, ELECTRONIC SETTLEMENT SERVER, NEGOTIABLE-VALUE PROVIDING APPARATUS, MOBILE COMMUNICATION TERMINAL, AND ELECTRONIC SETTLEMENT METHOD - The present invention provides an electronic settlement system which is similar to cash settlement and which is available even in a game hall. The present invention provides an electronic settlement system including an electronic settlement server, a mobile communication terminal, and a negotiable-value providing apparatus. In the electronic settlement system, the mobile communication terminal acquires, from the negotiable-value providing apparatus, an equipment ID identifying the negotiable-value providing apparatus. The mobile communication terminal then generates a settlement request message containing a user ID identifying a user, a transfer amount corresponding to consideration for a negotiable value, and the equipment ID. The mobile communication terminal then transmits the message to the electronic settlement server. According to the result of a check of the user's credit status, the electronic settlement server instructs the negotiable-value providing apparatus to provide a negotiable value corresponding to the transfer amount. The electronic settlement server further requests a transfer of an amount corresponding to the transfer amount from the user's account to a predetermined account. Upon receiving the instruction to provide the negotiable value from the electronic settlement server, the negotiable-value providing apparatus provides the user with rental balls, rental medals, or the like corresponding to the transfer amount. | 07-08-2010 |
20100174651 | METHOD AND SYSTEM FOR INITIATING AND/OR CONDUCTING A TRANSACTION THAT IS ASSOCIATED WITH AT LEAST TWO CORRESPONDING DECLARATIONS OF INTENT - The present invention relates to a method and a system for initiating and/or conducting a transaction that is associated with at least two corresponding declarations of intent, in particular a payment transaction, between at least two transaction parties via a processing unit ( | 07-08-2010 |
20100179906 | Payment authorization method and apparatus - When a customer ( | 07-15-2010 |
20100179907 | METHODS AND A SYSTEM FOR PROVIDING TRANSACTION RELATED INFORMATION - Methods and a system for providing a service enabling users to securely request and receive data representing details of a payment card using a mobile telephony device. The data representing details of a payment card can then be used to partake in a commercial transaction in which the user is not present at, or remotely located from, the point of transaction. | 07-15-2010 |
20100179908 | Method And System For Performing Money Transfer Transactions - A method of performing a send money transfer transaction through a financial services institution includes storing transaction details on a data base, wherein the transaction details include a desired amount of money to be sent; establishing a code that corresponds to the transaction details stored on the data base; entering the code into an electronic transaction fulfillment device in communication with the data base to retrieve the transaction details from the data base; and determining a collect amount based on the transaction details. A system for performing a send money transfer transaction is also disclosed. | 07-15-2010 |
20100185544 | Method and System for Making a Payment Through a Mobile Communication Device - A method for making a payment through a mobile communication device, the method comprising:
| 07-22-2010 |
20100191649 | SYSTEM AND METHOD FOR PERFORMING ELECTRONIC TRANSACTIONS - In an embodiment, an arrangement for executing electronic card payment transactions includes first card reading means ( | 07-29-2010 |
20100198728 | OVER THE AIR MANAGEMENT OF PAYMENT APPLICATION INSTALLED IN MOBILE DEVICE - Systems, apparatus, and methods for managing a payment application installed on a mobile device, such as a mobile phone are provided. An Issuer of a payment device can remotely control the payment application by instructing a wireless network carrier or operator to transmit a message to the mobile phone, where the message contains an instruction to perform an operation related to the payment application. The Issuer can remotely reset a counter or a password associated with the payment application, lock or unlock a payment application, and set the access control data to a predetermined value, to prevent unauthorized use of the payment application in the situation in which the mobile phone is lost or stolen, or the Issuer desires to limit access to the payment application for other reasons, such as limiting its exposure to unauthorized uses of the payment device. | 08-05-2010 |
20100198729 | METHODS, DEVICES AND BANK COMPUTERS FOR CONSUMERS USING COMMUNICATORS TO WIRE FUNDS TO SELLERS AND VENDING MACHINES - Methods for consumers to pay at the point of sale by using a personal communicator to wire transfer funds out of their bank account. The communicator is coupled to, and exchanges signals with a reciprocating communicator of the seller, which in turn is coupled to the seller's bank. This way the money is transferred as an EFT payment code directly from the buyer's bank to the seller's bank, where it may be considered direct deposited, without processing delays. Devices also include vending machines that can receive payment this way. Bank computers are provided with systems and software for enabling the above. The bank computers are accessible by telephone lines, and work with cooperating banks by exchanging signals, for transferring the funds. The seller's bank generates a payment confirmation code that is ultimately transmitted to the seller's satisfaction for releasing the goods at the point of sale. | 08-05-2010 |
20100205095 | METHOD AND SYSTEM FOR TRANSFERRING ELECTRONIC FUNDS - A method and system for transferring electronic funds over the Internet wherein a sender provides payment information to a transfer processing system. The sender may choose from a plurality of different types of funds transfer, such as wire transfer, Western Union money transfer, various types of checks, and transfers to ATM debit/credit cards. The transfer processing system sends an electronic payment message to a recipient indicating the transfer of funds and a transfer message to a financial institution providing instructions to debit the sender's account and make those funds available to the recipient. If the recipient has an account with a financial institution that is affiliated with the transfer processing system of the present invention, the funds are credited to the recipient's account wherein the payment message serves as a confirmation message. If the recipient does not have such an account, the recipient may access the transfer processing system to access the funds made available by the system wherein the payment message serves as a payment availability message. | 08-12-2010 |
20100205096 | Virtual Share Exchange Apparatus and Method - A method and apparatus that includes a method and apparatus for pooling resources into a common fund such that the risk benefit is held low by assigning rating to the individual members as well as allowing people with similar characteristic or profiles to participate in the pool. | 08-12-2010 |
20100205097 | METHODS AND APPARATUS FOR FUNDING TRANSACTIONS USING DEBIT CARDS ISSUED BY ONE INSTITUTION AND FUNDS FROM ACCOUNTS AT OTHER INSTITUTIONS - Methods and apparatus for funding transactions are presented herein. In one embodiment, the apparatus includes an account information unit to store information about an account, the account being associated with a first financial institution. The apparatus can also include a transaction processor to receive a request for a debit amount, to determine that the account is associated with one or more funding sources, and to determine if the one or more funding sources authorize the request for the debit amount. The one or more funding sources are associated with one or more financial institutions other than the first financial institution. | 08-12-2010 |
20100211503 | Double Verified Transaction Device and Method - The disclosed technology comprises methods and devices whereby a device associated with a payer or user, such as a handheld wireless device, communicates an authorization to pay a merchant and also communicates to a financial institution, either directly or indirectly, a version of the authorization. A confirmation of the payment after verification of each communication is then received, in embodiments of the disclosed technology. In this manner, a transaction is carried out only after the device authorizes the transaction to both a merchant and a financial institution, the authorizations taking place substantially simultaneously or being delayed until both authorizations can be sent out from the device. | 08-19-2010 |
20100211504 | METHOD OF PERFORMING TRANSACTIONS WITH CONTACTLESS PAYMENT DEVICES USING PRE-TAP AND TWO-TAP OPERATIONS - A system, apparatus, and method for processing payment transactions that are conducted using a mobile payment device that includes a contactless element, such as an integrated circuit chip. The invention enables one or more of the operations of activation of a payment application, transfer of transaction data, updating of account records, setting or re-setting of a payment application counter or register, or transfer or processing of a script, command, or instruction, with these functions being performed with minimal impact on a consumer. This is accomplished by introducing a pre-tap and/or two-tap operation prior to, or as part of, the transaction flow. | 08-19-2010 |
20100217708 | Superior identification system using numbers - A system and method of preventing unauthorized use of a credit/debit card whereby a new PIN code is used for each new transaction. The user/card holder is in charge of generating each new PIN code. When entering the PIN code, a new PIN code is entered at the same time which replaces the last PIN code. Since only the user/card holder knows this ever changing new PIN code, this system is virtually fraud proof. In an enhanced version intercepting the new PIN code or watching what digits are used by the card holder would be worthless since a secret number only known by the card holder would have to be added to the last PIN code when used for the next transaction. | 08-26-2010 |
20100217709 | APPARATUS AND METHOD FOR PREVENTING UNAUTHORIZED ACCESS TO PAYMENT APPLICATION INSTALLED IN CONTACTLESS PAYMENT DEVICE - A system, apparatus, and method for preventing the unauthorized access to a payment application installed on a mobile payment device, or to transaction data stored in the device. The mobile payment device may be a mobile phone that includes a contactless element (such as a contactless smart chip) and that is capable of communication and data transfer using a wireless communications network and a near field communications capability. Unauthorized access to the payment application is prevented by requiring that access control data be received from a trusted source, such as a controller or application in charge of managing inputs from a phone keypad, in order to activate the payment application or to access stored data. | 08-26-2010 |
20100223183 | Systems and Methods to Provide Information - Systems and methods are to provide information to facilitate online transactions via mobile communications. In one aspect, a system includes a data storage facility to store and associate personal information of a user with a telephone number of the user, and an interchange coupled with the data storage facility. The interchange includes a common format processor and a plurality of converters to interface with a plurality of different controllers of mobile communications. The converters are configured to communicate with the common format processor in a common format and to communicate with the controllers in different formats. The interchange uses the converters to communicate with the mobile phone of a user to approve the providing of the personal information from the data storage facility to a website. | 09-02-2010 |
20100223184 | Sponsored Accounts For Computer-Implemented Payment System - Systems and methods for primary and sponsored accounts are provided. A system may include an account processor to execute software instructions for creating and managing electronic payment accounts and an accounts database to store account data from the account processor. The account processor may be configured to create a primary account and a sponsored account in the accounts database. The primary account may be associated with a primary account holder who has access to the primary account to add and remove funds. The sponsored account may be associated with both the primary account holder and a sponsored account holder, where the primary account holder has access to the sponsored account to transfer funds between the primary account and the sponsored account in order to add and remove funds from the sponsored account, and the sponsored account holder has access to the sponsored account for making transactions using funds in the sponsored account. | 09-02-2010 |
20100223185 | SYSTEM AND METHOD FOR PROVIDING SUPPLEMENTAL TRANSACTION PROCESSING SERVICES TO USERS OF A PRIMARY FINANCIAL SERVICES SYSTEM. - A supplemental financial transaction processing system operates with a primary financial services system to providing financial transaction processing services to a client system which has established a secure session with the primary financial services system. A transaction request includes a financial institution identifier identifying the primary financial services system and at least one primary system defined transaction value. A secure web services system, in response to receiving the transaction request: i) assigns a unique redirect URL to the transaction request, ii) stores, in a redirect database, in association with the unique redirect URL, the primary system defined transaction value; and iii) returns the unique redirect URL to the primary financial services system. A web document object comprises: i) the at least one primary system defined transaction value; ii) at least validation value; iii) user interface control script, the user interface control script comprising instructions which render, on the client system, controls for obtaining user entry of at least one client defined transaction value; and iv) validation control script, the validation control script determining that the transaction is valid; and v) transaction control script, the transaction control script comprising instructions which create and post a financial transaction back to the supplemental transaction server only if the transaction is valid. The supplemental transaction server: i) providing the web document object to the client system in response to receiving a secure connection by the client system at the unique redirect URL; ii) receiving a post of the financial transaction from the client system; and iii) performing at least one of: i) writing the financial transaction to a transaction database; or ii) forwarding the financial transaction to a processing system distinct from the supplemental transaction processing system. | 09-02-2010 |
20100228670 | System and Method for Account Level Blocking - A system and method are disclosed. The method includes receiving, at a server computer, a transaction clearing request for a transaction, and then determining, using the server computer, if the transaction satisfies a stored blocking parameter. The method further includes allowing, using the server computer, the transaction clearing request if the transaction does not satisfy the stored blocking parameter, and denying, using the server computer, the transaction clearing request if the transaction satisfies the stored blocking parameter. | 09-09-2010 |
20100228671 | SYSTEM AND METHOD FOR ACCOUNT LEVEL BLOCKING - A system and method are disclosed. The method includes receiving, at a server computer, a transaction clearing request for a transaction, and then determining, using the server computer, if the transaction satisfies a stored blocking parameter. The method further includes allowing, using the server computer, the transaction clearing request if the transaction does not satisfy the stored blocking parameter, and denying, using the server computer, the transaction clearing request if the transaction satisfies the stored blocking parameter. | 09-09-2010 |
20100228672 | SYSTEM AND METHOD FOR EXECUTING AN ELECTRONIC PAYMENT - A computer-implemented system and method for processing an electronic payment. The system and method provides for storage of at least one customizable business rule, which is set by a user, a merchant, a business and/or a third party entity. Upon receipt of electronic digital information relating to a financial transaction between a first entity and a second entity, the system and method initiate execution of an electronic payment from the second entity to a third entity that is controlled by the at least one customizable business rule. | 09-09-2010 |
20100235279 | ONLINE TRANSACTION VALIDATION USING A LOCATION OBJECT - A method that comprises obtaining from end user equipment a location object caused to be stored on the end user equipment by a service provider; and validating an online transaction attempted using the end user equipment, based at least in part on the location object so obtained. The method may further comprise obtaining transaction object information provided via the end user equipment; and obtaining information to assist in validating online transactions attempted using the transaction object information. The validating of the online transaction may comprise comparing a location specified by the location object to the information to assist in validating online transactions attempted using the transaction object information and taking a validation action based on a result of the comparing. | 09-16-2010 |
20100235280 | METHOD AND SYSTEM TO VERIFY A TRANSACTION - A method and system to verify a transaction are described. The system may include an escrow module to receive funds from a client, a communication module to receive a request from the provider to redeem a provider set of tokens, and a redemption module to selectively redeem the provider set of tokens. The funds received by the escrow module are associated with a transaction between the client and a provider. The redemption module may be configured to examine the provider set of tokens and selectively redeem the provider set of tokens based on the results of the examination. | 09-16-2010 |
20100241565 | Transmission of sensitive customer information during electronic-based transactions - An exemplary method is implemented by a payment gateway for processing electronic transactions. A token-ID that is unique to each transaction is generated, and on receiving a request to initiate an electronic transaction from a merchant server, a first message is transmitted to the merchant server that includes a first token-ID. A communication is received from an electronic device of a cardholder that contains information about the cardholder's credit card account and the first token-ID. A record is stored that includes the first token-ID and information enabling the credit card account of the cardholder to be identified. On receiving a second request, that includes the first token-ID, from the merchant server for payment of a specified amount, the credit card account of the cardholder to be debited for the requested payment is identified based on the token-ID. A determination is made if the cardholder's credit card account was successfully debited for the requested payment, and a second message is transmitted to the merchant server that specifies if the requested payment transaction was successfully completed. | 09-23-2010 |
20100241566 | PAYMENT SYSTEM AND METHOD USING MESSAGE TRANSMISSION - Provided are a payment system and method using message transmission. The payment system using message transmission includes an indicator recognizing unit and a message transmitting unit. The indicator recognizing unit recognizes a payment request indicator included in a payment request message which is transmitted from a collector terminal to a remitter terminal. The message managing unit inserts a payment means into the payment request message so as for the payment means to be output on the remitter terminal when the payment request indicator is recognized, wherein the payment means performs payment according to a payment performing input from the remitter terminal. Due to such a construction, the payment request message can be distinguished from general messages, and the payment means can be inserted into only the payment request message. Therefore, if there is a payment request input on a message screen, the payment can be immediately performed. Accordingly, it is possible to simplify payment steps and to reduce inconvenience of payment. In addition, it is possible to reduce a security danger such as personal information leakage and to facilitate payment between persons. | 09-23-2010 |
20100241567 | METHODS AND SYSTEMS FOR VERIFYING CUSTOMER SUPPLIED FINANCIAL ACCOUNT INFORMATION USING DEBIT AND CREDIT TRANSACTIONS - Embodiment of the invention describe methods and systems for verifying customer supplied financial account information verification using debit and credit transactions. These methods include electronically transmitting an electronic debit and credit transaction to the customer financial account, based on the customer supplied financial account information. The method also includes electronically transmitting a first statement descriptor, as part of at least one of the electronic debit transaction and the electronic credit transaction, that includes a first verification code. The method also includes electronically receiving, from the customer, a second verification code, and comparing, by the computer system, the transmitted first verification code with the received second verification code with respect to each other. The method also includes verifying, by the computer system, the customer supplied financial account information based on the comparison of the verification codes. | 09-23-2010 |
20100250435 | CARDHOLDER SYSTEM WITH IMPROVED SECURITY FUNCTIONS AND CORRESPONDING METHODS - A cardholder system for holding electronic cards used for transactions includes a cardholder having a fraud protection mechanism. The system allows access to a card or to information stored on the card only upon entry of data uniquely identifying the owner of the system and the card or cards contained cardholder. Upon receipt of this identifying data, a card may be removed from the cardholder. The cardholder may also be used for contactless payment transactions without removing the card from cardholder. Accordingly, the cardholder includes an RFID tag or transponder for communication to a BLINK terminal, and the data required for the contactless transaction are transferred from a card in the cardholder to the RFID tag or transponder upon acceptance of the identifying data. | 09-30-2010 |
20100250436 | MOBILE CUSTOMER SERVICE CENTERS WITH A MOBILE PICKUP MODEL - Methods and systems for redirecting the funds in a money transfer transaction are provided. The redirection of funds can be accomplished through a money redirection system. The redirection process can be initiated through a request from a recipient of the funds to change the destination of the money transfer from an intended destination to a new destination. The recipient can provide the money redirection system with a transaction identifier and with recipient identification information so that the money redirection system can verify that the recipient making the money redirection request is the recipient associated with the money transfer. After the money redirection system has verified the identity of the recipient, the money redirection system can direct a money transfer facilitator to redirect the funds. | 09-30-2010 |
20100262542 | Method And System For Controlling Risk In A Payment Transaction - Example embodiments of the presently described subject matter are described that require a customer to use a secure payment token if, during a payment transaction, it is determined that the payment transaction poses a risk. A risk analysis may be performed based at least in part on data related to the payment transaction, such as data related to the customer, the transaction itself, the merchant, etc. If the results of the risk analysis indicate that an unacceptable amount of risk exists, the merchant or any interested party may require the customer to use a secure payment token, for example, a smart card, to conduct the transaction. Otherwise, the customer may proceed by using a static payment token, for example a credit card or PIN/password-based payment token. | 10-14-2010 |
20100262543 | ELECTRONIC SETTLEMENT SYSTEM, ELECTRONIC SETTLEMENT METHOD AND CASH PAYING METHOD USING LCD BARCODE DISPLAYED ON MOBILE TERMINAL - Disclosed are an electronic settlement system, an electronic settlement method, and a cash payment method using a barcode displayed on a mobile terminal, thereby performing member identification using the barcode including member information, electronic settlement services (such as credit card settlement, direct payment card settlement, advance payment card settlement, small amount settlement, and Giro system settlement) at various shops via a procedure verifying whether a user is an actual owner of the barcode, cash payment services via member information barcode and member identification procedures, advance payment card services by depositing a designated amount of money at a database of the bank and allowing the user to systematically use the advance card within the deposited money, and wireless banking services for transmitting and receiving various banking related data via wireless network between the bank and the members. | 10-14-2010 |
20100262544 | SYSTEM AND METHOD FOR FACILITATING VALUE EXCHANGES USING MOBILE DEVICES - A system and method for facilitating a value exchange transaction. A first party initiates the transaction by selecting or providing an identifier of another party and the value to be exchanged. The second party may be identified by a pre-existing identifier such as an electronic mail address, telephone number, etc. The system informs the second party of the transaction (e.g., using the specified pre-existing identifier). If the second party is not a registered user of the system, he or she is invited to register and complete the transaction. The system may comprise a synchronization server for exchanging transaction details with users' devices, a communication server for registering new users and/or conducting transactions online and a financial server for interacting with external financial institutions. | 10-14-2010 |
20100268644 | DATA SUBMISSION FOR ANTI-FRAUD CONTEXT EVALUATION - Contextual data is gathered about a user's known location and/or about a user's expected location and generates contextual indicators based on at least a portion of the gathered contextual data. The contextual indicators are provided to one or more relying parties, such as an anti-fraud system to allow the anti-fraud system to more effectively determine the validity of transactions associated with the user, such as credit card transactions associated with the user's credit card. | 10-21-2010 |
20100268645 | SYSTEMS AND METHODS PROVIDING MULTIPLE ACCOUNT HOLDER FUNCTIONALITY - Embodiments of the invention may relate to systems and methods providing multiple account holder functionality for stored value accounts. In one embodiment, a method may include executing computer program instructions by one or more processors for receiving a request to create a secondary stored value account for a recipient; creating the secondary stored value account for the recipient; and establishing an association between a primary stored value account and the secondary stored value account. The method may further include establishing transaction rules associated with the secondary stored value account. The transaction rules can include funding rules limiting funding of the secondary stored value account to occur from the primary stored value account, and access rules preventing access to account information associated with the secondary stored value account by a primary account holder associated with the primary stored value account. | 10-21-2010 |
20100268646 | Electronic Registration And Transaction System - One preferred embodiment provides mobile device based registrations and transactions by providing an aggregator, in the form of a server connected to the internet for collecting and selectively distributing user data. The aggregator may obtain the user data through the mobile network operator, a third party data source (e.g., a credit reporting bureau), or from one-time user input with the aggregator. The user can selectively transmit their user data quickly (e.g., with the selection of a single link) via their mobile device between the aggregator and a third party content provider (e.g., a gambling site, adult content site, banking site, etc.). | 10-21-2010 |
20100268647 | System and method for securing a credit account - A system and method is disclosed for verifying a commercial transaction between a card-holder, a merchant, and a credit card company. The card-holder makes a purchase with the merchant using a full credit card number. The merchant submits a transaction approval request for approval with the credit card company. The credit card company executes conventional credit approval of the transaction approval request, as well as verifies the transaction approval request with the card-holder. An approval is sent to the merchant only after the transaction approval request is both conventionally approved by the credit card company and verified by the card-holder. The card-holder, or the credit card company, may initiate verification of the transaction approval request. The transaction approval request can also be automatically verified if one or many pre-verification criteria is/are satisfied by data contained in the transaction approval request. The pre-verification criteria can be initially determined and/or modified by the card-holder. As another security feature, the card-holder may selectively activate and deactivate their credit card/account as desired. The credit card itself includes indicia of security measures. | 10-21-2010 |
20100268648 | METHODS AND SYSTEMS FOR USING AN INTERFACE AND PROTOCOL EXTENSIONS TO PERFORM A FINANCIAL TRANSACTION - A method for communicating financial transaction data between a plurality of computer devices using an interface module and an enhanced protocol is provided. The transaction is initiated by a cardholder at an input terminal using a transaction card for completing a purchase from a merchant. The method includes receiving at the interface module initial identification (ID) data from a merchant computer wherein the interface module is a computer module separate from the merchant computer, generating a first verification enrollment request (VEReq) message based on the initial ID data that includes at least one of a merchant identifier and an account number, transmitting the first VEReq message, receiving a verification enrollment response (VERes) message affirmatively verifying enrollment of the merchant in an express check out program, and generating at the interface module a payer authentication request (PAReq) message using the enhanced protocol that defines a first set of data field extensions. | 10-21-2010 |
20100274717 | Global Internet Based Method and System For Compiling, Assigning, Registration, and Maintenance of Unique Tags - A method and process of a Registrar creating unique Equipment Tags for use of one or more Equipment owners wherein there is no duplication of Tags among the participating Equipment owners. The Equipment owner requests the Tag and its registration as a service over the Internet or other network in the same way as a Client might request a URL from a domain registration agency. The Registrar receives payment in exchange for receiving the exclusive right to use the Tags from the Registrar's System. The Tags are the product of the Registrar's System. The processor may utilize a Tag generator. The Tags are generated upon instruction of software operating on the computer processor. The Tags may be issued for an identified piece of Equipment. Information regarding the Equipment may be entered on the Tag Register. The Tag and Equipment information is stored in the Tag Register interfacing with the computer processor. The Equipment owner receives exclusive use of the Tag for a fixed period of time. The Equipment owners interface with the System over the Internet or other network. | 10-28-2010 |
20100274718 | FINANCIAL INSTITUTE-IMPLEMENTED ACCOUNT MANAGEMENT SYSTEM - Systems, methods, and computer program products are provided for an automated system for financial institution account management. The methods, systems and computer program products herein described allow the customer to link financial institution accounts and authorize a financial institution automatically and intuitively manage the linked accounts. Automated management includes managing the transfer of funds between accounts to ensure minimum balances, maximize rate of return and minimize the number of transfers between accounts. | 10-28-2010 |
20100274719 | Delayed Settlement Transactions - Methods for deferring settlement of a transaction are disclosed. A server computer receives an authorization request message for a transaction. The server computer then receives an authorization response message for the transaction. The server computer then receives a deferred settlement indicator for the transaction. | 10-28-2010 |
20100274720 | FRAUD AND REPUTATION PROTECTION USING ADVANCED AUTHORIZATION AND RULES ENGINE - Systems and methods are presented for analyzing a credit card or other financial transaction and, based on whether a score for the transaction meets or exceeds a user-selected threshold, sending a transaction notification message to a consumer's electronic device such as a cell phone. | 10-28-2010 |
20100274721 | VERIFICATION OF PORTABLE CONSUMER DEVICES - Embodiments of the invention are directed to methods, systems, and computer program products pertaining to obtaining, providing, and using dynamic card verification values for portable consumer devices, such as credit cards and debit cards. An exemplary method comprises receiving, at a server, a request for a device verification value for a portable consumer device associated with a user; obtaining, at the server, a datum indicative of a device verification value for a portable consumer device; and sending, from the server, the datum to at least one of a phone number or network address of a personal communication device associated with the user. | 10-28-2010 |
20100274722 | APPARATUS, METHOD, AND COMPUTER PROGRAM PRODUCT FOR RECOVERING TORN SMART PAYMENT DEVICE TRANSACTIONS - Initial presentation of a payment device to a payment terminal assembly, in connection with a putative transaction, is facilitated. The payment device includes a payment device memory storing a device-side payment application, with an on-device balance, and at least one payment device processor coupled to the payment device memory. The payment terminal assembly includes a terminal memory, storing a terminal-side payment application, and at least one terminal processor coupled to the terminal memory. A first command is sent from the payment terminal assembly to the payment device to compute a cryptogram to complete the putative transaction. It is detected that the cryptogram is not received as expected. In response, an identifier of the payment device and transaction recovery data associated with the putative transaction are stored in a storage area of the terminal memory. The payment terminal assembly obtains the identifier of the payment device, upon re-presentation of the payment device to the payment terminal assembly. Upon the re-presentation of the payment device to the payment terminal assembly, the payment terminal assembly compares the obtained identifier of the payment device to contents of the storage area. Conditioned at least upon the comparing yielding a match, a second command is sent from the payment terminal assembly to the payment device. The second command instructs the payment device to re-produce the cryptogram to complete the putative transaction. | 10-28-2010 |
20100274723 | Apparatus and method for providing transaction history information, account history information, and/or charge-back information - A computer-implemented method, including processing, with a processing device, information regarding an account involved in a transaction involving an individual, wherein the information regarding the account is received by a receiver, and further wherein the information regarding the account is processed prior to a processing, a completion, a consummation, or a cancellation, of the transaction, generating, with the processing device, a report or a message in response to the processing of the information regarding the account, wherein the report or the message contains information regarding a charge-back regarding a previous transaction involving the account, and transmitting, with or from a transmitter, the report or the message to a communication device associated with a merchant, vendor, or provider, of a good, product, or service. | 10-28-2010 |
20100280949 | CROSS-BORDER OR INTER-CURRENCY TRANSACTION SYSTEM - A cross-border financial transaction system is provided in which a local financial institution has a computerised server facility in which multiple system members have each been allocated an account and a foreign financial institution has also been allocated an account and wherein the server facility is programmed to operate a member activated financial transaction system wherein a system member is able to conduct financial transactions by the remote operation of a communications device to transfer money from one financial account in the local financial institution to another financial account. The system is further enabled to reserve funds available in any account during the process of executing a financial transaction initiated by a system member. The server facility is programmed to receive instructions from a system member to execute a cross-border financial transaction; to reserve relevant funds from the instructing system member's account; to communicate information concerning the financial transaction to the said foreign financial institution and to receive a report from the foreign financial institution reporting as to the success, or otherwise of the transaction and transfer the reserved funds appropriately. | 11-04-2010 |
20100280950 | TRANSACTION AUTHORIZATION USING TIME-DEPENDENT TRANSACTION PATTERNS - Systems, apparatus, and methods for authorizing a transaction initiated by a consumer are provided. A likelihood function can approximate a pattern of previous transactions and provide a measure of how likely it is for a transaction to occur as a function of time. The time of a current transaction can be used to determine a corresponding likelihood value of a likelihood function associated with the transaction. The likelihood value can then be used to determine a score for authorizing the transaction. As the likelihood corresponds to a particular time of a pattern, the score can be tailored to the current transaction and achieve greater accuracy. | 11-04-2010 |
20100280951 | APPARATUS AND METHODS FOR PROVIDING A PAYMENT SYSTEM OVER A NETWORK - Apparatus and methods provide an accumulator that processes electronic payments from an employer to a recipient via a network. The payments processed may be, for example, child support payments collected from an employee by the employer. The employer may submit one transaction made up of payments collected from multiple employees bound for multiple recipients and the accumulator may receive, translate, batch, and deliver the payments to the multiple recipients. The accumulator, employers, and recipients may communicate via a network such as the Internet. | 11-04-2010 |
20100280952 | METHOD, APPARATUS AND SYSTEM FOR IMPLEMENTING VERIFICATION AND PAYMENT IN CONTENT SERVICE - Method for implementing verification and payment in content services is provided. The method includes: pre-configuring a payment-related interface between a content service provider and an instant messaging service provider; providing the payment-related interface in a function library which further provides the instant messaging service's login verification interface; modifying the function library and a first jar package including a content service program provided by the content service provider, which includes: injecting the login verification interface and the payment-related interface provided in the function library into the first jar package and configuring the login verification interface as to be called before the content service program is executed; and combining the modified first jar package and function library to form a second jar package, modifying the value of attributes originally belonging to the first jar package in the second jar package to make the modified value of the attributes reflect corresponding attributes of the second jar package. A corresponding apparatus and system are also provided. | 11-04-2010 |
20100287099 | RISK ASSESSMENT RULE SET APPLICATION FOR FRAUD PREVENTION - Rules, applied to deny authorization of likely fraudulent transactions, are derived from a modified Patient Rule Induction Method algorithm that uses a target variable and a data set of past transactions each associated with a plurality of input variables and a hyper-rectangle enclosing a multi-dimensional space defined by a representation of the input variable values as points within the multi-dimensional space. While a count of the points within the hyper-rectangle is greater than a minimum support parameter, a first plurality of points proximal to edges of the hyper-rectangle are removed, where each such removing maximizes a mean value of the target variable, and then, while the mean value remains maximized, a second plurality of points proximal to the edges is added, where each adding maximizes or maintains the mean value. The hyper-rectangle is bounded within a minimum bounding box that defines the rules. | 11-11-2010 |
20100287100 | Method and System for Cash Remittances Using a Two Country Banking Structure - A bank customer of a first bank in a first country has a bank account. The bank provides a banking service whereby customer is able to send cash to a recipient in a second country via a commingled bank account belonging to a second bank. The cash is provided to the recipient in the currency of the second country by a third party payment agent. To effect a transfer, the bank customer in the first country instructs the first bank to debit his or her account and send cash to a designated recipient. In response, the first bank debits the customer's account, sends first payment instructions to the second bank, and transfers funds to a commingled account at the second bank. Funds from this commingled account are used to pay for the cash provided to the recipient. The banking service may be provided free of charge to a banking customer of the first bank. | 11-11-2010 |
20100293094 | TRANSACTION ASSESSMENT AND/OR AUTHENTICATION - Systems and methods for assessing and authenticating transactions are disclosed. Some exemplary embodiments may authenticate transactions based at least in part on a comparison of a newly obtained electronic signature associated with a user with a previously obtained electronic signature associated with the user, where a payment instrument presented for use in the transaction is also associated with the user. Exemplary electronic signatures may comprise any information which may identify the user, such as browser fingerprints, computer fingerprints, IP addresses, geographic IP location information, information associated with a payment, and/or a typing patterns. | 11-18-2010 |
20100299257 | Method And System For Commodity-Based Currency For Payment of Accounts - A system and method for permitting gold or other commodities to circulate as currency requires a network of system users that participate in financial transactions where payment is made in units of gold. The gold is kept in secure storage at a deposit site for the benefit of the users. The payments in gold are effected through a computer system having data storage and transaction processing programs that credit or debit the units of account of gold held for the account of each system user. | 11-25-2010 |
20100299258 | System and method for verifying the authenticity of a check and authorizing payment thereof - A system and method for verifying the authenticity and payment of a bank check at any of a plurality of banks or check cashing sites, wherein a payor or issuing site determines a first set of data including account and individualized payee data, which is communicated to a processing center for temporary storage and eventual comparison. Upon presentation of the check for redemption, the cashing site will establish a second set of data at least including the pre-printed account data and, depending on the embodiment, the individualized payee data that appears on the face of the check when presented. The second set of data is communicated to the processing center where the first and second sets of data are compared. Subsequent to comparison, authenticating data will be communicated to the cashing site, which is indicative of redemption authorization or refusal. Additional embodiments include assuring payment for and delivery of merchandise associated with an Internet commercial transaction. | 11-25-2010 |
20100299259 | METHOD AND DEVICE FOR GENERATING A SINGLE-USE FINANCIAL ACCOUNT NUMBER - A device for facilitating financial account transactions is described which includes a processing unit including a cryptographic processor. The device also includes an input unit, a display unit and a memory device connected to the processing unit. The memory device contains a private cryptographic key, a first data element and a second data element. The processing unit encrypts the first data element using the private cryptographic key and the second data element, modifies the second data element, combines the encrypted first data element and the second data element to generate a single-use financial account identifier, and displays the single-use financial account identifier. This identifier is then transmitted to a central processor for authorization of the transaction. The central processor extracts and decrypts data elements from the transmitted identifier using the private cryptographic key, compares those data elements with data elements stored in a memory, and verifies the single-use financial account identifier in accordance with the comparison. | 11-25-2010 |
20100299260 | PAY YOURSELF FIRST WITH REVENUE GENERATION - The system identifies a revenue producing opportunity for a user. The system obtains information related to the user's income, income sources, user's debts (e.g., bills) and user's goals. The system identifies a revenue producing opportunity for the user by matching user information with information regarding the opportunities. The system further provides recommendations related to the prioritization of paying certain bills and the amount to pay for each bill based upon, for example, savings goals, a community recommendation, minimizing penalties/fees associated with user's debts, minimum amounts due, due dates and available income. The system and/or the user may then determine a payment hierarchy which includes transferring funds to the user's savings account prior to paying all or a portion of certain bills, wherein the transfer of funds may include different funds transfer systems and methods. | 11-25-2010 |
20100299261 | CREDIT APPLICANT AND USER AUTHENTICATION SOLUTION - The present invention provides a credit applicant and user authentication solution for authenticating the identity of a credit applicant or a credit user. In particular, a user of the authentication system establishes a user account and obtains authentication information. The user then provides the authentication information during a subsequent credit application or credit transaction to authenticate the user's identity. Authentication information may be renewed after each application or transaction at specified time intervals, based on monetary thresholds, specific geographic limitations, or any other methodology specified by the user. | 11-25-2010 |
20100299262 | CREDIT APPLICANT AND USER AUTHENTICATION SOLUTION - The present invention provides a credit applicant and user authentication solution for authenticating the identity of a credit applicant or a credit user. In particular, a user of the authentication system establishes a user account and obtains authentication information. The user then provides the authentication information during a subsequent credit application or credit transaction to authenticate the user's identity. Authentication information may be renewed after each application or transaction at specified time intervals, based on monetary thresholds, specific geographic limitations, or any other methodology specified by the user. | 11-25-2010 |
20100306107 | TRUSTED REMOTE ATTESTATION AGENT (TRAA) - Systems and methods for use with a service provider and a consumer electronic device include a trusted remote attestation agent (TRAA) configured to perform a set of checking procedures or mechanisms to help ensure the security status of a consumer electronic device (e.g., a mobile terminal or phone) that holds financial instruments. The checking procedures may include: self-verifying integrity by the TRAA; checking for presence of a provisioning SIM card (one that was present when the financial instruments were enabled on the device); checking that a communication connection between the consumer electronic device and the service provider is available and active; and checking that communication connectivity to a home mobile network is available and active. The frequency of the checking mechanisms may be adjusted, for example, according to a risk-profile of a user associated with the device or the location (e.g., GPS location) of the device. The checks may be used, for example, to temporarily disable or limit the use of the financial instruments from the device. | 12-02-2010 |
20100306108 | EMERGENCY FINANCIAL RESERVE ACCESSIBLE DURING A COVERED EVENT - A system and method for providing emergency reserve conditional credit to a customer of a financial institution. The emergency conditional credit may be provided to the customer in the form of a line-of-credit or a loan based on the occurrence of a predetermined condition, such as involuntary unemployment, disability or the like. The emergency reserve product of the present invention is a product that can be offered through a financial institution or other ER-providing entity and, as such, does not require the level of regulation required of an insurance product. The invention also provides for the emergency reserve product to be offered in conjunction with a debt cancellation feature, referred to as emergency reserve protection, which serves to cancel the outstanding debt associated with the loan or line-of-credit. | 12-02-2010 |
20100306109 | Method, system, server and computer program for services - The invention is related to a system, comprising: an authentication server configured to carry out authentication based on a user identity module for defining a user identification; an authorization server configured to check information on user's entitlement to services based on the user identification; a gateway server configured to establish a secured connection, receive a payment message from a service server, forward the payment message to the user, receive a message comprising user's acceptance of a payment transaction, convey the user's acceptance of the payment to the service server, and add the user identification to the secured connection or the message comprising the user's acceptance of a payment transaction; and a service server configured to secure a payment transaction by using the user identification. | 12-02-2010 |
20100306110 | M-COMMERCE VIRTUAL CASH SYSTEM, METHOD, AND APPARATUS - A virtual cash system, method, and apparatus has an account record containing a record of money amounts associated with a wireless device and a transmitter for wirelessly transmitting to the wireless device predetermined information from the account record. Cash amounts can be spent from the account record directly from the wireless device via information derived from the wireless device via a bar code on the display, a short range radio signal, a light beam, or the like. A different security code is generated for each account transaction for verification. | 12-02-2010 |
20100318463 | METHOD AND APPARATUS FOR ADDRESSING ISSUER HOLD FOR AUTOMATED FUEL DISPENSER TRANSACTIONS IN AN ELECTRONIC PAYMENT SYSTEM - Placement of a hold amount against a payment card account of a customer is facilitated, in response to the customer presenting a payment device, associated with the payment card account, in connection with a non-PIN, signature-based, dual-message transaction with a merchant. The presenting of the payment device is prior to a time when an amount of the transaction can be determined. Subsequent to the placement of the hold amount, immediately after the time when the amount of the transaction can be determined, transmission of an authorization advice message from an acquirer associated with the merchant to an issuer of the payment device is facilitated. The authorization advice message indicates the amount of the transaction. A further step includes facilitating the issuer of the payment device releasing any portion of the hold amount which exceeds the amount of the transaction, immediately responsive to the authorization advice message. | 12-16-2010 |
20100318464 | COMPLIANCE CONTROL IN A CARD BASED PROGRAM - An analysis system processes financial transactions data for compliance with a payment program, such that the processing involves receiving data relating to a set of financial transactions that have been authorized by a payment processing system, and determining if one or more of the authorized financial transactions will be subjected to further processing, wherein the further processing operates on the received data and identifies authorized financial transactions that may be out of compliance with transaction rules of the payment program. | 12-16-2010 |
20100325045 | JSI biometric payment system - The JSI Biometric Payment System is designed to work in conjunction the JSI Key and its' Chip Recognition System. The JSI Biometric Payment System is designed for the point of sales and payment industries and their different markets, the banking and financial institutions, and ATM networks to eliminate fraudulent electronic business transactions and identity theft. The JSI Biometric Payment System can be scaled-up or downsized to be implement in different markets depending on their payment landscape. JSI Biometric Payment System can be used in a mobile and wireless application, multi- and single lane retail outlets, banking transactions internal and external (ATM) network services. | 12-23-2010 |
20100325046 | Transaction Security Method and Apparatus - A method and apparatus for increasing the security of transactions between two parties is disclosed. The method and apparatus employ multiple PINs from which elements are selected for user identification. The transactions may be financial transactions or any other transaction where user identification is required. | 12-23-2010 |
20100325047 | SYSTEM AND METHOD FOR PROVIDING ADVICE TO CONSUMER REGARDING A PAYMENT TRANSACTION - Systems, apparatuses, and methods for providing a consumer with an alert or other information regarding a payment transaction. When a consumer conducts a payment transaction, an alert may be sent to a device to enable the consumer to view the alert. The contents of the alert, the triggers for sending the alert, or the delivery channel for the alert may be determined by a set of preferences that the consumer set when registering for the alert service. In response to the alert, the consumer may send an SMS or other message that requests “help”, “advice”, “need information”, etc. In some embodiments, the consumer may select or activate a user interface element that enables them to obtain advice or information regarding the transaction. In some embodiments, a consumer request for help, advice, or more information may be generated by the consumer during or after a payment transaction. In response to the request for help, advice, or information, the invention may provide the consumer with a menu or list of topics of information that is available regarding the transaction. | 12-23-2010 |
20100325048 | SYSTEM AND METHOD FOR PROVIDING CONSUMER TIP ASSISTANCE AS PART OF PAYMENT TRANSACTION - Systems, apparatuses, and methods for conducting payment transactions are disclosed. In exemplary embodiments, a consumer may wish to add a tip or gratuity when paying for a good or service, such as a meal at a restaurant. Exemplary systems may generate an alert or other form of message based on the transaction, where the alert or message may include a suggested amount for a tip and/or provide the consumer with information that may be used to determine an amount for the tip. In some embodiments, the systems, apparatuses, and methods may automatically generate an estimated amount for the tip based on previously established user preferences, with the estimated amount being added to the underlying cost of the good or service when authorization is sought for the transaction. | 12-23-2010 |
20100325049 | Run efficiency measuring system, a vehicle and a certificate - A run efficiency measuring system measures both investment into a vehicle for run and actual run performance by the vehicle. The investment means cost of energy, toll, and budgeted time, while the actual run performance means travel distance and saved time. Run efficiency is calculated on the measurements separately by difference in driver, between toll run and free run, and in unit price of energy. The measurement is summarized every time when one of the differences occurs, or day changes, or predetermined travel distance has been run. Vehicle is in wireless communication with IC card type certificate integrated with credit card which is inserted into card slot of the vehicle to identify driver for the individual run efficiency calculation, authentication as qualified driver, and ETC payment. Run efficiency data gotten in a vehicle can be taken over to next different vehicle for accumulation by way of memory of the certificate. | 12-23-2010 |
20100332390 | TRANSACTIONS WITH IMAGING ANALYSIS - A money transfer system with imaging. The system includes a first money transfer terminal and an imaging device. The imaging device is configured to acquire a first set of imaging information of a user. The system also includes a host computer system, configured to receive at least a portion of the first set of financial transaction information and at least a portion of the first set of imaging information. The system also includes a previous transaction database, an external database, and a decision maker terminal. The system also includes a second money transfer terminal and a second imaging device. The second imaging device is configured to acquire a second set of imaging information of the second user. | 12-30-2010 |
20100332391 | SECURE AUTHENTICATION BETWEEN MULTIPLE PARTIES - Systems and methods are disclosed herein to allow a party to a multiple-party transaction to perform authentications using identification information received from another party while allowing the party generating the identification information to maintain confidentiality of information. A user may enter an access code to identify the user to a first party that will be generating identification information to a second party in the transaction. The access code may be entered without requiring the entry of an alphanumeric PIN (Personal Identification Number). The first party may convert the access code to a second code for transmission to the second party so that the access code is not revealed to the second party. The second party may use the second code to authenticate the user, to authenticate a payment transaction or other types of communications from the user or the first party. Thus, parties in a multiple-party transaction may perform authentications while maintaining the confidentiality of information. | 12-30-2010 |
20100332392 | Portable Terminal Device and Method of Determining Communication Permission Thereof - A portable terminal device includes a wireless communication unit ( | 12-30-2010 |
20100332393 | ONLINE PAYER AUTHENTICATION SERVICE - A payment authentication service authenticates the identity of a payer during online transactions. The authentication service of the present invention allows a card issuer to verify a cardholder's identity using a variety of authentication methods, such as the use of passwords. Also, the only system participant requiring a certificate is the issuing financial institution. One embodiment of the invention for authenticating the identity of a cardholder during an online transaction involves querying an access control server to determine if a cardholder is enrolled in the payment authentication service, requests a password from the cardholder, verifies the password, and notifies a merchant whether the cardholder's authenticity has been verified. In another aspect of the invention, a chip card and the authentication service independently generate cryptograms that must match in order for the service to verify that the correct chip card is being used by the cardholder. | 12-30-2010 |
20100332394 | VEHICLE IDENTIFICATION, TRACKING AND ENFORCEMENT SYSTEM - A system for monitoring and tracking vehicles in parking locations, public roadways and highway entrances and exits and other public vehicle access areas is provided, such as to monitor and track vehicles in parking spaces, public roadways and highways without the need for parking or traffic personnel. The system includes a meter system that generates image data of a vehicle in a parking space, public roadway and highway entrances and exits such as by creating an array of pixel data in a predetermined field of view that includes a vehicle identification tag and facial imaging. An enforcement and tracking system receives the image data and generates a vehicle license number, vehicle tag identification number and facial image from the image data, such as by analyzing the image data to identify the vehicle license number, vehicle tag identification number and facial image based on the expected location of the license tag, identification tag and field of view image data characteristics of the license tag, facial image or other suitable data. From the image data acquired, monitoring of parking spaces is performed and violation citations or notices are generated for errant vehicles in parking locations as well as notification to law enforcement and homeland security agencies of vehicles and facial images identified as being on a watch list. | 12-30-2010 |
20110004551 | CONSOLIDATED PAYMENT ACCOUNT SYSTEM AND METHOD - The present invention provides a system and method for providing and/or facilitating complete on-line payment services while protecting the privacy of the transaction participants. The comprehensive payment service is based upon a consolidated account used to store value acquired through on-line transactions. The invention provides private payment numbers for protecting the identities of the participants and includes processes for authenticating participants, authorizing transactions, and settling payments. Thus, the present invention enables merchants to effectively accept non-standard forms of payment without changing their current payment infrastructures and enables the provision of value for purchases at any network merchant using any source of value. | 01-06-2011 |
20110004552 | METHOD AND SYSTEM FOR CONDUCTING A COMMERCIAL TRANSACTION BETWEEN A BUYER AND A SELLER - A system for conducting a commercial transaction between a buyer and a seller is disclosed. The system includes a transaction processing system for facilitating payment for a transaction between the buyer and the seller. In addition to the buyer and the seller, the transaction processing system also interacts with an issuer and an acquirer. The issuer issues and manages an account for the buyer. The acquirer manages an account for the seller. The transaction processing system operates as follows. An electronic invoice relating to the transaction is first posted to the system by the seller or another system. Upon accepting the electronic invoice, the system creates a payment instruction. Each time a payment instruction is created, the system applies certain pre-negotiated payment terms and conditions between the buyer and the seller to the payment instruction. After the payment instruction is created, the system seeks approval from the buyer. Upon approval of the payment instruction by the buyer, the system schedules the payment for the specified date in the payment instruction. On the scheduled day of payment, the system calculates one or more fees, such as a transaction fee, for the transaction according to a pre-defined variable pricing matrix, which is determined based on a set of pre-negotiated conditions agreed to by the issuer, the acquirer, the seller and the buyer. For example, the transaction fee is an amount used by the issuer and the acquirer to compensate each other for processing the payment on behalf of the buyer and the seller. After the transaction fee is calculated, information relating to the transaction fee and the payment instruction is formatted into a proper message format(s) and submitted for authorization, clearing and settlement. The issuer and the acquirer then communicate with one another directly or indirectly to settle the funds. Additionally, the system provides transaction and activity reports to all relevant parties as well as access to status information for invoices and payments. | 01-06-2011 |
20110004553 | TRACK DATA ENCRYPTION - A method for using a secondary PAN is disclosed. The method includes providing a secondary PAN associated with a primary PAN, where the secondary PAN has at least one end portion that is the same as the primary PAN, but has a middle portion of that is different than the primary PAN. | 01-06-2011 |
20110010295 | DELEGATED TRANSACTIONS OVER MOBILE - Systems and methods are described that generally relate to enabling completion of secure transactions using mobile devices that may or may not have the needed or desired security features. A secure transaction may be partially completed by a secure computing device and partially completed by a less secure mobile device, where the secure computing device may be used to delegate a transaction operation to the less secure mobile device. | 01-13-2011 |
20110010296 | SYSTEM FOR PERSONAL AUTHORIZATION CONTROL FOR CARD TRANSACTIONS - An authorization system allows for cardholder-provided parameters to a personal authorization subsystem. The parameters can be selected by the cardholder to limit the authorizations that would otherwise be granted on the card. The parameters can indicate limits by frequency, dollar amount, merchant, geographic location, time of day, combinations thereof, or the like. Authorization for a given transaction, even where authorized by an issuer and a network operator, might be denied based on self-constraints set by the cardholder. In some variations, messages are sent to the cardholder based on constraints set by the cardholder and transactions might be approved and messaged, or denied and messaged. | 01-13-2011 |
20110016048 | ELECTRONIC CURRENCY, METHOD FOR HANDLING SUCH A CURRENCY AND ELECTRONIC CURRENCY HANDLING SYSTEM - The present invention concerns a system for handling of electronic payments, a user device for use in such a system including a cash handling unit, a so called CashButler, a method for handling electronic payments, an electronic currency, so called Dynamic Checks, a logic unit for executing operations associated with the handling of the electronic currency for use in electronic payments, which logic unit can be implemented in the cash handling unit, and software for executing steps of the method. | 01-20-2011 |
20110016049 | ACCOUNT RISK MANAGEMENT AND AUTHORIZATION SYSTEM FOR PREVENTING UNAUTHORIZED USAGE OF ACCOUNTS - The invention provides a system for maintaining approval criteria of one or more accounts as determined by an account holder, said system including a server capable of maintaining the approval criteria of an account over its lifecycle, a server capable of determining whether a transaction against an account is permissible based on a set of account holder selected approval criteria, an interface accessible over a local or wide area network configured to permit an issuer system to request permission to proceed with its own authorization processing upon receipt of an authorization request against an account, an interface accessible over a local or wide area network configured to permit an account holder or an authorized account operator to instruct the server to allow or disallow transactions based on the variable approval criteria selected by the account holder, and a system for authenticating a user prior to permitting operations to be processed on the server in response to commands from the account holder. | 01-20-2011 |
20110016050 | SYSTEM AND METHOD FOR VERIFICATION, AUTHENTICATION, AND NOTIFICATION OF TRANSACTIONS - A system and method for verifying, authenticating, and providing notification of a transaction, such as a commercial or financial transaction, with and/or to at least one party identified as engaging in the transaction and/or identified as having a potential interest in the transaction or type of transaction, are provided. A central system accepts information regarding a transaction, including information about at least one party identified as engaging in the transaction, such as by a credit account number or Social Security number or merchant account number, and/or identified as having a potential interest in the transaction. Based on the information regarding the transaction and any supplemental information the central system determines, the central system communicates with and/or to at least one party and/or additional or alternative parties, via at least one communications device or system having a communications address, such as a telephone number or Short Message Service address, predetermined as belonging to the at least one party and/or additional or alternative parties. Via said communications, at least one party having an interest or a potential interest in the transaction may be notified of it, and may further be enabled or required to supply additional verifying or authenticating information to the central system. If the transaction was initiated or engaged in via a communications link, such as via the Internet, said communications preferably occur over at least one different communications link and/or protocol, such as via a wireless voice network. The central system may then compute a result based on the outcomes of said communications, and may then transmit the result to the user and/or to a second system or device. | 01-20-2011 |
20110016051 | INTELLIGENT AUTHENTICATION - Systems and methods for intelligently authenticating payment transactions are disclosed. A user initiates a payment transaction to purchases goods or services from a merchant. The merchant sends a payment initiation request to a server computer in communication with a payment processing network and an issuer. The server computer queries various databases to determine one or more available communication channels that may be used as authentication channels by the issuer. The server computer also determines one or more communication channels, available for use by a mobile device of the user, that may be used as authentication channels to authenticate the payment transaction. The user is provided with a list of available/eligible authentication channels. User selects one of the authentication channels and the issuer is notified of the selection. The issuer uses the selected authentication channel to communicate with the user and authenticate the payment transaction. | 01-20-2011 |
20110016052 | Event Tracking and Velocity Fraud Rules for Financial Transactions - A fraud rule can be applied to a transaction according to a first authorization parameter. The transaction is passed to a filtering rule which is applied to the transaction according to a second authorization parameter. The filtering rule can approve the transaction for processing or pass the transaction on to a third party analysis. The fraud and filtering rules can apply the same analysis to the transaction with the exception of the authorization parameters. The fraud rule and filtering rules can analyze historical attributes of a consumer account. | 01-20-2011 |
20110016053 | FINANCIAL TRANSACTION SYSTEM - A system and method for conducting a financial transaction is disclosed. The system includes a first memory location embedded in a personal portable device. The first memory location stores a plurality of personal financial data files associated with a user. The system also includes a second memory location to store biometric information and a first input interface to receive authentication information after initiation of a purchase transaction session. The system also includes a security module including an input coupled to the first interface to authenticate the authentication information based on the biometric information and an output interface comprising an input coupled to the first memory location and an output to provide personal financial data file information to a host device. | 01-20-2011 |
20110022517 | APPARATUS INCLUDING DATA BEARING MEDIUM FOR AUTHORIZING A PAYMENT TRANSACTION USING SEASONED DATA - A system, apparatus, and method for expediting the authorization of an electronic payment transaction. Authorization of a transaction at a node of an authorization network is the result of inferring the trustworthiness of a customer to the transaction using data obtained from a different node of the authorization network. The authorization process is expedited by relying on the previous authentication decision of another node, where the previous decision may have been made based on a different payment device or different user inputs. The invention uses a decision made by a first node in the authorization network as a proxy for the authorization decision at a different node, thereby transferring the trustworthiness of a consumer, consumer's device, payment device, or other aspect of the transaction from the first node to the second. | 01-27-2011 |
20110022518 | APPARATUS INCLUDING DATA BEARING MEDIUM FOR SEASONING A DEVICE USING DATA OBTAINED FROM MULTIPLE TRANSACTION ENVIRONMENTS - An apparatus includes a processor and a set of instructions stored in a memory, where when executed by the processor, the instructions implement a method or process of determining if a consumer device should be accepted as valid based on correlating a location of the device with a location of a different transaction involving the same account. This enables an authorization decision for a transaction to be made at an earlier stage of the overall authorization process, or with less data processing or computational resources than might otherwise be required. | 01-27-2011 |
20110035318 | CREDIT AND DEBIT CARD TRANSACTION APPROVAL USING LOCATION VERIFICATION - In one embodiment, an online credit or debit card transaction is processed by transmitting purchase information, including price of the purchase item and card number, to the company that issued the card. In addition, the location from which the purchase is made is calculated, e.g., using a GPS device, and the location data is transmitted to the card issuer. The card issuer determines if the purchase meets certain specified approval requirements, such as whether the card holder has sufficient funds, the card has been reported missing, or card holder's personal information is correct. Further, the card issuer compares the location data to a number of predetermined purchase locations specified by the customer. If the location data matches one of the predetermined locations and the specified approval requirements are met, then the purchase is approved. | 02-10-2011 |
20110035319 | SYSTEMS AND METHODS FOR ENROLLING USERS IN A PAYMENT SERVICE - Embodiments of the invention are direction to systems, apparatuses and methods for enrolling users in a payment service that enables an individual (“a presenter”) to conduct a payment transaction with another party (“an acceptor”) more efficiently in situations where the individual has multiple payment accounts. One embodiment of the invention is directed to a method comprising presenting to a user a plurality of payment accounts associated with the user, receiving from the user a selection of an alias account identifier for each of the payment accounts, and storing in a database data that associates the selected alias account identifiers with the payment accounts. | 02-10-2011 |
20110035320 | System And Method For Validating A Relationship Between A User And A User Account At A Financial Institution - A system and method for validating a relationship between a user and a user account at a financial institution includes a data communication device, a memory, a processor coupled to the memory, and an account validation module executable by the processor. The account validation module generates a verification identifier for storage in the memory and is provided to the user, and subsequently receives a user initiated financial transaction involving the user account at the financial institution. The received financial transaction includes a comparison identifier supplied by the user. The account validation module determines whether the comparison identifier corresponds to the verification identifier for purposes of validating the relationship between the user and the user account maintained at the financial institution. | 02-10-2011 |
20110040684 | SYSTEMS, METHODS, AND DEVICES FOR SELLING TRANSACTION INSTRUMENTS - The present invention generally relates to a system and method for distributing an open transaction instrument. The system includes the steps of: accessibly offering for sale, in a retail environment, the open transaction instrument; selling a selected open transaction instrument; and enabling the use of the open transaction instrument. The transaction instrument may be, for example, an open pre-paid card. Furthermore, accessibly offering the open pre-paid card for sale, in one exemplary embodiment, is performed by hanging the pre-paid card on a rack. The distribution of the open transaction instrument may also comprise the step of sending a message, in substantially real time, causing the pre-paid open transaction instrument to be funded but not activated. Also, in accordance with further exemplary embodiments of the present invention, an issuer system is suitably configured to leverage existing infrastructure for inventory and related processes. | 02-17-2011 |
20110040685 | TRANSACTIONAL SECURITY OVER A NETWORK - A system and method facilitates purchase transactions over a computer network, including the purchase of electronically storable items. The embodiments herein encrypt “customer information” in an encryption stream and cause the encryption stream to be transferred from the customer to a merchant in the purchase transaction. A verification entity receives the encryption stream which is sent by the merchant for identity verification and payment authorization. Then, the verification entity verifies the identifiers contained in the encryption stream and transfers an identity verification and payment authorization from the verification entity to the merchant. The encryption stream or unique transaction identifier can be added, by the merchant, to a purchased electronic item to create a personalized electronic item. | 02-17-2011 |
20110040686 | MOBILE PAYMENT SYSTEM AND METHOD USING ALIAS - Methods and systems are disclosed for allowing financial transactions to be conducted using mobile phones. A payer initiates a transaction by sending a payment request message from a mobile phone which specifies the payee and amount to be paid. Payees are identified by unique aliases, which are maintained in a database. Methods for assembling the enrollment and alias database are included. | 02-17-2011 |
20110040687 | Method for future payment transactions - A method for the online modification, submission and approval processing of a future payment request to afford a user the ability to renegotiate established loan agreement debt terms in which network communications are established between a user, such as a debtor, and a server is presented. The method comprises receiving information, at the server, regarding the loan agreement debt terms, presenting received information to a debtor, providing an interactive environment enabling a debtor to modify existing terms, submitting modified terms, processing data from the available information using a rules based engine, and processing a future payment request based on at least one decision made by the rules based engine. While online, the user/debtor may engage in revising a rejected future payment request in an attempt to reach a satisfactory renegotiation of debt terms. | 02-17-2011 |
20110047075 | LOCATION CONTROLS ON PAYMENT CARD TRANSACTIONS - Geographical location information provided by a mobile device is used as a control on the use of a payment card as described. Mobile device identification is linked to a payment card account such that when a payment card authorization request is received, information about the geographic location of the origination of the request is checked against the geographic location provided by the mobile device, and if there is a match, the transaction can further processed for authorization or directly authorized. | 02-24-2011 |
20110047076 | ALIAS REPUTATION INTERACTION SYSTEM - Systems and method for generating reputation information for an alias are provided. The alias is associated with an entity. Payment transaction information related to a first alias associated with a first entity is received. The payment transaction information includes payment transactions performed by the first entity. In addition, non-payment transaction information related to the first alias is also received. The non-payment transactions include transaction between the first alias and one or more objects. The payment transaction information and the non-payment transaction information is analyzed to associate the one or more objects with the first alias. Thereafter, reputation information for the first alias is generated based at least in part on the payment transaction information and the non-payment transaction information. | 02-24-2011 |
20110055085 | Systems and Methods for Processing Benefits - Systems and methods for processing, for example, childcare benefits include: issuing a benefit card to a childcare customer; receiving a start time for childcare service at a childcare provider, the start time recorded by using the benefit card at a terminal located at the childcare provider at the start of childcare service; receiving an end time for childcare service at the childcare provider, the end time recorded by using the benefit card at a terminal located at the childcare provider at the end of childcare service; computing the childcare benefit eligibility based on the start time, the end time and benefits available for the childcare customer; and paying the childcare provider a payment based on the computed benefit eligibility. | 03-03-2011 |
20110060686 | System and Method for Communicating Check Information to a Financial Institution - A system for communicating check information to a financial institution is provided. The system includes but is not limited to a check reader, a centralized computer, and a financial institution computer. The check reader retrieves check information from a drawn check. The check information includes an amount of money, a routing number, and an account number. The centralized computer is in communication with the check reader. The centralized computer converts the check information into debit card data for transmission over a debit card network. The financial institution computer is in communication with the centralized computer via the debit card network. The debit card data is transmitted to the financial institution over the debit card network. | 03-10-2011 |
20110060687 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR ISSUING AND USING DEBIT CARDS - A system, method, and computer program product are used to issue and track debit cards. A system comprises an enrolling system that verifies an enrollee, associates an enrollee's main and overdraft account, and issues a debit card, an authentication system that receives information regarding a requested transaction of a debit card and that receives information regarding the main and overdraft account associated with the debit card and accepts or rejects the requested transaction based thereon, and a settlement system that generates a periodic report of at least one of the transactions, the main account, and the overdraft account. The overdraft account can be a charge or credit account. | 03-10-2011 |
20110066551 | Method and System for Providing Risk Information in Connection with Transaction Processing - A system for providing real-time risk mitigation for an authorization system. The system receives authorization requests from multiple merchants (or their respective acquirers) and processes such requests. Each processed request is then forwarded to its corresponding issuer for further authorization. Each processed request includes an authorization message. The authorization message can include a risk score, a number of reason codes, and a number of condition codes. The use of the risk score, reason codes and condition codes allows issuers to make better informed decisions with respect to providing authorizations. | 03-17-2011 |
20110066552 | CARD-LESS FINANCIAL TRANSACTION - Systems (and corresponding methodologies) that facilitate card-less financial transactions are provided. The innovation enables card-less ATM (automated teller machine) transactions such as cash withdrawals, transfers, balance inquiries, etc. In aspects, customers can set up an ‘electronic wallet’ account based upon a pre-set range or otherwise. Accordingly, access to the ‘electronic wallet’ is granted or denied based upon responses to challenges presented. | 03-17-2011 |
20110066553 | SYSTEMS AND METHODS FOR VERIFYING IDENTITIES - A method for verifying the identity of one party on behalf of another party is provided. The method includes providing a money-transfer system and a communication system that communicates with the money-transfer system; receiving at the money-transfer system from the first party certain verification criteria for confirming the identity of a second party; and storing the verification criteria in the host computer system of the money-transfer system. When an ID is received from the second party at a money-transfer location; the verification criteria is retrieved from the host computer system; and the acceptability of the ID is determined in accordance with the verification criteria. If the identification device is acceptable, identification information is obtained from the identification device; and the identification information is processed to verify the identity of the second party. In other embodiments, a method for pre-verifying the identity of a party and a system for performing the method of the invention are provided. | 03-17-2011 |
20110071945 | SYSTEM AND METHOD FOR PERFORMING SECURE CREDIT CARD TRANSATIONS - A method and system of performing secure credit card purchases in the context of a remote commercial transaction, such as over the telephone, wherein only the customer, once generally deciding upon a product or service to be purchased, communicates with a custodial authorizing entity, such as a credit card company or issuing bank wherein such entity has previous knowledge of the credit card number as well as custodial control of other account parameters such as interest rate, payment history, available credit limit etc. The customer supplies the custodial authorizing entity with the account identification data such as the credit card number and a requested one of a possible plurality of predetermined payment categories which define the dollar amount for the purchase and specific, predetermined time parameters within which authorization by the custodial authorizing entity will remain in effect. The custodial authorizing entity then generates a transaction code which is communicated exclusively to the customer wherein the customer in turn communicates only the transaction code to the merchant instead of a credit card number. The transaction code is indicative of merchant identification, credit card account identification and a designated one of the plurality of predetermined payment categories. | 03-24-2011 |
20110071946 | CREDIT APPLICANT AND USER AUTHENTICATION SOLUTION - The present invention provides a credit applicant and user authentication solution for authenticating the identity of a credit applicant or a credit user. In particular, a user of the authentication system establishes a user account and obtains authentication information. The user then provides the authentication information during a subsequent credit application or credit transaction to authenticate the user's identity. Authentication information may be renewed after each application or transaction at specified time intervals, based on monetary thresholds, specific geographic limitations, or any other methodology specified by the user. | 03-24-2011 |
20110078079 | DISCOUNT PAYMENT METHOD AND SYSTEM USING A TEMPORARY CARD NUMBER - Disclosed is a method and system for making payment with discounted prices by using temporary card numbers. The method comprises the steps of: (a) at least one discount means being selected by a user of a mobile terminal, and the mobile terminal transmitting temporary card number issue information including the selected discount means to a temporary card number issue device, wherein the mobile terminal in advance stores a plurality of discount means that can substantially discount a transacted price; (b) the temporary card number issue device selecting and storing temporary card numbers corresponding to the temporary card number issue information and transmitting the selected temporary card numbers to the mobile terminal; (c) the mobile terminal transmitting payment information including the temporary card numbers and payment means information including information on a payment means for paying the transacted price to a credit authorization terminal (CAT) if a payment request is received from the user only for a predetermined time period from when the temporary card numbers are received, and extinguishing the temporary card numbers after the predetermined time period from when the temporary card numbers are received; and (d) the CAT receiving the payment information from the mobile terminal, transmitting a request for a transaction authorization to the payment company server by using the payment information, and receiving the transaction authorization from the payment company server. Thus, according to the present invention, it is more easy and convenient to making payment by using coupons. | 03-31-2011 |
20110078080 | METHOD AND APPARATUS TO SECURE AN ELECTRONIC COMMERCE TRANSACTION - A method begins by a processing module receiving data content. The method continues with the processing module embedding the data content into a data stream to produce a stream of data. The method continues with the processing module sequentially encoding data segments of the stream of data in accordance with an error coding dispersed storage function to produce pluralities of encoded data slices. The method continues with the processing module outputting the pluralities of encoded data slices to a plurality of dispersed storage units for storage therein. | 03-31-2011 |
20110078081 | MOBILE PAYMENT APPLICATION ARCHITECTURE - A system, apparatus, and method for conducting payment transactions using a mobile device. Embodiments of the invention are directed to an architecture or system design for the functional elements residing in a mobile device that may be used to conduct a payment transaction. The inventive architecture may be implemented as a set of functional modules resident in a secure element that is embedded or otherwise incorporated into the mobile device. | 03-31-2011 |
20110078082 | SYSTEMS, METHODS, AND DEVICES FOR COMBINED CREDIT CARD AND STORED VALUE TRANSACTION ACCOUNTS - The present invention generally relates to a single transaction account identifier that can be used for in transactions with one of multiple transaction accounts. The method includes one or more of the following steps: establishing at least two transaction accounts, wherein the transaction accounts are respectively associated with transaction account identifiers; receiving, at a transaction processing system, a common account identifier; recognizing the common account identifier as being associated with more than one account; and determining, which of the at least two transaction accounts to access for processing the transaction. The determining step may be based on selection criteria and the selection criteria may be modified by a user. One of the first and second transaction account identifiers may be forwarded to the respective first and second transaction accounts based on the determining step; and the transaction may be processed via the selected transaction account. | 03-31-2011 |
20110082791 | Monitoring Secure Financial Transactions - A request for a secure financial transaction is received from a user, who is authenticated with a biometric device. If the user is authenticated, an authentication token is received from the biometric device and sent to a remote device, which initiates the secure financial transaction. Upon initiation of the secure financial transaction, details related to the secure financial transaction are displayed to the user and the those details are monitored until the secure financial transaction is completed. | 04-07-2011 |
20110082792 | Processing of Credit Card Transactions Using Internet Protocol - A system for processing credit card transactions is disclosed. Merchant locations include at least one Internet protocol (IP) capable credit card terminal, either connected directly to a wide area network such as the Internet, or connected to the Internet via a router. The IP-capable credit card terminal forwards transaction information over the Internet, and biometric information regarding the presenting customer if desired and if available, which is processed by a credit card processing system. According to one embodiment of the invention, the credit card processing system is an IP credit card gateway processor, which formats the transaction information into a conventional format for processing by a credit card processor. According to another embodiment of the invention, the credit card processing system is a Direct IP credit card processor, which receives the IP transaction information, and biometrics if available, from the credit card terminal and which processes and communicates the information direction to the credit card issuer. Authorization of the transaction is then communicated by the credit card processing system over the Internet to the credit card terminal, so that the transaction is completed. | 04-07-2011 |
20110082793 | SECURE NETWORKED TRANSACTION SYSTEM - A method and system for approving a transaction between a customer and a merchant including the steps of transmitting a transaction request from a customer to a merchant; transmitting a verification request from the merchant to a verification entity, the verification request comprising first data; the customer device transmitting second data to the verification entity; and the verification entity performing a verification step by using the first data and the second data to verify if the transaction should be approved. | 04-07-2011 |
20110087591 | Personalization Data Creation or Modification Systems and Methods - The present disclosure has a merchant computing device communicatively coupled to a customer computing device via a network and a transaction computing device securely coupled to the merchant computing device and coupled to a debit network. In addition, the present disclosure has logic configured to enable a user of the customer computing device to modify personalization data stored on the transaction computing device based upon an approval obtained via the debit network during a transaction with the merchant computing device. In addition, the personalization data comprises a phrase and an image and the logic is further configured to display the phrase and the image to the user when the user performs a transaction with the transaction computing device. | 04-14-2011 |
20110087592 | SYSTEMS AND METHODS FOR FACILITATING TRANSACTIONS - Pursuant to some embodiments, a payment account including multiple subaccounts is provided where each subaccount can be used only for payment for a designated category of products. Pursuant to some embodiments, purchases using the subaccounts can be automatically combined in a single transaction to redeem multiple categories of products, with each subaccount providing funds for the redemption of a single product category. In some embodiments, the payment account may include a subaccount that contains value that is unrestricted and available for general spending or to automatically provide supplementary funds for the redemption of products from subaccounts with product category restrictions. The value contained within each subaccount may be immediately available funds, access to credit provided by an entity who has agreed to extend credit to the account holder for purchasing products in a designated category or a combination of these types of value. Alternatively, in some embodiments, the value may include benefits provided by a health care plan whose redemption is limited to specific categories of products and services as provided by the plan. | 04-14-2011 |
20110087593 | TRACK DATA MAPPING SYSTEM FOR PROCESSING OF PAYMENT TRANSACTION DATA - Systems and associated apparatuses and methods for processing payment transactions. A merchant's data processing system may provide payment transaction data in a first format (e.g., Track | 04-14-2011 |
20110087594 | DUAL EMERGENCY RESERVE AND SAVINGS ACCOUNT AND SYSTEMS FOR ALLOCATING DEPOSITS - A system and method for providing emergency reserve conditional credit to a customer of a financial institution. The emergency conditional credit may be provided to the customer in the form of a line-of-credit or a loan based on the occurrence of a predetermined condition, such as involuntary unemployment, disability or the like. The emergency reserve product of the present invention is a product that can be offered through a financial institution or other ER-providing entity and, as such, does not require the level of regulation required of an insurance product. The invention also provides for the emergency reserve product to be offered in conjunction with a debt cancellation feature, referred to as emergency reserve protection, which serves to cancel the outstanding debt associated with the loan or line-of-credit. | 04-14-2011 |
20110087595 | METHOD AND SYSTEM FOR FACILITATING COMMERCIAL PURCHASES - The present invention is directed to a method and system of consummating a commercial transaction between the customer and a merchant. A mobile device, such as a mobile phone would be provided with a special application allowing a customer to enter information relating to a particular purchase at a merchant's premises or, online, and then to transmit this information to an administrator for the approval of the purchase. If the purchase has been approved, this information would be transmitted in real time to both the customer's mobile device as well as to a merchant's terminal. The system and method of the present invention would be initiated by the customer and is generally wireless and can be done without the customer being physically in possession of their credit or debit card. | 04-14-2011 |
20110087596 | Systems and methods for dynamic receipt generation with environmental information - A new approach is proposed that contemplates systems and methods to enable an individual to complete a financial transaction by swiping a magnetic stripe card through a card reader connected to a mobile device. The size of the card reader is miniaturized to be portable for connection with the mobile device. The card reader is configured to reliably read data encoded in a magnetic strip of the card with minimum error in a single swipe and provide a signal that corresponds to the data read to the mobile device, which then decodes the incoming signal from the card reader and acts as a point-of-sale device to complete the financial transaction. Such an approach enables a person to become either a micro-merchant (payee) or a buyer/customer (payer) without having to purchase expensive card reader devices or software. | 04-14-2011 |
20110087597 | FUNDING ON-LINE ACCOUNTS - A system generates an identifier when a consumer deposits cash, where a new unique identifier is generated with each transaction. The consumer receives the identifier and the identifier (along with the amount of cash deposit) is communicated to a payment provider for storage. The consumer may then access and fund an on-line account with the financial services provider by first accessing the account and entering the unique character identifier, which the system processes. If the identifier is valid, e.g., an actual stored identifier within the system associated with a cash amount, then the system transfers that amount to the consumer's account. At this point, the consumer may use the account to make an on-line transaction or purchase with the newly funded amount. | 04-14-2011 |
20110093390 | Apparatus and Method for Aggregating and Accessing Data According to User Information - An apparatus and method for aggregating and accessing data according to user information are provided. According to one aspect, an interface device for providing data between a first device and a second device comprises an input, an output, logic, and a repository for storing personal data and data associated with one or more users. The input of the interface device receives data in a first format from the first device. The logic receives a data request, identifies a second device for receiving the data, identifies a second format for the second device, and translates the data to the second format. The translated data is then transmitted to the second device via the output. The logic may further collect, aggregate, and transmit the aggregated data to a requesting device. The input may be a product identification input device. The second device may be billed for the data services. | 04-21-2011 |
20110093391 | System and method for a private and secure merchant payment system using a mobile wireless device - A secure payment system between a customer and a merchant uses a wireless device of the customer that receives a partial payment authorization, record from a sales terminal of the merchant to include at least a merchant terminal identification and a payment amount to facilitate payment transaction via a customer portable wireless device from the customer to the merchant. The device has a receive sensor to receive the partial transaction record from the sales terminal and a function that activates a payment transaction function in the device. The payment function, on being activated, creates an encrypted payment data record including at least the merchant terminal identification, the payment amount, a personal code and the device identification code and transfers it over the global network to a central system. The device and the sales terminal receive from the central system a notification of the payment approval record. | 04-21-2011 |
20110093392 | NEGOTIABLE INSTRUMENTS AND SYSTEMS AND PROCESSING SAME - There is provided a check with additional data capture capability that in conjunction with a linked transaction card provides substantially complete coverage for card holders to conduct transactions with merchants for the payment of goods and services. The additional data capture capability enabling generation of a card statement with detailed information regarding purchases and expenditures of both check transactions and card transactions to thereby permit a card holder to accurately track, monitor, describe, and reconcile all transactions in a statement period. The check comprises first and second data entry location for identification and descriptive information about a financial transaction, account holder name adjacent to a drawer signature field and check limit adjacent to a written check amount field, as well as other check information and entry fields, including routing, account and check reference number, date, payee designation, numeric check amount and account holder and financial institution information. | 04-21-2011 |
20110099108 | METHOD, SYSTEM AND COMPUTER READABLE MEDIUM FOR WEB SITE ACCOUNT AND E-COMMERCE MANAGEMENT FROM A CENTRAL LOCATION - A method, system, and computer readable medium for managing a financial transaction of a user at a merchant, including authenticating the user via a device of the user while the user is at the merchant; transmitting activation information for activating a reusable, pre-existing, unaltered and permanent credit or debit card account number of the user from the user device to a financial institution for processing financial transactions, while the user is authenticated; submitting a payment request including the account number to the financial institution from the merchant, while the account number is activated; and de-activating the account number after the payment request is processed by the financial institution. The financial institution only accepts and processes payment requests received from merchants while the account number is activated, and the financial institution declines payment requests while the account number is de-activated. | 04-28-2011 |
20110099109 | Real Time Correlation of Parallel Charging Events - A method is implemented in a network ( | 04-28-2011 |
20110099110 | PORTABLE TERMINAL DEVICE, CHARGING PROCESSING METHOD FOR PORTABLE TERMINAL DEVICE, AND CHARGING SYSTEM - An object of the present invention is to provide a portable terminal device capable of selectively performing a charging form with convenience for a user, a charging processing method for the portable terminal device, and a charging system. | 04-28-2011 |
20110106701 | METHOD AND APPARATUS FOR PERFORMING VOICE-BASED CREDIT CARD PROCESSING - One embodiment of the present invention provides a system for performing voice-based credit card processing. During operation, the system receives voice input from a merchant at a computer via a telephone to initiate a credit card transaction. Next, the system authenticates the merchant. After authenticating the merchant, the system prompts the merchant for a credit card number. Next, the system authenticates a consumer associated with the credit card. Note that the system can authenticate the consumer with pre-registered information that is associated with the credit card. Once the consumer is authenticated, the system prompts the merchant for a transaction amount. Next, the system receives the transaction amount from the merchant. The system then authorizes the credit card transaction for the transaction amount. Finally, the system reports the result of the authorization to the merchant. Note that embodiments of the present invention enable the merchant to process credit card transactions at reduced cost without the need for any equipment other than a telephone, thus providing the ability to have instant credit card enabled merchants on demand. | 05-05-2011 |
20110106702 | METHOD, SYSTEM AND COMPUTER READABLE MEDIUM FOR WEB SITE ACCOUNT AND E-COMMERCE MANAGEMENT FROM A CENTRAL LOCATION - A method, system and computer readable medium for managing a user online financial transaction at a destination ecommerce web site using a credit or debit card account of the user, including a) transmitting an activation command to a financial institution processing financial transactions for activating the credit or debit card account of the user; b) submitting a charge request for the credit or debit card account to the financial institution via a destination e-commerce web site to which the user is logged in while the credit or debit card account is in the activated status; and c) transmitting a de-activation command to said financial institution for de-activating the credit or debit card account, wherein the financial institution only accepts and processes charge requests received from e-commerce web sites while the credit or debit card account is in the activated status and wherein the financial institution declines charge requests while said credit or debit card account is in the de-activated status, and wherein steps a) to c) are repeated at least once. | 05-05-2011 |
20110106703 | COMPUTERIZED DEPOSIT ACCOUNT MANAGEMENT - Computer-implemented methods and systems are provided for managing a deposit account held by a financial institution. This includes receiving, via a computer network, a request to make a contribution to the deposit account by an electronic payment and interacting with a payment processing center for processing and authorization of the electronic payment. Upon authorization of the electronic payment, the contribution is transferred to the deposit account via a transfer interface that interfaces with the financial institution. In another aspect, a computer readable medium contains instructions for controlling a computing device to perform a method for managing a deposit account held by a financial institution. | 05-05-2011 |
20110106704 | SYSTEM AND METHOD TO REALIZE INSTANT, GUARANTEED PAYMENTS FOR BUSINESS-To-BUSINESS (B2B) - A method is disclosed for transferring funds between two business entities. The method includes the steps of including a first business entity transmitting a purchase order to a second business entity, the second business entity transmitting an authorization request to a payment processor, sequestering a first amount of money in an account associated with the first business entity, based in part on an amount indicated in the purchase order, granting preliminary access to a second amount of money in an account associated with the second business entity, and removing the sequestered first amount of money from the account associated with the first business entity and depositing the second amount of money to the account associated with the second business entity. | 05-05-2011 |
20110106705 | Account Administration Plans and Systems - A computer system for facilitating payments from an account according to particular embodiments of the invention is adapted for: (1) facilitating the transmission, to a plan service provider, of a first set of documentation of a first payment that would potentially qualify for reimbursement from the account; (2) receiving, from the plan service provider, verification that the first payment has been verified as qualifying for reimbursement from the account according to a set of reimbursement rules associated with the account; (3) storing, in memory, an electronic version of the first set of documentation; and (4) storing, in memory, an indication that the first payment has been verified as being properly reimbursable from the account. | 05-05-2011 |
20110106706 | System for electronic transaction settlement - An electronic communication system associated with a settlement house for settling an electronic transaction between a customer and a merchant. The communication system is configured to receive through a first electronic communication path a first account identifier of a first account associated with the customer and a transaction amount from the merchant, contact the customer through a second electronic communication path to allow the customer to select a payment method, and send through a third electronic communication path the transaction amount and a second account identifier of a second account associated with the customer to a financial services provider associated with the payment method. | 05-05-2011 |
20110106707 | RECHARGE AMOUNT TRANSFER SYSTEM AND METHOD FOR ELECTRONIC PAYMENT MEANS USING PORTABLE PHONE - The present invention relates to a recharge amount transfer system for an electronic payment means using a portable phone. The present invention comprises: a first user terminal that indexes a recharge balance stored in a first electronic settlement payment means according to recharge amount transfer request information input by a first user, transmits a generated recharge amount transfer request SMS if the amount to be transferred is less than the recharge balance, receives a first recharge amount transfer completion SMS, and updates the recharge balance stored in the first electronic settlement payment means; a recharge server that indexes the first user information already stored according to the recharge amount transfer request SMS, generates and transmits a recharge amount transfer confirmation request SMS accordingly, receives a recharge amount transfer confirmation SMS, updates the first and second user information already stored in a recharge storage DB, and transmits the generated first and second recharge amount transfer completion SMS; and a second user terminal unit that receives the recharge amount transfer confirmation request SMS, generates and transmits a recharge amount transfer confirmation SMS according to the recharge amount transfer confirmation information input by a second user, receives the second recharge amount transfer completion SMS, and updates the recharge balance stored in a second electronic settlement payment means. | 05-05-2011 |
20110112964 | Method, system and apparatus for the establishment of a virtual banking environment in a merchant venue while increasing the deposit-based assets of optionally interfaced traditional banking institutions subject to fractional-reserve banking - A system incorporating method and associated apparatus for establishing virtual banking in a merchant venue or syndication of merchants for one or more consumers in a manner that increases the deposit-based assets of a related traditional banking institution by loading transactions of fractional currency amounts, preferably reflecting the acquisition of physical fractional currency, and more preferably coinage, and thereupon enabling inter-merchant (or syndicate) commercial transactions, including purchases and sales, in a manner that does not deplete deposit-based assets. Commercial transactions are at the direction of consumer(s) each with their own portable device linked to a merchant-hosted virtual account that maintains transaction details, histories and balances, and transmits data reflecting the same to the portable device(s) where it is recorded and displayed, upon demand. Also included are devices for executing commercial transactions with the portable device(s) and transmitting appropriate data to each bank and virtual account. | 05-12-2011 |
20110112965 | COMMUNICATION METHOD AND SYSTEM - The present invention relates generally to a method and system for authenticating a transaction between a user and a payment system. The information of the transaction is transmitted through a secure communications from the user to the payment system, and the authentication message is sent from a payment system to the user via an authentication system. The authentication message is sent from the authentication system from one of multiplicity of addresses to the user, and the response to the message is received in that address. Additional security is achieved when the reply addresses are selected randomly. | 05-12-2011 |
20110112966 | Financial Transaction System with Integrated Electronic Messaging, Control of Marketing Data, and User Defined Charges for Receiving Messages - A method of performing financial transactions between users of Summa accounts, each Summa account including an electronic messaging system that provides for crediting and debiting at least one financial account associated with each Summa account. The invention also allows each user to define a schedule of receipt charges associated with the identities of other users to be charged as compensation for accepting delivery of their messages. With the user's permission, a record of purchases made from the Summa account may be maintained in a marketing database, increasing the value of use's market identity and the corresponding value of receipt charges they user may collect. Major benefits of the invention include, but are not limited to: (1) electronic financial transactions are completed in a more secure manner with appropriate tracking and verification, (2) message recipients receive income from the value of their market identities, and (3) commercial enterprises can more readily identify individuals interested in receiving their commercial offers. | 05-12-2011 |
20110119187 | Electronic sales method - A method is presented for facilitating sales transactions by electronic media. A temporary barcode or other design is tattooed onto a tattoo sheet, previously organized by verifiable chronological date. The tattoo sheet is made with an adhesive sufficient to allow the tattoo, once printed, to be transferred onto the skin of a person or to a personal object and remain affixed to said person or personal object during the period of time for which a financial transaction might occur. The transferable temporary tattoo is then removed from the sheet and applied to the skin of the individual or to a personal object in their possession. Before the sales transaction can be consummated, the tattoo information along with the corresponding valid date information is scanned with a scanner. Characteristics about the scanned tattoo are compared to characteristics about other tattoos stored on a computer database for the specific time period in question in order to verify the identity of the buyer for a given time period. Additionally, the chronological information is verified to ensure that the transaction is occurring only during a previously prescribed valid time period for which a given tattoo is valid. Once both pieces of information are verified, the seller may be authorized to debit the buyer's bank electronic bank account in order to consummate the transaction or transactions during the given period of time. The seller's electronic bank account may be similarly updated. | 05-19-2011 |
20110119188 | BUSINESS TO BUSINESS TRADING NETWORK SYSTEM AND METHOD - The system enables a data processing framework that polls for files using a listener, controls the workflow using event driven logic, processes financial transactions, and creates a business to business trading partner network. The listener ensures the reliability and data integrity of input files and performs archiving functions. The payment management functions automatically processes transactions, including payor (e.g., the buyer) initiated payments to a payee (e.g., a supplier) by utilizing a flexible, decoupled processing architecture. A payment management computer identifies a universal identifier for each entity and forms relationships and hierarchies in order to increase efficiency of the trading partner network. Metadata describes the format, validation and relationships for a wide variety of financial account data. | 05-19-2011 |
20110119189 | DATA PROCESSING FRAMEWORK - The system enables a data processing framework that polls for files using a listener, controls the workflow using event driven logic, processes financial transactions, and creates a business to business trading partner network. The listener ensures the reliability and data integrity of input files and performs archiving functions. The payment management functions automatically processes transactions, including payor (e.g., the buyer) initiated payments to a payee (e.g., a supplier) by utilizing a flexible, decoupled processing architecture. A payment management computer identifies a universal identifier for each entity and forms relationships and hierarchies in order to increase efficiency of the trading partner network. Metadata describes the format, validation and relationships for a wide variety of financial account data. | 05-19-2011 |
20110119190 | ANONYMOUS TRANSACTION PAYMENT SYSTEMS AND METHODS - Disclosed are methods, apparatus, systems, and non-transitory, tangible computer-readable media associated with use of transaction authorization codes to each of the parties involved in a buying and selling transaction. In various embodiments, the transaction authorization code(s) may be exchanged between parties, and once confirmed or validated, the transaction may be consummated. In one embodiment, the transaction authorization code may conceal personal and/or financial information about a party with whom the code is associated. In various embodiments, transaction authorization codes may be used on shared or separate devices. In various embodiments transaction authorization codes may be entered through web-based interfaces or using mobile devices. | 05-19-2011 |
20110125642 | METHODS AND SYSTEMS FOR INDIRECTLY RETRIEVING ACCOUNT DATA FROM DATA STORAGE DEVICES - A method and system for processing an electronic payment transaction is described herein. The method uses a first computer device configured to access account data from a database subsystem operating at a second computer device. The method includes operating a transaction messaging system (TMS) in a first computer operating environment of the first computer device, operating an account data access system (ADAS) in a second computer operating environment of the first computer device, transmitting a request for account data from the TMS to the ADAS, executing a query for the account data at the database subsystem wherein the query is generated by the ADAS and based on the request for account data, receiving the requested account data at the TMS in response to the query, and processing the payment transaction at the TMS using the received account data. | 05-26-2011 |
20110125643 | OVERDRAFT PROTECTION AND FORGIVENESS - Various aspects relate to systems, methods or devices for processing overdrafts made by customers. A particular embodiment is directed towards, a system that is configured to receive transaction data from customer-oriented terminals. The transaction data includes requests for monetary transfers on behalf of customers that hold a checking or savings account at a financial institution. In response to receiving the transaction data, the system accesses customer account information, which can include the amount of funds in the checking or savings accounts. The system determines whether sufficient funds exist in the accounts to cover the financial transactions. In response to a potential overdraft of one or more customer accounts, stored customer information is accessed to determine and authorize overdraft deferment eligibility of the customer based upon the stored customer information. The system defers an overdraft fee by providing a grace period during which funds can be transferred to cover the overdraft. | 05-26-2011 |
20110125644 | ONLINE PAYMENT TRANSFER AND IDENTITY MANAGEMENT SYSTEM AND METHOD - A payment transfer method for transferring funds from a payer to payee is provided, including designating a payee and specifying a payment amount and an account; debiting the funds from the account and crediting a first trust account; and identifying the payee by verifying responses received in response to one or more challenge-response questions defined by the payer. If the one or more responses are verified, a second trust account may be debited and a payee account credited with the payment amount. The first and second trust accounts may then be reconciled. There is also provided a payment transfer facility for transferring funds, comprising an application server for storing payment data relating to a transfer of funds and a notification server for providing a notification of the transfer of funds. | 05-26-2011 |
20110125645 | SYSTEM AND METHOD FOR FACILITATING A SUBSIDIARY CARD ACCOUNT - The present invention provides a system and method for providing a flexible limit subsidiary account that may be issued by a Foreign Financial Institution. In particular, the present provides a system and method for allowing a parent to provide funds to a subsidiary and to control the spending of subsidiary or spending capacity. The card account may be issued at the request of the parent who may retain the ability to define, modify, and/or terminate the spending and/or debt accumulation limits for the subsidiary card account as well as other features as described in the attached disclosure. The system may be configured to provide the ability for parent to eliminate risks associated with fluctuations in currency exchange rates by committing to fixed automatic long-term charges at a fixed foreign exchange rate for a fixed term. | 05-26-2011 |
20110131135 | ONLINE WARRANTY HISTORY STORAGE ACCESS - A message confirming a transaction for the purchase of an item can include identifiers for the item and for a consumer as well as information pertaining to the transaction. The item identifier is used to locate an express warranty for the item. The consumer identifier (e.g.; a number of an account issued to the consumer) is used to locate the consumer's file in which the express warranty is stored along with at least a portion of the information pertaining to the transaction. Other data received in respective messages can be also be stored in the consumer's file. Thereafter, the consumer identifier can be use to retrieve all express warranties stored in the file for past respective purchased items. Information about each express warranty can be compared to the stored portion of the information pertaining to the transaction so as to retrieve only those express warranties that are valid (e.g.; unexpired). | 06-02-2011 |
20110131136 | Risk Management Customer Registry - Methods and systems are provided for managing Risk associated with a financial account initiated by an intermediary institution. Risk related information descriptive of a customer of the intermediary can be registered with a neutral entity and a certification can be generated that is associated with the customer and includes the registered information. An instruction can be received to convey the certification associated with the customer to a Primary Financial Institution after which the certification can be conveyed to the Primary Financial Institution. | 06-02-2011 |
20110131137 | METHOD AND APPARATUS FOR PERFORMING COLLECTIVE VALIDATION OF CREDENTIAL INFORMATION - An embodiment of the invention comprises a method and apparatus for performing collective validation of credential information. The invention has applicability in industries that require sales agents or those related to the distribution of a certain product to be credentialed (e.g., licensed and/or appointed) when selling certain products (e.g., life insurance, etc . . . ). For example, in order to sell some financial instruments sales representatives must meet state and/or federal licensing requirements. Embodiments of the invention provide a way to ensure that sales representatives operate within any regulatory constraints put in place by government or any other organization. Companies may, for instance, utilize embodiments of the invention to ensure that sales representatives operate within a set of defined constraints. One aspect of the invention provides a method for validating sales agents' credentials while processing the sales transaction data to determine commission amounts. The system is configured to perform such transaction processing in an efficient manner that minimizes the amount of computational resources required to determine whether a sales agent has valid credential at the time of a particular sale and is therefore entitled to compensation (e.g., a commission) for the sale. | 06-02-2011 |
20110137796 | PAYMENT MESSAGE ROUTING USING GEO-LOCATION - Methods and system for enabling safe and efficient money transfer between a sender and a beneficiary are provided. The method includes communicating with a beneficiary's mobile device to ascertain the beneficiary's current geo-location. Based on the geo-location and funds at hand, one or more receiving agents are selected to fulfill the transfer. The beneficiary is offered a choice of agents and the selected agent is provided with the money transfer details to complete the transfer. | 06-09-2011 |
20110137797 | Server Device for Controlling a Transaction, First Entity and Second Entity - Server device for performing a transaction in a system having a first entity, such as a POS, a second entity, such as a user having a mobile phone with a digital camera, and a remote server. The first entity generates a code having a transaction information and sends a first message to a server. The second entity, such as a buyer of a product or a user of a service captures the code and transmits a second message to the server having information on the transaction extracted from the code. The transaction is only authorized, when the server has determined that the first message and the second message match with each other. The transaction can be a payment transfer, a grant of an access to a service or a grant of an access to an internet portal. | 06-09-2011 |
20110137798 | SYSTEM AND METHOD FOR SELECTION OF PAYMENT SYSTEMS FROM A PAYMENT SYSTEM DIRECTORY TO PROCESS A TRANSACTION - Dynamically enabling and facilitating businesses or other entities to locate and transact with payment systems for the purpose of processing payments. A customer interacts with a supplier of an item (e.g., goods or services), selects an item for purchase, and provides the supplier with payment criteria. The supplier queries a payment system directory to locate candidate payment systems for the transaction. The supplier then interacts directly with one or more of the payment systems to partially or fully process payment for the transaction. Alternatively, the supplier interacts with a gateway service, which queries a payment system directory to locate candidate payment systems and then interacts with one or more of the payment systems to process payment for the transaction. | 06-09-2011 |
20110137799 | CARD INCLUDING ACCOUNT NUMBER WITH VALUE AMOUNT - Embodiments of the invention disclosed herein provide a method of participating in prepaid programs through retail systems without the need to first upgrade their POS capabilities to participate, and allow for a merchant (retailer) to participate in proof of concept programs to determine if prepaid is a viable solution for their retail business model. | 06-09-2011 |
20110145146 | Off-Line Account Recharging - A method for off-line account recharging allows recharging of a user account at a simple payment node without sophisticated account interface. The method does not require the user to have an online bank account. The user enters a recharge amount and a mobile device number at the payment node, which sends the entered recharge information to a server where the user account is held. The server generates a recharge code which corresponds to the recharge amount and the mobile device number, and provides the recharge code to the user. The user uses the received recharge code to contact the server and complete the account recharge. The server may perform additional identity verification using the mobile device number and a random challenge code when the user requests to complete the count recharge. The recharge process does not require complex account information to be entered. | 06-16-2011 |
20110145147 | SYSTEM AND METHOD FOR AUTHORIZING TRANSACTIONS - A method and system for authorizing a transaction that includes a remote location where the transaction takes place from which purchaser information may be obtained and providing that information to a central site where pre-determined information regarding the customer exists. Storing legal information at that central site provides the criterion for determining authorization by comparing the purchaser data with the stored legal information. The transaction data is stored, authorization is transmitted to the remote location, and the transaction authorization is transmitted to a temporary database available for near real-time access solely by law enforcement officers. | 06-16-2011 |
20110145148 | MERCHANT ALERTS INCORPORATING RECEIPT DATA - One embodiment of the invention is directed to a method comprising receiving an authorization request message for a transaction conducted by a consumer with a merchant, sending the authorization request message to an issuer, receiving an authorization response message, modifying the authorization response message using a server computer to include receipt preference data, wherein the receipt preference data is derived from receipt preferences of the consumer or the merchant, and sending the authorization response message comprising the receipt preference data to the merchant, wherein the merchant generates a receipt for the consumer according to the receipt preference data. | 06-16-2011 |
20110145149 | METHODS, APPARATUS, AND SYSTEMS FOR SUPPORTING PURCHASES OF GOODS AND SERVICES VIA PREPAID TELECOMMUNICATION ACCOUNTS - Apparatus and method for detecting in real-time when a User of a prepaid telecommunications account tries to complete a data, voice or financial transaction to purchase a product or service but cannot, due to insufficient funds in the Prepaid Account. The system then determines whether the Account is eligible to receive a Facilitation according to predetermined criteria and, if so, either (1) automatically authorizes the transaction to be completed based on a Facilitation amount, subsequently recorded by the system to satisfy the insufficiency, or (2) instantly communicates to the User an offer to do so, and if the User accepts the offer, authorizes the transaction and records the Facilitation amount. The transaction can then be completed without significant interruption. A mechanism is provided such that on the next Topping-Up event(s) of the User's Account, the Facilitation amount is debited from the User's Account for return to the Facilitator. | 06-16-2011 |
20110153496 | AUTHENTICATION OF CARD-NOT-PRESENT TRANSACTIONS - Methods, systems, and machine-readable media are disclosed for processing a card-not-present transaction. According to one embodiment, processing a card-not-present transaction can comprise receiving a request for a card-not-present transaction involving an enrolled consumer. The request can include information identifying the enrolled consumer. A record of information related to the enrolled consumer can be read and the enrolled consumer can be authenticated based at least in part on the information of the request and the record of information related to the enrolled consumer. In response to authenticating the enrolled consumer, a set of single-use payment information can be generated which can include a one-time password and a dynamic Primary Account Number (PAN) which is valid for a single transaction. The single-use payment information can be provided to the enrolled consumer or the merchant to complete the transaction in place of the true PAN. | 06-23-2011 |
20110153497 | SECURE TRANSACTION SYSTEM AND METHOD BASED ON BIOMETRIC IDENTIFICATION - A secure transaction system and method based on biometric identification. One or more biometric sensors (e.g., a fingerprint sensor) can be electronically connected to an input device having one or more operable keys, wherein the input device communicates with the secure transaction system to determine the identity of a user. A biometric feature (e.g., a fingerprint) can be captured and measured, if the operable key is pressed. A biometric signal indicative of the sensed biometric feature can be transmitted to a biometric identification module via a network to compare the biometric signal with stored biometric data. An authentication signal can be provided to the user for accessing a secure application that is communicatively coupled to the transaction system if the sensed biometric signal matches the stored biometric data. | 06-23-2011 |
20110153498 | Payment Channel Returning Limited Use Proxy Dynamic Value - A central platform provides proxy dynamic values for any one of a number of a cardholder's portable payment devices, upon a request for such information made during a transaction. The proxy dynamic value can be provided to the merchant, who then can route it into the acceptance network in order to initiate the authentication process. The central platform provides the actual primary account number associated with the proxy dynamic value during the authentication process. | 06-23-2011 |
20110153499 | PERFORMING A BUSINESS TRANSACTION WITHOUT DISCLOSING SENSITIVE IDENTITY INFORMATION TO A RELYING PARTY - A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the security policy can be as little as a request to conduct the on-line business transaction. The user identifies an information card that satisfies the security policy. The computer system requests a security token from the identity provider managing the information card, which can include requesting a transaction receipt for the transaction elements. The computer system then returns the security token (and the transaction receipt) to the relying party, to complete the transaction. | 06-23-2011 |
20110153500 | REAL TIME ACCOUNT UPDATE - A method is used in a system that includes a financial service provider coordinating accounts issued by an issuer to cardholders requesting credit from merchants. Each merchant has an acquirer with whom the financial service provider also coordinates the accounts. The method can be performed by a merchant sending a transmission to its acquirer including a request for a transaction against one account to which the merchant receives a denial or prior to receiving such a denial. The merchant then requests information from the financial service provider who responds by sending the requested information, upon which the merchant determines whether to extend the credit. When the method is performed by a financial service provider, in response to the denial received by one merchant or prior to such denial, the financial service provider receives a transmission from the merchant including a request for information about the account. In response, the financial service provider sends the merchant the requested information. | 06-23-2011 |
20110161229 | SYSTEMS AND METHODS FOR PROCESSING A CONTACTLESS TRANSACTION CARD - Embodiments of the invention relate to systems and methods for processing a contactless card transaction. In one embodiment, a method for processing a contactless transaction card can be provided. The method can include receiving an input associated with a selection of at least one payment option. Further, the method can include based at least in part on the input, activating a contactless transaction card reader and initiating a corresponding transaction application program. In addition, the method can include receiving account information from the contactless transaction card via the contactless transaction card reader. Moreover, the method can include advancing a transaction counter associated with the contactless transaction card and a transaction counter associated with the corresponding transaction application program. | 06-30-2011 |
20110161230 | System and Method for Processing Payment Transaction Receipts - Embodiments of the invention are directed to systems and methods for processing payment transaction receipts. When an authorization request message for a transaction of a consumer is received, it is determined whether an account associated with the consumer's portable consumer device is enrolled in an electronic receipt program. If the account is enrolled, an electronic receipt for the transaction is sent to the consumer. | 06-30-2011 |
20110167001 | GEODICTIONARY - Methods, systems, and devices are described for determining compliance with a listing of persons banned from conducting financial transactions. Words appearing in a listing of a banned person and a financial transaction may be compared with defined words appearing in a database. Common words appearing in both the listing of the banned person and the database, and the transaction record and the database, may be identified, thereby identifying a first and second set of common defined words. The listing of the banned person is linked with countries based on the first set of common defined words and/or phrases and the transaction record is linked with countries based on the second set of common defined words and/or phrases. The countries may then be compared. Based on the outcome, the financial transaction may be permitted or suspended. | 07-07-2011 |
20110167002 | UNIVERSAL MERCHANT PLATFORM FOR PAYMENT AUTHENTICATION - A method of processing of a transaction between a first and second party is provided. The first party accepts payment via a plurality of different payment options selectable by the second party, and the plurality of different payment options are associated with a plurality of different authentication protocols prescribed therefor. The method includes: receiving payment information over a communications network at a server operatively connected to the communications network, the payment information identifying a particular payment option used by the second party for the transaction, and the server being equipped to format and route messages over the communications network in different manners to accommodate the plurality of different authentication protocols; determining from the payment information received at the server which of the different authentication protocols is prescribed for the type of payment option identified in the payment information; selecting, in accordance with the determination, a particular authentication protocol from the plurality of different authentication protocols supported by the server; obtaining an authentication determination for the transaction in accordance with the selected authentication protocol, including formatting messages and routing the formatted messages over the communications network in accordance with one or more mandates of the selected authentication protocol; and generating a one-time number to be sent back to the first party. | 07-07-2011 |
20110173122 | Systems and methods of bank security in online commerce - A system of bank security for reducing fraud losses due to unauthorized transactions in online commerce has a mobile authorization service (MAS) system with interfaces with a financial institution's computer systems that maintain customer's accounts and mobile wireless devices of the customers. The MAS system enables authorizations, of payment authorization requests that are received for payment on the account of the customers that are maintained at the financial institution, by the customers themselves in real time, before authorizing such payment transaction requests by the financial institution. The MAS system authorizes payment on those payment authorization request transactions that are on a pre-authorized transaction list and for those transaction that are not on the list, the transaction is authorized by a secure mobile contact means with the customer, thereby reducing payment on transaction that have not been authorized and thus reducing bank's fraud losses. | 07-14-2011 |
20110178925 | Token Based Transaction Authentication - A token based transaction authentication system is disclosed. Issuer, merchants, and a payment processing network generate unique tokens or keys to authenticate messages between themselves and to authenticate a sending entity or consumer as they are redirected between entities. The tokens are also used to identify the particular authentication thread a message or sending entity is associated with. The sending entity authentication occurs over a web-based channel or a mobile based channel. | 07-21-2011 |
20110178926 | Remote Variable Authentication Processing - A remote variable authentication processing system is disclosed. A sending entity initiates a remote payment using an alias over an initiation channel. The alias may be associated with one or more nicknames that identify portable consumer devices and metadata. The metadata describes which channels are available for authentication. The sending entity selects a nickname and an associated authentication channel. The sending entity authenticates with an issuer over the selected authentication channel. | 07-21-2011 |
20110178927 | VERIFICATION MECHANISM - Systems, apparatuses, and methods for receiving a verification message with information that includes a first portion but not a second portion of an account identifier associated with an account of a consumer. Upon receiving the verification message, searching for the account using the information of the verification message. | 07-21-2011 |
20110178928 | Multi Application Smartcard with Currency Exchange, Location, Tracking and Personal Identification Capabilities - A smart card capable of performing more than one function, said smart card comprising a first memory means comprising a first set of data to access a bank account, a second set of data to access a credit card account, a third set of data representing the identification of a holder of the smart card, and a fourth set of data to access telephone communication services. The smart card further comprises a microprocessor, said microprocessor being in electrical communication with a second memory means, and a location tracking means for determining a location of the smart card. | 07-21-2011 |
20110178929 | BUSINESS-TO-BUSINESS TRANSACTION QUALIFIER - A system and method are disclosed. The method includes receiving, at a server computer, a transaction clearing request for a transaction, and then determining, using the server computer, if the transaction satisfies a stored blocking parameter. The method further includes allowing, using the server computer, the transaction clearing request if the transaction does not satisfy the stored blocking parameter, and denying, using the server computer, the transaction clearing request if the transaction satisfies the stored blocking parameter. In B2B transactions, clearing requests that are less than (or slightly above) a previously contracted amount can be denied because they are less than what the buyer expected. | 07-21-2011 |
20110184866 | SYSTEMS AND METHODS FOR ENHANCED TRANSACTION PROCESSING - A computer-implemented method for modifying control parameters associated with a financial product that is linked to an account. The method includes receiving updated control parameters for the financial product, where the account provides financial backing for the financial product, and the updated control parameters define updated use restrictions for the financial product; and modifying the control parameters associated with the financial product to reflect the updated control parameters, where the financial product is configured to be used for one or more payment transactions in accordance with the updated use restrictions. | 07-28-2011 |
20110184867 | SYSTEM AND METHOD FOR GENERATING A DYNAMIC CARD VALUE - A method and system is provided for generating a dynamic card value (DCV) from a mobile user device for use in a transaction between a user cardholder and a transaction provider. The DCV may be configured for use as a card verification value (CVV), also known as a card security code (CSC), a primary account number (PAN), or a portion of a PAN. The DCV may be generated using a DCV generator which may include an algorithm and a DCV generation key. The DCV generation key may be camouflaged. Obtaining a DCV from the user device may require inputting a PIN, a device identifier, a challenge or transaction information. The DCV may be used for any transaction requiring the input of a user identification number and a verification value, including, credit card transactions, debit card transactions, online or telephonic transactions. | 07-28-2011 |
20110191244 | Secured Transaction System - The present invention relates to a secured transaction system. In one embodiment, a mobile transaction processing agent system includes a communication module configured to receive a secured transaction description from a mobile client device or an encrypted transaction description from a point-of-sale (POS) device, wherein the secured transaction description is in the form of a bar code generated by the mobile client device, an authentication module configured to decode the secured transaction description and verify the secured transaction description is valid based on the mobile client device or the point-of-sale device, and a transaction processing module configured to process the transaction in accordance with the secured transaction description. | 08-04-2011 |
20110196790 | Transaction processing system - A system for optimizing the transfer of funds from an account holder to an associate. The system identifies the geographic location of a first financial institution involved in the transaction. The system selects from a plurality of financial institutions a second financial institution which is located near the first financial institution to be involved in the transaction. Selecting a second financial institution nearby the first financial institution facilitates the transaction and reduces the time transaction funds are unavailable. | 08-11-2011 |
20110196791 | FRAUD REDUCTION SYSTEM FOR TRANSACTIONS - A system, apparatus, and method for reducing fraud in payment or other transactions by providing issuers with a warning that a transaction being processed for authorization is potentially fraudulent. In some embodiments, the present invention processes data obtained from a consumer authentication process that is used in card not present (CNP) transactions to determine characteristics or indicia of fraud from previous transactions. The characteristics or indicia of fraud can be used to generate a set of fraud detection rules or another form of fraud assessment model. A proposed transaction can then be evaluated for potential fraud using the fraud assessment model. | 08-11-2011 |
20110196792 | MOBILE PHONE CHARGE CARD NOTIFICATION AND AUTHORIZATION METHOD - An added level of security is provided for charge card transactions. Upon presenting a charge card number for a purchase, for example, the cardholder receives a message (e.g., SMS) on his cell phone or PDA that a charge authorization request has been received. The message may include the merchant, a charge amount, and a time and date. | 08-11-2011 |
20110202459 | PROCESSING TRANSACTIONS INVOLVING EXTERNAL FUNDS - Methods, computer readable media, and apparatuses for processing transactions involving external funds are presented. A funding source associated with a financial institution different from a financial institution at which a transaction is being conducted may be identified. The funding source may be validated and registered with the financial institution at which the transaction is being conducted. In some examples, a trust level may be determined for a user associated with the funding source, and the amount of funds available for transacting may be limited based on the trust level. In some examples, an amount of funds from the funding source available for transacting may be limited by an amount of funds associated with the user at the financial institution where the transaction is being conducted. Responsive to risk factors being met, the requested transaction may be rejected automatically. Otherwise, a transaction may be processed with the financial institution with funds drawn from the registered funding source. The transaction may be processed automatically in accordance with a predefined transfer schedule. | 08-18-2011 |
20110202460 | METHOD AND SYSTEM FOR AUTHORIZING TRANSACTIONS BASED ON RELATIVE LOCATION OF DEVICES - Aspects of a method and system for authorizing transactions based on relative location of devices are provided. In this regard, data relating to a location of a first communication device and data relating to a location of a second communication device may be received, a distance between the first communication device and the second communication device may be determined based on the received data, and whether to approve a transaction may be determined based on the determined distance. The transaction may have been initiated from one of the first communication device and the second communication device, and may comprise a need to access an account. The transaction may be approved in instances that the first communication device and the second communication device are within a predetermined distance of each other. The received data may comprise distance information determined via communications between the first communication device and the second communication device. | 08-18-2011 |
20110202461 | METHOD AND SYSTEM FOR AUTHORIZING NETWORK TRANSACTIONS BASED ON RADIO FREQUENCY (RF) CHARACTERIZATION OF A DEVICE'S LOCATION - Aspects of a method and system for authorizing network transactions based on radio frequency (RF) characterization of a device's location are provided. In this regard, whether to approve a communication device to perform a network transaction may be determined based on results of a comparison between a radio frequency (RE) characterization of a location of the communication device and one or more approved RF characterizations. The RF characterization may be based on information from a plurality of receivers within the communication device. The one or more approved characterizations may be stored in the network device. The RF characterization may indicate a quantity of RF sources detected and identified by the communication device at the location. The RF characterization may indicate signal strength of signals received from RF sources detected and indentified by the communication device at the location. | 08-18-2011 |
20110202462 | METHOD FOR A PAYMENT CARDHOLDER TO CONTROL AND MANAGE THE USE OF A PAYMENT CARD - A method for providing a payment cardholder with control over a payment card is provided herein, hi one respect, the method of the present invention uses a managing platform to configure a set of usage parameters for usage of the payment card. After that, the payment card is associated with the managing platform, and allows the payment cardholder to select one or more of the usage parameters. Based on the selected usage parameters, a set of cardholder parameters are associated with the payment card, and include defining rules for determining an acceptable transaction and an unacceptable transaction for the payment card. Then, the managing platform intercepts an authorization for each transaction of the payment card and identifies, based on the cardholder parameters, each of the transactions as being one of the acceptable transactions or the unacceptable transactions. Finally, a message notifies the payment cardholder of at least one of the unacceptable transactions. | 08-18-2011 |
20110202463 | METHODS AND SYSTEMS FOR CARDHOLDER INITIATED TRANSACTIONS - A cardholder-initiated financial transaction using a cardholder controlled input device in communication with a payment card network and a database is disclosed. The cardholder uses a payment card issued to the cardholder by an issuer bank. An exemplary method includes the steps of storing merchant data within the database including data identifying the merchants registered to utilize the card network and receiving from the input device transaction data relating to the financial transaction. The transaction data includes an authorization request and merchant identifying data that identifies the merchant involved in the transaction. The method further includes determining that the identified merchant is registered to utilize the card network by comparing the transaction data with the merchant data stored in the database, forwarding the authorization request to the issuer bank, receiving a response to the request from the issuer bank, and automatically forwarding the response to the input device. | 08-18-2011 |
20110208653 | SYSTEM AND METHOD FOR GRANTING DEPOSIT-CONTINGENT E-MAILING RIGHTS - An Email guarantee deposit method, system, and program product, with the method comprising in one embodiment, the steps of: receiving from a sender a request to send to a recipient an Email; receiving a deposit or an authorization to obtain a deposit of something of value; sending the Email to the recipient only if a deposit of authorization for a deposit is received; determining if the recipient has accepted the deposit; and if the recipient has accepted the deposit, then facilitating the disposal of the deposit. In an important alternate embodiment, a deposit can be required before an Email with a auditory or visual enhancement is provided, or before routing to a designated type of device occurs. | 08-25-2011 |
20110208654 | MANAGED PURCHASE ACCOUNT FOR DEFINED COMMODITIES - A purchase account may be managed to control purchases made using the account. An account number may be provided at a point of sale. The account number is associated with or includes an identifier for a class or type of goods or services. A merchant computer may receive the identifier and process it to determine whether what is proposed for purchase using the account is a qualified type of good or service. The computer may obtain a list of qualified or unqualified products and compare the list to what is proposed for purchase. In the alternative, the computer may provide instructions to a human operator for the merchant, who may determine whether or not the proposed product is qualified. If the proposed product is deemed qualified for purchase, use of the account may be approved; if otherwise, use of the account may be refused. | 08-25-2011 |
20110213706 | SYSTEMS AND METHODS FOR TRANSACTIONS ON THE TELECOM WEB - Embodiments of the invention broadly contemplate systems, methods, apparatuses and program products that leverage the mobile web, especially the spoken (telecom) web, to handle transactions. According to embodiments of the invention, in essence, a mobile device such as a phone is used as a terminal, remote authentication is employed, and a challenge response using a per transaction audio based code is used as a confirmation. Embodiments of the invention also provide further protection against repudiation, and greater trust in the transaction, by employing witnesses. | 09-01-2011 |
20110213707 | SYSTEMS AND METHODS FOR FACILITATING PERSON-TO-PERSON PAYMENTS - Embodiments of the invention may provide systems and methods for facilitating person-to-person payments. A payer request to pay a payee identified by a first contact identifier is received. Upon failing to locate the payee in a data repository of registered payees via the first contact identifier, the first contact identifier is utilized to transmit a registration invitation to the payee. Information associated with the request may be stored pending registration by the payee, and the invitation may include a link to a payment service provider site and an indicator of the stored information. Based upon a payee selection of the link, the indicator and identifying information for the payee other than the first contact identifier is received. The received identifying information is utilized to determine a pre-existing registration of the payee with the payment service provider, and the stored information is utilized to direct a payment to the payee. | 09-01-2011 |
20110213708 | GLOBAL METHOD AND SYSTEM FOR PROVIDING ENHANCED TRANSACTIONAL FUNCTIONALITY THROUGH A CUSTOMER TERMINAL - A global customer activated terminal (CAT) primarily serves traveling customers who require access to their accounts when they are away from their home financial institution and beyond their local regional financial area. The system provides applications that permit users to access their accounts and utilize account profiles and transaction journals within a generic global system approach, and each transaction set provides access to the user's full account profile. The traveling customer is also provided with access to all their accounts linked (as they would locally) to a specific card. The hardware employed in the system supports encryption key downloading, unscrambling and PIN encryption, so that security is instituted at the hardware level. To provide the maximum flexibility at each regional level for product and services offered, regional front end processors and Hosts are the arbitrators of each transaction acceptance and fulfillment, rather than the CAT. | 09-01-2011 |
20110213709 | CUSTOMER AND PURCHASE IDENTIFICATION BASED UPON A SCANNED BIOMETRIC OF A CUSTOMER - Systems and methods for biometrically identifying an individual for purchasing a product and/or service without a need for the individual to input authentication data into a system/device are described. Data representative of a scanned iris of a customer desiring to make a purchase may be made. The customer may be identified based upon the scanned iris. A determination may be made as to whether the identified customer desires to make a purchase with an associated payment amount from an entity. A determination may be made as to whether the identified customer has a default purchase at the entity. Information of an account of the customer to make a purchase may be received and funds in the account may be debited by the associated payment amount. An item corresponding with the purchase based upon the scanned iris may be determined. | 09-01-2011 |
20110213710 | IDENTIFICATION OF CUSTOMERS AND USE OF VIRTUAL ACCOUNTS - Systems and methods for authorizing an individual for purchasing a product and/or service are described. Monetary funds of a customer of a company may be received into a monetary account of the company at the financial entity. The received monetary funds of the customer may be maintained virtually in a non-monetary account with the non-monetary account value being proportional to the received monetary funds. A determination may be made as to whether an identified customer is authorized to make a purchase with an associated payment amount. The customer may be identified by a scanned iris. Upon determining the identified customer is authorized, the non-monetary account value may be decreased proportional to the associated payment amount. | 09-01-2011 |
20110218913 | VIRTUAL TRAVELER'S CHECK - The purchase and redemption of virtual traveler's checks is managed. A purchase request is received, which includes purchasing customer identification information and a request for one or more virtual traveler's checks. Each of the one or more virtual traveler's checks has one of a predetermined set of fixed denominations. A check number is issued for each of the one or more virtual traveler's checks. Each check number is associated with the purchasing customer identification information. A redemption request is then received, which includes redeeming customer identification information and a request to redeem at least one of the one or more virtual traveler's checks. The release of funds is approved in an amount equal to the denominations of the requested virtual traveler's checks if the redeeming customer identification information matches the purchasing customer identification information. | 09-08-2011 |
20110218914 | CLOSED LOOP STORED VALUE INSTRUMENT BROKERAGE SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT - Embodiments of the present invention provide a method, system and computer program product for a closed loop stored value instrument brokerage. In an embodiment of the invention, a method for brokering a closed loop stored value instrument can include receiving a request in brokerage logic executing in memory by at least one processor of a computer. The request can include a request to broker a payment of a sale price for an item purchased from a selling merchant with a closed loop stored value instrument issued by a separate originating merchant. In response to the receipt of the request, the originating merchant can be directed to debit the closed loop stored value instrument in an amount equivalent to the sale price. Thereafter, payment to the selling merchant can be transferred in an amount less than the sale price. | 09-08-2011 |
20110218915 | METHOD FOR SECURE TRANSACTIONS UTILIZING PHYSICALLY SEPARATED COMPUTERS - A secure transaction method involves establishing an electronically accessible verification site authorized by the holder of a credit or debit card, and accessing the verification site by a merchant to determine whether a request for goods or services is authorized. The request for goods or services is based upon the use of the credit or debit card, but the card is not physically presented. The verification site is an electronic mail account which may be established by the merchant, card holder or other authorized person or entity. An authorization message is preferably sent from the site to the merchant in response to the step of accessing the verification site by the merchant. The verification site may also be wirelessly accessible, enabling an authorization message to be delivered through a cellular telephone, personal digital assistant, or other mobile device. | 09-08-2011 |
20110218916 | Secure, Closed-Loop Electronic Transfer of Money - A method of providing for a money transfer over a network includes the steps of: providing a stamp having a face value and a lifespan both indicated on the stamp, the stamp being a string that is a concatenation of two or more fields including the face value and the lifespan, with at least one of the fields calculated according to a prescription involving a hashing or encryption of a concatenation of others of the fields or of some other field not part of the stamp; affixing the stamp to an e-mail; and allowing the recipient of the e-mail to obtain value for the stamp if the stamp is presented to a predetermined entity (such as a stamp issuer) for the stamp value within the lifespan indicated on the stamp. The stamp may comprise a concatenation of a set of fields, including a lifespan, a stamp value; and hash/encryption. | 09-08-2011 |
20110218917 | Secure Transfer of Value Via Electronic Stamp - A method of providing for a money transfer over a network includes the steps of: providing a stamp having a face value and a lifespan both indicated on the stamp, the stamp being a string that is a concatenation of two or more fields including the face value and the lifespan, with at least one of the fields calculated according to a prescription involving a hashing or encryption of a concatenation of others of the fields or of some other field not part of the stamp; affixing the stamp to an e-mail; and allowing the recipient of the e-mail to obtain value for the stamp if the stamp is presented to a predetermined entity (such as a stamp issuer) for the stamp value within the lifespan indicated on the stamp. The stamp may comprise a concatenation of a set of fields, including a lifespan, a stamp value; and hash/encryption. | 09-08-2011 |
20110218918 | SYSTEMS AND METHODS FOR PROVIDING ACH TRANSACTION NOTIFICATION AND FACILITATING ACH TRANSACTION DISPUTES - A system and method for identifying incoming ACH transactions involving subscriber accounts at a financial institution, comparing the ACH transaction details with preset notification criteria, suspending any ACH transaction that satisfy the preset criteria so that the transaction does not post to the account, notifying the subscriber of the incoming ACH transaction, providing the subscriber with the option to either authorize or dispute the ACH transaction, and facilitating the dispute process according to applicable banking rules by requesting further information from the subscriber and forwarding the dispute information to the ACH operator. | 09-08-2011 |
20110225088 | RECEIVER-BASED FUNDS TRANSFER - Methods, systems, and devices are described for a receiver-initiated funds transfer. A prospective receiver of a funds transfer may identify a funds transfer amount and provide a sender identifier, to thereby initiate and request the funds transfer. Authorization for the funds transfer may be received from a sender corresponding to the sender identifier. Funds associated with the funds transfer and sourced from the sender may be received. The funds transfer may be made in response the receiver-initiated request. | 09-15-2011 |
20110225089 | SYSTEM AND METHOD INCLUDING SECURITY PARAMETERS USED FOR GENERATION OF VERIFICATION VALUE - Systems and methods for generating a dynamic verification value for electronic payment transactions are disclosed. The dynamic verification value is generated via a function-based algorithm that accepts a plurality of security values as input. By selecting a set of security values from the plurality of the available security values, the level of complexity and security of the dynamic verification value can be adjusted and a unique security characteristic for the dynamic verification value is obtained. Also, the issuers of portable consumer devices are able to regenerate the dynamic verification value by inputting an issuer secret phrase into the same type of function-based algorithm that was used originally to generate the dynamic verification value. | 09-15-2011 |
20110225090 | SYSTEM AND METHOD INCLUDING CUSTOMIZED LINKAGE RULES IN PAYMENT TRANSACTIONS - Systems and methods for generating a dynamic verification value for electronic payment transactions are disclosed. A user of a portable consumer device enrolls the account identifier associated with the portable consumer device and specifies one or more customized linkage rules that identify one or more user communication devices and user identifiers that should be used to submit an authentication request message to an entity that generates a dynamic verification value. A server computer that receives an authentication request message determines whether the authentication request message complies with the specified customized linkage rules and generates a dynamic verification value. | 09-15-2011 |
20110225091 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR TRANSACTIONAL FRAUD DETECTION USING WIRELESS COMMUNICATION NETWORK MOBILITY MANAGEMENT INFORMATION - Methods, systems, and computer readable media for detecting transactional fraud can involve, for a transaction associated with a first transaction location and account holder, receiving a request for mobile location information associated with the account holder. Mobile location information associated with the account holder may then be obtained, wherein the mobile location information is derived from mobility management signaling messages or other data associated with a mobile communication device used by the account holder. The mobile location information associated with the account holder can then be provided to the requestor. The mobile location information may be compared against the first transaction location to determine, at least in part, whether the transaction is fraudulent. | 09-15-2011 |
20110231315 | METHOD AND SYSTEM FOR MAKING SECURE PAYMENTS - The invention discloses a method, system and computer program product for making secure payments. A customer selects one or more items to be purchased. The customer then enters an authentication detail and a dynamic password, also referred to as a One Time Password (OTP), on an Electronic Data Capture device for authenticating the payment. Based on the authenticity of the OTP and the authentication details, a payment request is sent to an organization for completing the payment. | 09-22-2011 |
20110231316 | METHOD, SYSTEM AND COMPUTER READABLE MEDIA CONTAINING A PROGRAM FOR IDENTIFYING WHETHER A PRODUCT IS GENUINE - Provided herein is a method, system and non-transitory computer readable medium storing instructions related to receiving and storing product code information from plural surveyor surveillance devices and compensating a party associated with each surveyor device that provides information potentially related to a improper transacted sales of a product associated with a gathered product code. The information gathered from the surveillance devices can assist in investigating whether existing products are genuine or counterfeit by identifying non-valid and/or non-registered product codes and improper sales transactions associated with product codes received from the surveillance devices. In an embodiment, a determination is made whether received product code information corresponds to a registered product code stored in a data structure, and for a stored registered product code corresponding to the received product code information, a determination is made of a number of instances the product code information has been received. A party associated with the surveillance device is compensated, or rewarded if the determined number of instances is greater than a predetermined value or the received product code is determined not to correspond to a registered product code. | 09-22-2011 |
20110238575 | MERCHANT FRAUD RISK SCORE - Methods and systems are presented for a fraud risk score to be given to a merchant for a proposed transaction with a consumer. The fraud risk score is generated by a payment account service provider, such as a credit card processor, using information from a pending transaction as well as information from other payment accounts that the consumer holds to which the payment account service provider is privy. Various factors, including indicators of elevated risk in other payment accounts, are custom-weighted by the merchant for the score. | 09-29-2011 |
20110238576 | ACCOUNT PERMANENCE - A system and method for using derived account identifiers. The derived account identifiers are associated with a single permanent account identifier. Each derived account identifier is associated with a communication channel or portable consumer device. | 09-29-2011 |
20110238577 | CONDITIONAL BALANCE MANAGEMENT FOR NON-ISSUER DEBIT INSTRUMENTS - A computer receives information about a debit account controlled by a third-party issuer, a user owing the account and instructions for managing the account after a specified trigger date. Operating according the instructions, an unknown remaining balance in the account may be exhausted after the trigger date has passed, using a sequence of charges responsive to the initial balance, to the last charge amount completed or attempted, and to whether or not the last charge amount is accepted. In the alternative, or in addition, the account may be managed to convert the remaining balance to a non-monetary coupon (e.g., “virtual currency”) for use in an online computer game or the like, after the trigger date. | 09-29-2011 |
20110246363 | TWO DEVICE AUTHENTICATION - In one embodiment, a transaction is authenticated by a payment provider, as opposed to a merchant, using two user devices without the user having to enter information, such as an email or password. When the user is ready to make a purchase from a merchant site, a unique transaction ID is created by the payment provider. That transaction ID, along with data about the transaction, such as specific items and cost, is automatically sent to the payment provider through a second device linked to the purchasing device. The payment provider compares the identifier from the sending device, such as the phone number, and the transaction ID with information stored in its database. If there is a match, the transaction/user may be approved or authenticated. | 10-06-2011 |
20110246364 | SECURE EXCHANGE OF INDICIA OF VALUE AND ASSOCIATED INFORMATION - Secure exchange of value and associated information in financial transactions involving beneficial offers available for customers is provided. Various offers, including discounts, prepaid amounts, and the like may be purchased by customers for use with various merchants. A third party issuer obtains information from the customer in selling the offers and issues some kind of indicium of value having a representation of the value of the offer associated therein. Record of the indicia are maintained and either transmitted to the merchant or kept by the issuer or associated financial institutions. When the customer redeems the offer by presenting the indicium to the merchant, the merchant may either authenticate the indicium using the records received by the issuer, or establish communication with the issuer for the issuer to authenticate the indicium, either by itself or in cooperation with one or more related financial institutions. | 10-06-2011 |
20110246365 | SECURE EXCHANGE OF INDICIA OF VALUE AND ASSOCIATED INFORMATION - Secure exchange of value and associated information in financial transactions involving beneficial offers available for customers is provided. Various offers, including discounts, prepaid amounts, and the like may be purchased by customers for use with various merchants. A third party issuer obtains information from the customer in selling the offers and issues some kind of indicium of value having a representation of the value of the offer associated therein. Record of the indicia are maintained and either transmitted to the merchant or kept by the issuer or associated financial institutions. When the customer redeems the offer by presenting the indicium to the merchant, the merchant may either authenticate the indicium using the records received by the issuer, or establish communication with the issuer for the issuer to authenticate the indicium, either by itself or in cooperation with one or more related financial institutions. | 10-06-2011 |
20110246366 | AUTHENTICATION USING TELECOMMUNICATIONS DEVICE - A method for authenticating a transaction being conducted remotely of a commerce server is disclosed. The method comprises selecting a telephone number from a pool of telephone numbers and making a telephone call to a registered telecommunications device, the telephone call being made with caller identification activated. A prompt is provided for the entry of at least a part of the telephone number as an authentication of the transaction. Upon the telephone number being entered within a set time the transaction is approved and effected. | 10-06-2011 |
20110246367 | Payment service to efficiently enable electronic payment - A method to forward a browser client is disclosed. The method comprises storing information at a payment service server. The information includes a return network address corresponding to a interface hosted by a merchant server. Next, the method performs the step of comparing the return network address that is included in the information to a reference return network address corresponding to the interface hosted by the merchant server and identifying whether the return network address matches the reference return network address. Finally, the method comprises forwarding the browser client to the interface hosted by the merchant server responsive to the identifying the match. | 10-06-2011 |
20110246368 | METHOD AND APPARATUS FOR A NO PRE-SET SPENDING LIMIT TRANSACTION CARD - A method and apparatus are provided for a no pre-set spending limit transaction card with features and attributes of both a credit card and a charge card, including an overlimit spend feature and an associated communicated line of credit. The transaction card may carry a balance like a credit card and may require that a card user pay down the balance carried forward to the line of credit subsequent to the end of each billing cycle. When the user has reached or exceeded the communicated line of credit, each subsequent transaction request for a new transaction by the user is evaluated on a case-by-case basis by a process that includes execution an overlimit spend authorization logic or process | 10-06-2011 |
20110251957 | DUAL-ACTIVATION FINANCIAL PRODUCTS - A system operating in conjunction with a financial account permits joint activation of a card associated with the financial account. An event-detection module detects an event related to the card and an authorization component for permitting certain individuals to use the card. A messaging module generates account-related messages and transmitting these messages to individuals associated with the financial account. | 10-13-2011 |
20110251958 | Method of Controlling a Device Able to Function in a Mode With or Without Code Verification to Effect a Transaction - The invention relates to a method of controlling a device able to function in a mode with code verification or in a mode without code verification to effect a transaction, the method including a step of authenticating the device, an optional step of verifying a code, and a stage of continuing the transaction, wherein the method further includes a first verification step of verifying whether the device is functioning in the mode without code verification; and
| 10-13-2011 |
20110251959 | System and Method for Check Exception Item Notification - A system mainframe receives a payee check file and a payor check file and produces an exception file including at least one exception item. A server receives the exception file and generates a Web file including information relating to the exception item and generates an address for the Web file. The server further sends an exception client an e-mail which notifies the exception client of the exception item and provides the exception client with the address for the Web file. | 10-13-2011 |
20110258117 | MODIFICATION OF PAYMENT TRANSACTIONS IN REAL-TIME BASED UPON EXTERNAL DATA SOURCE - A system for, and method of using multiple data flows, both transactional and non-transactional, in real time to modify a transaction is disclosed. Further the use of transaction information in real time as a decision factor to trigger a different, non-transactional response, and the combination of the two approaches is disclosed. In particular, a network comprised of a plurality of software modules and databases is capable of combining current POS/POP transaction data, with a variety of other outside data sources to provide improved information for adjusting responses to transactions in real time. More specifically, the network utilizes payer facing systems to analyze the data in combination with well-known POS/POP transaction data and a variety of internal and external systems to combine information and provide modified transactions, related discounts and offers, and other relevant messaging to the payer. In addition, a specific method for analyzing for fraud within hybrid information transactions is disclosed and several examples to illustrate the invention are included. | 10-20-2011 |
20110258118 | Authentication Process Using Search Technology - Systems and methods are presented for improved authentication and risk analysis processes using search engine technology. In one potential implementation, an authorization request message is received at a payment processing network as part of a transaction between a user and a merchant. The payment processing network analyzes risk based on a search history associated with the user involved in the transaction with the merchant. A response to the authentication request is made based in part on the risk associated with the user search history. In further embodiments, a user registers with a search engine as part of a service for improved authentication, where the user accepts privacy settings allowing storage of search and transaction data by a search engine server. The search engine server passes search and transaction data to a risk analysis server for creation of risk parameters which may be used to authenticate transactions. | 10-20-2011 |
20110258119 | DIGITAL CHECK TRANSACTION SYSTEM - A digital check transaction system including a receiver which receives, from a requestor, a request for confirming whether a check can be endorsed to a recipient to complete a transaction between the requestor and the recipient, a processor which processes the received request to determine whether the check can be endorsed, and a transmitter which, in response to the processor determining whether the check can be endorsed, transmits a response to the requestor indicating whether the check can be endorsed. | 10-20-2011 |
20110258120 | METHOD AND APPARATUS FOR SECURE ACCESS, PAYMENT AND IDENTIFICATION - According to one aspect, the invention provides a system for authenticating identities of a plurality of users. In one embodiment, the system includes a first handheld device including a wireless transceiver which is configured to transmit authentication information, a second device including a wireless receiver, where the second device is configured to receive the authentication information. | 10-20-2011 |
20110270752 | FRAUD AND EVENTS INTEGRATED MANAGEMENT METHOD AND SYSTEM - “FRAUD AND EVENTS INTEGRATED MANAGEMENT METHOD AND SYSTEM”, comprising information regarding two kinds of systems: Information Technology Security Events Management Systems (IT Security) and Fraud Detection and Prevention Management Systems (Frauds), enabling the investigation, monitoring, and correlation of customer banking transactions via the banking institution's diverse electronic communication channels, with the various security incidents arising from their different IT assets (Internet Banking, automatic teller machines, debit/credit cards, among others), online and in real-time, providing a wide-reaching and flexible approach to combat fraud and treat security information incidents. | 11-03-2011 |
20110270753 | METHOD FOR AUTHENTICATING FINANCIAL TRANSACTION REQUESTS USING A WEBSITE OR WEB PORTAL - A method for authenticating a financial transaction request includes receiving first information where the first information includes first party identifying information, and a unique pseudorandom number of a pseudorandom sequence included with a check from a plurality of checks. A status of activating the plurality of checks is determined using a portion of the first information, a stored activation code, and stored information first party identifying information. The stored first party identifying information is stored with the pseudorandom sequence. The first party is authenticated with the received and stored first party identifying information. The unique pseudorandom number is authenticated with the received first party identifying information, a portion of the stored first party identifying information and the stored sequence. The first information is authenticated if the first party and the unique pseudorandom number included with the first information are authenticated and if the plurality of checks have been activated. | 11-03-2011 |
20110270754 | METHOD FOR AUTHENTICATING FINANCIAL INSTRUMENTS AND FINANCIAL TRANSACTION REQUESTS - A method for authenticating a check of a plurality of checks where the check was previously issued from a first party to a second party, including receiving first information from the first party, storing the first information in a file of a third party and receiving the check. The check has first party identifying information, a unique pseudorandom number of a pseudorandom sequence, and an amount. A status of activating the plurality of checks is determined. At least a portion of the first party identifying information included with the check, the unique pseudorandom number included with the check and the check amount included with the check are authenticated. The received check is authenticated if the first party, the unique pseudorandom number included with the check and the amount included with the check are authenticated and if the plurality of checks have been activated. | 11-03-2011 |
20110270755 | METHOD FOR SECURELY CLEARING CHECKS - A method for check clearing by a first entity where the check was previously issued from a first party to a second party. The first party has a first account with the first entity and the second party has a second account with a second entity. The first entity receives first information included with the check from the second party, including first party identifying information, a unique pseudorandom check number, and a check amount. The first entity authenticates at least a portion of the first information and receives second information from the second party, including at least the second account number and the second entity's routing transit number. The first entity transfers funds from the first account of the first party to the second account of the second party using at least a portion of the authenticated first information and the second information. | 11-03-2011 |
20110270756 | SYSTEMS AND METHODS FOR SCREENING PAYMENT TRANSACTIONS - Methods and systems for anti money laundering screening are provided. A risk score and a first validation code is determined based on information related to a funds transfer transaction. The first validation code is associated with the risk score. Thereafter, a second validation code is calculated and compared with the first validation code. The risk score and the validation score are included in a payment authorization message sent to a payment processing network. The payment processing network extracts the validation code and communicates the payment authorization message including the risk score to a receiving financial institution. The receiving financial entity accepts or denies the incoming funds transfer based on the risk score included in the payment authorization message. | 11-03-2011 |
20110270757 | SYSTEM AND METHOD FOR SECURELY VALIDATING TRANSACTIONS - Systems and methods for validating and processing payment transactions are disclosed. In the embodiments of the invention a first authorization request message and a first verification value are received at a server computer. The verification value is validated and a second authorization request message with a second verification value is generated. The first verification value may be a dynamic value and the second verification value may be static value. The second verification value is associated with portable device used to perform a transaction and it is what the issuer computers of the portable device expect to receive as part of an authorization request message in a payment transaction. | 11-03-2011 |
20110270758 | METHOD FOR PROVIDING ELECTRONIC TRANSACTION USING MOBILE PHONES - The embodiments herein provide a method for providing an electronic transaction using the mobile phones. The method comprises dialing one of a Payment Service Provider (PSP) server number by a first mobile user and a second mobile user, arranging the two mobile phones in a head-to-tail fashion, wherein a microphone of the first mobile phone is placed in front of a speaker of the second mobile phones and viceversa, broadcasting a sound signal data by the PSP server to the two mobile phones and transmitting the received sound signal data back to the PSP sever, decoding the sound signal data received from the mobile phones and activating an IVR system. The first mobile phone user enters transaction credentials for an electronic transaction to the second mobile phone user followed by a password through IVR system. | 11-03-2011 |
20110270759 | SYSTEM AND METHOD FOR GENERATING AN UNPREDICTABLE NUMBER USING A SEEDED ALGORITHM - A random number generating algorithm is seeded with an unpredictable number. The seed value is computed by subjecting variable data to a Secure Hashing Algorithm, and truncating the right most, or left most, 16 bytes from the message digest generated. The algorithm generates the unpredictable number by using the seed value as a counter value in the random number generator, and performing a data encryption standard operation. In one exemplary embodiment, the unpredictable number is modified to a predetermined maximum unpredictable number value as determined by the sender and receiver of the unpredictable number. | 11-03-2011 |
20110276484 | IDENTITY VERIFICATION SYSTEMS - Identity verification systems and methods for remotely verifying a user's identity are disclosed. In some exemplary embodiments, the identity verification systems and methods may be used to verify an identity for a remote transaction. An exemplary embodiment of the system may comprise a capture unit, a delivery unit, a verification unit, a transaction unit, and a user account associated with the user. The capture unit may capture one or more verification images of the user, an identification document, and one or more other financial or identification documents. The delivery unit may transmit the verification documents to a server assembly. The verification unit may provide verification of the user's identity based on the verification images. The transaction unit may determined whether a transaction requested via the user's user account qualifies for verified status based on identity verification and, accordingly, whether the transaction should be afforded predetermined privileges of verified status. | 11-10-2011 |
20110276485 | METHOD OF ESTABLISHING IDENTITY VALIDATION BASED ON AN INDIVIDUAL'S ABILITY TO ACCESS MULTIPLE SECURE ACCOUNTS - A system and methods that enables and utilizes the conversion of an individual's ability to access multiple secure accounts to establish and validate the individual's digital primary identity. The control for the digital primary identity validation is user-centric so that the individual controls the amount of information supplied and therefore the level of assurance achievable. The level of assurance can be added to the digital primary identity. An identity card for digital primary identity validation can be used online or in-person. Validation and level of assurance is reviewed regularly or continuously. Levels of assurance can be increased by validating primary sources of identification. | 11-10-2011 |
20110276486 | SYSTEM AND METHOD FOR SECURING PAYMENT - A system and method for secured payment in credit transactions using a credit transaction terminal in a store, having a central processing unit adapted to communicate with the transaction terminal receiving identification information and transaction information from transaction terminal, communicating with customer to verify transaction and authenticate the identity of said customer, and carrying out a transaction without disclosing to the transaction terminal customer related information. | 11-10-2011 |
20110276487 | SYSTEM AND METHOD INCLUDING CHIP-BASED DEVICE PROCESSING FOR TRANSACTION - Present embodiments are directed to a server computer. The server computer establishes a first channel of communication to receive payment device data in a first format (e.g., chip type) and establishes a second channel to receive the payment device data in a second format (e.g., legacy type). The server computer receives an authorization request message in the second format from a merchant and generates a new authorization request message in the first format. The server computer then forwards the new authorization request to the issuer for approval. | 11-10-2011 |
20110276488 | METHOD OF CREDIT CARD TRANSACTION AUTHORIZATION USING VOIPOW TECHNIQUE - A method of credit card transaction authorization using VoIPoW phone is provided to efficiently and economically perform authorization by both recognizing a credit card and identifying a holder of the credit card, which key feature of the method is that the VoIPoW phone is independent of environmental barriers, time as well as space limitations and communication costs, and a real-time intercommunication between a card holder and a relevant card issuing bank through VoIPoW phone can be performed to effectively preclude credit card fraud. | 11-10-2011 |
20110276489 | ELECTRONIC TRANSACTION FRAUD PREVENTION - A card fraud prevention network and method are provided. The network includes a plurality of network-connected data processing terminals, including at least one server. Electronic authorisation requests are received for authorising the processing of an electronic transaction associated with a cardholder's card data or account data. The received requests are filtered according to predetermined or configurable criteria. A cardholder terminal is identified, to which the request is sent in order to notify the cardholder that processing of an electronic transaction is proposed, a parameter of which is the cardholder's card data or account data. Means are provided for interrupting processing of the, or any further, electronic transaction with that card data or account data, should the request correspond to an unauthorised transaction. | 11-10-2011 |
20110282788 | Anonymous Electronic Payment System - Systems and methods for autonomous online payments to an individual are described. A request to generate an electronic payment user interface associated with an individual for a transaction to an account associated with an entity is received. One or more individual defined criteria associated with the electronic payment user interface for the transaction is received. An Internet accessible address to the electronic payment user interface is generated. A request input from a payer to access, via the Internet accessible address, the electronic payment user interface associated with the individual is received. An authorization input from the payer to make an electronic payment of monetary funds from an account of the payer to the account of the individual is received, and access by the individual to personally identifiable information of the payer regarding the transaction is prevented. | 11-17-2011 |
20110282789 | CARD FALSE-POSITIVE PREVENTION - A method for authenticating a transaction is disclosed. The method comprises the steps of: receiving data identifying a region where a transaction is being requested; receiving data identifying a mobile communication device associated with a person requesting the transaction; determining from Location Register (LR) data for the mobile communication device data identifying a region where the mobile communication device is located; comparing the data identifying the region where the transaction is being requested with the data identifying the region where the mobile communication device is located; and authenticating the transaction in dependence on the result of the comparison. | 11-17-2011 |
20110282790 | GLOBAL COMPLIANCE PROCESSING SYSTEM FOR A MONEY TRANSFER SYSTEM - An improved money transfer system includes a rules database, a customer database, and a transaction processing system. The rules database includes information representative of transaction rules, at least some of which include an aggregation threshold. The customer database includes information representative of customers' transaction histories. The transaction processing system is connected to the rules database and customer database and includes point of entry ports, a customer identifier, a rules coordinator, an aggregation engine, and a transaction rules service. The point of entry ports receive transaction requests from points of entry and provide transaction responses to the points of entry. Based on information received in transaction requests, the customer identifier identifies customers and the rules coordinator determines applicable transaction rules. The aggregation engine determines aggregation values as a function of customers' transaction histories. The transaction rules service determines whether information received in the transaction requests meets the applicable transaction rules and causes the aggregation engine to determine aggregation values if the applicable transaction rules include aggregation thresholds. The transaction rules service generates transaction responses based upon the information received in the transaction requests along with any information received in response to any requests for additional information and any aggregation values, and updates the customer database as a function of the transaction. | 11-17-2011 |
20110282791 | CUSTOMIZED FINANCIAL TRANSACTION PRICING - Enabling innovative merchant transaction pricing capability, while improving pricing process efficiency, is disclosed. When a merchant submits financial transaction account records to a payment processor for payment, the payment processor utilizes granular transaction data to calculate complex merchant transaction pricing rules. The system accesses individual transaction data, aggregate transaction data, transaction history, customer data, merchant data and product data to enable flexible, innovative and dynamic pricing capabilities that increase revenue and increase customer satisfaction. | 11-17-2011 |
20110288996 | Automatically Decisioning Transaction Requests - A system and method of automatically decisioning transaction requests is provided. In some examples, a decisioning system may receive customer transaction limit information, as well as current activity information. The system may determine whether a requested transaction is within a first transaction limit. If not, the system may determine whether the requested transaction is within a second transaction limit. If so, one or more business rules may be applied to the requested transaction to determine whether the transaction is approved. | 11-24-2011 |
20110288997 | SELF-SERVICE TERMINAL - A method of executing a transaction for a user at a self-service terminal is described. The method comprises: (a) sensing a stroke gesture delineated by the user on a touch-sensitive panel; (b) recognizing the delineated stroke gesture; and (c) matching the delineated stroke gesture to one of a plurality of defined transaction strokes, each defined transaction stroke being associated with a specific transaction. The method further comprises (d) executing the specific transaction associated with the matched transaction stroke. | 11-24-2011 |
20110288998 | Deposit For Non-Account Holders - Systems and methods for depositing monetary funds into an account are described. A first request from a first individual to deposit monetary funds into an account associated with an entity may be received. The first individual is not an account owner of the account. Monetary funds from the first individual may be received for deposit in the account. The monetary funds may include cash, checks, credit card transfers, and/or debit card transfers. The receipt of the first request may be receipt of a paper ticket with an access code authorizing deposit of monetary funds into the account. One or more restrictions may be reviewed to authorize the deposit of monetary funds in the account. | 11-24-2011 |
20110288999 | Deposit Permissions For Specific Non-Account Holders - Systems and methods for permitting a specific individual to deposit monetary funds in an account are described. A first request to permit a specific individual to deposit monetary funds into an account associated with an entity may be received. The specific individual is not an account owner of the account. At least one account owner defined criterion identifying the specific individual is received, and data representing a permission for the specific individual to deposit monetary funds into the account associated with the entity is stored. The at least one criterion may include a name, an address, and/or some other identifier of the specific individual. One or more restrictions may be placed on the ability to deposit monetary funds in the account. Additional specific individuals with similar and/or different restrictions on the ability to deposit may be permitted to deposit monetary funds into the account. | 11-24-2011 |
20110289000 | METHOD FOR MANAGING ON-LINE COMMERCIAL TRANSACTIONS - Method for managing on-line commercial transactions between a user and a seller of goods/services that interact through respective data processing systems communicating through a data network. The method includes: upon receipt, from a computer system of an institute issuing payment cards, of a request of transaction with debit on the payment card of the user coming from the seller of goods/services, having the computer system of the institute issuing the payment cards preliminarily requesting a confirmation of the transaction to the buyer through a mobile telephony terminal of the buyer, and, in case the confirmation of the transaction is received, having the computer system of the institute issuing the payment cards processing the transaction, whereas in case the confirmation of the transaction is denied, not processing the transaction and informing the seller. Both or one of the request of confirmation of the transaction or the confirmation of the transaction are sent through communication over a data channel with the mobile telephony terminal of the buyer. | 11-24-2011 |
20110289001 | SYSTEMS AND METHODS FOR MANAGING MULTIPLE ACCOUNTS ON A RF TRANSACTION DEVICE USING SECONDARY IDENTIFICATION INDICIA - Systems and methods are configured to manage data sets associated with a transaction device. For example, a method is provided for facilitating the management of distinct data sets on a transaction device that are provided by distinct data set owners, wherein the distinct data sets may include differing formats. The method includes the steps of: adding, by a read/write, a first data set to the financial transaction device, wherein the first data set is owned by a first owner; adding, by the read/write device, a second data set to the financial transaction device, wherein the second data set is owned by a second owner; and storing the first data set and the second data set on the financial transaction device in accordance with an owner defined format. The first and second data sets are associated with first and second owners, respectively, and are configured to be stored independent of each other. The transaction device user may be permitted to select at least one of the multiple data sets for transaction completion using a secondary identifier indicia. Where the user selects multiple accounts for transaction completion, the user may be permitted to allocate portions of a transaction to the selected transaction accounts. The transaction request may be processed in accordance with the user's allocations. | 11-24-2011 |
20110295748 | DIGITAL CREDIT CARD - A digital credit card for transactional processes and a method of using the same, where said credit card comprises: a memory for storing data; a processor, where said processor executes functions related to the credit card: an input; an output; and a biometric security, where said biometric security activates the credit card. The memory may include read only memory and random access memory. The biometric security may include fingerprint identification, iris identification or retina identification. | 12-01-2011 |
20110295749 | SYSTEMS AND METHODS FOR FUNDRAISING VIA MOBILE APPLICATIONS - The present application is directed to methods and systems of facilitating a transfer of donation money from individuals to charitable organizations. The transfer of money occurs through a first transfer of money from at least one mobile phone carrier to a facilitating organization and through a second transfer of money from the facilitating organization to the charitable organization. The facilitating organization enables the money transfer by transmitting web-based and mobile phone communications regarding donations on behalf of charitable organizations and enabling individuals to respond to such communications and communicate donation solicitations to other individuals. | 12-01-2011 |
20110295750 | SECURE PAYMENT AND BILLING METHOD USING MOBILE PHONE NUMBER OR ACCOUNT - A system, method and computer program product for processing payments for goods or services, including a payment processor that receives a payment request from a merchant for goods or services and that includes a mobile phone number or mobile phone account of a user, sends a payment authorization request text message to the mobile phone requesting payment authorization, and receives a payment authorization text message from the mobile phone authorizing or not authorizing the payment. If the payment is authorized, the payment processor pays the merchant and charges the mobile phone account for the payment. If the payment is not authorized or if the payment is not received within a predetermined period of time, the payment processor declines to pay the merchant for the goods or services. | 12-01-2011 |
20110302083 | METHOD AND SYSTEM FOR CONTROLLING ACCESS TO A FINANCIAL ACCOUNT - A computer implemented system and method for controlling access to a financial account, the system comprising: one or more memories for storing information and at least one set of instructions, and one or more processors for receiving the financial account information at an access terminal, wherein the access terminal collects access data; identifying a destination account from the financial account information; sending an authorization request to a mobile device linked to the destination account, wherein the authorization request comprises a variable amount of the access data; receiving a response to the authorization request from the mobile device; and controlling access to the financial account at the access terminal based on the response. In some embodiments, the system and method may be further configured to store the response in the destination account. In other embodiments, the financial account is used for payment in a sales transaction, and the access is a request for payment from the financial account. | 12-08-2011 |
20110302084 | SYSTEM AND METHOD FOR IMMEDIATE REPLACEMENT OF LOST OR STOLEN CREDIT CARDS/DEBIT CARDS - A method and system for providing uninterrupted access to a credit or debit card account with:
| 12-08-2011 |
20110302085 | METHODS AND SYSTEMS FOR VERIFYING CUSTOMER SUPPLIED FINANCIAL ACCOUNT INFORMATION USING DEBIT AND CREDIT TRANSACTIONS - Embodiment of the invention describe methods and systems for verifying customer supplied financial account information verification using debit and credit transactions. These methods include electronically transmitting an electronic debit and credit transaction to the customer financial account, based on the customer supplied financial account information. The method also includes electronically transmitting a first statement descriptor, as part of at least one of the electronic debit transaction and the electronic credit transaction, that includes a first verification code. The method also includes electronically receiving, from the customer, a second verification code, and comparing, by the computer system, the transmitted first verification code with the received second verification code with respect to each other. The method also includes verifying, by the computer system, the customer supplied financial account information based on the comparison of the verification codes. | 12-08-2011 |
20110302086 | System & Method for Unique Digital Asset Identification and Transaction Management - Digital assets are tracked through the use of digital serial numbers. Systems equipped with the present invention can uniquely identify copies of assets within it. Assets that originate within the system can be uniquely identified even outside the system. The transaction history can be traced by looking up the transaction history associated with an assets' serial number. The serial number applied to an asset is unique to each transaction and can be applied at the time a copy is made. Database entries are created that link each unique serial number to aspects of the transaction. Each serial number can reference details about a particular transaction such as parties involved, date and time of copy, ownership, terms of use, and payment terms. | 12-08-2011 |
20110302087 | COMPREHENSIVE ONLINE FRAUD DETECTION SYSTEM AND METHOD - A fraud detection and protection method and system are disclosed. The method and system utilize a fraud detection and protection server to monitor online commercial transactions between a webserver and a client computer, and generate a risk assessment of a user associated with the client computer. The system and method further utilize a number of beacon servers geographically dispersed in an area. Each beacon server is configured to receive packet header information associated with the online commercial transactions, analyze the packet header information for authenticating information, and send the authenticating information to the fraud detection and protection server for the risk assessment. | 12-08-2011 |
20110307380 | System And Method For Establishing And Managing Social Wireless Network - A system for establishing connection between at least two electronic devices, through wireless communication data network, wherein each electronic device is associated with a single entity and at least one of the entities is a human user which participates in at least one social network. The system includes: a connection module supported by a short range communication protocol, integrated within at least one electronic device, wherein the module includes an identifying field uniquely associated with said electronic device and associated entity, the identification field is exposed as BT identity to other electronic devices located at proximity to said first device, wherein the identification field includes at least one unique code corresponding to said electronic device and at least one code associated with ID number of the entity in a social network, at least one repository of a cellular social network members, each member record including the identifying field, user profile and user connections to other entities, and wherein the connection module support handling the handshaking process of establishing social connection between two entities. | 12-15-2011 |
20110307381 | METHODS AND SYSTEMS FOR THIRD PARTY AUTHENTICATION AND FRAUD DETECTION FOR A PAYMENT TRANSACTION - Described herein are methods and systems for third party authentication and fraud detection for a payment transaction between a consumer and a merchant. A third party authentication may occur during a consumer's registration with the payment system or during a consumer's transaction with a merchant. In one embodiment, a payment system receives user information from an electronic device of the consumer. The payment system receives a selection of a third party authentication option from the consumer. The payment system sends a request for a login window to a third party site. The consumer logs into the third party site using the login window. The payment system receives and saves a consumer's universally unique identifier (UUID) from the third party site. The consumer registers with the payment system by authenticating with the third party site. In another embodiment, the consumer authenticates successful with the payment system during a payment transaction. | 12-15-2011 |
20110307382 | SYSTEM AND METHOD FOR IDENTIFYING A POINT OF COMPROMISE IN A PAYMENT TRANSACTION PROCESSING SYSTEM - A system, apparatus, and method for reducing fraud in payment transactions by identifying a potential point of compromise (POC) that may lead to subsequent fraudulent transactions, or confirming that a suspected point of compromise is in fact responsible for a security breach leading to fraudulent payment transactions. The invention is also directed to a system, apparatus, and method for identifying data or transaction characteristics that may be used to most effectively identify a point of compromise in a payment transaction syst | 12-15-2011 |
20110307383 | METHOD AND SYSTEM FOR SECURE ORDER MANAGEMENT SYSTEM DATA ENCRYPTION, DECRYPTION, AND SEGMENTATION - An apparatus for segmented processing of order management system data is described herein. The apparatus generally includes: a front end interface that is operative to receive unencrypted payment information and unencrypted personal information relating to at least one customer order and return encrypted payment information and encrypted personal information relating to the at least one customer order; a middle tier interface that is operative to receive encrypted payment information and encrypted personal information relating to at least one customer order and return decrypted personal information only; and/or a back end interface that is operative to receive encrypted payment information and encrypted personal information relating to at least one customer order and return decrypted payment information and decrypted personal information relating to the at least one customer order. | 12-15-2011 |
20110307384 | MULTI CURRENCY EXCHANGES BETWEEN PARTICIPANTS OF A NETWORK-BASED TRANSACTION FACILITY - A method and apparatus for facilitating online payment transactions in multiple currencies between participants of a network-based transaction facility are described. In one embodiment, a set of balances in different currencies within a user account of a user is presented. An indication from the user to transfer funds between two balances of the set of balances in the user account is received. A current exchange rate for conversion between currencies of the two balances is provided. An approval from the user to perform the transfer of funds between the two balances is received. In response, the transfer of funds between the two balances is performed. | 12-15-2011 |
20110313925 | DYNAMIC PAIRING SYSTEM FOR SECURING A TRUSTED COMMUNICATION CHANNEL - A system for securing a trusted communications channel for a mobile financial transaction is provided by receiving, from a user via an external terminal, a request for an access control entitlement to complete a financial transaction. A total risk level associated with the financial transaction is computed. A required trust score is determined based on the total risk level. User identification data associated with the user is received from one or more data sources. The user identification data is validated. A user trust score associated with the user is computed based on the validated identification data. The user trust score is compared to the required trust score. The access control entitlement is transmitted to the user via the external terminal if the user trust score is greater than or equal to the required trust score. | 12-22-2011 |
20110313926 | System and method for facilitating large scale payment transactions - A system and method of payment of an end-user account with a service provider includes a computer system that makes payments to service providers on behalf of end-users and that is operable to exchange information with a terminal at the point of sale or a web-enabled computer system operated by the end-user and with the computer system of the service provider. In one embodiment, the computer system of an intermediary receives a request to make a payment on an end user's account with a service provider. The computer system of the intermediary may communicate with the computer system of the service provider by logging on to the web page of the service provider as the end-user, and entering a universally accepted open system number and the amount of the payment received from the end user's source of funds to effect payment on the end user's account with the service provider. In another preferred embodiment, a payment router together with an issuing/sponsoring bank and a processor, as implemented by their computer systems, facilitate payment transactions in which the router transacts at least thousands of payments for at least hundreds of payors with at least dozens of payees using at least one open system card association network, preferably in a day. | 12-22-2011 |
20110320352 | BIOMETRICALLY SECURED USER INPUT FOR FORMS - Systems and methods for collecting biometrically secured financial form data from a user are described. A user input device may receive biometric data from the user. The user may be presented with a visual medium. The visual medium may contain a plurality of fields for information necessary to conduct a financial transaction. Handwriting data may be received from the user. At least a portion of the handwriting may represent information corresponding to the plurality of fields for information necessary to conduct the financial transaction. At least a portion of the information corresponding to the plurality of fields for information necessary to conduct the financial transaction may be transmitted from the user input device to a computer system. | 12-29-2011 |
20110320353 | MULTI-USER DEVICE WITH INFORMATION CAPTURE CAPABILITIES - Methods and systems, related to a biometrically secured user input device for conducting a transaction are described. The user input device may comprise a biometric authentication device. At the biometrically secured user input device, a biometric sample may be received from a user. The biometrically secured user input device may transmit the biometric sample, provided by the user, to a host computer system. The host computer system may compare the biometric sample provided by the user to another biometric sample. Handwriting data from the user may then be received by the user input device. The handwriting data may be transmitted to a computer system by the user input device. Transaction data based on the handwriting data may be transmitted from the computer system to a host computer system. The financial transaction may be conducted using the transaction data transmitted to the host computer system from the computer system. | 12-29-2011 |
20110320354 | SYSTEMS AND METHODS FOR ASYNCHRONOUS MOBILE AUTHORIZATION OF CREDIT CARD PURCHASES - An exemplary system includes an asynchronous transaction authorization (“ATA”) subsystem configured to record prior approval of transaction parameters from the account holder(s) and approve a transaction with congruent parameters within a subsequent defined time period. If the parameters of a transaction attempt have not been previously authorized by the account holder(s), the parameters of the requested transaction are stored and the transaction is rejected. The ATA subsystem then queries all associated account or card holders (“ACHs”) providing the parameters of the attempted transaction. Upon authorization from the required ACHs, which is a predefined subset of all the associated ACHs, the purchaser and all ACHs may be notified of approval. The subsequent attempted transaction with congruent parameters will be authorized. Authorization will no longer be active after the subsequent transaction has been approved or a time, delta, has lapsed. In some examples, the authorization hierarchy is slightly different, e.g., domestic and commercial use. | 12-29-2011 |
20110320355 | VALUE TRANSFER WITH IDENTITY DATABASE - A value transfer system and methods are disclosed. A sending entity may initiate a cross-border value transfer by authenticating with an authentication system, where the authentication system communicates with an identity database populated with profiles for the sending entity and a recipient entity that contain government data, where the government data is used in the authentication process. | 12-29-2011 |
20110320356 | CARD TRANSACTION SYSTEM AND METHOD ON ON-LINE AND/OR OFF-LINE - A system and method for allowing a user to have card transactions on-line and/or off-line with a non-rechargeable electronic money card are provided. The card transaction system includes a card issuing unit which allocates a unique card number to each card and sets a card account corresponding to the card number to issue a card; a card adjustment unit which receives transaction details corresponding to the card and adjusts the card account corresponding to the card according to the transaction details; a flag generator with generates a flag; which indicates whether the card can be used, according to the balance of the card account, on the basis of an off-line reference amount set for off-line transactions and an on-line reference amount set for on-line transactions; and a card information transmitter which transmits the flag corresponding to the card. Accordingly, a time gap between an on-line real time transaction and an off-line transaction using batch transmission can be overcome so that network type electronic money can be used for both on-line and off-line transactions. | 12-29-2011 |
20120005096 | Method of conducting financial transactions - A method is provided of conducting a financial transaction with reduced likelihood of fraud. A financial transaction is entered into using a first party's financial transaction instrument to transfer funds. The first party's financial transaction instrument information is sent externally to a mobile device. The financial transaction instrument information is sent from the mobile device to a payment system. | 01-05-2012 |
20120011066 | METHODS AND SYSTEMS FOR AUTHENTICATING AN IDENTITY OF A PAYER IN A FINANCIAL TRANSACTION - A system and computer-based method for using a one-time password (OTP) to authenticate an identity of a cardholder in a financial transaction initiated by the cardholder with a merchant via a first communication medium. A one-time password is generated at an interchange computer system and transmitted to the cardholder via a second communication medium. The cardholder is prompted to enter access credential information, including the one-time password. When the entered access credential information is verified (e.g., the entered one time password is equal to the generated one-time password), a successful authentication is indicated to the merchant. | 01-12-2012 |
20120011067 | GATEWAY ABSTRACTION LAYER - Systems, gateway computers, and methods for using a gateway abstraction layer and application platform interfaces for conducting service transactions are disclosed. A gateway abstraction layer computers can receive service requests in multiple message formats or communication protocols, transform those service requests into other message formats to process the service using one or more networks or third-party service providers. The results of the service request can then be translated back to the message format in which the original service request was received. The gateway abstraction layer can be maintained using update messages received from service providers. | 01-12-2012 |
20120016799 | MONEY TRANSFER SYSTEM GATEWAY SERVICE - A method includes receiving, in a computer, a transaction request from a payment services provider. An end user identifier included in the request is mapped into a payment card system account number. The end user identifier identifies an end user who has been assigned the payment card system account, and who is a subscriber to a closed-loop payment system operated by the payment services provider. Funds from the payment services provider are credited to a shadow open-loop system payment card account identified by the payment card system account number. An authorization request for an open-loop system transaction is sent to an acquirer financial institution that represents a merchant with which the end user is dealing, and is received back from a payment card system authorization system by the same computer that received the transaction request from the payment services provider and that generated the authorization request. | 01-19-2012 |
20120016800 | ELECTRONIC PAYMENT AND AUTHENTICATION SYSTEM WITH DEBIT AND IDENTIFICATION DATA VERIFICATION AND ELECTRONIC CHECK CAPABILITIES - An electronic payment and authentication system that includes features to verify the authenticity of a payer, validate debit data, and facilitate debit (as opposed to credit) payment transactions. The electronic payment system allows a consumer to purchase items and services via a network while utilizing a debit transaction. The invention provides merchants with the ability to verify the identity of the consumer, determine if the consumer is a good debit transaction risk, and retrieve debit data associated with a particular consumer. | 01-19-2012 |
20120023022 | CARD-PRESENT SECURITY SYSTEM - A method, system and apparatus for authenticating the validity of a transaction. The method includes the steps of receiving data identifying a means for carrying out the financial transaction; receiving data identifying a mobile network segment for routing communications via a mobile communication device associated with a user requesting the transaction; comparing the mobile network segment data and the data identifying the means for carrying out the transaction with a database of correlated data identifying one or more means for carrying out a transaction associated with further data identifying one or more mobile network segments; and authenticating the transaction in dependence on the result of the comparison. | 01-26-2012 |
20120030109 | DEPENDENT PAYMENT DEVICE - The present invention provides embodiments of a dependent payment device, such as a credit card, for allowing a primary customer to control and monitor the transactions made by a dependent customer who is authorized to use the account of the primary customer. The primary customer can control the maximum limit that the dependent customer can spend on the dependent card up to the maximum amount that the financial institution has approved for the primary customer. The primary customer can also block/approve purchases that the dependent customer can make at store or on products by adding MCCs, store names, store types, UPCs, or other product or store identifiers to a list of blocked/approved transactions. The primary customer can set monetary and time limits on the amount and frequency of the transactions the dependent customer can make at stores or on products that have been blocked/approved. | 02-02-2012 |
20120030110 | DEVICE, SYSTEM, AND METHOD FOR LOCATION-BASED PAYMENT AUTHORIZATION - A device, system, and method for location-based payment authorization includes receiving a payment request for an order submitted from a mobile computing device via an e-commerce vendor website. A location of the mobile computing device is determined based on location data. In one embodiment, the payment request is authorized or denied based on whether the e-commerce vendor website has been authorized for the determined location of the mobile computing device. | 02-02-2012 |
20120030111 | SERVICE PLATFORM UTILIZING AN ELECTRONIC PAPER DEVICE FOR FINANCIAL INSTITUTIONS - A service platform utilizing an electronic paper device for financial institutions, comprising: an option input device, used for sensing an entry operation and outputting a financial business option signal accordingly; a control unit, having an option input interface, a display interface, a host interface, and a slips storage unit, wherein the option input interface is used to receive the financial business option signal, the host interface is used to communicate with a financial institution host, the slips storage unit is used to store financial business slips; and an electronic paper device, having a touch input function, coupled to the display interface to display one financial business slip for related information input by a touch pen, or transmit the related information through the control unit to the financial institution host, or display an informing message sent from the financial institution host through the control unit. | 02-02-2012 |
20120030112 | Generation And Use Of Cash Value Debit Cards - Systems and methods for generating and using a cash value debit card are described. A request from a user to add value to a cash value debit card account financially secured by a financial entity against an account of the user may be received. The user may be authenticated to the account of the user with the financial entity. Monetary funds may be debited from the account of the user by an amount to add to the cash value debit card account, and the debited amount may be added to the cash value debit card account. A request to withdraw monetary funds from the cash value debit card account may be received. A determination may be made as to whether to authorize the withdrawal from the cash value debit card account. The withdrawal may be authorized, and the cash value debit card account may be debited accordingly. | 02-02-2012 |
20120030113 | Generation And Use Of Negotiable Instruments - Systems and methods for generating and using negotiable instrument are described. A request from a user to generate a negotiable instrument financially secured by a financial entity against an account of the user is received, and the user is authenticated to the account of the user with the financial entity. Upon authenticating the user to the account, data representative of the negotiable instrument financially secured by the financial entity against the account of the user is transmitted. The data may include a printable image and barcode for scanning by a second computing device of the financial entity. The transmitted data representative of the negotiable instrument may be received by a computing device. The computing device may output the data representative of the negotiable instrument to a printer for local generation of the negotiable instrument on the printer without the need for special inks and/or other data. | 02-02-2012 |
20120030114 | User Positive Approval and Authentication Services (UPAAS) - The invention provides Users of Retail Payment and Identification instruments with the ability to review transaction details and approve transaction by capturing UVM in User controlled environment and Issuers of these instruments with the ability to positively authenticate Users in Issuer controlled environment. The invention accounts for real time legacy or non-legacy processing systems to provide an authorization request from POA to Issuer Host. The invention introduces two UPAAS components—User Gateway and User Application. The UPAAS User Gateway is implemented in an Issuer controlled environment enabling interface between Issuer legacy Host and UPAAS User Applications. The UPAAS User Application can be implemented on any device supporting communication protocol such as TCP/IP without any hardware changes enabling the User to login to UPAAS User Gateway, review and approve or decline a specific transaction in real time by entering UVM, such as PIN, for User authentication purposes. | 02-02-2012 |
20120030115 | SYSTEMS AND METHODS FOR PREVENTING FRAUDULENT BANKING TRANSACTIONS - A system and method for protecting account holders against fraudulent transactions by receiving authorization criteria, wherein the authorization criteria relates to one or more characteristics associated with financial transactions that involve an account in a financial institution; receiving incoming transaction data wherein the incoming transaction data is associated with an underlying financial transaction involving the account; identifying the one or more characteristics associated with the incoming transaction relating to the authorization criteria received; identifying prior transactions with one or more characteristics corresponding with the identified one or more characteristics associated with the incoming transaction data; comparing the incoming transaction data with the authorization criteria; suspending the underlying transaction associated with the incoming transaction data if the authorization criteria is not satisfied; transmitting notification of the suspension to the account holder associated with the suspended underlying transaction data through a first communication method, wherein the transmitted notification includes a unique item of information; and permitting the suspended underlying transaction to proceed if the unique item of information is received through a second communication method. | 02-02-2012 |
20120030116 | SYSTEM AND APPARATUS FOR TRANSACTION FRAUD PROCESSING - A system for processing transaction data is provided. The system includes a fraud policy system that provides merchant fraud policy data. An order information data system receives order information data and the merchant fraud policy data and generates order information fraud score data, such as by modifying the order information data using the merchant fraud policy data and then scoring the modified order information data. A transaction authorization system receives the order information fraud score data and the merchant fraud policy data and generates client authorization data. | 02-02-2012 |
20120036071 | VERIFICATION METHODS FOR FRAUD PREVENTION IN MONEY TRANSFER RECEIVE TRANSACTIONS - A computer system is operated to prevent fraud in a money transfer receive transaction. A send transaction request is received from a sender for a money transfer including a send amount. The sender is prompted to select one or more security inputs to be supplied by a receiver for redemption of the money transfer. A send transaction record is stored with the selected one or more security inputs in a server. A receive transaction request is then received from the receiver. The receiver is prompted for the one or more security inputs set for redemption of the money transfer, and the provided one or more security inputs from the receiver are received. The received one or more security inputs are authenticated, and release of funds in the send amount is authorized if the received one or more security inputs are authenticated. | 02-09-2012 |
20120036072 | Transport Logistics Systems and Methods - A logistics system manages the shipments of goods supplied from a plurality of different shippers by a plurality of carriers. It has a variety of modules integrated with each other to perform various functionalities. For example, it may have a purchasing module evaluating proposals by shippers for respective shipments of goods and awarding contracts for the shipments to the plurality of carriers. It may have an optimization module analyzing the proposals and informing the purchasing module if an opportunity exists for at least some of the shipments to be consolidated, in which case at least one contract awarded by the purchasing module is for a consolidated group of the shipments. It may have a contract administration module maintaining information relating to the status of proposals received and contracts awarded by the purchasing module. It may have a scheduling module scheduling shipments according to the awarded contracts. It may also have a shipment management module tracking the status of shipments awarded by the purchasing module and scheduled by said scheduling module. It may further have a financial module authorizing payments according to the status of shipments tracked by the shipment management module are passed between first and second asynchronous clock domains. | 02-09-2012 |
20120036073 | INTELLIGENT ESTIMATES IN AUTHORIZATION - Techniques for providing an intelligent estimated amount for authorization include receiving a request to calculate an estimated amount for a transaction where the final amount is not known at the time of authorization. A payment processing network calculates the estimated amount based on several factors associated with the transaction and provides the estimated amount to an issuer for authorization. | 02-09-2012 |
20120036074 | MOBILE SYSTEM FOR EXACTING PARKING TOLLS - Mobile systems are provided for charging electronic toll collection accounts for parking fees. The systems are configured to wirelessly request and receive tag data from an electronic toll device. Some embodiments include a vehicle and a boom, some embodiments include a handheld device, and other embodiments include combinations thereof. Methods of charging an electronic toll payment system are also provided. A mobile scan system wirelessly requests and receives tag data from an electronic toll device on a customer's vehicle which is checked for validity, and then an electronic toll collection account is charged a fee for parking. | 02-09-2012 |
20120041878 | Method And System For Authenticating Software License - The present invention is directed to a method and system for authenticating software license. The method for authenticating software license according to an embodiment of the present invention transmits a usage authorization request to an authentication information management server through a communication network, and receives and stores authentication information from the authentication information management server. Subsequently, the method for authenticating software license according to an embodiment of the present invention transmits a terminal identifier to a personal computer, and calculates run-time of software using a launch signal, a termination signal, or combinations thereof, received from the personal computer, corresponding to the running of software, and charges in accordance with the calculated run-time of software. The present invention enables users to authenticate software license using a mobile communication terminal. | 02-16-2012 |
20120041879 | METHODS AND SYSTEMS FOR PAYMENT PROCESSING BETWEEN CONSUMERS AND MERCHANTS - Described herein are methods and systems for processing a consumer payment with a payment system that utilizes payment information from a network partner of the payment system. In one embodiment, the payment system initiates a payment transaction between a merchant's site and the consumer in response to receiving a selection of a payment option from a consumer using an electronic device. The payment system generates selectable network partner options to be displayed on the electronic device of the consumer. The payment system receives a selection of one of the network partner options and also account credential information for the selected network partner from the consumer. The payment system sends the account credential information to the network partner for authentication. The payment system receives payment information for the consumer from the network partner. The payment system processes the payment transaction on behalf of the merchant. | 02-16-2012 |
20120047071 | PAYMENT CARD PROCESSING SYSTEM - A method, programmed medium and system are provided for using a payment card with an embedded RFID device. In one example, a cellular telephone or other wireless device is used to generate a one-time password (OTP), which is then transmitted by a read-write RFID in the wireless device to the read-write RFID which is embedded within a payment card. The user's phone or other wireless device then activates the writing of the OTP to the RFID of the payment card. The payment card, with the one time password now saved in the card, is then handed to the waiter or store clerk for payment approval and/or further processing. The user's OTP is then read by the merchant's RFID reader and transmitted to an approving agency/server for approval or disapproval of the user's purchase. | 02-23-2012 |
20120047072 | MERCHANT ALERT SYSTEM AND METHOD FOR FRAUD PREVENTION - A system and method for preventing merchant electronic transaction fraud includes a plurality of network connected data processing terminals, including at least one server; means for receiving an electronic authorisation request at the server from a first data processing terminal, the request is for authorising the processing of an electronic transaction associated with a cardholder's card or account data; means for filtering the received request according to predetermined filtering criteria; means for identifying at least a second data processing terminal as a merchant device; means for sending the request to the merchant device, to notify the merchant that processing of an electronic transaction is proposed, a parameter of which is said cardholder's card or account data and alert data to indicate that the transaction is fraudulent; and means for receiving interrupt data from the second terminal and for interrupting processing of the transaction with that card data or account data. | 02-23-2012 |
20120047073 | Account Administration Plans and Systems - A computer system for facilitating payments from an account according to particular embodiments of the invention is adapted for: (1) facilitating the transmission, to a plan service provider, of a first set of documentation of a first payment that would potentially qualify for reimbursement from the account; (2) receiving, from the plan service provider, verification that the first payment has been verified as qualifying for reimbursement from the account according to a set of reimbursement rules associated with the account; (3) storing, in memory, an electronic version of the first set of documentation; and (4) storing, in memory, an indication that the first payment has been verified as being properly reimbursable from the account. | 02-23-2012 |
20120066125 | COMPUTER-BASED COLLECTIVE INTELLIGENCE RECOMMENDATIONS FOR TRANSACTION REVIEW - In an embodiment, a data processing method comprises obtaining a plurality of first transaction data items for a proposed online credit card purchase transaction that has been recommended for review; obtaining a plurality of second transaction data items for a set of similar past online credit card purchase transactions, wherein each member of the set has one or more transaction feature values that are similar to the transaction data items of the proposed online credit card purchase transaction, and a decision value specifying whether the member was accepted or rejected by a reviewer; obtaining a stored data model of features, feature values, transaction acceptance decisions and rejection decisions of the reviewer based at least in part on the set, determining, based on applying the first transaction data items to the stored data model and a subsequent query to the database among more recent transactions that were not included during model construction, a likelihood value of a particular decision of whether the proposed online credit card purchase transaction would be accepted or rejected by the reviewer of the merchant; causing the likelihood value to be displayed; wherein the method is performed by one or more computing devices. | 03-15-2012 |
20120066126 | OVERAGE SERVICE VIA TRANSACTION MACHINE - In general terms, embodiments of the present invention relate to methods and apparatuses for providing an overage service via a transaction machine. For example, in some embodiments, a method is provided that includes: (a) receiving transaction information associated with a transaction, where the transaction involves an account, a transaction machine, and a holder of the account; (b) determining, based at least partially on the transaction information, that the account will incur an overage as a result of the transaction; (c) prompting, via the transaction machine, the holder to consent to the overage; (d) receiving the holder's consent to the overage; and (e) authorizing the transaction based at least partially on the receiving the holder's consent. | 03-15-2012 |
20120066127 | OVERAGE SERVICE SUBJECT TO CONDITION - In general terms, embodiments of the present invention relate to methods and apparatuses for providing an overage service subject to one or more predetermined conditions. For example, in some embodiments, a method is provided that includes: (a) receiving, from a holder of an account, consent to a future overage, where the future overage is a result of a future overage transaction involving the account, and where the consent is valid only if a predetermined condition is met; (b) receiving transaction information associated with a transaction, where the transaction involves the account, and where the transaction was initiated after the receiving the consent; (c) determining, based at least partially on the transaction information, that the account will incur an overage as a result of the transaction; (d) determining that the predetermined condition is met and/or that the holder's consent is valid for the transaction; and (e) authorizing the transaction based at least partially on receiving the consent, determining that the holder's consent is valid for the transaction, and/or determining that the predetermined condition is met. | 03-15-2012 |
20120066128 | DATA COMMUNICATION METHOD AND SYSTEM FOR PROVIDING A FINANCIAL TRANSACTION - Method for communicating data using a public mobile telecommunications or data network, to grant a remote user access to a safe financial transaction service, the method comprising inputting a voice sample of a user requesting access to the service at a mobile terminal, transmitting the voice sample data to a remote voice authorization server, which is directly linked to a transaction processing server governing a debitable and creditable user account, analyzing the voice sample data at the voice authorization server vis-a-vis pre-stored voice profile data, and outputting an access control signal granting or rejecting the request access, in response to the result of the analysis, to the transaction processing server. | 03-15-2012 |
20120066129 | DATA AUTHENTICATION AND PROVISIONING METHOD AND SYSTEM - Techniques for authenticating the identity and validating the profile of an individual (“a presenter”) who presents him or herself to another party (“an acceptor”) as having a certain identity and having certain corresponding profile data are described. The invention can be advantageously used in Internet transactions where such authentication and validation is difficult to perform. The techniques of the present invention allow the trusted party to give a definitive answer regarding the authentication of identity and validity of profile data. Other services such as profile data provisioning and profile data updating can also be performed. | 03-15-2012 |
20120066130 | DATA AUTHENTICATION AND PROVISIONING METHOD AND SYSTEM - Techniques for authenticating the identity and validating the profile of an individual (“a presenter”) who presents him or herself to another party (“an acceptor”) as having a certain identity and having certain corresponding profile data are described. The invention can be advantageously used in Internet transactions where such authentication and validation is difficult to perform. The techniques of the present invention allow the trusted party to give a definitive answer regarding the authentication of identity and validity of profile data. Other services such as profile data provisioning and profile data updating can also be performed. | 03-15-2012 |
20120066131 | MONEY TRANSFER SERVICE WITH AUTHENTICATION - A bank (or merchant) hosts and operates an online money transfer service (or “portal”). A sender logs into the portal and enters payment card and money transfer details and then submits the transaction. An authentication window appears displaying the sender's transaction details and the sender is prompted to enter his or her password. Upon successful authentication, the bank seeks authorization from the card issuer. Upon successful authorization, the bank credits the recipient's local bank account or existing payment card. The recipient can also receive a check, a draft, a prepaid card or cash. The money transfer service is used both cross-border and domestic to effect person-to-person money transfer. The money transfer service uses the “Verified by Visa” authentication service and VisaNet for authorization. Messages over VisaNet are used to deliver funds to a recipient. | 03-15-2012 |
20120066132 | SCORED NEGATIVE FILE SYSTEM AND METHOD - System and method for validating a payment. The method can include obtaining a first account identifier, accessing a database containing a plurality of risk scores, each one of the plurality of risk scores being associated with one of a plurality of account identifiers, obtaining a first risk score from the plurality of risk scores, the first risk score being associated with the first account identifier, and determining an acceptance decision by comparing the first risk score against a risk threshold value. | 03-15-2012 |
20120066133 | AUTHORIZATION REFRESH SYSTEM AND METHOD - Limited use account identifiers or secondary account identifiers are enabled with refresh capability. The refreshable account identifiers are used in financial transactions and, specifically, in transaction situations where multiple and/or duplicate authorization requests occur for the same or related transactions. An authorization refresh may occur if a settlement request is received for a transaction. The limited use account identifiers may be used by intermediaries that coordinate the purchase of an item for a buyer. | 03-15-2012 |
20120072346 | SYSTEM AND METHOD FOR SECURING AND AUTHENTICATING PURCHASE TRANSACTIONS - A system and method for securely authenticating a dual number payment card used in a purchase order is provided. A request to approve the purchase order is received from a cardholder that owns the dual number payment card, via a first path. The request includes a site address of a website, an order number and a second card number of the dual number payment card. A first card number of the dual number payment card, associated with the order number, is received from the website, via a second path. A matching pair of numbers that identifies a stored dual number payment card, is searched in a card details storage. If a first number of the matching pair matches the first card number and a second number of the matching pair matches the second card number; the purchase order is approved. | 03-22-2012 |
20120072347 | POLICY-BASED PAYMENT TRANSACTION ROUTING SERVICE FOR CREDIT CARD PAYMENT PROCESSING - The present document describes a method, processing device and computer readable media, for routing a credit card payment transaction over a communication network. The method comprises receiving an authorization request for the credit card payment transaction at a payment processor, the authorization request being generated at a merchant terminal of a merchant. The method also comprises: at the payment processor, determining an optimal transaction route for sending the authorization request over the communication network to one of multiple acquirer servers, each one of the multiple acquirer servers being associated to one of multiple acquiring financial institutions of the merchant, the determining being based on payment processing costs associated to routing the authorization request from the merchant terminal to each one of the multiple acquirer servers; the payment processor routing the authorization request to the one of the multiple acquirer servers implementing the optimal transaction route; the payment processor receiving, from the one of the multiple acquirer servers, an authorization response for the authorization request; the payment processor forwarding the authorization response to the merchant terminal; and the merchant terminal displaying the authorization response forwarded by the payment processor, to thereby notify a user of the authorization response. | 03-22-2012 |
20120072348 | AUTHORIZATION REFRESH SYSTEM AND METHOD - Limited use account identifiers or secondary account identifiers are enabled with refresh capability. The refreshable account identifiers are used in financial transactions and, specifically, in transaction situations where multiple and/or duplicate authorization requests occur for the same or related transactions. The limited use account identifiers may be used by intermediaries that coordinate the purchase of an item for a buyer. An authorization refresh may be performed by the account issuer and/or the intermediary if a settlement request is received for a transaction. | 03-22-2012 |
20120072349 | AUTHORIZATION REFRESH SYSTEM AND METHOD - Limited use account identifiers or secondary account identifiers are enabled with refresh capability. The refreshable account identifiers are used in financial transactions and, specifically, in transaction situations where multiple and/or duplicate authorization requests are submitted by a merchant for the same or related transactions. The limited use account identifiers may be used by intermediaries that coordinate the purchase of an item for a merchant/buyer. An authorization refresh may be performed by the account issuer and/or the intermediary if a settlement request is received for a transaction. | 03-22-2012 |
20120072350 | SYSTEM AND METHOD FOR MOBILE PAYMENT TRANSACTIONS - A system processes a request by a customer to pay a transaction amount, using the customer's account, for a transaction between the customer and a merchant, to provide a payment to an account of the merchant. The transaction incorporates use of a mobile wireless device operated by the customer to provide identification information of the customer's account to an authentication server. A payment server coupled to the authentication server and the merchant passes merchant communications to the authentication server. The authentication server receives the transaction amount from the merchant and receives customer account information from the customer's wireless mobile device, and processes the transaction and account information and, if authenticated, routes the payment transaction to the payment server for payment to the merchant's account. | 03-22-2012 |
20120078787 | Mobile Agent Methods and Systems - Methods and systems are described for providing financial services to a disaster area. Biographical information may be received from a disaster victim. A first image may be captured of the disaster victim's face. The first image of the disaster victim's face and the biographical information may be transmitted to a remote server system via wireless communications. The biographical information may be compared to a plurality of biographical records linked to staged financial transactions stored at the remote server system. A match between the biographical information received from the disaster victim and a biographical record of the plurality of biographical records may be identified, wherein the biographical record is linked to a staged financial transaction. An indication of an amount of funds to be distributed may be provided to the disaster victim. The funds may be provided to the disaster victim. | 03-29-2012 |
20120078788 | TRANSACTIONS BY FLICKING - A user can transfer items, such as a money, a payment request, virtual goods, listings, etc., by flicking the item on a user device, such as a smart phone. The selected item then moves out of the display and onto the display of a recipient device. The transfer can be completed when the user and recipient have an established trust relationship or authorize the transfer. | 03-29-2012 |
20120078789 | OFFLINE TO ONLINE PAYMENT - A payer submits a payment request when there has been no connection established with an online payment provider. The payment request is stored on the payer's device, such as a phone, and is transmitted to the payment provider when a connection is established. The payer can submit a plurality of offline payment requests, all of which can be transmitted and processed when received by the payment provider. | 03-29-2012 |
20120078790 | REAL-TIME INTERCHANGE FEE ESTIMATION - Few merchants are in a position to understand how changes to processes or procedures may alter the issuer risk and/or subsequent transaction processing costs. Merchants would prefer to be provided with estimated Interchange fees associated with a financial transaction in real-time. To provide a merchant with an estimated Interchange fee in real-time, a financial transaction request may be received from the merchant and used to determine the estimated Interchange fee. The estimated Interchange fee may then be transmitted to a merchant in real-time. The estimated Interchange fee may be representative of an actual Interchange fee associated with a financial transaction. Estimated Interchange fees may be provided as part of an authorization or settlement processing method. | 03-29-2012 |
20120078791 | METHOD AND SYSTEM FOR FACILITATING PAYMENT TRANSACTIONS USING ACCESS DEVICES - A payment system for facilitating a payment transaction between a payer and a payee is disclosed. The payment system includes a payer access device, a payee access device, and a services hub. The services hub is configured to communicate with the payer device and the payee device; maintain information relating to a payer account and access device information associated with the payer account, the payer account being linked to the access device; generate a tracer ticket in response to a request issued by the payer using either the payer device or the payee device, the tracer ticket containing information relating to the payment transaction; validate the access devices; and authorize the payment transaction against the payer account through conventional payment processing systems. Upon receiving the request from the payee device for the tracer ticket, the services hub generates the tracer ticket and forwards a copy thereof to the payer via the payee device. Upon receiving the copy of the tracer ticket, the payer uses the payer device to communicate with the services hub and forward the received copy of the tracer ticket to the services hub. The services hub then validates the payer device based on the access device information. Upon validation of the payer device, the services hub checks the copy of the tracer ticket forwarded by the access device against the previously generated tracer ticket. If the copy of the tracer ticket forwarded by the access device corresponds to the previously generated tracer ticket, the services hub authorizes the payment transaction against the payer account. | 03-29-2012 |
20120078792 | Method and System for Secure Mobile Remittance - This invention provides a system and method for reducing the fraud related to remittance transactions initiated at web portals. In one embodiment, mobile technologies that are available to consumers can be used to reduce fraud associated with remittance transactions. For example, a funding agency computer that enables a remittance transaction can request that a mobile platform computer verify a customer with a mobile personal identifier. The mobile platform computer can request the mobile personal identifier from a customer via the customer's mobile handset device. The mobile platform computer can determine whether the identifier received from the customer's mobile handset device matches the mobile personal identifier stored for the customer. If the mobile platform computer is able to verify the customer, the mobile platform computer can provide a verification confirmation message to the funding agency computer. | 03-29-2012 |
20120078793 | FINANCIAL INSTRUMENT HAVING LOAN PROCEEDS AND PRE-PAID CHARACTERISTICS - Financial methods and systems for using a financial instrument are disclosed. A financial account includes both a loan balance portion and a pre-paid cash balance portion. The loan balance portion and the pre-paid cash balance portion are used in performing a purchase transaction. The purchase transaction is initiated by the account holder using the financial instrument. A prioritization scheme is selected that indicates an order of priority of the loan balance portion and the pre-paid cash balance portion of a financial account. A purchase amount is applied to the financial account according to the prioritization scheme. A transaction fee is not charged by the financial institution when any portion of the loan balance portion is applied to the purchase amount. And, a transaction fee is charged by the financial institution when no portion of the loan balance portion is applied to the purchase amount. | 03-29-2012 |
20120078794 | System and Method for Delivering Financial Services - A delivery system and method allow a financial institution to provide financial services to a plurality of remote devices. The system is comprised of a set of re-usable global components which are modular and are organized into services sets. The system and method operate in sessions and, for instance, employ a dialog component for gathering information from a customer, a rule broker component for providing answers to the various legal and regulatory rules in a particular country, a language man component for selecting appropriate language, a transaction executor component for performing transactions, and a presentation manager component for formatting outputs to the customer. The system and method provide state-of-the art interfaces that can be configured and delivered to the customer in a globally consistent format that is based on the customer's account profile, various languages, various currencies, different legal regulatory requirements, as well as, different sets of business products. | 03-29-2012 |
20120078795 | SYSTEM FOR PROVIDING CARDLESS PAYMENT - The method and system of the invention provide a variety of techniques for using a selected alias and a selected personal identification entry (PIE) in conjunction with use of a transaction card, such as a credit card, debit card or stored value card, for example. A suitable number or other identification parameter is selected by the account-holder as an alias. The account-holder is then required to choose a PIE for security purposes. The alias is linked to the account-holder's credit card number via a database. When the account-holder enters into a transaction with a merchant, the physical card need not be present. The account-holder simply provides his or her alias and then the PIE. This can be done at any point of sale such as a store, catalog telephone order, or over the Internet. The alias and PIE are entered and authorization is returned from the credit card company. | 03-29-2012 |
20120078796 | SYSTEM AND METHOD FOR PAYMENT FOR BUSINESS REPLY MAIL - A business reply mail payment system and method is provided. A business reply mail payment system establishes a master account with the postal system for the payment of business reply mail. A plurality of mailers each establish a separate account with the payment system and transfer control of payment for business reply mail accepted under their respective permit imprints to the payment system. When the mailer will be receiving business reply mail, a request for payment of postage is made to the payment system, which processes the information related to the business reply mail. The post office acceptance site communicates with the payment system as the business reply mail is received and compares the received business reply mail with the information processed by the payment system to determine if it should be accepted or rejected. If the business reply mail is accepted, the master account is debited for payment. | 03-29-2012 |
20120084206 | SYSTEM AND METHOD FOR SECURE TRANSACTIONS AT A MOBILE DEVICE - A system and method for conducting money transfer transactions using mobile devices includes a money transfer host computer that facilitates the collection of fingerprint data for the mobile devices and personal data for users of the mobile devices. The personal data can include a user photo. In order to enable the mobile devices, both the fingerprint data and the personal data are collected, and at least the personal data is verified. To authorize transactions at an enabled mobile device, the fingerprint data and personal data are compared to reference data, and based on the comparison and on a threshold established for the comparison, a transaction is authorized or rejected. | 04-05-2012 |
20120084207 | METHODS AND APPARATUS FOR PREVENTING FRAUD IN PAYMENT PROCESSING TRANSACTIONS - A method includes receiving an authorization request for a purchase transaction, and determining whether the authorization request arose from proximity-reading a proximity payment device. The method further includes mapping a first account number included in the authorization request into a second account number associated with the first account number if it is determined that the authorization request arose from proximity-reading a proximity payment device and if the first account number is qualified for mapping. In addition, the method includes transmitting the authorization request to an issuer financial institution with the second account number substituted for the first account number in the authorization request. | 04-05-2012 |
20120084208 | METHODS AND SYSTEM FOR CARDHOLDER INITIATED TRANSACTIONS - A cardholder-initiated financial transaction using a cardholder controlled input device in communication with a payment card network and a database is disclosed. The cardholder uses a payment card issued to the cardholder by an issuer bank. An exemplary method includes the steps of storing merchant data within the database including data identifying the merchants registered to utilize the card network and receiving from the input device transaction data relating to the financial transaction. The transaction data includes an authorization request and merchant identifying data that identifies the merchant involved in the transaction. The method further includes determining that the identified merchant is registered to utilize the card network by comparing the transaction data with the merchant data stored in the database, forwarding the authorization request to the issuer bank, receiving a response to the request from the issuer bank, and automatically forwarding the response to the input device. | 04-05-2012 |
20120084209 | SYSTEM AND METHOD FOR SELECTION OF PAYMENT SYSTEMS FROM A PAYMENT SYSTEM DIRECTORY TO PROCESS A TRANSACTION - Dynamically enabling and facilitating businesses or other entities to locate and transact with payment systems for the purpose of processing payments. A customer interacts with a supplier of an item (e.g., goods or services), selects an item for purchase, and provides the supplier with payment criteria. The supplier queries a payment system directory to locate candidate payment systems for the transaction. The supplier then interacts directly with one or more of the payment systems to partially or fully process payment for the transaction. Alternatively, the supplier interacts with a gateway service, which queries a payment system directory to locate candidate payment systems and then interacts with one or more of the payment systems to process payment for the transaction. | 04-05-2012 |
20120089515 | IDENTIFICATION LEVEL GENERATION METHODS AND SYSTEMS - According to the invention, a method for approving financial transactions involving money transfer agents and individuals is disclosed. The method may include receiving a request to conduct a money transfer at a money transfer agent location characterized by a first quality level. The method may include determining that the money transfer requires a minimum agent quality level, and a minimum identification quality level of identification of the individual. The method may include inspecting a form of identification characterized by a second quality level of the requestor. The method may include comparing the first quality level to the minimum agent quality level to verify that the agent location is qualified and the second quality level to the minimum identification quality level to verify that the identification is sufficient. The method may include initiating the money transfer upon verifying that the agent location is qualified and that the identification is sufficient. | 04-12-2012 |
20120089516 | Method and system of processing financial transaction - A system for processing financial transaction includes two or more financial transaction devices, a management control linked with a financial institution network, and a financial transaction network linking the financial transaction devices with the management control, wherein the financial transaction devices are communicatively linked with each other. The financial transaction devices of a payer and a payee respectively obtain financial information of the payer and the payee. The financial information of the payer, the financial information of the payee, and payment amount of the financial transaction are consolidated in the financial transaction device to generate payment information, which is sent together with a request for financial transaction by the financial transaction device to the management control. The management control transact the payment from an account of the payer regarding to the financial information thereof to an account of the payee regarding to the financial information thereof through the financial institution network for processing the financial transaction between the payer and the payee. | 04-12-2012 |
20120089517 | LOCATION BASED TRANSACTION - A method for executing a wireless trade is provided that includes communicating with a handheld device via a wireless network and sending and receiving financial information to and from the handheld device. The financial information is associated with a trade that can be initiated by the handheld device. The method also includes authorizing the handheld device through location data, which is associated with a location of the handheld device, before executing the trade. | 04-12-2012 |
20120095913 | Overdraft Payment Balance Exception Processing - A system for managing and processing exceptions to shared global treasury limits across multiple different platforms can be utilized by an organization to eliminate inconsistent client experiences and increase overall operating efficiency. A management and processing system can decision transactions of clients (e.g., customers, users, members, account-holders, clients, etc.) through a combination of straight-through and manual processes that are utilized according to select qualifying criteria. The system provides for auto-decisioning of low-risk, low-amount transactions while enabling authorized users to manually decision and otherwise manage transactions through various workflow-driven graphical user interfaces (GUIs). The GUIs can be configured to allow transaction approvers to standardize workflow for manual processing and approval of transactions that cannot be entirely decisioned by, or are exempt from, automated straight-through processing and can further be configured to provide users with numerous viewing, reporting, routing, tracking and decision override capabilities. | 04-19-2012 |
20120095914 | Systems and methods for financial transaction through miniaturized card reader with decoding on a seller's mobile device - A financial transaction card reader device includes a housing having a slot for swiping a magnetic stripe of a financial transaction card to complete a financial transaction between a buyer and seller. A read head is in the housing, reads data stored on the magnetic stripe and for produces a signal indicative of data stored on the magnetic stripe. An output jack is adapted to be inserted into a microphone input associated with a seller's mobile device for providing the signal indicative of data stored on the magnetic stripe to the mobile device. The signal is decoded in the mobile device. | 04-19-2012 |
20120095915 | Read head device with selected sampling rate - A read head is provided that is configured to be coupled to a mobile device. The read head has a slot for swiping a magnetic stripe of a financial transaction card. The slot is utilized for a financial transaction between a buyer and seller and reads data on the magnetic stripe. A signal is produced indicative of data stored on the magnetic stripe, An output jack of the read head is adapted to be inserted at least one of the audio input port or microphone input port of the mobile device. The output jack delivers the signal to the mobile device. A sampling rate of the signal at the audio input port or a line input port of the mobile device is at least 15 kHZ. | 04-19-2012 |
20120095916 | Payment methods with a payment service and tabs selected by a first party and opened by a second party at any geographic location of the first party's mobile device - A method of paying a second party is provided. A first party accesses the names of one or more qualified second parties. The qualified second parties are second parties that, (i) have an association with the payment service, and (ii) second parties that if they do not have an established association with the payment service then they have established one prior to payment. The first party has an association with the payment service. A tab is opened by the first party that can be selected by the qualified second party at any geographic location of a first party's mobile device. The qualified second party is only able to charge a first party's financial account when the first party's mobile device is within a defined geographic area. The tab is a relationship between the first party, the payment service and the qualified second party, The qualified second party can engage in a financial transaction with the first party is within the defined geographic area. | 04-19-2012 |
20120095917 | SYSTEM AND METHOD FOR PERFORMING SECURE CREDIT CARD PURCHASES - A method and system of performing secure credit card purchases in the context of a remote commercial transaction, such as over the telephone, wherein only the customer, once generally deciding upon a product or service to be purchased, communicates with a custodial authorizing entity, such as a credit card company or issuing bank wherein such entity has previous knowledge of the credit card number as well as custodial control of other account parameters such as interest rate, payment history, available credit limit etc. The customer supplies the custodial authorizing entity with the account identification data such as the credit card number and a requested one of a possible plurality of predetermined payment categories which define the dollar amount for the purchase and specific, predetermined time parameters within which authorization by the custodial authorizing entity will remain in effect. The custodial authorizing entity then generates a transaction code which is communicated exclusively to the customer wherein the customer in turn communicates only the transaction code to the merchant instead of a credit card number. The transaction code is indicative of merchant identification, credit card account identification and a designated one of the plurality of predetermined payment categories. | 04-19-2012 |
20120095918 | Transaction alerting in a multi-network environment - Techniques are provided for generating a transaction alert for a transaction whether the transaction was processed by a first payment processing network associated with an alerting platform or the transaction was processed by a second payment processing network not associated with an alert platform. An authorization request message associated with a transaction is received by a transaction processing server configured to receive authorization request messages from a first payment network and a second payment network. If the authorization request message was routed through the second payment network, alert initiation data is transmitted to an alert platform associated with the first payment network. The alert platform is configured to apply at least one alert criterion to the alert initiation data to determine if an alert is to be generated, generate the alert, and transmit the alert to a mobile application. | 04-19-2012 |
20120095919 | SYSTEMS AND METHODS FOR AUTHENTICATING ASPECTS OF AN ONLINE TRANSACTION USING A SECURE PERIPHERAL DEVICE HAVING A MESSAGE DISPLAY AND/OR USER INPUT - Systems and methods for authenticating aspects of an online transaction using a secure peripheral device having a message display and/or user input are provided. One such method for establishing a secure communication channel between a computer peripheral device and a host includes responding to requests to authenticate the peripheral device, authenticating the host, receiving one or more messages from the host, displaying the one or more messages on a display of the peripheral device, receiving user input in response to the one or more messages, sending the user response to the host. | 04-19-2012 |
20120101944 | SYSTEM AND METHOD FOR PROCESSING MEDIA GIFTS - Various techniques are provided for the gifting between multiple electronic devices of media content provided by an online digital media provider. An offer and acceptance of a selected gift file is accomplished between a gifter device and a receiving giftee device using a near-field communication (NFC) connection. If a connection to the online provider is available, the gifter device may transmit a gift request by which the gifter's account is charged for the gift file. Thereafter, a gift file created using DRM keys associated with the giftee's account may be downloaded to the giftee device. If a network connection is unavailable, the giftee device may transfer a locked gift file and a corresponding gift license to the giftee device using a peer-to-peer connection. The giftee device may authenticate the license and unlock the gift file once a connection to the online provider is available. | 04-26-2012 |
20120101945 | IDENTITY VERIFICATION SWITCH - Methods, systems, and machine-readable media are disclosed for an identity verification switch. According to one embodiment, the method comprises receiving from an inquirer a request to verify an identity of an individual initiating a transaction. The request includes account information for an account subject to the transaction and identity information for the individual initiating the transaction. Based on the request, a verifying financial institution is selected from one or more participating financial institutions. The request is forwarded to the verifying financial institution for verification of the identity information. An answer is received from the verifying financial institution indicating results of verification of the identity information. The answer is returned to the inquirer. | 04-26-2012 |
20120109821 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR REAL-TIME ONLINE TRANSACTION RISK AND FRAUD ANALYTICS AND MANAGEMENT - Embodiments disclosed herein provide a behavioral based solution to user identity validation, useful in real-time detection of abnormal activity while a user is engaged in an online transaction with a financial institution. A risk modeling system may run two distinct environments: one to train machine learning algorithms to produce classification objects and another to score user activities in real-time using these classification objects. In both environments, activity data collected on a particular user is mapped to various behavioral models to produce atomic elements that can be scored. Classifiers may be dynamically updated in response to new behavioral activities. Example user activities may include login, transactional, and traverse. In some embodiments, depending upon configurable settings with respect to sensitivity and/or specificity, detection of an abnormal activity or activities may not trigger a flag-and-notify unless an attempt is made to move or transfer money. | 05-03-2012 |
20120109822 | CUSTOMER CONTROLLED ACCOUNT, SYSTEM, AND PROCESS - Access devices like credit cards and/or check cards have enhanced security features that allow a customer to control circumstances under which their account is accessed. Fraudsters may try to access the account without the knowledge of the consumer set controls, the system takes remedial action with reduced instances of false positives. An account is established for an account holder through a central entity, e.g. an issuer. At least one user is associated with the access device that is established for one or more transactions. Use of the access devices is defined by a set of rules defined by the central entity and are controllable by the customer, including comprising any of the account holder and the user of the account. The customer inputs, controls, and/or updates parameters associated with the customer-controllable rules. Subsequent authorization of the access devices is controlled based on the customer input and other controls. | 05-03-2012 |
20120109823 | VERIFYING THE SOURCE OF ELECTRONICALLY EXCHANGED VALUE - Computer-implemented method and system are provided for verifying a financial instrument. The method comprises performing a plurality of transactions using a source of electronically exchanged value identified by a user, recording details of the plurality of transactions, inviting the user to identify the details to a verification system, and verifying the source of electronically exchanged value based on the details provided by the user to the verification system. | 05-03-2012 |
20120109824 | MODIFIABLE AUTHENTICATION LEVELS IN AUTHENTICATION SYSTEMS FOR TRANSACTIONS - A system and method are provided for authentication. A first request for a transaction is received from a communications device, the first request comprising collation information of a customer to be authenticated and a price of a product or service to be purchased by the customer. An authentication level is set based on the price. A second request is transmitted to a mobile communications device of the customer. Authentication information is received from the mobile communications device, the authentication information comprising identification information of the customer. The authentication information is transmitted to the communications device. | 05-03-2012 |
20120116970 | REMITTANCE SYSTEM WITH IMPROVED SERVICE FOR UNBANKED INDIVIDUALS - A service provider computer receives a request for a transfer of funds from a sender to a recipient. The service provider computer makes a data record about the transaction available to a receiving financial institution. The receiving financial institution receives a visit from the recipient, issues a new payment card account to the recipient, and communicates the account number for the new account to the service provider computer. The service provider computer initiates a payment transaction in a payment card system to route the requested funds transfer from a payment card account belonging to the sender to the newly issued payment card account for the recipient. | 05-10-2012 |
20120116971 | PROCESSING LOAN TRANSACTIONS - A method includes receiving, at a client access module, a request from a client to process a loan transaction, wherein the request is associated with a particular loan system. The method also includes determining, by a processor, the particular loan system associated with the request, determining one or more rules associated with the request and a selected one of the client access module and the particular loan system, and applying, by the processor, the one or more determined rules to the request using the account information. | 05-10-2012 |
20120116972 | Electronic Payment Orders - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for generating and clearing electronic payment orders. In one aspect, a method includes generating an electronic payment order using a computer. Signature data authorizing the electronic payment order is electronically captured. The signature data includes a stroke pattern of a user signature and is captured substantially concurrently with generating the electronic payment order. The electronic payment order and the electronically captured signature are transmitted to an entity authorized to receive payment based on the electronic payment order. | 05-10-2012 |
20120116973 | Online payment system and method - System, method, and computer program product are provided for a user to send and receive P2P payments using the Internet. Through the use of a network, a user may access accounts the user has at a financial institution and direct payments to other individuals or entities using the other individuals or entities alias. In this way, the user may ensure a secure payment to a third-party through the network associated with a financial institution. The payments may be directed to individuals the user may input into the system by providing the user's alias. A user's alias may be a unique identifier of the user and tied to a financial account of that user. In this way, the sender of the P2P payments may input the recipient's alias and transfer funds via the P2P payment system without having to input the recipient's account information. | 05-10-2012 |
20120116974 | SYSTEMS AND METHODS FOR RISK TRIGGERING VALUES - Systems and methods for facilitating risk assessment for point of sale transactions utilizing at least one risk triggering value (RTV) is disclosed. An RTV is a condensed version of a set of complex risk data and strategies usually found in central processing sites. After receiving a request for payment authorization, a risk value is calculated for the request. The distributed processing site compares the risk value to the RTV to determine whether to authorize payment. If the risk value is less than or equal to the RTV, the payment is authorized while a risk value greater than the RTV will not be authorized. The central site calculates a new RTV for the account and distributes the new RTV to the distributed processing site. | 05-10-2012 |
20120116975 | SYSTEM AND METHOD UTILIZING DEVICE INFORMATION - A method for correlating information received directly from an access device operated by a user, and information from a merchant server is disclosed. The method includes receiving, at a server computer of a non-merchant entity, device information specifically associated with an access device directly from the access device, and also receiving, at the server computer of the non-merchant entity, transaction information from a merchant server. The server computer then correlates and collected information and can perform additional processing. | 05-10-2012 |
20120123940 | METHODS AND SYSTEMS FOR UNIVERSAL PAYMENT ACCOUNT TRANSLATION - A method and system of transferring value from a payer participant of a first online community website to a payee participant of a second online community website through a payment account translation system is provided. The method includes initiating a first payment request, validating that the payer and payee are registered participants of the online community, translating the payer alias into a payer pseudo-account number using business rules and community participant profiles associated with the community website from which the payment request is made, and mapping the payer pseudo-account number to a respective funding/repository account primary account number (PAN). The method further includes transmitting the PANs and a validation code to a payments network for processing through the payments network and approving the transfer of value from the payer to the payee such that the PAN of the payer is unknown to the community website. | 05-17-2012 |
20120123941 | INTERNET FACILITATION OF FRAUD SERVICES - A system and method for fraud prevention is provided. The computer based system and method comprises receiving a request for verification services by a merchant transmitted via an Internet browser based platform, performing a fraud assessment by a verification services tool resulting in a verification message, and transmitting a reply to the merchant via an Internet browser based platform including a verification message. | 05-17-2012 |
20120123942 | Global Customer Identification Network - A computerized system conducts customer identification processing for customers who remotely open accounts with personal identification information that cannot be verified through available data sources. | 05-17-2012 |
20120123943 | SYSTEM AND METHOD FOR CHECKLESS CASH ADVANCE SETTLEMENT - Methods, devices, and systems for conducting a checkless cash access settlement are provided. In one embodiment, a cash advance method includes the following: a customer initiates a cash access transaction with a financial card via a cash access system; the customer receives authorization or denial; the customer provides identification and the financial card to a cashier or attendant; the cashier or attendant validates the customer's identity, retrieves the transaction information, and completes the cash advance application; the application prints a non-negotiable instrument, such as a transaction receipt; the customer signs the receipt confirming the transaction with a physical receipt or electronic capture; the receipt image is stored electronically for subsequent transmittal to a central server; the transaction information, including the receipt image if applicable, is recorded on the central server; and the central server generates an ACH file and electronically transmits the ACH file to a designated financial institution. | 05-17-2012 |
20120123944 | Method and System Using Universal ID and Biometrics - A universal ID and biometrics systems and methods are disclosed. A method includes receiving an authentication request message originating from a user. The authentication request message includes a first identifier and a second identifier, where the second identifier includes biometric data. The method further includes determining a third identifier based on the first identifier and sending the second and third identifiers to a first server computer to determine if the second and third identifiers have a predetermined correlation. The method further includes receiving confirmation of user authentication if the identification system determines that the second and third identifiers have the predetermined correlation. | 05-17-2012 |
20120130895 | TRANSACTIONS ASSOCIATED WITH A MOBILE DEVICE - Methods and apparatus, including computer program products, for transactions associated with a mobile device are discussed. A method can include receiving a merchant identifier, sending an identification data, receiving a transaction, and processing a funds transfer. The receiving the merchant identifier is from a mobile device associated with a user registered with a central payment service. The identification data is associated with the user and the identification data includes multiple identifying data items. The transaction data details a transaction between the merchant and the user. The funds transfer is between the merchant and the user based on the transaction. | 05-24-2012 |
20120130896 | SYSTEM AND METHOD FOR IMMEDIATE ISSUANCE OF TRANSACTION CARDS - A system and method for substantially immediate issuance of transaction cards includes at least one unassigned transaction card including a storage medium having a card number encoded thereupon. The system also includes a computing system configured to receive application information from an applicant that has been provided said unassigned transaction card, and to activate the unassigned transaction card so that access to monetary funds is extended to the applicant through said unassigned transaction card, upon an evaluation of said application information indicating that the applicant has been approved for access to the monetary funds. The unassigned transaction card bears no visible marking presenting information concerning the applicant and encodes no information concerning said applicant upon the storage medium of said unassigned transaction card. | 05-24-2012 |
20120130897 | METHODS AND SYSTEMS FOR PROVIDING A DECISION MAKING PLATFORM - A method for enriching the data associated with financial transaction card transactions using a computer system is described. The method includes receiving financial transaction data from a plurality of input channels, each input channel associated with a financial transaction data format, converting the received financial transaction data into a common data format, enriching the converted financial transaction data by scoring the converted financial transaction data across a plurality of scoring engines, converting the plurality of scores relating to the financial transaction data from the scoring engines into output data, and transmitting the output data using an output manager, the output manager operable to provide the data into a format appropriate for each intended recipient. | 05-24-2012 |
20120130898 | MOBILE DIRECTORY NUMBER AND EMAIL VERIFICATION OF FINANCIAL TRANSACTIONS - Systems and methods for verifying a financial transaction based on an account number, a mobile directory number associated with the financial transaction, a mobile directory number associated with the account number, an email address associated with the account number, internet protocol address data associated with the financial transaction, and internet protocol address data associated with accesses of the email address. | 05-24-2012 |
20120136786 | METHOD AND SYSTEM FOR DIGITAL DOCUMENT MANAGEMENT ON A MOBILE DEVICE - A method and system are described for tracking a process of provisioning, by a middleware server to a portable device in a mobile payment system, electronic wallet data for authorizing a payment transaction. In an embodiment, a user request for a payment account product is transmitted by the portable device to the middleware server. In response, the middleware server initiates a provisioning process for the requested payment account product, including storing status data indicative of an initiated state of the provisioning process. The middleware server then transmits a digital document to the portable device, including information that must be viewed by the user, and updates the status data indicative of a transmitted state of the digital document. In response to receiving an indication that the digital document has been viewed, the middleware server updates the stored status data indicative of a digital document viewed state. The middleware then provisions an electronic wallet data for the requested payment account product to the portable device. | 05-31-2012 |
20120136787 | Electronic Centralized Margin Management System For Managing Actions Such As Margin Calls Under Margin Agreements - An electronic margin management system and method for facilitating margin management actions are disclosed. A communications system stores records of details of registered margin agreements and facilitates processing of the margin management actions requested from one authorized computer, over a wide area network, to another authorized computer. The system includes at least one intermediate computerized system connected to send and receive communications to each authorized computer. The intermediate computerized system is configured to receive a margin management action request, under a registered margin agreement, from an authorized computer associated with a request originator, forward a notification of the margin management action request to an authorized computer associated with a request receiver identified as a counterparty to the registered margin agreement, receive a response from the request receiver including whether it agrees or disputes the requested margin management action, and forward the response from the request receiver to the request originator. | 05-31-2012 |
20120136788 | SYSTEM AND METHOD FOR SECURE TRANSFER OF FUNDS - Systems and methods for conducting financial transactions are provided. In one example, a system for conducting financial transactions includes a transaction proposal device. The transaction proposal device includes a unique device identifier, a geographic location detector, and a digital camera. In another example, the system for conducting financial transaction also includes a transaction controller configured to receive and potentially initiate proposed financial transactions generated by the transaction proposal device. | 05-31-2012 |
20120136789 | SECURE PAYMENT SYSTEM - Systems and method for performing secure electronic payment transactions to allow merchants to perform payment processing such that the merchant is only required to identify a unique identifier of a customer account and not data specific to a particular payment device. | 05-31-2012 |
20120136790 | System and method for facilitating large scale payment transactions including selecting communication routes - A system and method for payment of payor accounts with payees preferably including a computer system of a third party payment router instructing a payee to make a payment to an account on behalf of a payor using a variety of communication routes between the router and the payee and/or the computer system of the payee, preferably using a universally accepted open system card number that is a virtual number. In some embodiments a computer system of an intermediary third party payment router communicates with a computer system of the service provider, to make payments on an end user's (payor's) account, by logging onto a payee webpage, or by IVR with a payee phone site, or by prearranged direct transmission or email or fax or texting or mail, automated to the extent possible. | 05-31-2012 |
20120143757 | Designation of Electronic Financial Transactions - An electronic financial transaction system has an identifier designation determining means for determining a designation of an identifier supplied by a prospective transactor in accordance with his circumstances; and a response means for implementing a predetermined response according to the designation of the identifier. The designation can be either “normal” or “duress”. If a “normal” identifier is given then the transactor is allowed a normal suite of transactions. If a “duress” identifier is given then no transactions are permitted, the transactor's account is frozen, and personnel are alerted to assist the transactor. Alternatively, limited transactions are permitted and the personnel alerted. | 06-07-2012 |
20120143758 | Account Transfer Techniques - Account transfer techniques are described. In one or more implementations, a user interface is output by a mobile communication device that describes funds in an account. The account is usable by the mobile communication device to purchase goods or service and the purchase performable at least in part using credentials stored in a secure element implemented in hardware of the mobile communication device. An input is received via interaction with the user interface to authorize a transfer of funds from the account associated with the mobile communication device to another account usable by another mobile communication device to purchase goods or services. | 06-07-2012 |
20120143759 | PROCESSING A FINANCIAL TRANSACTION USING SINGLE-USE FINANCIAL ACCOUNT CARD NUMBER VIA PORTABLE COMMUNICATION DEVICE - System(s), method(s), and device(s) that generate and use single-use financial account card numbers (SUFACNs) to facilitate secure processing of financial transactions are presented. A user registers a financial account(s) with a financial transaction platform (FTP), a user profile comprising user-related information is created, and a personal identification number (PIN) is associated with the user. When making a purchase locally or online, the user's portable communication device (PCD) accesses the FTP via an application or web site, the PCD synchronizes with the FTP, and the PCD and FTP each respectively generate the same SUFACN(s) based in part on time of generation and PIN. The SUFACN is presented to the seller's register component via scanning (e.g., when SUFACN is a barcode) or entering the SUFACN. The register component sends the SUFACN to the FTP, which interacts with the user's financial account(s) to facilitate payment. | 06-07-2012 |
20120143760 | Internet Payment System Using Credit Card Imaging - A system and a method for conducting credit card transactions through a mobile device of a user. The mobile device comprises an image acquisition unit and a mobile application operated by the mobile device. The system enables acquiring an image of a client's credit card, using the image acquisition unit; analyzing data of the image; outputting details of the credit card from the analysis; verifying the output details, wherein the verification is further carried out through the mobile application; verifying authorization of inputted monetary transaction, wherein the mobile application enables verifying the authorization by communicating with the billing center, associated with at least one credit company associated with the credit card over at least one communication network, wherein the communication is carried out by the mobile application using the mobile device; and conducting monetary transactions using the verified credit card details. | 06-07-2012 |
20120143761 | SOCIAL NETWORK PAYMENT SYSTEM - A method for providing social network payments includes receiving a request to make a payment. The request is associated with a social network payer and a social network payee. It is determined that the social network payer is associated with a first payment provider identifier and an authorization token, and a second payment provider identifier for the social network payee is then retrieved using the authorization token. An instruction to make a payment from the social network payer to the social network payee is then transmitted to a payment service provider. The instruction includes a payment amount, the first payment provider identifier, and the second payment provider identifier. A payment alert is also adapted for a payee social network associated with the social network payee, and the payment alert is send to a social network provider device associated with the payee social network. | 06-07-2012 |
20120143762 | METHOD OF MANAGING FRANCHISES USING CREDIT-CARD PAYMENT SYSTEM - A franchises managing credit-card payment system method includes inputting franchise customer goods selection or service use statement to a franchise client to calculate estimated payment amount, inputting customer member information to franchise client, and transmitting member information to a head office customer information server to request member authentication; receiving a customer member authentication request signal, authentication processing the information, and transmitting the authentication result to the franchise client; inputting estimated payment amount credit-card payment information to the franchise client, requesting a card company for payment approval, and receiving approval information; outputting satisfaction survey selection items for franchise service provided through a sign pad connected to the franchise client; analyzing customer satisfaction evaluation information for the franchise according to the selection items, and storing the resultant satisfaction evaluation information in a customer information server database; and switching the sign pad to a digital signature screen. | 06-07-2012 |
20120143763 | USING A FINANCIAL INSTITUTION BASED ACCOUNT FOR ULTRA-LOW LATENCY TRANSACTIONS - A system and method is illustrated for a reader to receive account data associated with an account managed by a financial institution, the account to be accessed to pay an amount associated with an ultra-low latency transaction. The system and method may also include a receiver to receive an instruction authorizing completion of the ultra-low latency transaction, the instruction generated based upon a comparison of the account data to an entry in a list that includes a plurality of account data. Additionally, the system and method may include a mechanism to allow completion of the ultra-low latency transaction. | 06-07-2012 |
20120150742 | System and Method for Authenticating Transactions Through a Mobile Device - A user may claim to have not made or allowed a transaction and that the transaction was made in error. Where it appears the user has not authorized the transaction, the funds of the transaction are returned to the user, or are charged back. Systems and methods provide a way to confirm whether or not a transaction was actually authorized by the user, thereby settling a chargeback dispute for a previously executed transaction. The method comprises receiving the dispute regarding the transaction including associated transaction data, and retrieving a digital signature associated with the transaction data, the digital signature computed by signing the transaction data. The digital signature is then verified using a public key, wherein the public key corresponds to a private key stored on a mobile device. It is then determined whether or not the transaction is fraudulent based on a verification result of the digital signature. | 06-14-2012 |
20120150743 | SYSTEM AND METHOD FOR TRANSFERRING REDEMPTION RIGHTS TO GIFT CARDS - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for managing regifting of a group gift wherein a recipient or purchaser of the gift and givers are all registered with the system using their payment accounts in advance and a policy manages money transfers for the gift. The system identifies a recipient and a recipient payment account associated with the policy that provides that upon detecting a qualifying transaction using the recipient payment account, a gift amount is transferred to the recipient payment account. The system receives a request to modify the policy based on identification of a new recipient and identifies an associated new recipient payment account. In response to the request, the system modifies the policy such that at least a portion of the gift amount is transferred to the new recipient account upon detecting the qualifying transaction using the new recipient account. | 06-14-2012 |
20120150744 | Systems and Methods for Secure and Transparent Cardless Transactions - Systems, methods, and apparatus for handling and/or authorizing payment requests by a consumer for a transaction are provided. Payment information can be sent directly from a consumer to a non-merchant, thereby allowing no new entities to obtain the payment information. Transaction identifiers can be used to facilitate communications among the entities. The payment information can be sent to the non-merchant via a merchant application with a submit payment button directed to the non-merchant so little or no deviations from standard practices are required. | 06-14-2012 |
20120158585 | ITERATIVE PROCESSING OF TRANSACTION INFORMATION TO DETECT FRAUD - A fraud management system is configured to store rules for detecting fraud, receive a transaction from a merchant, process the transaction using a first subset of rules to generate a fraud score for the transaction, and output information regarding the fraud score to the merchant to assist the merchant in determining whether to accept, deny, or fulfill the transaction. The fraud management system is further configured to receive, after outputting the information regarding the fraud score to the merchant, additional information relating to the transaction, re-process the transaction using a second subset of rules to generate an update fraud score, and output information regarding the updated fraud score to the merchant to assist the merchant in determining whether to accept, deny, or fulfill the transaction. | 06-21-2012 |
20120158586 | AGGREGATING TRANSACTION INFORMATION TO DETECT FRAUD - A fraud management system is configured to receive a transaction from a merchant; select rules to use to process the transaction; process the transaction using the selected rules to generate a set of alarms; and generate an alarm score for each of the alarms. The fraud management system is further configured to combine the alarms with alarms from one or more other transactions to form a combined set of alarms; sorting alarms, in the combined set of alarms, into groups based on attributes of the transaction; generate a group score, for each group, based on at least one of the alarm scores for at least one alarm in the group; generate a fraud score, for the transaction, based on one or more of the group scores; and output information regarding the fraud score to the merchant to notify the merchant whether the transaction is potentially fraudulent. | 06-21-2012 |
20120158587 | TELLER TERMINAL AND RECEPTION PROCESS METHOD - A teller terminal for handling a deposit/withdrawal request from a customer. The teller terminal is comprised of a scanner, an identifying unit, a determining unit, and a display unit. The scanner generates a check image based on check received from the customer and generate a slip image based on a slip related to the check. The identifying unit extracts check information from the check image and extracts slip information from the slip image. The determining unit determines whether or not corresponding pieces of information between the check information and the slip information match each other. The display unit displays the determination result determined by the determining unit. | 06-21-2012 |
20120158588 | RECEPTION PROCESS SYSTEM AND METHOD - A system is provided for processing a deposit/withdrawal request from a customer. A bank terminal includes an identifying unit that extracts check information from the check image and extracts slip information from the slip image, an input unit that receives an input information, and a confirmation determining unit that determines, based on at least one of the check information, the slip information, and the input information from the input unit, whether or not a reconfirmation for at least one of the information is necessary. A communication unit transmits the check information, the slip information, and the determination result to a center terminal having a second display unit. The second display unit displays the check information and the slip information and displays information determined necessary to be reconfirmed in a way so as to be distinguished from information determined not necessary to be reconfirmed. | 06-21-2012 |
20120158589 | Social Media Payment Platform Apparatuses, Methods and Systems - The SOCIAL MEDIA PAYMENT PLATFORM APPARATUSES, METHODS AND SYSTEMS (“SocialPay”) transform message posts to social networks via SocialPay components into payment transaction receipts social merchant-consumer bridging offers. In one implementation, the SocialPay obtains a user social pay initiation trigger, and obtains user social data from a social networking site. The SocialPay identifies a social pay command within the user social data. In one implementation, the SocialPay, in identifying the social pay command within the user social data, parses the user social data, and extracts a social pay command string within the user social data. The SocialPay determines a payor identifier, a payee identifier, and a payment amount using the social pay command string. Based on the identified social pay command, the SocialPay initiates a funds payment transaction. | 06-21-2012 |
20120158590 | Financial fraud prevention method and system - According to an embodiment of the present invention a method for detecting fraudulent use of credit cards is herein described. In the case when possible fraudulent use is detected the issuer or other responsible party, such as a third-party mediator, temporarily blocks the credit card account. This can be accomplished, for example, by making an artificial excess of credit limit of the credit card or otherwise temporarily closing a credit card account. In some embodiments an issuer or responsible party may send a warning message and/or alert to a client's mobile phone informing of an upcoming temporary block of client's credit card. | 06-21-2012 |
20120158591 | CONSUMER AUTHENTICATION SYSTEM AND METHOD - A method for authenticating a consumer. The method includes receiving an authorization request message associated with a consumer conducting a transaction with a portable consumer device. A challenge message is sent to the consumer, where the challenge message is dynamic or semi-dynamic. A challenge response message is received from the consumer, and an authorization response message is sent to the consumer. The authorization response message indicates whether or not the transaction is authorized. | 06-21-2012 |
20120166334 | METHODS AND SYSTEMS FOR IDENTITY BASED TRANSACTIONS - Pursuant to some embodiments, methods, systems, apparatus, computer program code and means for conducting a transaction by a user are provided that include receiving, during a purchase transaction, transaction data and a unique user identity identifier associated with a payment card; providing the identity identifier and the transaction data to a payment network; requesting verification of the transaction data and identity identifier; receiving a reply to the verification request of the transaction data and the identity identifier; associating a payment account number with the identity identifier; and authorizing the purchase transaction based on the payment account number associated with the identity identifier. | 06-28-2012 |
20120166335 | TRANSACTION INTEGRITY - In one embodiment a secure controller comprises a memory module, and logic to receive one or more information components pertaining to a transaction initiated by a user on a controller separate from the secure controller, present, on a display device, a Turing test in combination with one or more information components associated with the transaction, receive a user input in response to the Turing test, authenticate the transaction when the user input corresponds to the answer to the Turing test and the personal identifier matches a personal identifier associated with the user. Other embodiments may be described. | 06-28-2012 |
20120166336 | SYSTEM AND METHOD FOR PREPAID ACCOUNT REPLENISHMENT - A system and method for replenishing prepaid account balances is disclosed. Consumers are issued a prepaid account card similar to a credit card. Funds are added to prepaid accounts at retail locations by providing cash or equivalent to a clerk along with the prepaid account card. The clerk swipes the prepaid account card in an authorization terminal and rings up the transaction in a manner similar to a normal credit card transaction. The transaction is transmitted to a bank which processes the transaction and notifies a replenishment system that the customer has added value to the prepaid account. The replenishment system provides the customer with a confirmation number associated with the transaction. The replenishment system notifies a prepaid engine for the prepaid account. The prepaid engine updates the user's prepaid account balance, thereby making funds available for future purchases by the user. The user may also add funds to the prepaid account via an automated teller machine (ATM), via the Internet or by dialing certain feature codes on a wireless telephone. | 06-28-2012 |
20120166337 | NEAR FIELD COMMUNICATION TERMINAL FOR PERFORMING SECURE PAYMENT AND SECURE PAYMENT METHOD USING THE SAME - A Near Field Communication (NFC) terminal for performing secure payment includes an NFC unit and a control unit. The NFC unit communicates with an external payment terminal and the payment unit transmits results obtained by processing transaction information and an electronic signature value of the transaction information to the payment terminal using the NFC unit. The payment terminal requests an external payment server to perform payment. An authentication certificate applet included in the payment unit generates the electronic signature value of the transaction information. An electronic wallet applet included in the payment unit transmits the results obtained by processing the transaction information and the electronic signature value to the payment terminal. | 06-28-2012 |
20120166338 | METHOD AND SYSTEM FOR UNIVERSAL APPLICATION FOR TRANSACTION PROCEDURES WITH NFC TECHNOLOGY - The present invention relates to a method and a system for a universal application for transaction procedures with NFC technology. This application allows to realize an application distribution network for accessing services by means of mobile terminals provided with a proximity wireless communication technology or “proximity based communication protocol” (e.g. NFC, Bluetooth, RFID). The present invention envisages a “universal” mobile application, which is capable of modifying its function for each real application used, in terms of process and user interface (or “user experience”), e.g. menu layout, colors, logos, functionalities, commands. | 06-28-2012 |
20120166339 | PAYMENT SYSTEM, PURCHASING SYSTEM, AND METHOD FOR PERFORMING A PLURALITY OF PAYMENT PROCESSES - A payment system which facilitates the payment of very small monetary amounts, making the payment more secure for the user. The payment system for at least one online shop is provided using an identification device for recording at least one identification number of a shopper system an interface device for receiving and confirming direct debit orders, a memory device for storing the direct debit orders and a processing device. The processing device is configured to monitor the total of the debit amounts in relation to the identification number and to request a user of the shopper system to register after a predetermined time interval and/or on exceeding a predetermined value of the total payable, in order to settle at least part of the total payable. | 06-28-2012 |
20120166340 | METHOD AND SYSTEM TO AUTOMATE PAYMENT FOR A COMMERCE TRANSACTION - A method and system to automate payment for a network-based commerce transaction provide a buyer an option to enable an automatic payment service, wherein automatic payment service automatically provides payment to a seller upon a termination event of a network-based commerce transaction. Payment information of the buyer is provided to a network-based payment system upon the occurrence of the termination event. | 06-28-2012 |
20120166341 | DEVICE INCLUDING AUTHENTICATION GLYPH - A method is disclosed. It includes displaying, by a device, an authentication image including a plurality of image elements comprising a set of image elements, wherein the image elements in the set of image elements are located at a set of positions on a display screen. The method also comprises receiving, at the device, a glyph having a configuration corresponding to the set of image elements from a user while the authentication image is displayed. The method further comprises determining if the glyph is authentic, and initiating a payment transaction after receiving the glyph. | 06-28-2012 |
20120173422 | INSTANT BANK FUND TRANSFERS - Embodiments for instant banking funds transfers include methods and systems for providing financial services. The financial services provided include instant top up of an account with a Financial Service Provider (FSP), instant account verification (using instant deposit confirmation); instant direct debit; and instant withdrawal or funds out. In one or more embodiments, an FSP has an agreement and a cash account with a partner bank; other banks, where users of the financial services have accounts, also have cash accounts with the partner bank. Thus, any transfers can be made within the partner bank and instantaneously. The FSP receives cash during a normal three to five day settlement period with standard bank transfers. Financial services provided may include instant top up of funds (instant credit), instant bank confirmation (using random deposits), instant debit, and instant withdrawal (or funds out). | 07-05-2012 |
20120173423 | LOCAL MANAGEMENT OF PAYMENT TRANSACTIONS - It is determined whether a payment device has come into association with a special spending environment. If so, an authorization and guarantee for a predetermined amount of funds to cover multiple transactions within the special spending environment is requested from an issuer of the payment device. If successful, a balance, based on the predetermined amount of funds, is established on a local authorization platform that is associated with the special spending environment and that is separate from the issuer of the payment device. A series of purchases with the payment device, within the special spending environment, is tracked. For each given purchase of the series of purchases, the balance is adjusted to reflect the value of the given purchase. At some point, it is determined that the series of purchases is ended. An additional step includes, subsequent to determining that the series of purchases is ended, communicating with the issuer to request payment as to only that portion of the predetermined amount of funds actually spent in the series of purchases. A further step includes facilitating an immediate release of the guarantee as to that portion of the predetermined amount of funds not actually spent in the series of purchases. The immediate release is subsequent to determining that the series of purchases is ended. A special callback command to summon back funds is also contemplated. | 07-05-2012 |
20120173424 | PAYMENT SYSTEM AND METHOD BY IDENTIFYING FINGERPRINTS - A fingerprint of a user can be used to identify the user. A cloud server of a data center receives the fingerprint of the user from a fingerprint input device. The cloud server of the data center determines if the received fingerprint matches a predetermined fingerprint pre-stored in the cloud server. A prompt is displayed for prompting the user for payment on a display device of a client connected to the cloud server, in response to a determination that the received fingerprint matches the predetermined fingerprint. | 07-05-2012 |
20120173425 | MOBILE DEVICE AND METHOD FOR PROVIDING SECURITY FUNCTION - A mobile device and a method for enhancing a security function through a password combination by using posture-based passwords as well as number-based passwords are provided. In the method, the mobile device receives its posture information when one of predefined security events is selected, and compares the received posture information with predefined security information. If the received posture information is identical to the predefined security information, the mobile device performs a particular function of the selected security event. | 07-05-2012 |
20120173426 | RAPID ONLINE PAYMENT SYSTEM - A method for online payments includes receiving an instruction to start a payment application. Payment tag information is then received and sent over a network. Product information that is associated with the payment tag information is then received over the network and displayed on a first payment page that includes a request for payment account credentials. The first payment page is provided through the payment application immediately following the sending of the payment tag information. Payer account credentials are then received through the payment application and sent over the network. Payer account information is then received over the network and displayed on a second payment page that includes a payment confirmation indicator. The second payment page is provided through the payment application immediately following the first payment page. A selection of the payment confirmation indicator is then received through the payment application and sent over the network. | 07-05-2012 |
20120173427 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR FACILITATING SECURE COMMERCIAL TRANSACTIONS - A secure financial transactions system generally includes a card that can be used a credit card, ATM card or debit card having a personal identification number (PIN) that can include a panic digit or panic PIN. The panic digit or panic PIN can be used to begin an emergency notification sequence including sending emergency signals and video transmissions from the commercial transactions machine. The card can include several biometric devices as well as financial transaction records. The card can include data to interact with data gathered from biometric devices on the ATM or POP devices. The card can then be interfaced with a personal computer. The card could also be made into other formats such as a ring, key chain, or other jewelry. | 07-05-2012 |
20120173428 | DATA TRANSFER ACROSS A NETWORK - Requests for retrieval of data items from another data processing apparatus include embedded objects having executable class functions for performing operations at the target data processing apparatus. This has the advantages of the request implicitly sending data as well as requesting data and allows the request to perform a test on data within an object (such as a comparison with parameters of the request to determine whether the request may be satisfied). Objects within the request may be embedded within each other with different encryption and compression applied to the different objects. As well as achieving communication efficiencies, the ability to selectively encrypt components of a request may be used to provide greater security. For example, a store may be able to interpret the request, while credit details may be separately encrypted such that only a bank may decrypt that subcomponent of the request. | 07-05-2012 |
20120173429 | Location Based Authorization of Financial Card Transactions Systems and Methods - Systems, methods, and software for identifying location based rules related to a network connected device are described. A network connected device may transmit a set of data identifying the location of the device and an identifier unique to the device to a server. The server may also receive an action request, wherein the action request is associated with the identifier. The server may select a rule in a database to address the action request, the rule applicable to the identifier and location of the device. Various embodiments related to financial card transactions, access to financial information, emergency services contact, and electronic message filtering are also addressed. | 07-05-2012 |
20120179609 | AUTOMATIC IMAGE ANALYSIS AND CAPTURE - In general terms, some embodiments of the present invention relate to methods and apparatuses for automatically analyzing and/or capturing an image of a deposit item for use in a deposit transaction. In some embodiments, a method is provided that includes: (a) generating, by a remote capture device, an image of a deposit item, where the generating the image is based at least partially on the deposit item being exposed to the remote capture device; (b) determining, automatically by the remote capture device, that the image is satisfactory for reading deposit item information from the image, where the deposit item information is associated with the deposit item; and (c) performing, automatically by the remote capture device, a predetermined action, where the performing the predetermined action is based at least partially on the determining that the image is satisfactory for reading deposit item information from the image. In some embodiments, the performing the predetermined action includes capturing, automatically by the remote capture device, the image of the deposit item. In other embodiments, the performing the predetermined action includes prompting, automatically by the remote capture device, a user of the remote capture device to capture the image. In some embodiments, the method occurs in substantially real-time and/or while the deposit item is being exposed to the remote capture device. | 07-12-2012 |
20120179610 | ELECTRONIC PURCHASING AND FUNDS TRANSFER SYSTEMS AND METHODS - An electronic transaction method, funds transfer apparatus and method for facilitating a funds transfer. The methods comprise sending information from a purchaser or payor to a funds transfer system separate from a vendor system or payee, validating and confirming personal financial information at the funds transfer system, and transferring funds from a purchaser or payor account to the vendor or a payee account without exposing either party's financial and account information to the other. Additionally, a funds transfer apparatus is disclosed comprising connections to a payor and payee system and mechanisms for receiving and validating party and transaction information and a mechanism for transferring funds from one party to the other. | 07-12-2012 |
20120185389 | OFFSETTING FUTURE OVERAGE FEES - In general terms, embodiments of the present invention relate to methods and apparatuses for prepaying, covering, avoiding, negating, and/or otherwise offsetting future overage fees. For example, in some embodiments, a method is provided that includes: (a) receiving one or more payments for offsetting one or more future overage fees, where the one or more payments are associated with an account; (b) receiving transaction information associated with a transaction, where the transaction involves the account, and where the transaction is initiated after the receiving the one or more payments; (c) determining, based at least partially on the transaction information, that the account will incur an overage as a result of the transaction; (d) determining that the one or more payments are sufficient to offset an overage fee associated with the overage; and (e) authorizing the transaction based at least partially on the determining that the one or more payments are sufficient. | 07-19-2012 |
20120185390 | METHOD AND SYSTEM FOR PROVIDING WIRELESS VULNERABILITY MANAGEMENT FOR LOCAL AREA COMPUTER NETWORKS - A Software-as-a-Service (SaaS) based method for providing wireless vulnerability management for local area computer networks. The method includes providing a security server being hosted by a service provider entity to provide analysis of data associated with wireless vulnerability management for a plurality of local area computer networks of a plurality of customer entities, respectively. The method includes creating a workspace for wireless vulnerability management for a customer entity on the security server and receiving configuration information associated with the workspace. The method also includes supplying one or more sniffers to the customer entity. The method includes receiving at the security server information associated with wireless activity monitored by the one or more sniffers at premises of the customer entity and processing the received information within the workspace for the customer entity using the security server. The method includes metering usage of the workspace for wireless vulnerability management for the customer entity. | 07-19-2012 |
20120185391 | CUSTOMIZABLE SIGN-ON SERVICE - Techniques are described for providing customizable sign-on functionality, such as via an access manager system that provides single sign-on functionality and other functionality to other services for use with those services' users. The access manager system may maintain various sign-on and other account information for various users, and provide single sign-on functionality for those users using that maintained information on behalf of multiple unrelated services with which those users interact. The access manager may allow a variety of types of customizations to single sign-on functionality and/or other functionality available from the access manager, such as on a per-service basis via configuration by an operator of the service, such as co-branding customizations, customizations of information to be gathered from users, customizations of authority that may be delegated to other services to act on behalf of users, etc., and with the customizations that are available being determined specifically for that service. | 07-19-2012 |
20120185392 | METHOD AND APPARATUS FOR DONATING MONEY TO A CANDIDATE OR ORGANIZATION - A method of donating money to a political candidate or organization using a credit card, and a system of networked computers, comprising: using a credit card to make a purchase, transferring purchase amount information and purchaser information electronically to a central computer | 07-19-2012 |
20120185393 | SYSTEM AND PROCESS FOR AUTOMATICALLY ANALYZING CURRENCY OBJECTS - A method, system, and computer program product for analyzing images of visual objects, such as currency and payment cards, captured on a mobile device in determining their authenticity, and total amount of value. The system may be used in verifying the authenticity of hard currency, to count the total amount of the currency captured in one or more images, and to convert the currency using real time monetary exchange rates. The mobile device may also be used to verify the identity of a credit card user utilizing images of the card holder's face and signature, name on the card, card number, card signature, and card security code. Computerized content analysis of the captured images on the mobile devices as compared to images stored on a database facilitates a merchant processing a customer's payment and a financial institute accepting a cash deposit. | 07-19-2012 |
20120185394 | SYSTEMS AND METHODS FOR REDUCING THE UNAUTHORIZED RESALE OF EVENT TICKETS - The present invention relates to (a) a ticket management system for purchasing and allocating event tickets; (b) a ticket authentication system for authenticating tickets presented at an event; and (c) a secondary market system for the authorized resale of event tickets. These systems, individually and collectively, facilitate the reduction of ticket scalping by requiring the production of valid registered valued identification for the purchase, allocation, and resale of event tickets and the admittance to an event. | 07-19-2012 |
20120185395 | SYSTEMS AND METHODS FOR ELECTRONICALLY CIRCULATING A CONDITIONAL ELECTRONIC CURRENCY - Persistent, electronically anchored currency notes (PEAC notes) may be generated by a transaction provider and maintained in a datastore. Each PEAC note may be associated with a respective unique identifier and asset held by a custodian. The transaction provider may provide for assigning ownership of the PEAC notes to various entities and/or transferring ownership therebetween. Ownership transfers may be performed by the transaction provider while maintaining the PEAC notes in the datastore and/or maintaining the asset(s) associated therewith their respective custodian(s). A PEAC note may be tied to one or more usage conditions, which restrict transfers thereof. The usage conditions may be removed when release conditions are satisfied. | 07-19-2012 |
20120185396 | SERVICE PROVIDING METHOD AND ACCESS GATEWAY - Embodiments of the present invention provide a service providing method and an access gateway. The method includes: obtaining a network capability product and service level agreement SLA information that corresponds to the network capability product; authenticating, according to the network capability product and the SLA information that corresponds to the network capability product, an SP that uses the network capability product for access; and allowing the SP to provide a service for a terminal user if the authentication is successful. | 07-19-2012 |
20120191606 | Social network transaction processing system - A system for transferring funds using social network connections. The system sends application programming interface (API) requests to social networks to obtain “friend” information and create accounts into which funds are deposited and which may be retrieved by recipients via hyperlinks in messages provided through social networks. The system may also be used to request funds from social network friends. The system provides benefactor friends fund requests in the form of social network messages, which allow the benefactors to access the system and provide funds to a user via hyperlinks in the messages. | 07-26-2012 |
20120191607 | Methods And Systems For Facilitating Or Executing Electronic Payment Transactions - A method for executing an electronic payment transaction may include initiating or receiving notification of the initiating of a communication session with a wireless data connection enabled computing device, sending a payment transaction request during the communication session for the wireless data connection enabled computing device, and receiving a payment confirmation or a rejection of the payment transaction request to conclude the payment transaction. | 07-26-2012 |
20120191608 | Method and Apparatus for Regulating Electronic Mail Transmission through Funds Verification - Methods and apparatus for regulating the transmission of electronic mail message are provided. The amount of funds necessary to transmit the electronic mail message to its destination is calculated and the sender's account is queried to ensure sufficient funds exist. If so, the electronic mail message is sent to its destination and the amount of the funds are deducted from the sender's account. If not, the electronic mail message is held and the user is allowed to deposit sufficient funds to allow for delivery. In determining the necessary amount of funds, variables can include the geographic location of the destination and the size of the electronic mail message and its attachments. | 07-26-2012 |
20120191609 | SECURE AND EFFICIENT PAYMENT PROCESSING SYSTEM - A method for carrying out commercial transactions includes establishing a transaction processing system on an electronic communications network, and establishing an account within the transaction processing system for a corresponding account holder. One or more descriptions of acceptable future commercial transactions related to the account are obtained from the account holder. Commercial transactions carried out via the transaction processing system are administered, and it is verified that administered commercial transactions related to the account meet one or more of the descriptions obtained. | 07-26-2012 |
20120191610 | ONLINE PAYMENT FOR OFFLINE PURCHASE - A user receives a unique purchase identifier from a merchant during an offline purchase transaction. The merchant holds the purchase. The user makes an online payment at a later time by entering the purchase identifier through a payment provider, who retrieves details of the purchase and processes the payment if the user approves of the payment. The merchant is notified and releases or ships the purchase to the user. | 07-26-2012 |
20120197799 | Secured Charge Card - According to one or more aspects, financial transactions may be conducted using a financial card product, such as a charge card secured through a security interest in an asset. The asset may be the available balance in an interest-bearing checking account (e.g., a DDA account), a brokerage account, or other type of account that may hold funds/assets. The available balance may be monitored in real-time (or near real-time) such that the available spending limit on the secured charge card may be floating (e.g., dynamic). In one example, backend systems may be configured to monitor in real-time an available balance in security accounts in order to prevent spending over the amount of secured funds. In addition, in some examples, more than one account may be associated with a secured charge card such that the total spending limit on the card is greater. The total spending limit may be calculated through arithmetic (e.g., sum) of the available balance of each of the associated accounts. | 08-02-2012 |
20120197800 | Hybrid Secured Credit Card - According to one or more aspects, financial transactions may be conducted using a financial card product, such as a hybrid secured credit card that permits transactions up to a predetermined total credit limit, and then allows transactions in excess using a security interest in assets. The asset may be the available balance in an interest-bearing checking account (e.g., a DDA account), a brokerage account, or other type of account that may hold funds/assets. The available balance of the asset(s) may be monitored in real-time (or near real-time) such that the available spending limit on the hybrid secured credit card may be floating (e.g., dynamic). In one example, backend systems may be configured to monitor in real-time an available balance in security accounts in order to prevent spending over the amount of secured funds. In addition, in some examples, more than one account may be associated with the card such that the total spending limit on the card is greater. The total spending limit may be calculated through arithmetic (e.g., sum) of the available balance of each of the associated accounts. | 08-02-2012 |
20120197801 | MERCHANT PAYMENT SYSTEM AND METHOD FOR MOBILE PHONES - A method and system for processing a payment for a transaction with a merchant by a customer via a customer's mobile phone is disclosed. The method and system utilizes a customer mobile identifier comprised of an Issuer's BIN and the customer's telephone number. The merchant enters a customer's mobile phone number into the POS terminal and a transaction amount. This generates a transaction authorization request message in the POS terminal. The request is sent to the customer's mobile phone. The customer then selects a funding account. The amount and merchant's authorization request is then sent to the funding institution to authorize the transaction. Upon verification of account balance, the institution debits the funding account, and sends an approval message to both the customer's mobile phone and to the merchant's POS terminal. | 08-02-2012 |
20120197802 | METHOD AND SYSTEM FOR DETERMINING FRAUD IN A CARD-NOT-PRESENT TRANSACTION - A computer system for fraud detection associated with a card-not-present payment card system is provided. The system includes a network host site and an interchange network including a processor communicatively coupled to a memory device for storing data and to the network host site wherein the processor is programmed to receive a card transaction authorization request message from a merchant, route the card transaction authorization request to the network host site to perform CNP fraud risk scoring, and based on the criteria of the card transaction authorization request, call at least one of a plurality of fraud scoring models defined for criteria of the transaction authorization request. The processor is further programmed to calculate the fraud risk score based on the current transaction authorization request data and an updated card account profile, and transmit the message to an issuer of the payment card for approval of the request. | 08-02-2012 |
20120197803 | DUAL LAYER AUTHENTICATION FOR ELECTRONIC PAYMENT REQUEST IN ONLINE TRANSACTIONS - Increasing the security of online payment requests by introducing a dual-layer authentication system for accessing the funds and/or credit through payment cards is described. An additional check regarding the identity of a card user to be included within a traditional security protocols for these cards, wherein the additional check is based on an authentication channel which is external to the user's card. A device owned by the legitimate card owner certifies that the user of the card at any given instant is the legitimate owner of the card and not someone else. To process this additional information, a connection by means of a proximity based device is established. | 08-02-2012 |
20120203695 | SYSTEMS AND METHODS FOR FACILITATING SECURE TRANSACTIONS - A system for secure transactions receives an authorization request from a mobile device, the mobile device having received the authorization request by scanning a QR code and/or other encoded data. The system processes the authorization request using one or more transaction accounts that are paired to the mobile device, and transmits a response indicating approval or denial of the authorization request. | 08-09-2012 |
20120203696 | SYSTEMS AND METHODS FOR FACILITATING SECURE TRANSACTIONS - A system for secure transactions receives an authorization request from a mobile device, the mobile device having received the authorization request by scanning a QR code and/or other encoded data. The system processes the authorization request using one or more transaction accounts that are paired to the mobile device, and transmits a response indicating approval or denial of the authorization request. | 08-09-2012 |
20120203697 | SYSTEMS AND METHODS FOR FACILITATING SECURE TRANSACTIONS - A system for secure transactions receives an authorization request from a mobile device, the mobile device having received the authorization request by scanning a QR code and/or other encoded data. The system processes the authorization request using one or more transaction accounts that are paired to the mobile device, and transmits a response indicating approval or denial of the authorization request. | 08-09-2012 |
20120203698 | Method and System for Fraud Detection and Notification - Methods and systems for an automated dialer enhancements. The methods may analyze transactions. The analysis of the transactions may comprise of triggers which are met when a delta threshold is exceeded, when an immediate threshold is exceeded, or when a rule is met. A notification strategy is implemented after a trigger is fired and accounts may be blocked or held. Reappearing transactions are flagged and escalated. | 08-09-2012 |
20120203699 | Conducting Commerce Between Individuals - Receiving payment includes the establishment, at a first server, a transaction record including information identifying a payment amount, a first account to be credited by the payment amount, and a second account to be debited by a debit amount. A financial authorization network performs an authorization analysis on at least the second account. The second account is debited if the authorization analysis is successfully completed, and the first account is directly credited by the payment amount to conclude the transaction. Risk analysis may be performed for each individual. Payment is integrated with shipping. | 08-09-2012 |
20120209768 | PAYMENT SYSTEM WITH LOCATION RESTRICTIONS - A method for restricting a payment from an account based on a user location includes receiving at least one payment location restriction for an account from a user device over a network. The at least one payment location restriction includes at least one authorized user location or at least one unauthorized user location for making payments using the account. | 08-16-2012 |
20120209769 | MONEY TRANSFER SYSTEM FOR SENDING MONEY TO AN INSTITUTION FOR THE BENEFIT OF A RECEIVER ASSOCIATED WITH THE INSTITUTION - A computer system is operated to transfer money to a receiver via an institution. A send transaction request including a send amount is received from a sender for a money transfer. The sender is prompted to provide identifying information about the institution and the receiver. The identifying information about the receiver includes the receiver's name. A compliance and/or regulatory review of the receiver is then conducted. If the receiver passes the compliance and/or regulatory review, the receiver name and send amount are provided to the institution in a receive transaction. | 08-16-2012 |
20120209770 | System and Method for Monetizing Video Content - Methods and systems are presented for displaying multimedia content on a user computing device where the content includes several segments. A first segment of the content is displayed on the computing device and following display of the first segment of the content, a request for payment associated with a second segment of the content is displayed to the user. A user payment request approval for the second segment of the content is communicate from the user computing device to a service server, and the service server may respond with an approval or rejection. In a further potential embodiments, segments of the video may be defined and set by a content server, and varied based on feedback and history related to user payments. | 08-16-2012 |
20120209771 | MONITORING FOR OFFLINE TRANSACTIONS - A technique for tracking conversion of an online offer includes tracking online and/or offline transactions. A customer accepts an offer provided by a merchant and submits his or her account information so that he or she may receive a reward for satisfying criteria associated with the offer. Transactions of the merchant are then monitored at the payment processor level to determine whether the customer satisfies the purchase criteria. Therefore, online and offline conversion can both be tracked. Further, the merchant is able to determine the overall effectiveness of advertising campaigns by analyzing the number of offers that are both accepted and satisfied. | 08-16-2012 |
20120209772 | PAYMENT SYSTEM WITH TIME RESTRICTIONS - A method for restricting a payment from an account based on a time includes receiving at least one payment time restriction for an account from a user device over a network. The at least one payment time restriction includes at least one authorized payment time or at least one unauthorized payment time for making payments using the account. The at least one payment time restriction is associated with the account in a database. A request to make a payment using the account is received over the network. A current time is determined. The request is authorized or denied based, at least partly, on whether the current time is included in the at least one authorized payment time or the at least one unauthorized payment time. | 08-16-2012 |
20120209773 | FRAUD ALERTING USING MOBILE PHONE LOCATION - A location of a transaction or payment request is compared with a location of a user device to determine whether the distance is great enough to send an alert for a possible fraudulent transaction. The user device location may be predicted based on a last known location and information about the area of the last known location and movement of the user device. | 08-16-2012 |
20120209774 | Redirecting or Returning International Credit Transfers - Redirecting or returning international credit transfers is described. In one embodiment a system for redirecting or returning international credits is described including a gateway operator that receives a credit transfer from a foreign originator, compares routing and account numbers of the credit transfer with a predetermined table of routing and account numbers, and forwards the credit transfer based on the comparison of the routing and account numbers with the predetermined table, an Automated Clearing House (ACH) that presents the credit transfer to a Receiving Depository Financial Institution (RDFI) for clearing and settlement, and a wire transfer service that presents the credit transfer to the RDFI for clearing and settlement. In another embodiment a method for redirecting or returning international credits is described. | 08-16-2012 |
20120209775 | SOCIAL NETWORK TRANSACTION PROCESSING SYSTEM - A system for transferring funds using social network connections. The system sends application programming interface (API) requests to social networks to obtain “friend” information and create accounts into which funds are deposited and which may be retrieved by recipients via hyperlinks in messages provided through social networks. The system may also be used to request funds from social network friends. The system provides benefactor friends fund requests in the form of social network messages, which allow the benefactors to access the system and provide funds to a user via hyperlinks in the messages. | 08-16-2012 |
20120215691 | SYSTEM AND METHOD FOR PAYMENT TRANSFER - A system and method for payment transfer between a paying party and a recipient party. Optionally and preferably, payment transfer is made by using a prepaid card, which has many security and administrative advantages. Other payment methods may also optionally be used. Also, optionally a plurality of micropayments are provided to a plurality of recipients. The paying party is optionally a media content provider while the recipient party is optionally a user who provides content, although many different combinations of paying/recipient parties may optionally be implemented. | 08-23-2012 |
20120215692 | Method and Apparatus for Allowing Secured Overdrafts of Reloadable Debit Card Accounts - The invention discloses a reloadable debit card which may be overdrawn by authorized merchants thus allowing future and recurring payments to be made via ACH transactions against this debit card. In addition, the cardholder may repay indebtedness simply by depositing funds onto the reloadable debit card. | 08-23-2012 |
20120215693 | METHOD AND SYSTEM FOR MANAGING DATA AND ENABLING PAYMENT TRANSACTIONS BETWEEN MULITPLE ENTITIES - A system for conducting payment transaction includes a network-enabled server that communicates with one or more user devices, other network-enabled server computers, and a payment processing network server computer. The network-enabled server facilitates transactions between one or more merchants and users by a managing data flow and interactions between the merchants and the users, providing storage area for storing of all transaction related documents, and providing seamless integration with a payment processing network for payment processing. | 08-23-2012 |
20120215694 | METHOD FOR THE QUASI REAL-TIME PREPARATION AND CONSECUTIVE EXECUTION OF A FINANCIAL TRANSACTION - The present invention relates to a method for the quasi real-time preparation and consecutive execution of a financial transaction between a payor and a payee. The method comprises the steps of:
| 08-23-2012 |
20120215695 | MANAGING RECURRING PAYMENTS FROM MOBILE TERMINALS - Equipment and methods for facilitating service provisioning in a system that include a payment processor, a number of service providers and a mediator that mediates information exchange between the payment processor and service providers, and a mobile terminal operated by payment card holder. In some disclosed embodiments, service provisioning can be facilitated in cases where the payment processor must reside in a strictly regulated Payment Card Industry (PCI) compliant environment and the service providers operate servers that are not PCI-compliant. | 08-23-2012 |
20120215696 | MANAGING RECURRING PAYMENTS FROM MOBILE TERMINALS - Equipment and methods for facilitating service provisioning in a system that includes a payment processor, a number of service providers and a mediator that mediates information exchange between the payment processor and service providers, and a mobile terminal operated by payment card holder. In some disclosed embodiments, service provisioning can be facilitated in cases wherein the payment processor must reside in a strictly regulated Payment Card Industry (PCI) compliant environment and the service providers operate servers that are not PCI-compliant. | 08-23-2012 |
20120215697 | METHOD AND SYSTEM FOR FACILITATING ONLINE PAYMENTS BASED ON AN ESTABLISHED PAYMENT AGREEMENT - A method and system for facilitating online payments are disclosed. According to one aspect of the present invention, a payment agreement is established at a payment service provider that defines terms of a payment relationship between a merchant and a user. The establishing of the payment agreement includes linking the payment agreement with a payment account of the merchant or user stored at the payment service provider. After establishing the payment agreement, a payment request associated with a transaction is received, whereby the payment request includes a unique identifier to identify the payment agreement stored at the payment service provider. Based on a verification that the payment request complies with terms of the payment agreement, the payment request is processed. | 08-23-2012 |
20120221468 | DIRECT CONNECTION SYSTEMS AND METHODS - Embodiments of the invention are directed to passing a plurality of communications directly from a merchant to a payment processing network. A first communication may include payment information in an authorization request, while a second transaction may include non-payment transaction data. The communications may be linked with a transaction identifier. In other embodiments, a capture file process is disclosed where capture files are generated by the payment processing network, and transactions are subsequently cleared and settled. | 08-30-2012 |
20120221469 | DYNAMIC HOLD DECISIONING - Embodiments of the present invention relate to methods and apparatuses for determining, communicating, and/or executing hold decisions for deposit items. For example, a method is provided that includes: (a) receiving information associated with a deposit item; (b) determining a deposit amount for the deposit item; (c) determining a payee account to receive the deposit item; (d) determining a hold limit for the payee account; and (e) determining a hold decision for the deposit item based at least partially on a comparison of the deposit amount to the hold limit. In some embodiments, the hold limit is based at least partially on (a) an account balance associated with the payee account, and (b) one or more other characteristics associated with the payee account. | 08-30-2012 |
20120221470 | USER AUTHENTICATION AND SECURE TRANSACTION SYSTEM - A system, method, and apparatus to minimize fraud at the user, merchant, and/or financial institution level. A control computer provides authentication and/or transaction processing. The control computer has access to databases comprising user, merchant, enrollment, transaction, duplicate, and fraudulent activity data. Parties may enroll in the system via an enrollment computer and conduct transactions through the system via a merchant computer. Users are issued hardware identification keys containing an encrypted user code. Access keys can be required in addition to an authorized user key to conduct certain actions. Keys are copy protected and can comprise a computer operating system. The hardware profile of client devices can be recorded. Parties may specify minimum and/or maximum security levels and restrict transactions. Transactions with parties can be authenticated without sending user personal data to the parties. Users can control transfer of information from their personal communication device to other devices. | 08-30-2012 |
20120221471 | Electronic System for Selecting the Best Card from a Collection of Consumer Credit, Debit and Discount Cards - A method, system and computer program product for enabling completion of purchase transactions by retrieving purchase card information from an electronic database of consumer cards and applying the appropriate card to the transaction. The database, managed by a central card authority, stores client account information for cards such as debit, credit, phone, and discount cards, which are accessible via a unique, secure login/access credential, such as a username and password combination. During registration with the central card authority, a client classifies key/important factors to consider when performing purchases. The central card authority is accessed by the client during purchases from a retail facility and/or other purchasing environment. The central card authority automatically selects the best card to utilize during a purchase, after weighing the important purchasing factors related to the credit, debit, phone, and discount cards registered with the central card authority. | 08-30-2012 |
20120221472 | SYSTEM AND METHOD FOR FACILITATING A FINANCIAL TRANSACTION WITH A DYNAMICALLY GENERATED IDENTIFIER - Instead of a PIN which is associated with an account and provides access to an account, a dynamically generated card identifier (dynamic CID) is used to verify that the consumer currently possesses the transaction card at the time of purchase and/or is the true card owner. At the time of purchase, a token generates a dynamic CID, which changes with each transaction. A consumer enters the dynamic CID into a pre-existing CID field in an electronic order form. The merchant then sends the dynamic CID to a card authorization system within an authorization request. The card authorization system issues a response to a merchant system via a pre-existing authorization message indicating that the transaction card and dynamic CID have been validated, thereby adjusting the fraud risk associated with the transaction. | 08-30-2012 |
20120226611 | METHOD AND SYSTEM FOR CONDUCTING A MONETARY TRANSACTION USING A MOBILE COMMUNICATION DEVICE - A method and system for facilitating a secure monetary transaction by using a mobile communication device. In one aspect, the present invention provides a convenient and secure mechanism for conducting a monetary transaction by using OpenID, Open Authorization, and information residing on the SIM token of the mobile device to facilitate the transaction. | 09-06-2012 |
20120226612 | SYSTEM AND METHOD FOR PROCESSING AN ON-LINE TRANSACTION - A system and method for processing an order from a user. The system comprises an entry field displayed on a user's computer operable to receive a single code string having first and second portions and a transaction processor circuit in communication with the user's computer being configured to capture a single code string inputted by the user into the entry field and to separate the single code string into the first portion and the second portion and a database containing a plurality user's account each having a corresponding password. The method comprises, at the transaction processor circuit, separating the single code string into first and second portions, confirming that the first portion corresponds to a user's account, authenticating the identity of the user by comparing the second portion to a password corresponding to the user's account and causing a status code to be displayed on the user's display. | 09-06-2012 |
20120226613 | SYSTEMS AND METHODS FOR ADAPTIVE IDENTIFICATION OF SOURCES OF FRAUD - A fraud detection engine is provided that analyzes transactions for fraudulent transactions. The transactions may include credit card or debit card transactions. The fraud detection engine may identify possible sources of fraud. The fraud detection engine may identify possible phony acceptors that masquerade as genuine merchants. The fraud detection engine may identify compromising points where accounts become compromised and are prone to fraudulent transactions thereafter. The fraud detection engine may receive and analyze transaction data in real-time or in batch mode. The fraud detection engine may use fuzzy logic. The fraud detection engine may use artificial intelligence such as case-based reasoning or business rules. | 09-06-2012 |
20120226614 | Group Electronic Purchase - Payment for a purchase is facilitated wherein members of a group contribute to the payment. A memory can store account information for a plurality of contributing users and for a purchasing user. A processor can be operable to receive a communication indicating an agreement of each of the contributing users to participate in a group purchase transaction. The participation can include transferring money from the contributing users to the purchasing user. The processor can be further operable to access accounts of the contributing users and the purchasing user, transfer money from the accounts of the contributing users into the account of the purchasing user, and authorize the group purchase transaction with a merchant for the purchasing user. In this manner, a more expensive item may be purchased, such as for a gift, than may be purchase by an individual member of the group. | 09-06-2012 |
20120226615 | CARD-LESS FINANCIAL TRANSACTION - Systems (and corresponding methodologies) that facilitate card-less financial transactions are provided. The innovation enables card-less ATM (automated teller machine) transactions such as cash withdrawals, transfers, balance inquiries, etc. In aspects, customers can set up an ‘electronic wallet’ account based upon a pre-set range or otherwise. Accordingly, access to the ‘electronic wallet’ is granted or denied based upon responses to challenges presented. | 09-06-2012 |
20120233072 | CONDUCTING FINANCIAL TRANSACTIONS BASED ON IDENTIFICATION OF INDIVIDUALS IN AN AUGMENTED REALITY ENVIRONMENT - Embodiments of the invention are directed to methods and apparatuses for conducting financial transactions based on identification of individuals in an augmented reality environment. The method includes capturing a video stream using a mobile computing device; analyzing, using a computing device processor, the video stream to distinguish between individuals and objects; identifying an individual in the video stream; authenticating the identity of the individual; and conducting the transaction after the individual is authenticated. The method may also include presenting indicators associated with the user, the identified individual, or the financial transaction. | 09-13-2012 |
20120233073 | Universal Value Exchange Apparatuses, Methods and Systems - The UNIVERSAL VALUE EXCHANGE APPARATUSES, METHODS AND SYSTEMS (“UVE”) transform cross-ecosystem currency exchange instructions via UVE components into cross-ecosystem currency exchanges. In one embodiment, the UVE may obtain a cross-ecosystem currency exchange instruction and determine one or more sources and destinations based on parsing the cross-ecosystem currency exchange instruction. The UVE may identify currency types associated with the sources and the destinations and determine exchange rates of the currency types relative to a standard currency. In one implementation, the UVE may obtain currency exchange restrictions and conditions associated with the sources and the destinations and generate a currency exchange flow path for currency transfer from the sources to the destinations. The UVE may also issue currency transfer requests to the sources and the destinations, determine that the cross-ecosystem currency exchange has been completed and provide a notification of completion of the cross-ecosystem currency exchange. | 09-13-2012 |
20120233074 | Targeted Benefit Account - Exemplary embodiments provide a single financial account that may contain funds in either an actual or a notional balance from one or more payment, benefit, and/or entitlement programs with the funds being made available to an account holder through the use of a multipurpose financial account card that may be used for transactions. The account may accept funds from various non-governmental sources and prevent comingling of funds where comingling is not permitted or enable comingling of funds where permitted or encouraged. The access to and use of the funds may be governed by one or more hierarchical rules based on the type of funds' that determine the funds application to the transaction. | 09-13-2012 |
20120233075 | Systems and Methods for Processing Benefits - Systems and methods for processing, for example, childcare benefits include: issuing a benefit card to a childcare customer; receiving a start time for childcare service at a childcare provider, the start time recorded by using the benefit card at a terminal located at the childcare provider at the start of childcare service; receiving an end time for childcare service at the childcare provider, the end time recorded by using the benefit card at a terminal located at the childcare provider at the end of childcare service; computing the childcare benefit eligibility based on the start time, the end time and benefits available for the childcare customer; and paying the childcare provider a payment based on the computed benefit eligibility. | 09-13-2012 |
20120239571 | SYSTEM AND METHOD FOR USE IN CHARGING AN ELECTRICALLY POWERED VEHICLE - A method for use in operating a vehicle charging device based on an identifier provided to the charging device by a wireless transmission device. A registration device receives a first signal indicating a transmitter identifier from a wireless transmission device and an account identifier. The transmitter identifier is associated with the account identifier by the registration device. A second signal indicating the transmitter identifier is received from the wireless transmission device at a charging device. The charging device determines whether the account identifier associated with the received transmitter identifier is associated with an authorized account and provides electrical energy to a vehicle when the account identifier is associated with an authorized account. A financial transaction may be initiated against a payment account associated with the transmitter identifier based on the quantity of electrical energy provided. | 09-20-2012 |
20120239572 | SYSTEMS AND METHODS FOR PERFORMING FINANCIAL TRANSACTIONS USING ACTIVE AUTHENTICATION - A financial transaction method includes receiving a request to perform a financial transaction at a financial institution, generating a single-use transaction key for the financial transaction, and storing at least a first portion of the transaction key in a storage medium. The transaction key is transmitted to a user that requested the financial transaction, and an authorization request including at least a second portion of the transaction key is received from a merchant. The second portion of the transaction key received from the merchant is compared to the first portion of the transaction key to determine if the transaction should be authorized. An authorization message is transmitted to the merchant if the second portion of the transaction key received from the merchant matches the first portion of the transaction key. The financial transaction is funded from an account of the user if the financial transaction is authorized. | 09-20-2012 |
20120239573 | METHODS FOR PURCHASES USING CUSTOMER COMPUTER - Methods for purchasing of goods or services over the internet. A customer has a customer account set up at a bank with associated account information. The account information includes verification information for verification parameters, such as authorized computer identification, authorized delivery addresses, authorized user identification, authorized telephone caller identification, and/or other account information. An order is placed by a user via an ordering computer which provides order information. Such order information includes verification variables used by the bank. Verification and/or authentication using one or more variables of the customer account information is used by the bank to validate the order before assuring payment to the merchant. | 09-20-2012 |
20120239574 | METHODS AND SYSTEMS FOR ELECTRONIC COMMERCE VERIFICATION - A computer system for fraud detection in a payment card transaction system is provided. The computer system is programmed to receive a card transaction authorization request message for a payment card transaction initiated with a merchant that includes a plurality of data elements to be verified and a verification request indicator, determine whether the verification request indicator is valid, transmit the request message and verification request indicator to an issuer associated with the payment card, and receive a card transaction authorization response message from the issuer that includes an issuer authorization decision and a verification indicator associated with each data element verified by the issuer. The verification indicator indicates a status of a verification of the data element with data stored in one or more databases of the issuer. The computer system is further programmed to transmit the card transaction authorization response message to the merchant. | 09-20-2012 |
20120239575 | Wireless Payment Method and Systems - A method for conducting a transaction is disclosed. The method includes using a first portable electronic device, and directly transmitting a request for payment to a second portable electronic device through a wireless link. Then, the second portable electronic device transmits an approval of the request for payment to the first portable electronic device. One of the first and the second portable electronic devices then sends the request for payment to a payment hub service. The payment hub service then facilitates the transfer of funds from a payer institution to a payee institution to complete the transaction. | 09-20-2012 |
20120239576 | MOBILE COMMERCE AUTHENTICATION AND AUTHORIZATION SYSTEM - The mobile commerce authentication and authorization system allows a user of a currently existing mobile wireless communications instrument to conduct financial transactions, including purchases, across a wireless communications system using location data to authorize and authenticate the user and the transaction. The location of the mobile wireless communications instrument and the location of a vendor point-of-sale device are matched with a payment sum. Authentication of the mobile wireless communications instrument user is achieved at least by application of the position and/or location determinable features of the mobile wireless communications instrument, the position and/or location of a point-of-sale device of a vendor or merchant where the instrument user seeks to purchase goods or services, and the payment sum entered on the point-of-sale device. A transaction matching subsystem located in a wireless customer server hub may assist in processing the location data and the payment sum across the wireless communications network. | 09-20-2012 |
20120246071 | SYSTEM AND METHOD FOR PRESENTMENT OF NONCONFIDENTIAL TRANSACTION TOKEN IDENTIFIER - In an exemplary embodiment, a method for leveraging a payment token comprising a non-confidential number (i.e., “cellcard number”), such as a phone number associated with a user's portable computing device (“PCD”), to effect purchase transactions against one of possibly a plurality of value accounts associated with the non-confidential number comprises presenting a cellcard number for purchase of goods, requesting that a value account associated with the cellcard number be debited and, before debiting the value account and completing the purchase transaction, transmitting a request for authorization of the transaction to the user's PCD. | 09-27-2012 |
20120246072 | AUTHORIZING AN ADVANCE PAYMENT BASED ON PERFORMER DATA - An authorization machine may be used by an authorizing entity to aggregate and analyze multiple reports that are pertinent to a performer of entertainment. The authorization machine may determine the performer's potential earnings for performing at an event to occur in the future. This determination may be based on one or more revenue-related reports that describe past transactions attributable at least in part to the performer. The authorization machine may then determine a likelihood that the performer will actually attain the potential earnings by performing at the event. This likelihood may be determined as a risk score based on one or more sentiment-related reports that describe the performer's popularity. Based on the potential earnings and the likelihood of attaining them, the authorization machine may authorize an advance payment corresponding to the performer. | 09-27-2012 |
20120246073 | SYSTEMS AND METHODS FOR TRANSFERRING TRANSACTION INSTRUCTIONS FROM A REMOTE REPOSITORY TO A MERCHANT WEBSITE USING A TRANSACTION AGENT - Systems and methods for transferring transaction instructions from a remote repository to a participating merchant website using a transaction agent are provided. A user is provided an option of checking out of a merchant website by using a transaction assistant option that requires the user to be authenticated with an activity server. Subsequent to successful authentication, the pre-stored transactional instructions such as user payment method details, the shipping information, and the like are accessed from a payment store and transferred to the transaction terminal at the merchant website for completion of the transaction. | 09-27-2012 |
20120246074 | Service Enhancements Using Near Field Communication - A near field communication (NFC) mobile device may obtain location information from a NFC terminal device that is communicating with the NFC mobile device. A data transfer link may be established between the NFC mobile device and a mobile telecommunication network. The mobile telecommunication network may prompt the NFC mobile device to obtain location information from the NFC terminal device. The mobile telecommunication network may then receive the location information from the NFC mobile device via the data transfer link, and may subsequently determine a location of the NFC mobile device using the location information. | 09-27-2012 |
20120246075 | SECURE ELECTRONIC PAYMENT METHODS - This invention presents methods for secure electronic funds transfer and using electronic credit cards and debit cards in conducting purchases and making payments on the internet, over the phone, and when customer is not present. Methods described provide for generating instances of encrypted pay identifiers or pay identifier records, both of which are payer and receiver specific. Said pay identifiers are used in place of credit cards, debit cards, check numbers, and bank accounts, and as generated, are unique per transaction. Said pay identifiers if copied illegally cannot be used in a different transaction, therefore it discourages identity theft. Presented methods are perfect for use in hand held devices and in local, remote, and near field communication (NFC) payment applications. | 09-27-2012 |
20120246076 | CREDIT CARD FRAUD PREVENTION SYSTEM - An object of the present invention is to prevent a fraudulent use of a credit card such as spoofing. | 09-27-2012 |
20120254032 | MOBILE WIRELESS COMMUNICATIONS DEVICE CONFIGURED TO AUTHORIZE TRANSACTION BASED UPON MOVEMENT SENSOR AND ASSOCIATED METHODS - A transaction processing system includes an authorization server and an authorization server. A transaction terminal includes a first near field communication (NFC) device and is configured to perform a transaction based upon the authorization data. A mobile wireless communications device includes a second NFC device, at least one movement sensor, and a processor. The processor is configured to send a transaction request via the second NFC device to the first NFC device of the transaction terminal, and send detected data representing a pattern of movement detected by the at least one movement sensor to the authorization server. The authorization server is configured to generate authorization data based upon the detected data. The transaction terminal is configured to perform the transaction based upon the transaction request and the authorization data. | 10-04-2012 |
20120254033 | VIRTUAL ACCOUNTS LINKED TO FINANCIAL ACCOUNTS - Virtual accounts having alphanumeric identifiers different from an alphanumeric identifier of a financial account are linked to the financial account. Financial transactions performed in relation to the virtual accounts result in changing the current value of the financial account. The virtual accounts themselves do not have a current value apart from a current value of the financial account to which the virtual accounts are linked. Performance of the financial transactions in relation to the virtual accounts does not expose the alphanumeric identifier of the financial account that would otherwise be exposed if the financial transactions were performed in relation to the financial account. A given financial account is also linked to another financial account. Performance of a financial transaction in relation to this given virtual account thus results in changing the current value of one of the financial accounts to which it is linked. | 10-04-2012 |
20120254034 | METHOD FOR PERFORMING ACQUIRER ROUTING AND PRIORITY ROUTING OF TRANSACTIONS - A financial processing system for determining a financial network for routing an electronic transaction includes a network BIN database including a plurality of terminal routing profiles. Each routing profile includes at least a corresponding bank identification number (BIN) and a prioritized list of preferred financial networks of an associated terminal created by a transaction acquirer. The financial processing system provides a BIN file including a plurality of BINs and indicating financial networks having claimed priority over any of said BINS from the plurality. From the routing profile of a terminal, the financial processing system determines a financial network preferred by the transaction acquirer for routing said electronic transaction, and from the BIN file, determines if at least one network flag is marked indicating a network's claim of priority over the BIN. The financial processing system then selects a financial network for routing the electronic transaction based on at least one of the BIN file information and the routing profile. | 10-04-2012 |
20120254035 | PORTABLE ELECTRONIC DEVICE WITH SPENDING DETECTING FUNCTION AND SPENDING DETECTING METHOD - A portable electronic device with a spending detecting function is provided. The portable electronic device stores a predetermined expense value. The portable electronic device detects a current expense of the portable electronic device periodically or in a predetermined condition. The portable electronic device determines whether the current expense of the portable electronic device is greater than the predetermined expense value stored in the data storage, and is prevented from paying the current expense if the current expense of the portable electronic device is greater than the predetermined expense value stored in the data storage. | 10-04-2012 |
20120254036 | INFORMATION PROCESSING DEVICE AND METHOD, PROGRAM AND INFORMATION PROCESSING SYSTEM - An information processing device includes a communication device detection section which detects a communication device which performs proximity communication and a common processing section which performs common processing with regard to a plurality of the communication devices based on unique information which are acquired from the communication devices which are detected in a case where the plurality of communication devices are detected. | 10-04-2012 |
20120254037 | CARDS, DEVICES, SYSTEMS, AND METHODS FOR PAYMENT FUNCTIONALITY SELECTION - A user is provided with a GUI that may allow the user to change functionality associated with a non-battery-powered card, a battery-powered card, a payment sticker, or another device (e.g., a mobile telephonic device). The GUI may be provided on, for example, a display screen of a device (e.g., mobile telephonic device or tablet computer) as an application for that device. The GUI may be provided by a website so that a user views the GUI from a web-browser. At any time, for example, a user may change additional functionality performed at payment. A user may change the additional functionality for a card or a button of a card. In this manner, a user may change that a button on a powered card performs a check-in operation for a check-in service to receives a coupon, if a coupon is available for that transaction, from the a coupon-service. | 10-04-2012 |
20120254038 | CARDS, DEVICES, SYSTEMS, AND METHODS FOR ADVANCED PAYMENT FUNCTIONALITY SELECTION - A user is provided with a GUI that may allow the user to change functionality associated with a non-battery-powered card, a battery-powered card, a payment sticker, or another device (e.g., a mobile telephonic device). The GUI may be provided on, for example, a display screen of a device (e.g., mobile telephonic device or tablet computer) as an application for that device. The GUI may be provided by a website so that a user views the GUI from a web-browser. At any time, for example, a user may change additional functionality performed at payment. A user may change the additional functionality for a card or a button of a card. A remote facility may initiate a piggyback transaction, credit transaction, and/or other functionality based on the selected functionality be a user. | 10-04-2012 |
20120254039 | MULTI-VARIABLE TRANSACTION SYSTEM AND METHOD - A system for optimization of variables is provided. The system includes a buyer finance system for receiving asset data and buyer finance data. A seller variable system receives the asset data and the buyer finance data and applies a seller variable distribution to generate seller transaction state data. A finance variable system receives the asset data and the buyer finance data and applies a finance variable distribution to generate finance transaction state data. A variable optimization system receives the seller transaction state data and the finance transaction state data and generates transaction approval data. | 10-04-2012 |
20120254040 | MOBILE WIRELESS PAYMENT AND ACCESS - Embodiments of systems, methods, and devices are disclosed for enabling wireless mobile devices to be automatically detected and used as fare media on vehicles in a transit and/or transportation system. Embodiments include detecting a wireless mobile device and utilizing a unique identifier of the wireless mobile device to track a transit user's entry to and exit from a transit vehicle. Embodiments further include causing the wireless mobile device to display a fare payment indicator, allowing the transit user to use the wireless mobile device to show proof of payment if so solicited by a fare inspector. A corresponding fare can be calculated and paid for in a variety of ways. | 10-04-2012 |
20120259779 | SYSTEM AND METHOD FOR CASHLESS PEER-TO-PEER PAYMENT - Embodiments of the present invention provide a method for a server performing a wireless payment transaction, comprising: providing a server web page or native application including options for a user selecting a role as payer or payee; requesting information from the payee including a transaction ID provided by the server; requesting information from the payer including the transaction ID; initiating an authorization of the transaction on a credit or debit account of the payer; initiating a transaction to credit the payee's account; and completing the transaction with the payer by initiating the offline clearing of the transaction. | 10-11-2012 |
20120259780 | METHOD, TERMINAL AND SYSTEM FOR PROVIDING DATA TRANSMISSION AND FINANCIAL TRANSACTION BASED ON THE POSITION OF MOBILE TERMINALS HAVING SHORT-RANGE COMMUNICATION FUNCTION - Method and terminal for performing a financial transaction based on a relative position between terminals. A system for performing a financial transaction based on a relative position of mobile terminals includes: a user terminal configured to generate payment data in association with a transaction amount and to deduct the transaction amount from a payer account; a transaction terminal configured to receive the payment data from the user terminal by use of short-range communication and to add the transaction amount corresponding to the payment data to a payee account; and a financial server configured to approve the financial transaction based on the payment data, wherein the payment data is determined by a positional relationship between the user terminal and the transaction terminal. | 10-11-2012 |
20120259781 | BROKER-MEDIATED PAYMENT SYSTEMS AND METHODS - In certain embodiments of systems and methods for conducting payment transactions between a payer and a payee, the payer selects one or more payment sources from various funding sources and accounts available to the payer, and instructs a payment broker's server to perform payment authorization and/or payment routing and clearing services on the payer's behalf. The payment broker's server notifies the payer and/or the payee of the payment authorization status and, if approved, instructs the funding source to send the payment to or for the payee without divulging the payer-selected funding source or account to the payee. | 10-11-2012 |
20120259782 | MULTIPLE TOKENIZATION FOR AUTHENTICATION - Embodiments of the present invention are directed generally to systems, methods, and apparatuses for authenticating a cardholder using multiple tokenization authentication. Embodiments of the invention are directed at a method. The method includes receiving at a first entity a first token from a consumer and determining a second token associated with the first token. Once the second token is determined, the second token is sent to a server computer at a second entity. The server computer then determines an account identifier associated with the second token and processes a transaction using the account identifier. | 10-11-2012 |
20120259783 | SYSTEM FOR PERSONAL AUTHORIZATION CONTROL FOR CARD TRANSACTIONS - An authorization system allows for cardholder-provided parameters to a personal authorization subsystem. The parameters can be selected by the cardholder to limit the authorizations that would otherwise be granted on the card. The parameters can indicate limits by frequency, dollar amount, merchant, geographic location, time of day, combinations thereof, or the like. Authorization for a given transaction, even where authorized by an issuer and a network operator, might be denied based on self-constraints set by the cardholder. In some variations, messages are sent to the cardholder based on constraints set by the cardholder and transactions might be approved and messaged, or denied and messaged. | 10-11-2012 |
20120259784 | FRAUD AND REPUTATION PROTECTION USING ADVANCED AUTHORIZATION AND RULES ENGINE - Systems and methods are presented for analyzing a credit card or other financial transaction and, based on whether a score for the transaction meets or exceeds a user-selected threshold, sending a transaction notification message to a consumer's electronic device such as a cell phone. | 10-11-2012 |
20120265680 | METHODS AND SYSTEMS FOR ROUTING PAYMENT TRANSACTIONS - Methods and systems for routing payment transactions electronically involve interrogating by computer logic each payment transaction received by a payments interface processor to identify a payment destination and a payment source and to determine, according to pre-defined parameters, whether the payment transaction is eligible for processing via an internal payment transaction processor of the financial institution that minimizes processing costs. Eligible payment transactions may be routed, for example, to an internal debit or credit card processor or ACH processor, and ineligible payment transactions may be routed to external card processing networks. | 10-18-2012 |
20120265681 | DYNAMIC CREDIT LIMIT INCREASE - In general terms, embodiments of the present invention relate to methods and apparatuses for dynamically increasing a credit limit associated with a credit account. For example, in some embodiments, a method is provided that includes: (a) receiving transaction information associated with a transaction, where the transaction involves a credit account, and where the credit account has a credit limit; (b) determining, based at least partially on the transaction information, that at least a predetermined portion of the credit limit (e.g., 90% of the credit limit, the total credit limit, etc.) will be used as a result of the transaction; and/or (c) increasing the credit limit based at least partially on the determining that at least a predetermined portion of the credit limit will be used. In some embodiments, the method further includes: (a) determining, after increasing the credit limit, that the credit account has available credit sufficient to cover the transaction; and (b) authorizing the transaction based at least partially on the determining that the credit account has available credit sufficient to cover the transaction. | 10-18-2012 |
20120265682 | Methods and Systems Using Contactless Card - It is desirable to implement security features that can prevent the unauthorized use of a customer's sensitive account information from an RFID sticker. The methods and systems described herein attempt to resolve the deficiencies with the conventional RFID stickers. In a more secure implementation, a financial institution allows a customer to activate or deactivate the account for use with the RFID sticker by submitting a request to the financial institution using internet banking, mobile banking, SMS texting, or other communications method. | 10-18-2012 |
20120265683 | Upgrading of Recurring Payment Cancellation Services - A method of reducing chargebacks due to a cancelled recurring payment, wherein the payment occurs within a card-based financial network, and wherein the network includes a database of unauthorized recurring charges and a defined chargeback procedure. The method generally includes the step of upgrading a recurring payment cancellation services file based on predefined occurrences relating to the identifying of cancelled recurring payments. | 10-18-2012 |
20120265684 | Message Routing Using Logically Independent Recipient Identifiers - Embodiments are directed to methods for routing messages using logically independent recipient identifiers and server computers operable to implement those methods. In one embodiment, an authorization request message is received at the server computer from a sending institution. The authorization request message comprises a non-financial institution identifier and a recipient identifier separate from the non-financial institution identifier, the non-financial institution identifier identifying a non-financial institution, the recipient identifier associated with a recipient, wherein the authorization request message requests authorization for a transaction between a sender and the recipient. The server computer then determines the non-financial institution from a number of different non-financial institutions, routes the authorization request message to the non-financial institution, and receives, from the non-financial institution, an authorization response message, the authorization response message indicating whether or not the transaction is approved or not approved. | 10-18-2012 |
20120265685 | System and Method for Physical-World Based Dynamic Contactless Data Emulation in a Portable Communication Device - This invention involves, in part, a system for automatically selecting a credential among a plurality of credentials on a portable communication device based on a geo-location of the portable communication device and based on a user preference, for use in an electronic wallet transaction. The system includes a geo-location device configured to detect the geo-location of the portable communication device; a location identification service unit configured to be activated by a pre-determined user input, and configured to determine a merchant where the portable communication device is most likely to be located based on said geo-location; means for storing preferences corresponding to the plurality of credentials; and means for automatically determining which of the plurality of credentials to use for the electronic wallet transaction based on the preferences. | 10-18-2012 |
20120265686 | ELECTRONIC TRANSACTION SECURITY SYSTEM AND METHOD - A computerized method for generating a time-limited number for use in a payment card transaction involving a payment card issued by a financial institution. The payment card comprises an original payment card number. A first plurality of digits of the original payment card number is provided to a processor. The first plurality of digits are predetermined digits associated to the financial institution. A desired expiration date through which the time-limited number is valid for acceptance in the payment card transaction is provided to the processor. A program is executed by the processor to set a first plurality of digits in the time-limited number to the first plurality of digits in the original payment card number, generate a first number corresponding to the desired expiration date, set a second plurality of digits in the time-limited number to the first number, and output the time-limited number. | 10-18-2012 |
20120265687 | METHOD AND APPARATUS FOR MANAGING TRANSACTIONS - A system receives account access information from a user. The account is then accessed using the received access information. Data is harvested from a web page associated with the account or received from another financial data source. The user's ability to access the account is authenticated based on the obtained information. | 10-18-2012 |
20120271764 | FINANCIAL TRADE METHOD AND TRADE SYSTEM USING MOBILE DEVICE FOR THE SAME - A financial trade method arranges a combo-chips card internally on a mobile device for trading. The mobile device selects one of the combo-chips card which combines a plurality of chip cards therein via an application program, and the mobile device progresses to swipe in a non-contact sensing mode. After sensing, the mobile device identifies for user thereon according to a request from a financial server, and the mobile device then transmits identification data to the financial server after identifying. Therefore, the financial server determines whether the trade is successful and completed after comparing with the identification data. | 10-25-2012 |
20120271765 | ROUTING OPTIMIZATION - A system and method are disclosed for routing optimization. A gateway processing service receives a first ordered list of payment processing networks associated with a first condition. The first ordered list comprises a higher priority payment processing network and a lower priority payment processing network. A second ordered list received by the gateway processing service comprises a higher priority payment processing network and a lower priority payment processing network. An authorization request message for a transaction is received by the gateway processing service. If the first condition is satisfied, the gateway processing service routes the authorization request message according to the first ordered list. If the first condition is not satisfied, the gateway processing service routes the authorization request message according to the second ordered list. | 10-25-2012 |
20120271766 | REQUEST MONEY SOCIAL NETWORKING APPLICATIONS - In example embodiments, a system and method provides receiving a funds request that contains an identifier to uniquely identify a first member of a first social network, an identifier to uniquely identify a second member of a second social network, and an amount of funds to be exchanged between the first and the second member. The information in the funds request is received via a user interface provided by the first social network that is customized to the first member. A funds authorization from the second member is received. An exchange of the amount of funds between an account held by the first member of the first social network and an account held by the second member of the second social network based on the receiving of the funds authorization is implemented. The first and the second social network are each a community of members that share a common interest. | 10-25-2012 |
20120271767 | SYSTEM AND METHOD FOR ELECTRONIC TRANSACTION VERIFICATION - A system and method for authenticating a physical address submitted in an online communication is disclosed. An online communication comprising a physical address to be verified is received. A verification identification (VID) is requested and received. A transaction verification document (TVD) comprising an indicia indicative of the VID is generated. An electronic copy of the TVD is transmitted. Verification data produced in response to dispatch of a physical embodiment of the TVD is received, wherein the physical embodiment is generated from the electronic copy. The physical address is authenticated based at least in part on the verification data. | 10-25-2012 |
20120271768 | PAYMENT TRANSACTION PROCESSING USING OUT OF BAND AUTHENTICATION - Systems, apparatuses, and methods for increasing the security of electronic payment transactions, such as eCommerce transactions conducted over the Internet. A transaction approval or authorization mechanism uses an out of band process to provide authentication or identification data that has previously been registered by a user and associated with the user's payment device or account. The out of band authentication data may be provided in response to a message sent to a user's mobile phone, where the message is generated in response to entering the user's phone number into a form that is provided when the user engages in an electronic payment transaction using a desktop computer. The data may include a digital signature and associated digital certificate that is used to authenticate the user. | 10-25-2012 |
20120278235 | Electronic Envelope Budget Planning and Control System - Described herein is a method of implementing an electronic envelope budget planning and control system. Such a system includes establishing sub-accounts which have criteria limiting consumer spending of such sub-accounts substantially simultaneously with purchasing transactions by requiring funding of a transaction to meet budgeting criteria and funding limits before such a transaction can be funded at the point of sale. | 11-01-2012 |
20120278236 | SYSTEM AND METHOD FOR PRESENTMENT OF NONCONFIDENTIAL TRANSACTION TOKEN IDENTIFIER - A method and system for completing a purchase transaction includes receiving the non-confidential number to effect a purchase transaction from a caller identifier and requesting that a value account associated with the non-confidential number be debited, wherein the debit amount is associated with the purchase transaction. A request for authorization is transmitted to an operator of at least one of portable computing device and a landline phone, wherein the request seeks authorization to debit the value account. The at least one value account may comprise a credit account in which the telephone number may form part of the primary account number (PAN) governed by the ISO/IEC 7812 card number standard. | 11-01-2012 |
20120278237 | Method, System and Mobile Device for Distributing Gift Certificate - A method for distributing a gift certificate may be provided that includes: receiving information on an affiliate identifier recognized by a user terminal device; receiving payment information of a user of the user terminal device from an affiliate terminal device; and calculating a remaining amount of the gift certificate of the user or a mileage of the user on the basis of the payment information. | 11-01-2012 |
20120278238 | Account Permanence - A system and method for using derived account identifiers. The derived account identifiers are associated with a single permanent account identifier. Each derived account identifier is associated with a communication channel or portable consumer device. | 11-01-2012 |
20120278239 | INSTANT AVAILABILILTY OF ELECTRONICALLY TRANSFERRED FUNDS - A system and method for making proceeds of a transaction available to a user before the transaction is completed is provided. The system may be part of an on-line system or traditional merchant configured to facilitate payments or fund transfers from users. In example embodiments, a request from a first entity to conduct a transaction involving a first value is received. Funds of the transaction are caused to be released prior to the transaction clearing a financial institution. Based on the transaction being rejected by the financial institution, at least a portion of the first value is charged against a credit source. | 11-01-2012 |
20120278240 | Method and System to Verify the Identity of a User - A method and system to verify the identity of a user are described. The system may include a communications module to receive a billing telephone number and a private data segment associated with a user; an address detector to obtain a street address associated with the user; a private data processor to obtain one or more identification records, utilizing the obtained street address and the private data segment; and a matching module to compare the one or more identification records with the private data segment associated with the user to generate a match result. | 11-01-2012 |
20120284185 | Image-Based Financial Processing - Image-based processing of sources of financial information for financial transactions is provided. A device is enabled to acquire one or more images including a representation of a source of financial information. The device can validate the source, independent of the financial information in a preliminary analysis. If the source is validated, one or more images are used to acquire the financial information. The financial information is then validated. If the financial information is valid, authorization of the financial transaction can be initiated. | 11-08-2012 |
20120284186 | Automated Political Risk Management - A risk management method and system for facilitating analysis and quantification of risk associated with politically exposed persons is disclosed. A computerized political risk management system maintains a database relating individuals to politically sensitive positions and world events. A rating system is used to assess risk based upon criteria such as a position held, historical data and/or interpretation of world events. The system can generate a risk quotient or other rating based upon a weighted algorithm applied to the criteria. The risk quotient is indicative of risk associated with an account. Actions commensurate with a risk quotient can be presented to an institution to help the institution properly manage risk associated with a politically exposed person. A log or other stored history can be created such that utilization of the system can mitigate adverse effects relating to a problematic account. | 11-08-2012 |
20120284187 | SYSTEM AND METHOD FOR PROCESSING PAYMENT TRANSACTIONS - A system and associated data processing flow for processing payment transactions that are conducted using a payment account or portable consumer device. The portable consumer device may be in any suitable form, including cards, key fobs, devices containing a contactless element, smart cards (having contacts or without contacts), etc. The invention separates the authentication of the payment account or payment device from the transaction authorization process, enabling different entities to be responsible for each of those functions. | 11-08-2012 |
20120284188 | INTERCHANGE REPORTING MANAGER - For a first transaction, an authorization request message is received from a first payment processing network and transmitted to an issuer computer, and an authorization response message is received from the issuer computer and transmitted to the first payment processing network. For a second transaction, an authorization message is received from a second payment processing network and transmitted to the issuer computer, and an authorization response message is received from the issuer computer and transmitted to the second payment processing network. The authorization request and response messages for the first and second transactions include transaction data which is stored. Interchange data files including interchange data for the first and second transactions are received from first and second payment processing networks, respectively. The interchange data files are normalized, and the stored transaction data for the first and second transactions is enriched with the received interchange data. | 11-08-2012 |
20120284189 | METHOD AND SYSTEM FOR DYNAMICALLY CONTROLLING THE QUALITY OF SERVICE - The invention relates to a method for dynamically controlling the quality of services attributed for the communication session of a user equipment (UE) in a 3GPP compliant communication network, comprising the steps of: initiating a communication session; an online charging system (OCS) detects an event ( | 11-08-2012 |
20120284190 | Intersystem Single Sign-On - Techniques for intersystem Single Sign-On use intersystem user ID mapping to map user IDs of multiple systems. In one implementation, a method obtains a user's ID information associated with a first system, and obtains the user's ID information associated with a second system from the user's ID information associated with the first system according to the intersystem user ID mapping table. The first system sends the user's ID information associated with the second system to the second system, which may allow the user to automatically log on upon successful user ID verification. The user ID information communicated between the systems may be encrypted and decrypted using digital signature techniques. Systems for accomplishing the method are also provided. | 11-08-2012 |
20120284191 | IDENTIFIER-BASED CHARGE ON DELIVERY TRANSACTION - Guaranteed funds from a buyer are held until a delivery to the buyer is confirmed by a payment provider. The funds are then released to the seller immediately upon confirmation. Confirmation may be accomplished by the buyer entering an identifier upon delivery or some other confirmation by the shipper, where the identifier was provided to the buyer during the transaction with the seller. In other embodiments, the identifier generated by the payment provider is provided partially to the buyer and partially to the seller. Upon receiving a match of the identifier from the buyer and seller on delivery, buyer funds are released to the seller. | 11-08-2012 |
20120290478 | CLOUD ENABLED PAYMENT PROCESSING SYSTEM AND METHOD - A comprehensive platform for processing financial transactions is disclosed. The platform is a cloud based and comprises an application programming interface so that application developers can take advantage of the services provided by the framework. The platform replaces many of the expensive, outdated or inefficient aspects of traditional payment processing methods. | 11-15-2012 |
20120290479 | Integration of a Payment Network with Systems of Multiple Participating Banks - A payment system making payments from each payer of a community of payers to each vendor of a community of vendors. The payers are grouped into mutually exclusive sub groups, each being associated with one of a group of participating banks. Upon receipt of a payment instruction file from a bank, including instructions for executing payments from payers in the subgroup associated with the bank to various vendors, the system: i) obtains authorization of a funding amount for each payer; ii) provides a transaction to transfer the funding amount from the payer's account to a pooling account held by the originating bank; and iii) after receipt of the funding amount in the pooling account, provides an EFT file for payment of the vendors. Multiple banks are supported. The vendors are not associated with any particular bank. | 11-15-2012 |
20120290480 | ELECTRONIC PAYMENT USING TRANSACTION IDENTITY CODES - A method for making payments utilizes a server that has a unified transaction identification system. Upon receiving an offer of a transaction from a payee, the server generates a unique transaction identity on behalf of the payee, encodes the unique transaction identity into an encoded image, and sends the image to a transaction initiating terminal to be displayed to a payer. The payer uses a mobile device to scan the displayed encoded image, repackages the transaction identity and the buyer's payment method information into an acceptance, and sends the acceptance to the server, which identifies the transaction according to the unique transaction identity, and allows a payment to be made according to the identified transaction from a payer financial account to a payee financial account. | 11-15-2012 |
20120290481 | METHOD FOR CARRYING OUT A TRANSACTION BETWEEN A PORTABLE DATA CARRIER AND A TERMINAL - A method for carrying out a transaction between a portable data carrier, such as a chip card, and a terminal is described. An information item (TID) about the terminal is transferred to the portable data carrier upon the transmission of transaction data by a communication between the portable data carrier and the terminal. As a result, the portable data carrier obtains from the information item a locational position (ZID, WID, GID) of the terminal. Further, there is ascertained a locational position (OP) of the portable data carrier to which the portable data carrier has access. Finally, the portable data carrier compares the locational position (ZID, WID, GID) of the terminal with its locational position (OP), and initiates a measure for protecting the transaction in case a deviation between the two locational positions (ZID, WID, GID; OP) exceeds a predetermined threshold. | 11-15-2012 |
20120290482 | SYSTEM AND METHOD FOR IDENTITY VERIFICATION AND MANAGEMENT - A system for verifying the identity of a user includes an identification score assignment module configured to receive at least one source of identification of the user and to assign an identification score to each of the at least one source of identification. The system includes a total identification score generation module, in communication with the identification score assignment module, configured to generate a total identification score of the user from the identification scores of each of the at least one source of identification and a predetermined function. The total identification score of the user is associated with a level of verification of the identity of the user, and compared to a minimum identification score associated with a transaction. The transaction is performed when the total identification score of the user is greater than or equal to the minimum identification score. | 11-15-2012 |
20120296822 | USING PAYMENT MODE RANKINGS RESPONSIVE TO ITEM ATTRIBUTES - A method and system are described for obtaining at least a first mode ranking and a second mode ranking responsive to one or more categorical attributes of a first item and to one or more payment mode use constraints and transmitting at least an indication of a first payment mode responsive to at least the first mode ranking or the second mode ranking. | 11-22-2012 |
20120296823 | CONTENT OWNER VERIFICATION AND DIGITAL RIGHTS MANAGEMENT FOR AUTOMATED DISTRIBUTION AND BILLING PLATFORMS - A common platform for offering third-party applications and/or content to a global community. In an embodiment, users are automatically charged via the user's billing account with the wireless network carrier to which the user subscribes. The platform may also use billing mechanisms, such as credit cards, bank accounts, prepaid cards, web-based payment services, etc. The application provider need not have contractual agreements with any of the wireless network carriers. In an additional aspect, an application provider may undergo authentication before uploading any media, content or application to the platform. During authentication, a unique identification code may be generated and stored for the application provider. Any media, content, or application subsequently uploaded by the authenticated application provider is associated with the unique identification code. | 11-22-2012 |
20120296824 | SYSTEMS AND METHODS FOR CORRECTION OF INFORMATION IN CARD-NOT-PRESENT ACCOUNT-ON-FILE TRANSACTIONS - A method for processing a card-not-present account-on-file transaction over a computer device coupled to a database is provided. Further, a network-based system for processing a card-not-present account-on-file transaction having a first transaction date is provided. Additionally, a computer coupled to a database for processing a card-not-present account-on-file transaction, is provided. Further, a non-transitory computer readable storage medium storing computer-executable instructions thereon for processing a card-not-present account-on-file transaction, is provided. The transaction is made by a cardholder using payment card information stored by a merchant. The payment card information includes a payment card account identifier, an expiration date associated with the payment card account identifier, and a payment card number associated with the payment card account identifier. | 11-22-2012 |
20120296825 | RATING E-COMMERCE TRANSACTIONS - Methods of the present invention allow for rating eCommerce transactions. An exemplary method for rating an eCommerce transaction may comprise the steps of identifying a plurality of data indicating the trustworthiness of a Hosting Provider, a Merchant, and/or a Customer, collecting the data, and generating a Transaction Trust Rating for an eCommerce transaction, with the Transaction Trust Rating being based upon the collected data. The Transaction Trust Rating may be stored in a Repository accessible to Internet users. A Transaction Trust Rating Indicator (indicative of the Transaction Trust Rating) also may be provided to the Hosting Provider, Merchant, and/or Customer and may take the form of a certificate for display on a webpage, a change in color of an address bar on a browser, and/or an alphanumeric ranking. | 11-22-2012 |
20120303524 | SYSTEM AND METHOD FOR RECEIVER STAGED MONEY TRANSFER TRANSACTIONS - A computer system is operated for a receiver-staged money transfer transaction. A staged transaction is received from a receiver and includes one or more items requested by the receiver. Information about one or more senders identified to receive the staged transaction is then received, and the staged transaction is sent to the one or more senders. Approval notifications are received from the one or more senders indicating the one or more items in the staged transaction that the one or more senders agree to fulfill. The requested items fulfilled by the one or more senders are then released to the receiver | 11-29-2012 |
20120303525 | METHODS AND SYSTEMS FOR VERIFYING REGULATION COMPLIANCE - A computer and a computer-based method for verifying compliance of transaction data for a chargeback transaction with a set of regulations is provided. The method includes storing transaction data and a plurality of regulation sets wherein each regulation set is associated with a reason code and defines compliance of a chargeback transaction with the associated reason code, and receiving a chargeback message for the chargeback transaction wherein the chargeback message includes an assigned reason code for requesting the chargeback transaction and a transaction identifier for identifying transaction data associated with the chargeback transaction. The method further includes retrieving transaction data based on the transaction identifier, retrieving a regulation set wherein the retrieved regulation set is associated with the assigned reason code included within the received chargeback message, and verifying the assigned reason code assigned to the chargeback transaction by comparing the retrieved transaction data to the retrieved regulation set. | 11-29-2012 |
20120303526 | SYSTEMS AND METHODS FOR TRANSFERRING FUNDS FROM A SENDING ACCOUNT - Provided herein are methods and systems for transferring funds from a sending account to a payee. In embodiments, the sending account may be a pre-paid wireless telephone account. The methods and systems may involve a transaction management system, an account setup module, a funds transfer module and a reporting module. | 11-29-2012 |
20120303527 | PROCESS AND HOST AND COMPUTER SYSTEM FOR CARD-FREE AUTHENTICATION - A terminal of acceptance ( | 11-29-2012 |
20120303528 | SYSTEM AND METHOD FOR PERFORMING A TRANSACTION RESPONSIVE TO A MOBILE DEVICE - A transaction system for use in cooperation with a client mobile device, the transaction system constituted of: a provider associated device arranged to obtain an identifier associated with the client mobile device; and a transaction server in communication with the provider associated device. The provider associated device is arranged to output a transaction request message comprising information regarding the obtained identifier of the client mobile device. The transaction server, responsive to the transaction request message, is arranged to process the received transaction request message in accordance with one of a plurality of processing paths responsive to an attribute of the received transaction request message. | 11-29-2012 |
20120303529 | MULTI CURRENCY EXCHANGES BETWEEN PARTICIPANTS - A method and apparatus for facilitating payment transactions in multiple currencies between participants is provided. In one embodiment, an option is provided to a user to select a currency in which to make a payment. An indication of the selected currency in which to make the payment is received. A determination is made as to whether the selected currency is a primary currency of an account of the user. Based on the selected currency being different from the primary currency of the account of the user, the payment is converted to the selected currency. | 11-29-2012 |
20120303530 | METHOD FOR CORROBORATING A GAMING JACKPOT PAYMENT - A method for authorizing a witness-less manual payment of a gaming jackpot includes comparing a jackpot transaction value from a payment user to a maximum witness-less hand-payment jackpot value and to a jackpot value from the gaming machine. Confirmed jackpots of suitable value can be authorized for hand-payment without a corroborating human witness. The maximum value is selectable by the casino. | 11-29-2012 |
20120303531 | SYSTEM AND METHOD FOR CONTROLLING SERVICE SYSTEMS - A pump surrogate controller system and method allows multiple point of sale systems to control a particular service system. For example, a register at a cashier stand may activate the same fuel pump as an automated checkout kiosk. The surrogate controller may further coordinate the transmission of transaction data to the appropriate destinations. For example, transaction information relating to a fuel transaction may be delivered to the appropriate point of sale for completion. Transactions that are pre-authorized prior to a purchaser's arrival at a service station may also be activated using the surrogate controller. Fuel dispensing may be dependent on confirmation that the vehicle and dispensing pump are in close proximity. | 11-29-2012 |
20120303532 | METHOD AND APPARATUS FOR FACILITATING ONLINE PAYMENT TRANSACTIONS IN A NETWORK-BASED TRANSACTION FACILITY USING MULTIPLE PAYMENT INSTRUMENTS - A method and system for transferring value to a user of a transaction system including receiving from the user a request for value, evaluating the risk involved in providing the value by evaluating information accessible to the transaction system, selectively approving the request for value based on evaluating the risk involved, and distributing the value to the user. The information that is accessible to the transaction system may be stored at the transaction system or separated from the transaction system. The value may include funds, a line of credit, coupons, or gift certificates, and may be distributed over a period of time. The user may be a buyer or a seller. | 11-29-2012 |
20120310828 | INSTANT BANK ACCOUNT VERIFICATION THROUGH DEBIT CARD NETWORK - A bank account can be authenticated or confirmed by a user providing an account number and a debit card number. The payment provider then obtains user account information from the bank through a debit card network. The payment provider authenticates the account if the account numbers match. In another embodiment, authentication further requires a portion of a current bank balance in the account provided by the user to match the current balance received from the bank. | 12-06-2012 |
20120310829 | SYSTEMS AND METHODS FOR APPLYING A UNIQUE USER IDENTIFIER ACROSS MULTIPLE WEBSITES - Various embodiments provide systems for registering a user with at least two websites. The systems comprise a memory and at least one processor configured to ( | 12-06-2012 |
20120310830 | SYSTEMS AND METHODS FOR MANAGING CHARGEBACK REQUESTS - Various embodiments provide systems for managing chargeback requests. Such systems comprise a memory and at least one processor configured to: (a) retrieve transaction parameters associated with the previously executed transaction from the memory; (b) retrieve historical parameters associated with one or more other previously executed transaction activities conducted by the user from the memory; (c) compare one or more transaction parameters with one or more historical parameters to identify at least one correlation; and (d) after identifying at least one correlation, transmit information on the at least one correlation to be used as evidence sufficient to support a finding that the user did conduct the previously executed transaction activity with the website. Associated methods are also provided. | 12-06-2012 |
20120310831 | REPUTATION MANAGEMENT IN A TRANSACTION PROCESSING SYSTEM - A method includes: receiving information regarding a plurality of completed transactions from a plurality of users; receiving a query from a first user regarding a proposed transaction; determining at least one affinity between the first user and the plurality of users based on the information; determining a ranking or expectation of success for each of a plurality of potential entities for the proposed transaction based on the at least one affinity; selecting a plurality of selected entities based on the ranking or expectation of success for each of the potential entities; and sending, in response to the query, the plurality of selected entities to the first user. | 12-06-2012 |
20120310832 | PAYMENT TRANSACTION USING MOBILE PHONE AS RELAY - Systems and methods of conducting a payment transaction using a mobile phone as a relay. The systems and methods receive transaction information associated with a transaction at a mobile communication device from a merchant. They send the transaction information with the mobile communication device to an issuer associated with the mobile communication device. The issuer thereafter sends an authorization response message to the merchant. | 12-06-2012 |
20120310833 | System and method for facilitating large scale payment transactions - A system and method of payment of an end-user account with a service provider includes a computer system that makes payments to service providers on behalf of end-users and that is operable to exchange information with a terminal at the point of sale or a web-enabled computer system operated by the end-user and with the computer system of the service provider. In one embodiment, the computer system of an intermediary receives and fulfills a request to make a payment on an end user's account with a service provider. In another preferred embodiment, a payment router together with an issuing/sponsoring bank and a processor, as implemented by their computer systems, facilitate payment transactions in which the router transacts at least thousands of payments for at least hundreds of payors with at least dozens of payees using at least one open system card association network, preferably in a day. | 12-06-2012 |
20120310834 | PAYMENT SYSTEM - A payment system is capable of making recurring payment processing through only single processing at a predetermined period and thereby enhancing credit card transactions on rents of real-estate rental properties. Rent information sent from a CAT to a host computer is stored in a recurring payment database, and a sales telegram of the rent stored in the recurring payment database is sent to payment request determination means on the assumption that the payment is within a guarantee period stored in a guarantee period database. | 12-06-2012 |
20120310835 | METHOD AND APPARATUS FOR CONTACTLESS PAYMENT AUTHENTICATION - The present disclosure relates generally to the authentication of contactless payments attempted by a device having embedded contactless payment functionality. In particular, the disclosure is directed to systems and methods that utilize authentication schemes that already exist on a device in which the contactless payment functionality is embedded. One example of such authentication schemes is the use of password protection to lock or unlock the device in which the contactless payment functionality is embedded. Using the password protection functionality may provide varying levels of authentication protection based on the desires of the user. A number of exemplary uses of such a method and apparatus are disclosed herein. | 12-06-2012 |
20120310836 | LOCATION BASED AUTHENTICATION SYSTEM - A method for determining a fraud score associated with a monetary transaction facilitated using a payment card in a store is disclosed. The method comprises receiving data representative of an incoming payment transaction; analyzing a location of an owner of the payment card and a location of the store for determining a location rating; analyzing a location behavior profile (LBP) related to the payment card for determining a behavior rating, wherein the analysis is based in part on the incoming payment transaction; computing a transaction rating using the location rating and the behavior rating in combination with a first weight factor; analyzing historical payment transactions related to the payment card for determining a card rating; and computing the fraud-score using the transaction rating and the card rating in combination with a second weight factor. | 12-06-2012 |
20120317027 | Computer-Implemented Systems And Methods For Real-Time Scoring Of Enterprise Data - Systems and methods are provided for providing real-time scoring of received transaction data. Transaction data describing a particular transaction that has occurred is received. The transaction data is stored in an enterprise database, where the enterprise database is configured to store transactions of disparate types, where the transaction data is stored using a plurality of segments, where a segment is formatted according to a template, and where the template is selected based on an attribute of the transaction, wherein the attribute is a customer attribute, an activity attribute, or a channel attribute. A transaction type of the particular transaction is determined. One or more models are selected from a pool of models based on the transaction type, wherein the one or more models are configured based on a plurality of records from the enterprise database, and a score of the received transaction data is generated based on the transaction data. | 12-13-2012 |
20120317028 | System, Method, and Apparatus for Creating and Distributing a Transaction Credit - An embodiment(s) of a system(s), method(s), and/or apparatus is presented for accepting requests for, determining approval of, and distributing transaction credit(s) (TC(s)). An embodiment of a system(s), method(s), and/or apparatus is presented for distributing a useable TC to a designated recipient in real time. An embodiment of a system(s), method(s), and/or apparatus is presented for providing a consumer a useable TC in any tangible form that may be known in the art, or that can be transferred via, stored in, or retrieved from an electronic format, or that can be physically fabricated by a consumer or transferee of the TC. An embodiment of a system(s), method(s), and/or apparatus is presented for providing a consumer or transferee of a TC notification of receipt of such a TC through a variety of notification means. | 12-13-2012 |
20120317029 | MANAGING RECURRING PAYMENTS FROM MOBILE TERMINALS - Equipments and methods are disclosed for facilitating service provisioning in a system that comprises a payment processor, a number of service providers and a mediator that mediates information exchange between the payment processor and service providers, and a mobile terminal operated by payment card holder. In some implementations, service provisioning can be facilitated in cases wherein the payment processor must reside in a strictly regulated Payment Card Industry (PCI) compliant environment and the service providers operate servers that are not PCI-compliant. | 12-13-2012 |
20120317030 | INTERNATIONAL REMITTANCE SYSTEM BASED ON PAYMENT CARD ACCOUNTS WITH ACCESS BY MOBILE TELEPHONE - Methods and systems for registering a remittance customer to facilitate international funds transfers are described. In an embodiment a first financial institution computer in a first country receives the name, residence address and a mobile telephone number of a remittance customer from a first mobile network operator (MNO), and also receives image data that corresponds to documentation verifying the remittance customer's identity and residence address. A new payment card account number is generated for the remittance customer and is stored along with the image data and first mobile telephone number. The remittance customer's mobile telephone number and new payment card account number is then transmitted to a translation server of a payment system used for transferring funds internationally. | 12-13-2012 |
20120317031 | METHODS AND APPARATUS FOR FUNDING TRANSACTIONS USING DEBIT CARDS ISSUED BY ONE INSTITUTION AND FUNDS FROM ACCOUNTS AT OTHER INSTITUTIONS - Methods, apparatus, and systems for funding transactions disclosed herein may operate to: receive, for a transaction, a request to debit a first amount from a primary funding source; determine that a second amount of funds available from the primary funding source is less than the first amount requested for the transaction; compare a maximum backup funding amount with a total amount debited from a backup funding source to fund previous transactions associated with the primary funding source, with the maximum backup funding amount being previously set as an amount available from the backup funding source; and to provide an indication that at least part of a difference between the first amount and the second amount can be drawn from the backup funding source based on determining that the total amount has not reached the maximum backup funding amount. | 12-13-2012 |
20120317032 | LINKING A FINANCIAL CARD WITH A MERCHANT ACCOUNT - Some embodiments include systems and methods for linking a card with a merchant account. A financial institution that issues the merchant card to a merchant acts as both issuer and acquirer for the merchant. The merchant uses the merchant card to accept other financial cards as payment. Funds due the merchant are added to an available balance of the merchant card rather than depositing the funds in a settlement account. The funds can be added to the available balance before the transactions settle and can be accessed by the merchant. The financial institution also authorizes transactions when the merchant uses the merchant card as a regular cardholder to make payment. The merchant name can be changed on a per transaction basis if desired. | 12-13-2012 |
20120323783 | Method and System for Customizing Fraud Detection - A user interface is used to customize fraud rules. In the interface, the user sets a customized threshold trigger and a customized limit trigger for a fraud rule set. The fraud rule set is applied to an action. Triggering the threshold trigger by the action causes a threshold trigger report to be generated and allows the action. Triggering the limit trigger by the action denies the action. | 12-20-2012 |
20120323784 | DYNAMIC PAYMENT GENERATOR - Apparatus and methods for providing a dynamic payment generator are provided. A customer of a financial institution may desire to conduct a transaction involving a transferor or transferee financial institution without prior knowledge regarding unique and specific information required by the transferor or transferee institution. In some embodiments, apparatus and methods may detect information entered by the customer and dynamically prompt the customer for additional information required by the transferor or transferee institution. Apparatus and methods may pre-fill fields on a form displayed to the customer with information required by the transferor or transferee institution. | 12-20-2012 |
20120323785 | METHOD OF USING PAPER CHECKS THAT ARE TIED TO PREPAID DEBIT CARD AND CASHED ONLY BY DESIGNATED ENTITIES - A method is provided of using paper checks to debit funds maintained in a debit card bank account that is associated with a person. A plurality of unique serial numbers are assigned by the debit card issuer to be pre-printed on paper checks that are associated with the debit card bank account number. The unique serial numbers have no relationship to any personally identifiable information associated with the person. When a filled in paper check is presented for cashing, the unique serial number is checked against the originally assigned serial numbers to verify that the paper check is genuine. Identification information of the person is also verified, and the account balance of the debit card bank account is also verified to make sure that there are sufficient funds in the bank account to cover the check amount. | 12-20-2012 |
20120323786 | METHOD AND SYSTEM FOR DELAYED AUTHORIZATION OF ONLINE TRANSACTIONS - According to an embodiment of the present invention, a method of authorizing a transaction includes providing a processor, receiving a request for a proposed transaction from an entity, and retrieving a list of devices associated with the entity. The method also includes transmitting a notification related to the proposed transaction to the devices associated with the entity. The method further includes determining, using the processor, (a) that an approval is received from all the devices associated with the entity, or (b) that a predetermined time period has expired, and (c) transmitting an approval of the proposed transaction to a transaction processor. Or, determining, using the processor, (a) that a rejection is received from one or more of the devices associated with the entity; and (b) transmitting a disapproval of the proposed transaction to the transaction processor. | 12-20-2012 |
20120323787 | SYSTEMS AND METHODS FOR FIXED FORM CARD TO VIRTUAL CARD COMMUNICATION - System and methods for converting a fixed form card to a virtual card are disclosed herein. The system includes a virtual card manager and a user computing device communicatively coupled via a network. The virtual card manager may be configured to convert a fixed form card to a virtual card, and the user computing device may be configured to initiate a virtual card conversion request via a virtual card engine stored in mass storage and executable by a processor. As such, a stored value of the fixed form card may be transferred to the virtual card in a secure manner. | 12-20-2012 |
20120323788 | DYNAMIC PIN PAD FOR CREDIT/DEBIT/OTHER ELECTRONIC TRANSACTIONS - A method for authenticating debit card transactions engaged in by a cardholder on a communications network includes: establishing a network connection with a client being used by the cardholder to engage in a transaction; providing to the client a web page containing a keypad ( | 12-20-2012 |
20120323789 | MANAGING RECURRING PAYMENTS FROM MOBILE TERMINALS - Equipments and methods are disclosed for facilitating service provisioning in a system that comprises a payment processor, a number of service providers and a mediator that mediates information exchange between the payment processor and service providers, and a mobile terminal operated by payment card holder. In some implementations, service provisioning can be facilitated in cases wherein the payment processor must reside in a strictly regulated Payment Card Industry (PCI) compliant environment and the service providers operate servers that are not PCI-compliant. | 12-20-2012 |
20120323790 | METHOD AND APPARATUS FOR DISTRIBUTION OF MONEY TRANSFERS - A method of performing money transfer send transactions begins with receiving registration information from a customer, including customer identification and qualification information and payment source identification and performing verification of at least a portion of the identification and qualification information and the payment source identification and upon sufficient verification building a distribution profile. The method proceeds by receiving from the customer and storing in the distribution profile send transaction specifications for staging each of one or more proposed send transactions, and receiving a send initiation instruction with associated customer authentication data and responsive thereto identifying a distribution profile and at least one send transaction specification to be executed. Responsive to the send initiation instruction, the method verifies the authentication data and the current status of the payment source identified in the distribution profile and upon sufficient verification, initiates a send transaction according to the at least one send transaction specification. | 12-20-2012 |
20120323791 | METHODS AND SYSTEMS FOR VERIFYING TRANSACTIONS - An aspect of the present invention provides a computer-implemented method for verifying authorisation of a transaction. The method comprises the steps of: receiving a request to process an electronic transaction for a predetermined amount of money ( | 12-20-2012 |
20120330832 | SYSTEMS AND METHODS FOR GESTURE-BASED INTERACTION WITH COMPUTER SYSTEMS - The present disclosure facilitates gesture-based interaction with a computer-system. The method may comprise pairing a transaction account with a likeness, receiving the likeness and a transaction request based upon the location of a marker in three dimensional space, retrieving the transaction account paired with the likeness, and approving the transaction request at least partially based upon the transaction account and the likeness. | 12-27-2012 |
20120330833 | SYSTEMS AND METHODS FOR GESTURE-BASED INTERACTION WITH COMPUTER SYSTEMS - The present disclosure facilitates gesture-based interaction with a computer-system. The method may comprise pairing a transaction account with a likeness, receiving the likeness and a transaction request based upon the location of a marker in three dimensional space, retrieving the transaction account paired with the likeness, and approving the transaction request at least partially based upon the transaction account and the likeness. | 12-27-2012 |
20120330834 | SYSTEMS AND METHODS FOR GESTURE-BASED INTERACTION WITH COMPUTER SYSTEMS - The present disclosure facilitates gesture-based interaction with a computer-system. The method may comprise pairing a transaction account with a likeness, receiving the likeness and a transaction request based upon the location of a marker in three dimensional space, retrieving the transaction account paired with the likeness, and approving the transaction request at least partially based upon the transaction account and the likeness. | 12-27-2012 |
20120330835 | SYSTEMS AND METHODS FOR GESTURE-BASED INTERACTION WITH COMPUTER SYSTEMS - The present disclosure facilitates gesture-based interaction with a computer-system. The method may comprise pairing a transaction account with a likeness, receiving the likeness and a transaction request based upon the location of a marker in three dimensional space, retrieving the transaction account paired with the likeness, and approving the transaction request at least partially based upon the transaction account and the likeness. | 12-27-2012 |
20120330836 | SYSTEMS AND METHODS FOR GESTURE-BASED INTERACTION WITH COMPUTER SYSTEMS - The present disclosure facilitates gesture-based interaction with a computer-system. The method may comprise pairing a transaction account with a likeness, receiving the likeness and a transaction request based upon the location of a marker in three dimensional space, retrieving the transaction account paired with the likeness, and approving the transaction request at least partially based upon the transaction account and the likeness. | 12-27-2012 |
20120330837 | ACCOUNT LINKING SYSTEM AND METHOD - Embodiments of the invention are directed to a relationship payment system that allows the establishment of a linked relationship between a primary account of a primary user and a secondary account of a secondary user. The relationship payment system allows a primary user to designate a portion of a credit limit of a primary user's account to grant to a secondary user's account. Transactions are authorized against secondary user's account, and then ultimately clearing and settlement for the transactions is conducted against the primary user's account. | 12-27-2012 |
20120330838 | SYSTEM AND METHOD FOR PROCESSING TOKENLESS BIOMETRIC ELECTRONIC TRANSMISSIONS USING AN ELECTRONIC RULE MODULE CLEARINGHOUSE - Herein is described a tokenless biometric method for processing electronic transmissions, using at least one user biometric sample, an electronic identicator and an electronic rule module clearinghouse. The steps for processing of the electronic transmissions comprise of a user registration step, wherein a user registers with an electronic identicator at least one registration biometric sample taken directly from the person of the user. | 12-27-2012 |
20120330839 | TRANSACTION PROCESSING - A transaction processing system for the real time authorization of payment transactions, The system comprises a verification system ( | 12-27-2012 |
20120330840 | CONFIGURABLE SYSTEM AND APPARATUS FOR RENDERING PAYMENT DECISIONS AND TRIGGERING ACTIONS - A computer-implemented method for controlling a payment transaction from a payer to a payee includes submitting a request for payment to a data processing machine, the request for payment including a set of submitted transaction characteristics for the payment transaction; and comparing, in the data processing machine, at least a portion of the set of submitted transaction characteristics to a set of predetermined transaction characteristics that are specific to the payer to determined a first payment decision for the payment transaction. | 12-27-2012 |
20120330841 | DEVICE AND METHOD FOR FACILITATING FINANCIAL TRANSACTIONS - A device, system, and method for conducting a secure transaction over a network includes receiving from a user, being issued a stored-value financial instrument, a dollar amount to be associated to the stored-value financial instrument, communicating the dollar amount to a debit agent residing on a network processing and communication device, receiving at the debit agent a selection of a non-integrated financial institution selected from a list that includes at least one non-integrated financial institution, receiving at the debit agent a financial-institution user-identifier from the user, communicating the financial-institution user-identifier from the debit agent to the selected non-integrated financial institution, participating in a user-free electronic dialogue between the debit agent and the selected non-integrated financial institution, the dialogue including a request to transfer funds from the selected non-integrated financial institution, and transferring, with the debit agent, the funds from the selected non-integrated financial institution to the stored-value financial instrument. | 12-27-2012 |
20130006857 | METHOD AND SYSTEM FOR PHOTO IDENTIFICATION IN A PAYMENT CARD TRANSACTION - A method and system for a photo ID payment card transaction verification system for use with a payment card interchange network is provided. The system is programmed to receive a photo of a cardholder, the photo verified to be of the cardholder, assign a unique photo identifier to the photo, the unique photo identifier associated with the cardholder's payment card account, receive payment card transaction information for a payment cardholder from the interchange network, the interchange network configured to process payment card transactions between a merchant through a merchant bank and a cardholder through an issuer bank, the payment card transaction information including data relating to a purchase of goods or services made by the cardholder at a merchant, and transmit at least one of the photo and an access to the photo to the merchant with an authorization request response during a payment card transaction. | 01-03-2013 |
20130006858 | SYSTEM AND METHOD FOR AUTOMATICALLY UPDATING A PURCHASE CARD ACCOUNT BASED ON TRAVEL OF THE CARD USER - According to some embodiments of the present disclosure, a method for modifying a purchase card account according to travel by a user of a purchase card comprises receiving, at a card issuer information handling system associated with a card issuer of a purchase card, a computer readable travel notification file. The travel notification file indicates a destination of travel of a card user of the purchase card, a time period of travel to the destination, account information associated with the purchase card and confirmation information indicating whether travel to the destination likely occurred. The method further comprises modifying, by the card issuer information handling system, an account associated with the purchase card based on the travel notification file to authorize use of the purchase card at the destination of travel during the time period of travel. | 01-03-2013 |
20130006859 | PAYMENT SYSTEM AND METHOD USING HUMAN BODY COMMUNICATION - Disclosed is a payment system and method using HBC to communicate between a vehicle terminal and a payment terminal. More specifically, a vehicle terminal including a HBC unit links HBC using a human body as a medium, and a storage unit which stores user payment information and purchase information is provided. Additionally, a control unit, which provides the user payment information to the payment terminal, performs a payment if the HBC is successfully/validated by the HBC unit. | 01-03-2013 |
20130006860 | ANTICIPATORY PAYMENT AUTHORIZATION - A payment provider anticipates when a user will be making a payment and authorizes a payment amount to a merchant or payee prior to a total purchase amount being determined. When the user is ready to pay, the merchant can complete the transaction without further communication with the payment provider, thereby speeding up the checkout or payment process. | 01-03-2013 |
20130006861 | Verification of a Financial Instrument Allowing Rules-Based Pre-Acceptance Use of the Financial Instrument - A method of verifying authority of a customer to use a financial instrument, includes initiating one or more transactions using a financial instrument identified by a customer. One or more attributes of the initiated one or more transactions are stored. A determination is made as to whether or not a further financial transaction using the identified financial instrument, requested by the customer prior to acceptance of the use of the financial instrument, complies with pre-acceptance transaction rules. The further transaction is initiated only if it is determined to comply with the pre-acceptance transaction rules. One or more proffered attributes are received, typically from the customer. The received proffered attributes are compared to the stored attributes. Use of the financial instrument by the customer is then accepted if the received proffered attributes correspond to the stored attributes. | 01-03-2013 |
20130006862 | System and Method of Controlling Transactions - A system and method of controlling financial transactions of an account of entity having two or more authorized parties includes the steps of (a) a first authorized party presenting a first instrument to perform a transaction on the account, (b) employing an electronic communication device to send a realtime electronic authorization request for approval to a second authorized party and (c) the second party electronically replying to the request. | 01-03-2013 |
20130006863 | Method, System and Program Product for Deterring Credit Fraud - Under the present invention, a credit account can be associated with a locational restriction and a corresponding monetary restriction. The locational restriction sets forth a specific merchant or type of merchant at which a credit account can be used. The monetary restriction sets forth a maximum monetary amount that can be charged to that account by the specified merchant or type of merchant. When a request to approve a purchase using the credit account is received from a merchant, it will be determined whether the locational and monetary restrictions are met. If so, the request is approved. However, if either restriction is not met, the request will be denied. | 01-03-2013 |
20130006864 | METHOD FOR TRANSMITTING A CODE - The present invention relates to a method for transmitting a code to a user in which the user transmits his or her financial account identifier information to a code allocation unit | 01-03-2013 |
20130013505 | TRANSACTION ENGINE REMOTE CONTROL - Apparatus and methods for controlling account access. The apparatus may include a receiver that is configured to receive from a customer an account access control instruction. The account access control instruction may change an access status of an account that holds funds belonging to the customer. The customer may be one of a plurality of customers of a financial institution. Each of the customers may own funds that are held in different accounts. The apparatus may include a processor. The processor may initialize an account access control program; and change the access status of the account between an activated state and a deactivated state. The processor may change the access status by transmitting a data object to an electronic payment platform. | 01-10-2013 |
20130013506 | Variable Service Fee For Overdraft Protection - Systems and methods provide variable service fees for protection against overdraft of resources. The resources can be monetary or non-monetary and generally are associated with a service. Protection against overdraft relies at least on authorization of a request for an OD transaction, the request having one or more data indicative of a service transaction that triggers an overdraft condition leading to such request. Authorization or denial of such request is based on one or more rules applicable to the one or more data. For an authorized OD transaction, and based on at least one rule of the one or more rules, a variable service fee is assessed to an overdraft account linked to the overdraft transaction. Assessment of such fee affords protection against overdraft, which allows utilization of resources even in scenarios a resource allocation is exhausted. | 01-10-2013 |
20130013507 | System to Create and Manage Payment Accounts - A hosted-software system including separate but integrated application modules configured to manage notification, validation, authorization, receipt, disbursement, and reporting of payment and transaction types processes and apply specialized and customizable business rules, access rights, and permissions configured to allow secure and definable transaction processing and other interactions between multiple related and disparate parties. | 01-10-2013 |
20130013508 | SECURE MOBILE PAYMENT SYSTEM - The present invention provides a method for conducting a transaction that includes receiving a pseudo account identifier that corresponds to a primary account identifier. The pseudo account identifier may be received at a portable wireless device and may be generated by a remote server computer. The portable wireless device can receive the pseudo account identifier over a first network and provide the pseudo account identifier to an access device. The access devices generally comprises a reader that can receive the pseudo account identifier, and thereafter send a message to request authorization of a transaction. The authorization request message may include the pseudo account identifier and is sent to a payment processing network. The authorization request message is sent to the payment processing network over a second network. The payment processing network may then process the authorization message and return a response that indicates if the transaction is authorized or not. | 01-10-2013 |
20130013509 | METHOD AND SYSTEM FOR PROCESSING MICROPAYMENT TRANSACTIONS - Methods and systems for performing micropayment transactions over communication networks is provided. These methods and systems enable ubiquitous micropayments by providing a seamless payment solution in which micropayment is one of a plurality of payments facilitated. In an embodiment, the transaction value may be compared to a predefined threshold, and processed as a micropayment if said value is less than said threshold, and otherwise processed using a second processing system. In another embodiment, the transaction may be processed as a micropayment if the payee has previously been verified by the micropayment processing system. In a third embodiment, the transaction takes place using the payee's website. | 01-10-2013 |
20130013510 | System, Method, and Apparatus for Creating and Distributing a Transaction Credit - An embodiment(s) of a system(s), method(s), and/or apparatus is presented for accepting requests for, determining approval of, and distributing transaction credit(s) (TC(s)). An embodiment of a system(s), method(s), and/or apparatus is presented for distributing a useable TC to a designated recipient in real time. An embodiment of a system(s), method(s), and/or apparatus is presented for providing a consumer a useable TC in any tangible form that may be known in the art, or that can be transferred via, stored in, or retrieved from an electronic format, or that can be physically fabricated by a consumer or transferee of the TC. An embodiment of a system(s), method(s), and/or apparatus is presented for providing a consumer or transferee of a TC notification of receipt of such a TC through a variety of notification means. | 01-10-2013 |
20130013511 | DEPENDENT PAYMENT DEVICE - The present invention provides embodiments of a dependent payment device, such as a credit card, for allowing a primary customer to control and monitor the transactions made by a dependent customer who is authorized to use the account of the primary customer. The primary customer can control the maximum limit that the dependent customer can spend on the dependent card up to the maximum amount that the financial institution has approved for the primary customer. The primary customer can also block/approve purchases that the dependent customer can make at store or on products by adding MCCs, store names, store types, UPCs, or other product or store identifiers to a list of blocked/approved transactions. The primary customer can set monetary and time limits on the amount and frequency of the transactions the dependent customer can make at stores or on products that have been blocked/approved. | 01-10-2013 |
20130013512 | SOFTWARE DEVELOPMENT KIT BASED FRAUD MITIGATION - A system and method for fraud prevention is provided. Specifically, an application program interface may be used in concert with an authorization request to process a transaction, to utilize fraud prevention tools. A system, method and/or computer program product for transmitting an authorization request and a request for fraud services to a transaction account issuer is disclosed. The transaction account issuer may combine the authorization request and request for fraud services in order to create an authorization response. | 01-10-2013 |
20130013513 | METHOD AND APPARATUS FOR CONSUMER DRIVEN PROTECTION FOR PAYMENT CARD TRANSACTIONS - Method and apparatus for facilitating a commercial transaction between an account holder and a merchant. The account holder has an account that is associated with respective account information. The account information includes at least one criterion for pre-authorizing a transaction. When the consumer initiates a purchase transaction, a transaction approval request is generated which includes information relating to the commercial transaction. A purchase approval entity compares the received transaction approval request to the account information to determine whether the at least one criterion for pre-authorizing the transaction is satisfied. The transaction approval request is denied when a determination is made that the at least one criterion for pre-authorizing the transaction is not satisfied. | 01-10-2013 |
20130013514 | CUSTOMER CONTROLLED ACCOUNT, SYSTEM, AND PROCESS - Access devices like credit cards and/or check cards have enhanced security features that allow a customer to control circumstances under which their account is accessed. Fraudsters may try to access the account without the knowledge of the consumer set controls, the system takes remedial action with reduced instances of false positives. An account is established for an account holder through a central entity, e.g. an issuer. At least one user is associated with the access device that is established for one or more transactions. Use of the access devices is defined by a set of rules defined by the central entity and are controllable by the customer, including comprising any of the account holder and the user of the account. The customer inputs, controls, and/or updates parameters associated with the customer-controllable rules. Subsequent authorization of the access devices is controlled based on the customer input and other controls. | 01-10-2013 |
20130018789 | Systems and methods for estimating the risk that a real-time promissory payment will defaultAANM Kaufmann; BernhardAACI St. MargrethenAACO CHAAGP Kaufmann; Bernhard St. Margrethen CH - Systems and methods are set forth for estimating the risk on-line promissory payment transaction (PPT) will default. A systematic approach is set forth using aspects of human survival behavior under stressful life situations enhanced with transaction velocity settings and parameterized business rules before an actual payment is deposited at a financial institution. | 01-17-2013 |
20130018790 | UNIVERSAL ADDRESSING SCHEMEAANM Gururajan; RaghuramAACI San JoseAAST CAAACO USAAGP Gururajan; Raghuram San Jose CA US - A method and a system for a universal addressing scheme are described. A physical address validation module retrieves and validates a physical address associated with an e-mail address received from a third party server. A financial transaction validation module retrieves a financial account associated with the e-mail address and operates a financial transaction on the financial account. A third party authentication module authenticates the third-party server prior to communicating the physical address and operating the financial transaction to the third-party server. | 01-17-2013 |
20130018791 | FRAUD DATA EXCHANGE SYSTEM - A fraud data exchange system performs a method for processing a transfer request using shared fraud data including receiving a transfer request comprising information corresponding to an account to be debited and information corresponding to an account to be credited, approving the information corresponding to the account to be debited, and accessing a database to retrieve fraud data. The database includes fraud data shared among two or more financial institutions, and the fraud data includes a plurality of entries, each entry corresponding to one or more accounts and comprising one or more data fields. Each data field corresponds to a characteristic of the accounts and tends to indicate whether the transfer request is fraudulent. The method includes determining a likelihood of fraudulent activity, based on the accessed fraud data and determining, based at least in part on the determined likelihood of fraudulent activity, whether to complete the transfer. | 01-17-2013 |
20130018792 | PARENTAL CONTROLS - Various techniques are provided for establishing financial transaction rules to control one or more subsidiary financial accounts. In one embodiment, a financial account management application stored on a processor-based device may provide an interface for defining financial transaction rules to be applied to a subsidiary account. The financial transaction rules may be based upon transaction amounts, aggregate spending amounts over a period, merchant categories, specific merchants, geographic locations, or the like. The device may update the financial transaction rules associated with a subsidiary account by communicating the rules to an appropriate financial server. Accordingly, transactions made using the subsidiary account by a subsidiary account holder may be evaluated against the defined rules, wherein an appropriate control action is carried out if a financial transaction rule is violated. | 01-17-2013 |
20130018793 | METHODS AND SYSTEMS FOR PAYMENTS ASSURANCE - Payments assurance methods and systems are described. In some embodiments, a Proxy Service Manager Server computer receives a consumer authentication request from a merchant device, and transmits that request to an Authentication Service Manager Server computer. The Proxy Service Manager Server computer then receives a non-repudiable accountholder authentication value (“AAV”) token, generates a payment authorization request that includes the AAV token, and transmits the payment authorization request to an Acquirer financial institution (FI) Server computer. The Proxy Service Manager Server computer is then operable to receive a payment authorization message, and to transmit the payment authorization message to the merchant device to enable a merchant to complete a purchase transaction with a consumer. | 01-17-2013 |
20130018794 | MOBILE COMMUNICATION DEVICE BASED MONETARY TRANSFER SYSTEM - Systems and methods are disclosed for performing transactions using secure images. A device may collect transaction details and initiates the creation of a secure image. Upon creation of the secure image, the device may provide the secure image to second device participating in the transaction by displaying the secure image in a manner that allows the second device to capture the secure image or by providing the secure image in an electronic message. The second device may use the secure image to identify the transaction by providing the secure image to a secure server. Upon receiving the secure image, the secure server may provide transaction details to the second device. The second device may then send a confirmation of the transaction to the secure server, which may then complete the transaction. Use of the secure image allows the transaction to be performed without exposing sensitive transaction details. | 01-17-2013 |
20130018795 | Multi-Channel Data Driven, Real-Time Fraud Determination System For Electronic Payment Cards - Exemplary embodiments for detecting electronic payment card fraud include receiving real-time payment card transaction data from ingress channels and an egress channels of at least one payment card system through a first application programming interface (API); generating transactional profiles for each of at least payment cards, the ingress channel, the egress channels, and funding sources of the payment cards; in response to receiving transaction data for a current payment card transaction, evaluating the transaction data using a predictive algorithm that compare the transaction data to the transactional profiles to calculate a probabilistic fraud score for the current transaction; evaluating the probabilistic fraud score and the current transaction data based on a set of rules to generate a recommendation to approve, decline or review the current transaction; and transmitting the recommendation back to the payment card system via a second API. | 01-17-2013 |
20130018796 | Multi-Channel Data Driven, Real-Time Anti-Money Laundering System For Electronic Payment Cards - Electronic payment card money laundering detection includes receiving real-time payment card transaction data from ingress channels and an egress channels of at least one payment card system through a first API; generating transactional profiles for each of at least payment cards, the ingress channel, the egress channels, and funding sources of the payment cards; in response to receiving transaction data for a current payment card transaction, evaluating the transaction data using a predictive algorithm that compares the transaction data to the transactional profiles to calculate a probabilistic money laundering score for the current transaction; evaluating the probabilistic money laundering score and current transaction data based on a set of rules to generate a suspicious activity report that recommends whether to approve or report the current transaction; and transmitting the suspicious activity report back to the payment card system and transmitting the suspicious activity report to an identified regulatory body. | 01-17-2013 |
20130018797 | Authentication System and Authentication Method - In order to prevent leakage of an authentication symbol string such as a credit card number, and enable a user to be authenticated: an ID issuance server | 01-17-2013 |
20130018798 | System and Methods for Facilitating Fund Transfers Over a Network - In accordance with embodiments of the present disclosure, systems and methods for facilitating financial transactions over a network include communicating with a financial institution over the network, wherein the financial institution includes a first user account related to a user. The systems and methods include receiving a fund transfer request from the financial institution on behalf of the user and establishing a second user account related to the user based on user information passed with the fund transfer request. The systems and methods include processing the fund transfer request by linking the first user account to the second user account based on the user information passed with the fund transfer request, receiving funds from the financial institution associated with the first user account, and depositing the received funds in the second user account on behalf of the user. | 01-17-2013 |
20130018799 | CONSTRUCTION PAYMENT MANAGEMENT SYSTEM AND METHOD WITH SUB-TIER DOCUMENT EXCHANGE AND APPROVAL FEATURES - Systems and methods for managing a construction payment process wherein a higher degree of functionality is provided to primary users and only a limited subset of functionality is provided to sub-tier contractors. One construction of the system is configured to receive an electronically signed document and a request for payment from the sub-tier contractor. The request for payment is presented to a first primary user who is a contractual parent of the sub-tier contractor. When approval of the request for payment is received, a payment is initiated from a project payor to the sub-tier contractor. In some embodiments, the project payor is a contractual grandparent of the sub-tier contractor and a contractual parent of the first primary user. | 01-17-2013 |
20130024375 | MULTI-STAGE FILTERING FOR FRAUD DETECTION - A multi-stage filtering process and system for fraud detection is disclosed. The process includes one or more preliminary filtration stages followed by one or more additional filtration stages that provide for enhanced screening for fraudulent activity. Over a plurality of transactions, a portion of the transactions are cleared for processing or marked as not fraudulent (e.g., deemed not likely fraudulent or of too low a value to continue analyzing) after each filtration stage. As such, acceptable transactions are not unnecessarily scrutinized. | 01-24-2013 |
20130024376 | MULTI-STAGE FILTERING FOR FRAUD DETECTION WITH VELOCITY FILTERS - A multi-stage filtering process and system for fraud detection is disclosed. The process includes one or more preliminary filtration stages followed by one or more additional filtration stages that may include velocity filters that provide for enhanced screening for fraudulent activity. Over a plurality of transactions, a portion of the transactions are cleared for processing (e.g., deemed not likely fraudulent or of too low value to continue processing) after each filtration stage. As such, acceptable transactions are not unnecessarily scrutinized. | 01-24-2013 |
20130024377 | Methods And Systems For Securing Transactions And Authenticating The Granting Of Permission To Perform Various Functions Over A Network - The present invention relates to a method of restricting access to perform a function over a network. In one variant, the network comprises at least one function server and a vault server, each having a processor and a memory. The vault server has stored within its memory a personal access vault. The personal access vault comprises at least an identifying code and at least one authorization code. The method comprises: transmitting to a function server a request to restrict access to a function; providing to the function server the identifying code of the personal access vault and a series of characters representing the function to the function server; and the function server identifying the function and placing the function in a restricted status; upon the function server placing the function in a restricted status, the function server awaits permission from the vault server prior to performing the function. | 01-24-2013 |
20130024378 | METHOD AND SYSTEM FOR FACILITATING PAYMENT TRANSACTIONS USING ACCESS DEVICES - A payment system for facilitating a payment transaction between a payer and a payee is disclosed. The payment system includes an access device, a payee device, and a services hub. The services hub is configured to communicate with the access device and the payee device; and generate a tracer ticket. | 01-24-2013 |
20130024379 | METHOD AND APPARATUS FOR THE TRANSFER OF A MONEY AMOUNT BY USING A TWO DIMENSION IMAGE CODE - The present disclosure concerns a method for transferring a money amount by using a two-dimension image code. It provides that the registration of the transfer parties affected by a managing entity generates a two-dimension image code containing registration and security data. Moreover, the request of the recipient party to the paying party of the money amount occurs by a two-dimension image code generated on the display of a mobile phone of the recipient party; the payment order of the paying party to the managing entity to pay said money amount involves the capture of the two-dimension image code from the display of the recipient party and sending to the managing party an encrypted SMS message including the data, the reception of the encrypted the SMS message by a central server of the managing party, which forwards or not the request of authorization of payment of the money amount. | 01-24-2013 |
20130024380 | Automated Submission of Prepaid Programs - A payment system includes transaction handler that processes transactions, each characterized by a consumer and a merchant engaging in a sales transaction involving a prepaid program having prepaid cards, such as a gift card, that an issuer provides to consumers. A method for establishing a prepaid program includes the issuer remotely accessing a computer system at the transaction handler. The computer system presenting the issuer with a program information form on which the issuer enters requested data. As each data item is entered, the computer system checks for errors, which are identified to and corrected by the issuer in real time. The issuer submits the data as a request to create a prepaid program, which the transaction handler reviews and responds by approving or rejecting creation of the prepaid program. The transaction handler electronically communicates approval or rejection of the prepaid program to the issuer. | 01-24-2013 |
20130031000 | System and Method for Detecting Fraudulent Financial Transactions - An Internet service provider uses virtual machines dedicated to one (or a few) customers to perform transactions on behalf of those customers, where the transactions require sensitive or confidential user authentication data. Each virtual machine only has access to the user authentication data it needs to perform the transactions for its dedicated customers, not authentication data for all the customers of the service provider. Virtual machines are shut clown when not performing transactions or interacting with customers, thus further reducing the risk of disclosure of the confidential user authentication data. | 01-31-2013 |
20130031001 | Method and System for the Location-Based Discovery and Validated Payment of a Service Provider - A method and system for consumers to find service providers is presented. The method and system minimizes the amount of the consumer's time required to find a service provider to provide a desired service. The system employs real-time geolocation information available within mobile devices to increase the efficiency of the process. Either automated or manual two-way communication between consumers and service providers for discovery and payment allows for a quick and easy user experience for all parties involved. | 01-31-2013 |
20130031002 | SYSTEMS AND METHODS FOR GLOBAL TRANSFERS - A global transfers computer system is configured to facilitate global transfers for customers having a plurality of accounts with different entities in different countries. The global transfer may be a foreign exchange (FX) transfer or a non-FX transfer. The global transfers computer system includes a customer database, a user interface, and at least one computer implementing a global customer data computer application, a global transfers computer application, and/or a foreign exchange computer application. Various embodiments are described, including a computer implemented method for performing global transfers using a global transfers computer system. | 01-31-2013 |
20130031003 | Payment methods with a payment service and tabs selected by a first party and opened by a second party at any geographic location of the first party's mobile device - A method of paying a second party is provided. A first party accesses the names of one or more qualified second parties. The second parties (i) have an association with the payment service, and (ii) if they do not have an established association with the payment service have established one prior to payment. The first party has an association with the payment service. A tab is opened by the first party that can be selected by the second party at any geographic location of a first party's mobile device. The second party is only able to charge a first party's financial account when the first party's mobile device is within a defined geographic area. The tab is a relationship between the first party, payment service and second party. The second party can engage in a financial transaction when the first party is within the defined geographic area. | 01-31-2013 |
20130031004 | Payment methods with a payment service and tabs selected by a first party and opened by a second party at any geographic location of the first partys mobile device - A method of paying a second party is provided. A first party accesses the names of one or more qualified second parties. The second parties (i) have an association with the payment service, and (ii) that if they do not have an established association with the payment service have established one prior to payment. The first party has an association with the payment service. A tab is opened by the first party that can be selected by the second party at any geographic location of a first party's mobile device. The second party is only able to charge a first party's financial account when the first party's mobile device is within a defined geographic area. The tab is a relationship between the first party, the payment service and the second party. The second party can engage in a financial transaction when the first party is within the defined geographic area. | 01-31-2013 |
20130031005 | METHOD FOR SECURE TRANSACTIONS UTILIZING PHYSICALLY SEPARATED COMPUTERS - A secure transaction method involves establishing an electronically accessible verification site authorized by the holder of a credit or debit card, and accessing the verification site by a merchant to determine whether a request for goods or services is authorized. The request for goods or services is based upon the use of the credit or debit card, but the card is not physically presented. The verification site is an electronic mail account which may be established by the merchant, card holder or other authorized person or entity. An authorization message is preferably sent from the site to the merchant in response to the step of accessing the verification site by the merchant. The verification site may also be wirelessly accessible, enabling an authorization message to be delivered through a cellular telephone, personal digital assistant, or other mobile device. | 01-31-2013 |
20130036050 | SYSTEM AND METHOD FOR USING A NEAR FIELD COMMUNICATION DEVICE TO CONDUCT A TRANSACTION WITH AN ALIAS - A system and method for using a static or dynamically-generated alias to conduct financial transactions via a Near Field Communication Device at a merchant is provided. The system and method allows a user to provide an alias identifying the user in order to conduct transactions via a near field communication device without needing to transfer the user's account number. The method associates the alias with an account of the user. The alias may be a static alias or a dynamic alias. A dynamic alias is generated for a transaction based in part on a characteristic of the transaction. The method determines the account number associated with the alias and completes the transaction using the alias. The method may also evaluate the transaction to determine whether pre-determined rules are complied with and provide confirmation to the user and/or merchant that the transaction has completed. | 02-07-2013 |
20130036051 | NON-NEAR FIELD COMMUNICATION POINT OF SALE EXPERIENCE - System, method, and computer program product are provided for a user to provide payment for a transaction via non-near field communications at the point-of-sale. Once a user enters a merchant, the user may purchase products from the merchant through a P2P mobile payment. The user may identify himself/herself on a mobile phone and access the P2P mobile payment system. The user then selects the merchant that he/she is purchasing from and the financial institution providing the user with a payment PIN. The PIN is a randomly generated numbers or letters set that the user inputs at the point-of-sale to provide payment for a transaction at the merchant. This invention allows a user to receive and provide payments for any type of transaction utilizing the security, accuracy, and convenience without having to disclose personal data such as an account number, routing number, or the like. | 02-07-2013 |
20130036052 | CREDIT TRANSACTION SYSTEM, APPARATUS, TERMINAL CAPABLE OF GRADING CREDIT AND METHOD THEREOF - A credit transaction system, apparatus, and method are capable of grading credit to other people. The credit transaction system includes a relay unit, a user terminal, and a seller terminal. The relay unit stores credit information including at least one of credit card information and account information of a credit owner, user information and terminal information on a user designated by the credit owner, and credit limit information on a limit usable by the user. The user terminal transmits the user's terminal information to a seller terminal corresponding to the seller. The seller terminal transmits billing records on the goods or service purchased by the user in response to the received user's terminal information. Here, the relay unit performs an authentication process for the user corresponding to the user terminal, and then relays to process payment regarding the billing records via the credit information within the credit limit information. | 02-07-2013 |
20130036053 | Centralized Identification and Authentication System and Method - A Central-Entity centralizes users' personal and financial information in a secure environment in order to prevent the distribution of user's information in e-commerce. This information is then used to create digital identity for the users. The digital identity of each user is dynamic, non-predictable and time dependent, because it is a combination of a user name and a dynamic, non-predictable and time dependent secure code that will be provided to the user for his identification. The user provides his digital identity to an External-Entity such as merchant or service provider. The External-Entity is dependent on Central-Entity to identify the user based on the digital identity given by the user. The External-Entity forwards the user's digital identity to the Central-Entity for identification and authentication of the user and the transaction. | 02-07-2013 |
20130036054 | OFFSITE FINANCIAL ACCOUNT ONBOARDING - Offsite financial account onboarding is provided which creates a more streamlined process for a customer. The customer accesses a money services businesss business electronic system to request financial account setup. The onboarding system establishes account, access to a pooled custodial account managed by the money services businesss business based on preliminary identification (ID) data from the customer. With only preliminary ID data, account access limits are assigned which reduces the risk of fraud or criminal activity with the customer's account access. Because account access is established with just the preliminary ID data, the customer may fully obtain account access directly from a mobile device. The money services businesss business provides additional graduated access levels depending on additional ID data provided by the customer. Thus, depending on the type of ID data provided by the customer, the customer's account access will have corresponding access level rights to the custodial account. | 02-07-2013 |
20130036055 | SYSTEM AND METHOD FOR PROVIDING A FINANCIAL TRANSACTION INSTRUMENT WITH USER-DEFINABLE AUTHORIZATION CRITERIA - Authorization limits on the use of a financial transaction instrument, such as a credit card and the like, may be set by an owner of a financial account corresponding to the financial transaction instrument. The owner provides information identifying the owner, the financial account, and the financial transaction instrument corresponding to the financial account to a computer, and also provides an owner-defined authorization limit on use of the financial transaction instrument to the computer. The authorization limit is stored in a database, which is accessed when there is a request to authorize a purchase to be made with the financial transaction instrument. The owner may communicate with the computer via a Web site, an automated call program, a kiosk, or the like. | 02-07-2013 |
20130036056 | CASH PAYMENT FOR REMOTE TRANSACTIONS - Methods coordinate payment for a remote transaction with a first party. An identification of the first party is received at a host system. Acknowledgment of receipt of a cash payment from a second party is received. The cash payment is associated with the identification of the first party. A money transfer corresponding to the cash payment to the control of the first party is executed with a request for the first party to perform on previously agreed terms of the remote transaction. | 02-07-2013 |
20130041821 | FRAUD MESSAGING SERVICE - In general terms, embodiments of the present invention relate to methods and apparatuses for providing a fraud messaging service. For example, in some embodiments, a method is provided that includes: (a) receiving transaction information associated with a transaction, where the transaction involves an account, and where the account is held by an account holder; (b) determining, based at least partially on the transaction information, that the transaction has triggered a fraud rule; (c) prompting, via a mobile device, the holder to consent to the transaction, where the mobile device is associated with the holder, and where the prompting the holder is based at least partially on the determining that the transaction has triggered the fraud rule; (d) receiving the holder's consent to the transaction; and (e) authorizing the transaction based at least partially on the receiving the holder's consent. | 02-14-2013 |
20130041822 | Payment Device with Integrated Chip - A method is disclosed. It includes presenting a portable consumer device to an access device, obtaining additional data, encrypting the additional data, and passing the encrypted additional data to the access device. | 02-14-2013 |
20130041823 | Payment Card with Integrated Chip - A method is disclosed. It includes presenting a payment card to an access device, obtaining additional data, encrypting the additional data, and passing the encrypted additional data to the access device. | 02-14-2013 |
20130041824 | Systems and Methods of Aggregating Split Payments Using a Settlement Ecosystem - Systems, apparatuses and methods for enabling a group of people to share the cost of an event, such as a meal, the purchase of a gift, or the rental of a car. Embodiments of the invention provide the tools needed to enable a group to participate in a shared event or activity, where one of the participants pays for the event or activity using their payment device and the other members of the group pay their portion of the cost to the participant who made the payment. Embodiments of the invention provide an ecosystem where a person can pay for an event, goods, or services using a single payment device (such as a credit or debit card) and then settle the amounts owed to them by other members of a group using the tools provided by the invention. | 02-14-2013 |
20130041825 | SYSTEM AND METHOD FOR MANAGING AND MONITORING THE DISPENSING OF FUELS - A fuel management system for use by operators of temporary and/or permanent inventories of vehicles such as vehicle dealerships. Fuel vouchers are issued by authorized issuing personnel to authorized recipients if a validation procedure is passed using a database incorporating employee and vehicle inventory information. At the time of delivery, the fueling station will verify the vehicle and individual presenting the voucher. If verification occurs, the authorized quantity of fuel is dispensed. The voucher and sales receipt are returned to the dealership for future auditing and report generation. The system stores information to enable reports to be generated concerning fuel voucher issuance, actual fuel usage and to detect fraud or misuse, allowing more effective fuel expense management. In the event a report generates a fraud alert, appropriate management personnel are immediately notified by email, text messaging or other means. | 02-14-2013 |
20130041826 | Content Purchaser Distribution Payment System - A system and method for authorizing access to digital content includes encoding, with a processor, a digital content with a unique identifier. The digital content is delivered to an authorized user. A query is received from a second user and it is determined if the second user is the authorized user. If the second user is not an authorized user one of a payment authorization for the digital content is received from either the authorized user or the second user and an instruction is received to disable the digital content. | 02-14-2013 |
20130046690 | SYSTEM AND METHOD FOR CREDENTIAL LENDING - Embodiments of the invention provide a method for allowing a first user to authorize a second user to perform a financial transaction using the first user's financial account information. In some embodiments, the second user conducts the transaction through the use of a mobile computing device that communicates with a point of transaction device. In some embodiments, the first user authorizes a second user to perform a financial transaction using the first user's account through the use of the personal computing device. In some embodiments, a method is provided that includes: (1) receiving a request from the first user to authorize the second user to perform a financial transaction; (2) receiving a parameters from the first user restricting a scope of the financial transaction that the second user is authorized to perform; (3) transmitting information associated with the request to a mobile computing device associated with the second user. | 02-21-2013 |
20130046691 | LOCATION-BASED SERVICE PAYMENT AND SETUP - Payments are made to service providers for services rendered at a specific user location when the user is detected at that location. This may be when the user's mobile device is detected at a house or business that the user is responsible for service payments. The user may be asked, through the mobile device, whether to make a payment. The request may only be sent when a payment is due. In another embodiment, services are set up for the user when a new address is detected for the user. Specific services may be set up depending on the location and/or user information, such as services utilized by the user at a previous location. | 02-21-2013 |
20130046692 | FRAUD PROTECTION WITH USER LOCATION VERIFICATION - Embodiments of the invention provide fraud protection with user location verification. The methods, apparatus and computer program products provide for approving a transaction based at least partially on a determining that a mobile device associated with an account holder associated with a transaction is located within a predetermined distance from the location associated with the transaction. In some example implementations where the mobile device is located outside the predetermined distance from the location associated with the transaction, information associated with previously approved transactions is received and the transaction approved based at least partially on a determination that previously approved transaction have occurred at the same location. | 02-21-2013 |
20130046693 | NON-REPUDIATION PROCESS FOR CREDIT APPROVAL AND IDENTITY THEFT PREVENTION - Embodiments are directed towards employing a non-repudiation process for consumer credit requests based on an affirmative authentication of a one-time-pin (“OTP”) generated from a consumer biometric smartcard. The biometric smartcard may authenticate biometric information (e.g. fingerprint, facial image, iris image, or the like) of the consumer based on biometric templates stored on the biometric smartcard. In at least some of the various embodiments, the OTP may be authenticated by an identity authority, such that an associated credit request to a provider may be authenticated. In some embodiments, the provider may request and utilize a credit report for an authentic credit request to determine whether or not the consumer has an acceptable credit rating. If the consumer has an acceptable credit rating, then the provider may provide credit to the consumer. | 02-21-2013 |
20130054457 | SYSTEM AND METHOD FOR USE IN MAKING FINANCIAL TRANSACTIONS WHEN CHARGING AN ELECTRICALLY POWERED VEHICLE - A financial transaction system for use in authorizing charging of an electrically powered vehicle includes a smart grid that includes an advanced metering infrastructure (AMI) system. The AMI system includes at least one credential reading device coupled to a charging device for an electrically powered vehicle. The at least one credential reading device is configured to transmit credential information. The AMI system also includes a server system that includes at least one server coupled to the at least one credential reading device via a communications network. The at least one server is configured to determine validity of the credential information transmitted from the at least one credential reading device. The at least one server is further configured to one of permit and deny charging of the electrically powered vehicle. | 02-28-2013 |
20130054458 | Money Transfer Utilizing a Social Network Environment - Systems and methods which utilize a social media platform to provide authentication information for a money transfer transaction are provided. Embodiments may include obtaining and utilizing information from online social network profile data of the sender, receiver or both in order to facilitate a convenient and secure transaction. Embodiments include an online social network profile database configured to store and correlate profile information for multiple users and a money transfer transaction processing device in communication with the database to authenticate a money transfer transaction. Embodiments may be implemented on the internet, with dedicated applications for a computer and/or mobile device, and the like. | 02-28-2013 |
20130054459 | SECURE PAYMENT INSTRUCTION SYSTEM - A method for providing secure payment instructions includes verifying a payer device for use in a transaction with a payee device. When a request is received from the payee device for payer information associated with a payment account being used by the payer device in the transaction, a security font is generated and associating in a database at least one payer information font character with payer information that is associated with the payer account. The at least one payer information font character is then provided to the payee device, and when a request for the security font is received and determined to be from the verified payer device, the security font is provided to the verified payer device such that the at least one payer information font character may be converted to the payer information for display on the payer device. | 02-28-2013 |
20130054460 | System for Allocating and Managing Contributions to Account Categories - According to some embodiments, a deposit system for allocating deposited funds among a plurality of account categories held for an account beneficiary comprises a management module, a contributor module, and an allocation module. The management module is operable to associate each account category of the plurality of account categories with a particular purpose, each purpose restricting use of funds in its associated account category. The contributor module is operable to receive, from a contributor, a deposit of funds, the deposit comprising a first set of funds associated by the contributor with a first purpose and a second set of funds associated by the contributor with a second purpose. The allocation module operable to deposit the first set of funds into the account category associated with the first purpose and deposit the second set of funds into the account category associated with the second purpose. | 02-28-2013 |
20130054461 | METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA FOR ELECTRONIC FINANCIAL TRANSFERS - Computer-implemented systems, methods, and computer-readable media electronic for financial transfers include: receiving a request for a set of at least one Icheck tokens; generating the set of Icheck tokens, each Icheck token including a unique identifier, a set of payer data, and a set of signature data, wherein each Icheck token is configured to be transferable over plural media; transmitting the set of Icheck tokens to a payer device; receiving from a payee device an Icheck token from the set of Icheck tokens; authenticating the Icheck token by analyzing at least one of the unique identifier, the set of payer data, and the set of signature data; transmitting a non-payment notice if the authenticating step reveals the Icheck token is not authentic; and transmitting payment according to the set of signature data if the Icheck token is authentic. | 02-28-2013 |
20130054462 | ECOMMERCE SYSTEM WITH PAYMENT DATA DIVISION - In at least one embodiment of an ecommerce system, payment data is divided into proper subsets and distributed among multiple data processing systems, and each of the data processing systems stores less than all of the subsets of the payment data after the subsets of payment data are distributed and until at least sending the payment data to a payment authorization system for processing. In at least one embodiment, distributing proper subsets of the payment data among multiple data processing systems enhances security of the payment data by limiting an amount of time and the locations in which a complete set of payment data is persisted. | 02-28-2013 |
20130054463 | Dynamic Level Assessment - Embodiments of the present invention include a dynamic and auditable rules-based spend requirement management (SRM) server configured to receive transaction data associated with a payment transaction involving an issuer of an account, where the account is associated with a first set of account level requirements (e.g., a minimum spend requirement) and a first interchange rate. The SRM is further configured to determine that the transaction data is not within the first set of account level requirements, but is within a second set of account level requirements associated with a second interchange rate, and associate the account to the second set of account level requirements by way of a final product identifier stored in a database accessible by a payment processing network (PPN). | 02-28-2013 |
20130054464 | TERMINAL, SYSTEM, AND METHOD FOR AUTHORIZING PAYMENT - A terminal, includes: a communication; a short range communication unit to communicate via short range communication to a second terminal; and a processor to parse data for either communication via the network or short range communication, wherein in response to the terminal and the second terminal being within a threshold distance from each other, the short range communication unit communicates data to the second terminal, and if the terminal is unrecognized by the second terminal, the communication unit communicates certification via the network. A method for authorizing a terminal, includes: establishing short range communication from the terminal to a second terminal in response to the terminal and the second terminal being within a threshold distance from each other; parsing data to be communicated; and if the terminal is unrecognized by the second terminal, communicating a certification via the network. | 02-28-2013 |
20130054465 | LEAST COST ROUTING AND MATCHING - Systems and methods are disclosed for routing a transaction based on an assessment of costs associated with multiple payment processing networks. A transaction broker server determines how to route a received authorization request message for a transaction based on a first cost associated with processing the transaction via a first payment processing network and a second cost associated with processing the transaction via a second payment processing network. If the first cost is less than or equal to the second cost, the authorization request message is routed to the first payment processing network. If the first cost exceeds the second cost, at least one rule is applied to determine whether the first cost is to be reduced. If the at least one rule is satisfied, the first cost is reduced and the authorization request message is routed to the first payment processing network. | 02-28-2013 |
20130054466 | Dynamic Card Verification Value - As described herein, a card services provider dynamically generates a card verification value (CVV) for a transaction card and sends the dynamically-generated CVV to a cardholder. The card services provider generates the dynamically-generated CVV such that the dynamically-generated CVV is substantially unpredictable based on other dynamically-generated CVVs for the transaction card. The dynamically-generated CVV is only valid for a limited period of time and/or for a limited number of economic transactions. The cardholder uses the dynamically-generated CVV as part of an economic transaction with a merchant. Because the dynamically-generated CVV is only valid for a limited number of economic transactions and/or for a limited period of time, it may be difficult for a thief to repeatedly use the transaction card to make economic transactions. | 02-28-2013 |
20130060691 | Location-Based Rules for a Financial Account - According to some embodiments, a system comprises an interface and one or more processors. The interface receives a request for a transaction from a primary user of a financial account. The processor(s) determine rules associated with the primary user. The rules indicate whether an administrator has authorized the primary user to make the transaction, and at least one of the rules includes comparing a location associated with the request to one or more approved locations from which the primary user is authorized to make the transaction. The processor(s) process the transaction according to the rules. | 03-07-2013 |
20130060692 | Access Control for a Financial Account - According to some embodiments, a system comprises an interface and one or more processors. The interface receives a request for a transaction from a user of a financial account. The processor(s) determine, based on a user identifier, whether the user corresponds to an administrator, a primary user, or a contributor. The administrator is authorized to configure rules for the financial account and to conduct deposit transactions, withdrawal transactions, and view transactions. The primary user is authorized to conduct at least one of the following types of transactions according to the rules: the deposit transactions, the withdrawal transaction, and the view transactions. The contributor is authorized to conduct at least one of the following types of transactions according to the rules: the deposit transactions and the view transactions. The processor(s) process the transaction according to the rules associated with the user requesting the transaction. | 03-07-2013 |
20130060693 | UNIFIED CHARGING SYSTEM - Technologies are generally described for systems and methods effective to create and use a unified charging system in a networking environment. In an example, a virtual charging card can be created and authenticated, and cash and credit accounts can be associated with the virtual charging card, and billing accounts can also be associated. In another example, a virtual charging card can be initialized when checking out at a shopping portal, and display a list of cash and credit accounts affiliated with the virtual charging card. One or more of the cash and credit accounts can be selected, and payment transferred to the shopping portal via the virtual charging card, masking the identity of the owner of the cash and credit accounts. | 03-07-2013 |
20130060694 | UNIFIED ACCOUNT HANDLING SYSTEM - Technologies are generally described for systems and methods effective to create and use a unified charging system in a networking environment. In an example, a virtual charging card can be created and authenticated, and cash and credit accounts can be associated with the virtual charging card, and billing accounts can also be associated. In another example, the virtual charging card can be used to transfer money from affiliated cash and credit accounts to selected billing accounts, or other virtual charging cards, while anonymizing the transfer process. In another example, the virtual charging card can be used to schedule automatic payments for utility bills, loan repayments, and charitable accounts. | 03-07-2013 |
20130060695 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one request for personal information from a party to a transaction; evaluating the transaction; selecting a persona at least partly based on an evaluation of the transaction, wherein the persona is linked to a unique identifier that is at least partly based on a user's device-identifier data and the user's network-participation data; and presenting the persona in response to the request for personal information. | 03-07-2013 |
20130060696 | INSTANTANEOUS MERCHANT INFORMATION RETRIEVAL FOR FINANCIAL TRANSACTIONS - A solution to disambiguate ambiguous merchant data in connection with processing a cashless transaction request in a real-time manner. Provided according to the present disclosure are a system and method including a binary-searchable non-transitory computer-readable medium is configure to store a first set of unambiguous merchant identification data having plural data entries therein, each entry corresponding to a merchant. A binary search of the first set of unambiguous merchant identification data is carried out using search keys based upon the ambiguous merchant identification data to determine whether one or more entries of the first set satisfies at least one of a hierarchical second set of partial match criteria for comparing the ambiguous merchant identification data with the first set of unambiguous merchant identification data. An entry of the first set of unambiguous merchant identification data is assigned to correspond with the ambiguous merchant identification data where at least a predetermined number of the second set of partial match criteria are met. | 03-07-2013 |
20130060697 | METHOD AND SYSTEM FOR PERFORMING A TRANSACTION - The disclosure relates to a method and system for performing a transaction that includes providing an image valid only for a determined transaction; displaying the image on a screen of a communication terminal of a first user involved in the determined transaction; recognizing the displayed image through a terminal of a second user involved in the determined transaction; verifying the validity of the recognized image; and once the image has been validated, performing the determined transaction. | 03-07-2013 |
20130060698 | MANAGING TRANSACTION ACCOUNTS - A transaction account verification system and method are provided. A user computing device transmits an account registration request that includes a selection of an account verification technique. A service provider obtains the request and initiates a set of transactions with an identified financial service provider. The service provider generates at least one verification token reflective of the set of transactions and at least one piece of information associated with the selected account verification technique. The user computing device generates at least one user verification token from user input regarding the set of transactions and at least one piece of information associated with the selected account verification technique. The service provider can verify the transaction account and set transaction thresholds based upon matching verification tokens. | 03-07-2013 |
20130060699 | METHOD AND SYSTEM FOR DIGITAL DOCUMENT MANAGEMENT ON A MOBILE DEVICE - A method and system are described for tracking a process of provisioning, by a middleware server to a portable device in a mobile payment system, electronic wallet data for authorizing a payment transaction. In an embodiment, a user request for a payment account product is transmitted by the portable device to the middleware server. In response, the middleware server initiates a provisioning process for the requested payment account product, including storing status data indicative of an initiated state of the provisioning process. The middleware server then transmits a digital document to the portable device, including information that must be viewed by the user, and updates the status data indicative of a transmitted state of the digital document. In response to receiving an indication that the digital document has been viewed, the middleware server updates the stored status data indicative of a digital document viewed state. The middleware then provisions an electronic wallet data for the requested payment account product to the portable device. | 03-07-2013 |
20130060700 | ENABLING TRANSFERABLE ENTITLEMENTS BETWEEN NETWORKED DEVICES - A method, apparatus, and system are directed towards employing transferable entitlements using EMMs for enabling a purchase of content using a mobile device, and redeeming for access the content using a different network device. An existing billing infrastructure may be used during a purchase transaction to identify the purchasing device. Upon billing authorization, a transferable EMM (XEMM) may be sent to the purchasing device. The purchasing device may then provide the XEMM to another network device. The other network device may send the XEMM to a redeeming service when requesting access to the content. Upon authorization, an EMM with an access key to the content may be sent to the other network device. | 03-07-2013 |
20130060701 | ELECTRONIC PAYMENT SERVICE METHOD, AND ELECTRONIC PAYMENT SERVICE APPARATUS, MOBILE COMMUNICATION TERMINAL, AND TRANSACTION TERMINAL FOR PERFORMING THE METHOD - The present invention relates to a payment apparatus and payment method using a mobile communication network. According to one embodiment of the present invention, the electronic payment service apparatus, which carries out payment using a mobile communication network, comprises: a transaction authentication unit which receives article purchase information from a transaction terminal and authenticates the transaction terminal; a transaction identification number information generating unit which generates transaction identification number information corresponding to the article purchase information received from the transaction terminal; and a payment authentication information generating unit which transmits the transaction identification number information to the transaction terminal, receives payment information corresponding to the transaction identification number information from a mobile communication terminal, and generates payment authentication information corresponding to the payment information. | 03-07-2013 |
20130066778 | Systems and Methods for Pre-Authorized Money Transfer Transactions - Methods and systems which allow one or more money transfer transactions to be implemented in a manner which provides additional certainty to a receiving party are provided. In one embodiment, a money transfer service authorizes a sender to transfer up to a certain amount of money. With this authorization, a money transfer transaction regiment is established, while the money transfer service maintains an accounting of the balance to insure that the balance remains below the pre-determined authorized amount. In another embodiment, a money transfer services utilizes reliability criteria to authorize a sender to transfer money with the money and service charge being collected after the transfer is completed. | 03-14-2013 |
20130066779 | System and Method for Issuing Negotiable Instruments by Licensed Money Transmitter from Direct Deposits - Anonymous transactions regarding prepaid negotiable instruments may be conducted. An anonymous account may be provided that is identified by an account number. Upon verification of a PIN and the account number, an individual is authorized to make an initial deposit of funds into the anonymous account, representing a pre-payment for negotiable instruments. The individual is thus authorized to request the issuance of negotiable instruments in an amount not exceeding the initial deposit of funds. When the issuance of negotiable instruments has depleted the initial deposit of funds, the anonymous account is closed. However, the anonymous account may be converted into a non-anonymous account, capable of accepting subsequent deposits, if the individual provides personal identifying information. While an anonymous account is not authorized to accept direct deposits of funds, the non-anonymous account may be linked to a traditional bank account, via a communications link, to indirectly offer direct deposit capabilities. | 03-14-2013 |
20130066780 | METHOD AND SYSTEM FOR FUNDING A FINANCIAL ACCOUNT - A system for generating and processing an electronic funding application is disclosed. The system includes a memory storing instructions and a processor configured to execute the instructions to transmit the electronic funding application to a client and enter financial data into the funding application. The financial data includes a magnetic ink character recognition (MICR) line, a currency amount, and an account identifier. The instructions further transmit the financial data to a server, validate at least a portion of the financial data by comparing a portion of the financial data to data representing valid demand deposit accounts, convert the MICR line to an item compatible with an automated clearing house (ACH) network, and submit the item and the currency amount to the ACH network. The currency amount is transferred from the demand deposit account of the customer to the financial account of the customer. | 03-14-2013 |
20130066781 | ENCRYPTION SWITCH PROCESSING - A method for delivering non-financial electronic data through a secure communications channel between a payment processing network and an access device is disclosed. One embodiment of the invention is directed to a method comprising receiving, at a payment processing network, a request to establish a secure communications channel between a consumer device and the payment processing network. Upon establishing a secure communications channel with the consumer device, the payment processor network receives non-financial electronic content from a merchant at the payment processing network where the non-financial electronic content is selected at the merchant by a user associated with the consumer device. The non-financial electronic content is sent to the consumer device from the payment processing network via the secure communications channel between the consumer device and the payment processing network. | 03-14-2013 |
20130066782 | Wireless Mobile Communicator for Contactless Payment on Account Read from Removable Card - A wireless mobile communications apparatus reads removable cards and can communicate an account corresponding to the removable card in order to conduct a wireless transaction with a merchant on the account with the wireless mobile communications apparatus. A total currency amount for the transaction, and remaining balance in the account after the transaction, can be displayed on a display screen of the wireless mobile communications apparatus. The removable card can be a gift card bearing a magnetic strip having an identifier for the account encoded thereto that will be read when inserted into the wireless mobile communications apparatus which can be a cellular telephone or Web enabled portable device. The magnetic strip gift card can be substantially composed of paper so as to be intended for disposable after use. | 03-14-2013 |
20130066783 | METHOD FOR PRODUCING A TRANSACTION SIGNAL - A method for generating a transaction signal using a first device and a second device includes generating first information dependent on a user-selected amount, transmitting the first information to a verification device and generating therefrom a signal, generating based on the first information with the verification device first verification information, transmitting the signal from the verification device to the first device where the signal is converted into a two-dimensional representation for display on the first device, recording the two-dimensional representation on the display of the first device with a camera of a second device and generating a recording signal, transmitting with the second device the recording signal, or other information dependent on the recording signal, to the verification device for generating second verification information, and generating the transaction signal when a comparison between the first verification information and the second verification information produces a predetermined result. | 03-14-2013 |
20130073460 | ENABLING PAID-FOR EXCHANGE OF IDENTITY ATTRIBUTES WITH MINIMAL DISCLOSURE CREDENTIALS - The claimed subject matter provides a system and method for enabling paid-for exchange of identity attributes with minimal disclosure credentials. An exemplary method includes requesting a credential from an identity provider by one of a user or a credential agent. The credential may be presented to a relying party, and the presented credential may be verified. Based on verification of the presented credential, a service of the relying party may be accessed by the user. The user, the relying party, a neutral third party, or the credential agent may provide payment for the credential to the identity provider, and the identity provider is unable to determine whether, where, when or by whom the credential has been used. | 03-21-2013 |
20130073461 | Processing a Payment Transaction Involving a Merchant Account and a Customer Account Associated with the Same Enterprise - In an exemplary embodiment, a method includes receiving a payment transaction comprising a customer account identifier and a merchant account identifier. A processor may determine whether the customer account identifier and merchant account identifier correspond to respective accounts associated with the enterprise. If the account identifiers each correspond to a respective account associated with the enterprise, the processing of the payment transaction is initiated at the enterprise and a notification that the enterprise initiates the processing of the payment transaction is sent. If the account identifiers do not each correspond to a respective account associated with the enterprise, a notification that the payment transaction was not processed may be sent. | 03-21-2013 |
20130073462 | Processing a Payment Transaction From a Mobile Device - In an exemplary embodiment, a method includes receiving, from a mobile device, a payment transaction between a customer and a merchant. A customer account identifier and a merchant account identifier of the payment transaction may be determined. The method further includes communicating the customer account identifier to an enterprise to determine whether the customer account identifier corresponds to a customer account associated with the enterprise. If the customer account identifier and the merchant account identifier each correspond to a respective account associated with the enterprise, an indication that the enterprise initiates the processing of the payment transaction is received, and a notification that the payment transaction was processed is sent. If the customer account identifier and the merchant account identifier do not each correspond to a respective account associated with the enterprise, a notification that the payment transaction was not processed is sent. | 03-21-2013 |
20130073463 | ISSUER TRUSTED PARTY SYSTEM - Embodiments of the invention are directed to an authentication platform capable of storing authentication data received from an issuer access control server. The authentication platform can authenticate users and portable devices, on behalf of the issuer access control server, using the stored authentication data. Messaging extensions are included in transaction messaging indicating the authentication platform's status as an issuer trusted party, allowing the issuer access control server computer to rely on the authentication platform to conduct authentication processing. | 03-21-2013 |
20130073464 | SYSTEMS AND METHODS TO COMMUNICATION VIA A MERCHANT AGGREGATOR - A computing apparatus configured to determine account numbers of account holders, determine merchant identifiers used to identify respective merchants in authorization requests for transactions between the respective merchants and the account holders, monitor transactions processed by a transaction handler to detect first transactions between the merchants and the account holders, and transmit information about each of the first transactions to a remote computing device in real time as the transaction handler processes the authorization of the respective detected transaction. | 03-21-2013 |
20130073465 | MERCHANT STRUCTURE HIERARCHIES FOR MEDIATING TRANSACTION DATA ACCESS - Mediation hierarchies may be established and maintained for use in accessing and managing transaction data. The hierarchies may correspond to merchant organizational structures. The transaction data may include financial transactions, such as payment transactions facilitated by portable consumer devices including credit, debit and charge cards, that are made by customers of the merchant. The hierarchies may be used to mediate reporting, searching and decision management functionality with respect to the transaction data. Users may make requests with respect to transactions associated with one or more portions of a hierarchy. Transaction data access control may be associated with hierarchy nodes. Merchant organizational structures may change over time, and a history may be maintained for each mediation hierarchy. Transaction processing functionality associated with time intervals during which multiple hierarchy versions were active may be processed with respect to the active hierarchy version for each sub-interval. | 03-21-2013 |
20130080323 | RESTRICTED FUNDING SOURCE - An account with restricted use is maintained by a payment provider, where funds from the account can only be used when specific user-determined conditions are met. The user may specify one or more payees, an amount or maximum payment, a time or date range for payment, or other restrictions. | 03-28-2013 |
20130080324 | EASY CREATION OF MOBILE PAYMENT CODE - A user is presented with a first display with parties to a payment transaction and a second display on the same screen, where the user can drag and drop the parties on the first screen to the second screen to create a desired payment flow. A service provider, such as a payment provider, builds code based on the payment flow and zips it into a downloadable file. The user can then easily implement the zipped code into a mobile app that will allow a customer to make a purchase through the app using the payment provider. The zipped code uses a library of payment options offered by the payment provider and allows the user to input custom variables into these options. Code is automatically generated for the user to use based on the user input. | 03-28-2013 |
20130080325 | DEPOSITING AND WITHDRAWING FUNDS - A user without Internet access or a bank account can fund an online payment provider account by depositing cash or voucher from a third party into a machine or with a person, and entering an account identifier, such as an email or phone number. The user can receive cash through the online payment provider by logging into an account through a machine, entering the amount of cash requested, and receiving a voucher. The user can then insert the voucher into a cash dispensing machine or present the voucher to a person to redeem the voucher for cash or redeem the voucher for store merchandise. | 03-28-2013 |
20130080326 | HOUSEHOLD PAYMENT MANAGEMENT AND TRACKING SYSTEM - An efficient digital tracking and payment system for members of a household, such as minors and guardians. The system allows for minors and guardians to enter into agreements for services (e.g., chores) and rewards through a single portal digital application that tracks services and notify parties of completion thereof. The system also provides a mechanism for funding of payment from one party to the other on mobile devices and computers over the internet. The system also allows guardians so predetermine the allocation of payments to multiple accounts for a minor. A marketplace is also provided which allows minors to purchase goods or services with funds earned by completing services. | 03-28-2013 |
20130080327 | AUTOMATIC REFRESH AUTHORIZATION FOR EXPIRED PAYMENT TRANSACTION AUTHORIZATIONS - An automatic refresh authorization for payment transaction authorizations that are estimated to be expired is disclosed. The automatic refresh authorization can be determined ‘in house’ by a payment service provider without the need for human intervention or additional information from a merchant. If several days have gone by since a credit card payment was authorized (but not settled), a reauthorization can be automatically initiated so that a subsequent capture/settlement request will successfully transfer funds. The threshold number of days/hours can be customized by the payment service and/or merchant and may be directed to certain payment processors with high fees only. If the reauthorization fails, a capture request based on the original authorization can be attempted in order to document the denied capture request for the merchant. | 03-28-2013 |
20130080328 | Systems and Methods for Processing Payment Transactions - Embodiments of the disclosure can include systems and methods for processing transactions. In one embodiment, a computer-implemented method for processing proposed transactions can be provided. The method can include storing, by a service provider system comprising one or more computers, one or more issuer rules associated with the applicability of one or more payment accounts to proposed transaction; receiving, by the service provider system from a merchant computer, information associated with a proposed transaction, the information comprising one of an identification of a payment account or an identification of a consumer payment device; evaluating, by the service provider system utilizing the one or more issuer rules, the proposed transaction; and determining, by the service provider system based at least in part upon the evaluation, at least one of (i) a payment account to utilize in association with the proposed transaction or (ii) whether the proposed transaction will be approved or denied. | 03-28-2013 |
20130080329 | Systems and Methods for Facilitating Card Present Transactions - Embodiments of the disclosure can include systems and methods for facilitating card present transactions. In one embodiment, a computer-implemented method for conducting card present transactions can be provided. The method can include receiving, by a merchant system comprising one or more computers, a request for a card present electronic commerce transaction on behalf of a consumer; determining, by the merchant system, an identifier of a mobile device of the consumer; obtaining, by the merchant system from the mobile device, validation information associated with a payment application stored on the mobile device; and outputting, by the merchant system for communication to an issuer system, a proposed card present transaction and the validation information. | 03-28-2013 |
20130085939 | INTERACTIVE, AUTOMATED TRANSACTION REPORTING AND AUTOMATED COLLECTION - The present invention relates to reporting transactions, such as credit reporting, and provides systems and methods for conditioning payment from a purchaser to a seller of a scheduled payment based on the seller reporting information concerning the scheduled payment, or another scheduled payment to the seller, or a previous payment to the seller, or any combination thereof. The present invention also relates to systems and methods for automatically collecting payments from a purchaser for repayment. | 04-04-2013 |
20130085940 | SYSTEM AND METHOD OF CASHING A CHECK - A system and method of cashing a check which reduces wait times and automates a very manual process. An example method includes capturing an image of the check, sending a request including an image file containing the image of the check to a check approval system, receiving an approval to cash the check from the check approval system, and submitting the image file and the approval during a check cashing transaction at a self-service terminal. | 04-04-2013 |
20130085941 | SYSTEMS AND METHODS FOR SECURE WIRELESS FINANCIAL TRANSACTIONS - There are provided systems and methods for conducting secure wireless financial transactions using portable electronic devices. For example, a method of conducting a wireless transaction is provided that includes taking a picture of a first QR code displayed on a transaction terminal using a camera of a portable electronic device. The method also includes sending data from the portable electronic device to the transaction terminal to conduct the financial transaction with the transaction terminal using a near field communication channel or another wireless communication channel, or both. This data is derived from the first QR code to enable the transaction terminal to verify that the portable electronic device is physically located near the transaction terminal. | 04-04-2013 |
20130085942 | ELECTRONIC FUNDS TRANSFER - Described herein is a method for secure transfer of funds. The method includes receiving a funds transfer request from a user on a transaction initiating channel, following a first authentication, and verifying the first authentication on a transaction authorization channel based on a second authentication, wherein the second authentication is based partly on at least one request for an information element, wherein the information element includes one or more non-repeating information elements exclusively associated with the user and known to a source authorizing the funds transfer request. | 04-04-2013 |
20130085943 | ELECTRONIC PAYMENT SYSTEM FOR AUTOMATED MACHINE - An electronic payment system is provided to comprise a mobile terminal | 04-04-2013 |
20130091057 | METHODS AND SYSTEMS FOR PROVIDING ENHANCED DATA FOR CO-BRAND PAYMENT CARD TRANSACTIONS - A computer-based method for processing a payment transaction using an enhanced payment card is provided. The transaction is processed using a computer device coupled to a storage device. The enhanced payment card is issued to a cardholder by an issuer. The method includes receiving an authorization request message associated with a merchant. The authorization request message includes a card identifier and relating to a transaction initiated by the cardholder with the merchant using the enhanced payment card. The method includes transmitting an authorization response message to the merchant. The authorization response message is generated by the issuer and including an instructing message. The merchant is instructed, via the instructing message, to transmit to the computer device an addendum file including enhanced transaction data for the transaction. | 04-11-2013 |
20130091058 | Electronic Commerce System - Embodiments of the present invention provide methods, systems, and computer readable storage media to facilitate a transaction in an electronic commerce system. Aspects of the embodiments include receiving a request at a network-connected transaction server to transfer one or more transaction items involving a first user account on the transaction server, selecting a delivery instrument from one or more available delivery instruments associated with the first user account on the transaction server, authorizing the request based at least upon a unique transaction identifier associated with the request and a unique user device identifier associated with a user access device, transferring a quantity of the one or more transaction items into or out of the selected delivery instrument, wherein the quantity is determined at least based upon the authorized request. | 04-11-2013 |
20130091059 | SERVER DEVICE FOR CONTROLLING A TRANSACTION, FIRST ENTITY AND SECOND ENTITY - Server device for performing a transaction in a system having a first entity, such as a POS, a second entity, such as a user having a mobile phone with a digital camera, and a remote server. The first entity generates a code having a transaction information and sends a first message to a server. The second entity, such as a buyer of a product or a user of a service captures the code and transmits a second message to the server having information on the transaction extracted from the code. The transaction is only authorized, when the server has determined that the first message and the second message match with each other. The transaction can be a payment transfer, a grant of an access to a service or a grant of an access to an internet portal. | 04-11-2013 |
20130091060 | System and method for configuring risk tolerance in transaction cards - A method comprising receiving a security profile configurable by a card party, storing the security profile in a database, receiving a transaction request to activate a transaction card, determining whether the transaction request satisfies the security profile's one or more requirements. | 04-11-2013 |
20130097078 | MOBILE REMOTE PAYMENT SYSTEM - Methods, systems, apparatus and computer program products for implementing a mobile remote payment system that allows consumers and merchants to engage in mobile remote payment transactions regardless of their registration point are described. In an embodiment, a mobile remote payment (MRP) switch computer receives from an originating service manager computer, a payment authorization request that comprises payment data, an originating service manager identifier, and a merchant identifier of a merchant. The MRP switch computer verifies the originating service manager identifier, determines that the merchant is affiliated with the receiving service manager, generates enriched payment instructions that include a switching identifier, transmits the enriched payment instructions to a receiving service manager computer, receives a payment authorization response from the receiving service manager computer that includes an electronic receipt, and transmits the payment authorization response and the electronic receipt to the originating service manager computer. | 04-18-2013 |
20130097079 | ENABLING PAYMENT FOR ITEMS USING A MOBILE DEVICE - A computer-implemented method for enabling payment for items using a mobile device may include: authenticating the mobile device with a service provider; confirming, by a device manager, authentication of the mobile device; activating the authenticated mobile device by an activation signal; responding to the activation signal by sending an identification signal from the authenticated mobile device to the device manager; identifying, by the device manager, the authenticated mobile device using the identification signal; receiving, by the identified mobile device, an identifier list, the identifier list including a first item identifier identifying a first set of items, where the identifier list is received after the confirmation of the authentication of the mobile device by the device manager; and sending, by the identified mobile device to the device manager, an indication of a selection of the first item identifier. | 04-18-2013 |
20130097080 | TAP AND WIRELESS PAYMENT METHODS AND DEVICES - Example embodiments include methods and apparatus for exchanging, using a contactless interface included in a portable device, transaction information associated with an electronic merchant device when the portable device is brought into close proximity to a contactless interface associated with the electronic merchant device, with the information identifying the electronic merchant device and identifying a handover wireless network connected to the electronic merchant device and with information including security credentials required to form a secure connection, establishing a persistent, secure wireless connection with the electronic merchant device, using a wireless network interface in the portable device and the transaction information, over the handover wireless network and exchanging transaction messages between the portable device and the electronic merchant device over the persistent, secure wireless connection during a shopping interval. | 04-18-2013 |
20130097081 | ELECTRONIC PAYMENT PROCESSING - A payment message is received from a buyer relating to a transaction with a merchant. The payment message is parsed to obtain merchant identifying information, and further parsed to obtain at least some payment information for the transaction. The payment information is submitted to a third party settlement processor on behalf of the merchant. The results of the transaction are reported to at least one of the merchant and the buyer. | 04-18-2013 |
20130097082 | Electronic Credit Card-ECC - An Electronic Credit Card (ECC) including a user verifier for verifying a user's identity, a code generator for generating a unique authorization code for the user, storage of the user's account details for use in an electronic funds transfer, and a communicator for non-visual communication of the account details and the authorization code to a transaction station. | 04-18-2013 |
20130097083 | USING A SECURE ELEMENT COUPLED TO A MOBILE DEVICE AS A POS TERMINAL FOR PROCESSING NFC TRANSACTIONS - A method and system for conducting an online payment transaction through a point of sale device. The method includes receiving input from a user selecting an item for purchase through the point of sale device; calculating a total purchase amount for the item in response to a request from the user to purchase the item; and sending payment authorization for the total purchase amount from the point of sale device to a payment entity, in which the payment authorization is sent to the payment entity via a mobile communication device of the user. The method further includes receiving a result of the payment authorization from the payment entity through the mobile communication device; and completing the payment transaction based on the result of the payment authorization. | 04-18-2013 |
20130097084 | UTILITY METERING SYSTEM INCORPORATING A TRANSACTION AUTHORISATION SYSTEM - A transaction authorisation system comprises a user interface unit | 04-18-2013 |
20130103583 | Universal Cash Account - According to one embodiment, an apparatus may include a memory and a processor. The memory may be operable to store a cash account associated with a cash value and a user. The processor may be operable to receive a request from the user to pay an amount from the cash account. The processor may determine, in response to the request, whether the amount exceeds the cash value associated with the cash account. The processor may then decrease the cash value associated with the cash account by the amount if the amount does not exceed the cash value of the cash account. The processor may then send a notification that includes the decreased cash value associated with the cash account. The apparatus may be associated with an enterprise and the enterprise may exclusively process the request. | 04-25-2013 |
20130103584 | PAYMENT SERVICE THAT PROVIDES OPTION TO AUTHENTICATE WITH EXTERNAL AUTHENTICATION SERVICE - A system and associated methods are disclosed for enabling users to use social media account information to make payments to merchants. A payment service receives a user's identifier in response to a user authentication request sent over a network to an authentication service of a social media site. The user authentication request includes social media login credentials of the user and is associated with a payment page of a merchant that has an account with the payment service. The payment service receives the user identifier when the authentication service validates the social media login credentials. Based at least in part on the user identifier, the payment service retrieves payment information obtained by a previous payment transaction of the user from its database. The payment service provides the user with an option to use the retrieved payment information to make a payment to the merchant. | 04-25-2013 |
20130103585 | Fueling Environment Wireless Architecture - A method and system for transmitting data between devices within a fueling environment comprising a wireless mesh network wherein the devices are configured to communicate via the wireless mesh network. A wireless communication device is connected to each device, and a middleware executed by the wireless communication device handles communications between the devices and the wireless mesh network. | 04-25-2013 |
20130103586 | SPENDING VEHICLES FOR PAYMENTS - A system and method for associating payments with spending vehicles so that an individual who is entitled to receive periodic or special payments such as social security checks receives in place of the payment a spending vehicle such as a discount card, rebate, or coupon for use with purchases of the sponsor's products or services. Sponsors include companies and organizations interested in offering purchase incentives to their customers. An individual who wishes to receive a spending vehicle rather than the regular payment selects the spending vehicle he or she would like to receive. The individual then assigns his or her right to receive the payment to a third party. The third party then arranges to give a spending vehicle to the individual and to transfer the individual's payment to the sponsor of the spending vehicle. The third party may take a portion of the payment as compensation for the service. | 04-25-2013 |
20130103587 | SECURE AND PORTABLE PAYMENT SYSTEM - Payment systems are provided that utilize a portable device, and in particular, payment systems that utilize a first portable device that belongs to a seller and a second portable device that belongs to a buyer, but do not utilize a point of sale (POS) device. | 04-25-2013 |
20130103588 | PROCESSING PAYMENTS AT A MANAGEMENT SERVER WITH A USER SELECTED PAYMENT METHOD - A method and system for conducting an online payment transaction through a point of sale device. The method includes receiving input from a user selecting an item for purchase through the point of sale device; calculating a total purchase amount for the item in response to a request from the user to purchase the item; and sending payment authorization for the total purchase amount from the point of sale device to a payment entity, in which the payment authorization is sent to the payment entity via a mobile communication device of the user. The method further includes receiving a result of the payment authorization from the payment entity through the mobile communication device; and completing the payment transaction based on the result of the payment authorization. | 04-25-2013 |
20130103589 | PROVIDING LICENSED CONTENT TO A USER - When a user requests licensed content, a dynamic licensing mechanism automatically requests and receives licenses for the licensed content when one or more criterion in a licensing policy is satisfied by license information relating to the content, without the user providing any further input to acquire the licenses. | 04-25-2013 |
20130103590 | METHODS, SERVER, MERCHANT DEVICE, COMPUTER PROGRAMS AND COMPUTER PROGRAM PRODUCTS FOR SETTING UP COMMUNICATION - It is presented a security server arranged to set up communication between a merchant device and a customer payment application. The security server comprises: a receiver arranged to receive a first message comprising a customer identifier, an application identifier and a security token; a determiner arranged to determine whether the merchant device is authorised; a transmitter arranged to send a second message to the merchant device, the second message indicating that the merchant device is authorised to effect payment; and a channel establisher arranged to set up a secure channel between the merchant device and the customer payment application in a secure element being adapted to be comprised in a mobile communication terminal, wherein all communication between the merchant device and the customer payment application is controlled by the security server. Corresponding methods, merchant device, computer programs and computer program products are also presented. | 04-25-2013 |
20130110719 | METHOD AND SYSTEM FOR MULTIPLE PAYMENT APPLICATIONS | 05-02-2013 |
20130110720 | SYSTEM AND METHOD FOR UTILIZING STUDENT ACCOUNTS | 05-02-2013 |
20130110721 | CONFIRMING LOCAL MARKETPLACE TRANSACTION CONSUMMATION FOR ONLINE PAYMENT CONSUMMATION | 05-02-2013 |
20130110722 | System and Method For Identity Chaining | 05-02-2013 |
20130117182 | MEDIA FILE ABBREVIATION RETRIEVAL - A server receives a sound file corresponding to a sound corresponding to a media file. The server compares the sound file to a library of media file sound recordings to identify a media file and a matching position in the media file of a final sound in the sound file. The server determines, from a data structure of media abbreviations, a media abbreviation that corresponds to a final sound data present in the sound file. The server transmits the media abbreviation to the addressable device. | 05-09-2013 |
20130117183 | Universal positive pay match, authentication, authorization, settlement and clearing system - A Universal Positive Pay Database (UPPD) method, system and/or computer useable medium to reduce financial transaction fraud. A UPPD database is configured to store thereon transaction records associated with financial transactions corresponding to customers of the UPPD database. A particular financial transaction is initiated between a payer and a payee by providing parameters associated with the financial transaction to the UPPD database. An issue Vile is provided to the UPPD database that includes parameters associated with the particular financial transaction. A correspondence determination is made between the financial transaction parameters from the Issue File and the financial transaction parameters provided to the UPPD database at every point along the financial transaction clearing process. The customer, payer, payee, payee bank, drawee bank, and banking institutions intermediate the payee bank and the drawee bank are able to access the correspondence determination at every point along the financial transaction clearing process. | 05-09-2013 |
20130117184 | Camera as a Vehicle to Identify a Merchant Access Device - Systems and methods of conducting a payment transaction using a mobile phone having a camera. The systems and methods receive an image of a merchant access device and optionally location data from a mobile device of a user engaged in the transaction. The systems and methods also receive transaction information associated with the transaction and account information associated with an account of the user. The systems and methods use the information to authorize or decline the transaction. | 05-09-2013 |
20130124412 | SPLIT MOBILE PAYMENT SYSTEM - Systems and methods for providing enhanced transaction security via use of a split mobile payment system which allows a Consumer to pay for a purchase using his mobile device without exposing Payment Account information to the merchant. The split mobile payment system may include a mobile payment application (MPA), running on a Consumer's mobile device, which can communicate with a Payment Platform and merchant's in-store Point of Sale Payment Application (PPA). A barcode can be used as one means for identifying a Consumer's Payment Account to the Payment Platform via the PPA. In the event of a PIN being required, the PIN may be entered by the Consumer via the mobile device rather than the merchant's PPA. | 05-16-2013 |
20130124413 | MOBILE IMAGE PAYMENT SYSTEM USING SHORT CODES - A Mobile Image Payment System for mobile commerce, which enables a Consumer to use a mobile device to make payments for online, Electronic Media, Print Media and POS Transactions, involving the presentment of a short code. In an embodiment, the Consumer scans the short code that is displayed by a merchant, to initiate a transaction. The system completes the transaction by processing information between a Mobile Payment Client residing on the Consumer's mobile device, a Mobile Payment interface residing on a Transaction Server, and, in a further embodiment, a Mobile Payment Application residing on a merchant's device or POS terminal. The Consumer's mobile device communicates with a Payment Platform, which communicates with a Merchant Transaction Server in order to process and complete the mobile transaction. The short code of the merchant can be displayed on any product or advertising medium. | 05-16-2013 |
20130124414 | SYSTEMS AND METHODS FOR MOBILE AUTOMATED CLEARING HOUSE ENROLLMENT - Systems and methods for mobile enrollment in automated clearing house (ACH) transactions using mobile-captured images of financial documents are provided. Applications running on a mobile device provide for the capture and processing of images of documents needed for enrollment in an ACH transaction, such as a blank check, remittance statement and driver's license. Data from the mobile-captured images that is needed for enrolling in ACH transactions is extracted from the processed images, such as a user's name, address, bank account number and bank routing number. The user can edit the extracted data, select the type of document that is being captured, authorize the creation of an ACH transaction and select an originator of the ACH transaction. The extracted data and originator information is transmitted to a remote server along with the user's authorization so the ACH transaction can be setup between the originator's and receiver's bank accounts. | 05-16-2013 |
20130124415 | SYSTEMS AND METHODS FOR SECURE AUTHENTICATION USING A WATERMARK - Systems, methods, and devices for authenticating a user using a watermark are provided. A device for authenticating a user includes one or more processors configured to prepare information including a watermark and a request for user credentials in response to a request for service requiring authentication, wherein the watermark comprises at least one of an image, text, a sound, a photo, and a combination thereof that is chosen by the user, and match received user credentials to stored user credential information. The device also includes a network interface component coupled to a network, the network interface component configured to receive the request for the service requiring authentication, and transmit the information including the watermark and the request for user credentials. The device further includes a memory, the memory storing the user credential information for matching to received user credentials. | 05-16-2013 |
20130124416 | METHOD AND SYSTEM FOR TRANSFERRING FUNDS OVER A VOICE CALL - The various embodiments herein provide a method and system for transferring funds between users over a voice call. The method comprises registering a plurality of users for funds transfer with a payment system, initiating the voice call between a payer and a payee involved in the funds transfer, establishing a communication link with the payment system during the voice call, providing a funds transfer request to the payment system by the payer, prompting an authentication token and providing a biometric signature of the payer and the payee to the payment system, verifying identity of the payer and the payee based on the authenticity of the biometric signature, retrieving the payer and the payee details from a central database, initiating the funds transfer and sending a funds transfer notification to the payer and the payee indicating that the payment from the payer to the payee has been made. | 05-16-2013 |
20130124417 | SYSTEMS AND METHODS TO PROVIDE GENERALIZED NOTIFICATIONS - A computing apparatus is configured to generate a generalized message to report information about an event, such as the processing of an authorization request or a settlement request for a transaction made using a consumer account of a user, to an aggregator, which is configured to further process the generalized message to provide services to the user, such as providing customized notification to the user, providing offers to the user, redeeming coupons or loyalty currency for the user, etc. | 05-16-2013 |
20130124418 | ECOMMERCE SYSTEM WITH PAYMENT DATA DIVISION - In at least one embodiment of an ecommerce system, payment data is divided into proper subsets and distributed among multiple data processing systems, and each of the data processing systems stores less than all of the subsets of the payment data after the subsets of payment data are distributed and until at least sending the payment data to a payment authorization system for processing. In at least one embodiment, distributing proper subsets of the payment data among multiple data processing systems enhances security of the payment data by limiting an amount of time and the locations in which a complete set of payment data is persisted. | 05-16-2013 |
20130132275 | RISK ANALYSIS OF MONEY TRANSFER TRANSACTIONS - A money transfer system includes a risk assessment system and a risk modeling system. The risk assessment system uses rules engines and Z scores to assess, on a real time basis, risk factors associated with money transfers. The risk modeling system develops risk scores based on historical transaction data in order to create a risk model. The risk model may be analyzed over time to refine the rules engines and take other actions to understand and reduce the risk of improper activity in connection with money transfers. | 05-23-2013 |
20130132276 | SYSTEMS AND METHODS FOR PROVIDING ACH TRANSACTION NOTIFICATION AND FACILITATING ACH TRANSACTION DISPUTES - A system and method for identifying incoming ACH transactions involving subscriber accounts at a financial institution, comparing the ACH transaction details with preset notification criteria, suspending any ACH transaction that satisfy the preset criteria so that the transaction does not post to the account, notifying the subscriber of the incoming ACH transaction, providing the subscriber with the option to either authorize or dispute the ACH transaction, and facilitating the dispute process according to applicable banking rules by requesting further information from the subscriber and forwarding the dispute information to the ACH operator. | 05-23-2013 |
20130132277 | System and method for control and prevention of fraudulent use of financial services cards - A system and method is provided for fraud detection includes using information broadcast by devices and resources in the immediate vicinity of a mobile device, or by sensors located within the mobile device itself, to ascertain and make a determination of the immediate environment and state of the mobile device. If the mobile device is determined to be outside a predetermined range of an ongoing transaction, the transaction may be denied. | 05-23-2013 |
20130132278 | MULTI-SOURCE DEBIT CARD SYSTEM AND METHOD - The present invention involves a server based system and method which enables multiple source reloading of a single debit card. | 05-23-2013 |
20130132279 | MECHANISMS FOR SECURING GOODS AT A POINT-OF-SALE - Mechanisms for securing goods at a point-of-sale. A server device receives data identifying an item from a mobile device via a network. The server device identifies a security device that secures the item. The server device receives data from the mobile device indicating a purchase of the item. In response to the receipt of the data, the server device sends data to the security device directing the security device to unsecure the item. | 05-23-2013 |
20130132280 | METHOD AND APPARATUS FOR EXECUTING CRYPTOGRAPHICALLY-ENABLED LETTERS OF CREDIT - A method and apparatus for executing electronic transactions using cryptographically-enabled accounts stores cryptographically-enabled account information and instructions, receives a cryptographically-encoded permission certificate, and processes the received permission certificate to execute the transactions. | 05-23-2013 |
20130138562 | PASS-THROUGH PAYMENT SYSTEM - The invention provides a computer system and method for managing electronic transactions. A plurality of consumer accounts stored in the data store. A payment source storing module stores a plurality of payment sources. A payment source selector is set upon receiving a payment source selection to indicate a selected one of the payment sources. A communication and routing module receives a charge request over the network interface device. A transaction processing system determines a payment source selected with the payment source selector, and processes the charge request based on the payment source selected by the payment source selector. | 05-30-2013 |
20130138563 | SYSTEMS AND METHODS FOR PREPAID MERCHANT PAYMENT SERVICES - A computer implemented method, a system, and software provides a new processing origination model allowing a new 6 | 05-30-2013 |
20130138564 | Chapter 13 Bankruptcy Trustee Payment System and Method - Exemplary embodiments are directed to a method of paying a trustee, including providing debtor information to a database, initiating at least one electronic fund transfer, transmitting the debtor information to a plurality of networks via a communications network, and delivering a payment to a trustee. The debtor information generally corresponds to a Chapter 13 bankruptcy debtor and the method further includes verifying the debtor information against a public database. The present disclosure is further directed to a system for paying a trustee, including a computer storage device to store debtor information and a processing device to initiate at least one electronic fund transfer, transmit the debtor information to a plurality of networks via a communications network, and deliver a payment to a trustee. | 05-30-2013 |
20130138565 | VERIFICATION OF A PORTABLE CONSUMER DEVICE IN AN OFFLINE ENVIRONMENT - A portable consumer device includes a base, and a computer readable medium on the base. The computer readable medium comprises code for an issuer verification value and a supplemental verification value. The issuer verification value is used by an issuer to verify that the portable consumer device is authentic in an on-line transaction and the supplemental verification value is used to verify that the portable consumer device is authentic in an off-line transaction. | 05-30-2013 |
20130138566 | Electronic Transaction Security System And Method - A computerized method for generating a time-limited number for use in a payment card transaction involving a payment card issued by a financial institution. The payment card comprises an original payment card number. A first plurality of digits of the original payment card number is provided to a processor. The first plurality of digits are predetermined digits associated to the financial institution. A desired expiration date through which the time-limited number is valid for acceptance in the payment card transaction is provided to the processor. A program is executed by the processor to set a first plurality of digits in the time-limited number to the first plurality of digits in the original payment card number, generate a first number corresponding to the desired expiration date, set a second plurality of digits in the time-limited number to the first number, and output the time-limited number. | 05-30-2013 |
20130138567 | SYSTEMS AND METHODS FOR VERIFYING IDENTITIES IN TRANSACTIONS - A computerized method of verifying the identity of an attendant operating a money transfer transaction device includes receiving at the money transfer transaction device a user identification and password from the attendant and receiving at the money transfer transaction device additional information from the attendant. The additional information relates to a security feature that limits access to the transaction device. The method also includes using the additional information, the user identification, and the password to evaluate whether to allow the attendant to operate the transaction device to process a transaction. | 05-30-2013 |
20130138568 | FINANCIAL TRANSACTION SYSTEM - A system and method for conducting a financial transaction is disclosed. The system includes a first memory location embedded in a personal portable device. The first memory location stores a plurality of personal financial data files associated with a user. The system also includes a second memory location to store biometric information and a first input interface to receive authentication information after initiation of a purchase transaction session. The system also includes a security module including an input coupled to the first interface to authenticate the authentication information based on the biometric information and an output interface comprising an input coupled to the first memory location and an output to provide personal financial data file information to a host device. | 05-30-2013 |
20130144784 | Security Component for Electronic Commercial Activity - The subject disclosure is directed towards securing electronic commercial activity. Geo-locations are determined for one Internet transaction and another Internet transaction. These Internet transactions are related based on a common credential. Using timestamps, a relative travel speed between the geo-locations is computed for the Internet transaction and the other Internet transaction. Based upon the relative travel speed, a security component may invalidate the Internet transaction and/or the other Internet transaction. | 06-06-2013 |
20130144785 | SOCIAL NETWORK PAYMENT AUTHENTICATION APPARATUSES, METHODS AND SYSTEMS - The SOCIAL NETWORK PAYMENT AUTHENTICATION APPARATUSES, METHODS AND SYSTEMS (“SNPA”) transform social networking user login inputs via SNPA components into notifications of authenticated purchase transactions. In one embodiment, the SNPA obtains an authentication request for a purchase transaction. The SNPA extracts card account data related to the authentication request, and provides the card account data related to the authentication request to a social networking server. The SNPA also provides an indication for a user to authenticate via logging into a social networking service associated with the social networking server. The SNPA obtains an indication from the social networking server that the user is authenticated. In response to obtaining the indication that the user is authenticated, the SNPA initiates completion of the purchase transaction. | 06-06-2013 |
20130144786 | PROVIDING VERIFICATION OF USER IDENTIFICATION INFORMATION - Providing verification is disclosed, including: receiving a verification request associated with a user; retrieving account information associated with the user, wherein the account information includes a plurality of user attribute values previously submitted by the user; selecting at least one user attribute value from the plurality of user attribute values included in the account information; dynamically generating a verification question and a plurality of answer choices based on the at least one selected user attribute value, wherein the plurality of answer choices includes the at least one selected user attribute value; presenting the verification question and the plurality of answer choices for the user; receiving one or more selections associated with the plurality of answer choices; and determining whether the verification is successful based at least in part on the one or more selections. | 06-06-2013 |
20130144787 | ALTERABLE ACCOUNT NUMBER - Embodiments of the invention are directed to apparatuses, systems, and methods that allow for personalized data to be embedded in a primary account number associated with a consumer device. In one embodiment, a consumer device comprises a body and personalized data embedded into a primary account number, associated with the body. The primary account number includes a bank identification number and the bank identification number and the personalized data overlap. | 06-06-2013 |
20130144788 | Verification Methods And Apparatus For Use In Providing Application Services To Mobile Communication Devices - A technique in a mobile device which is configured to communicate in a wireless network with use of a communication service provided by a service provider is described. The mobile device is configured to access via the wireless network a server for execution of an e-commerce transaction. The server is configured to administer a proof-of-work test in order to allow completion of the e-commerce transaction. The mobile device receives via the wireless network a token from a token server. The token is digitally signed by the service provider with a digital signature thereof. The mobile device sends via the wireless network a message to the server, and this message includes the token. When token validation of the message at the server is successful, the mobile device completes the e-commerce transaction with the server without performing the proof-of-work test, which is bypassed for the mobile device. | 06-06-2013 |
20130144789 | METHOD AND SYSTEM FOR MANAGING CREDITS VIA A MOBILE DEVICE - System and method for delivering upon request credits having monetary value to a mobile device using a communications network. An account of available credit for the user of the mobile device is maintained and authorization to issue credit is generated when a request for credit for the mobile device is received and there is available credit in the account associated with the mobile device equal to or greater than the requested credit. Credit may be offset, or sponsored, by one or more token providers and issued to the user, upon authorization, to enable the user to use the mobile device to purchase items, e.g., at a point of sale terminal. | 06-06-2013 |
20130151409 | AUTOMATING INTERACTIVE TRANSACTIONS - A method for intermediating communications with an automated system includes receiving, at an intermediating device that implements an intermediating communication application, an instruction to complete a transaction request on behalf of a user. The method also includes determining, by the intermediating communication application on the intermediating device, a destination system from which to request completion of the transaction request. The method additionally includes interacting, by the intermediating device, with the destination system to fulfill the transaction request. | 06-13-2013 |
20130151410 | Instant Remote Control over Payment and Cash Withdrawal Limits - A financial transaction processing system receives a limiting instruction from an owner of an account. The limit is applied to subsequent proposed transactions involving the account, and if the limit is violated, the transaction may be declined or terminated. | 06-13-2013 |
20130151411 | DIGITAL AUTHENTICATION AND SECURITY METHOD AND SYSTEM - A method and system for activating a user account and digitally securing electronic transactions is disclosed. The method and system includes the steps providing a code and PIN, requesting the PIN, transmitting the PIN and code together to an authentication server, authenticating the code and PIN, flagging a status of a user's account as “on”, transmitting the status of the user's account to a client server, allowing a digital transaction to proceed on the client server if the status of the user's account is “on”, and disallowing a digital transaction to proceed on the client server if the status of the user's account is “off”. Once activated, the user may toggle their account “on” and “off” via a mobile device in order to provide an additional layer of security in order to complete transactions. | 06-13-2013 |
20130151412 | METHODS AND APPARATUSES FOR HANDLING A ROAD-USE-DEPENDENT VEHICLE COMMUNICATION - A system and method for handling a road-use-dependent communication, such as a financial transaction, the execution of an overtaking maneuver is sensed and on the basis of the overtaking maneuver which has been performed a financial transaction is executed by an overtaking road user for an overtaken road user. | 06-13-2013 |
20130151413 | SYSTEMS AND METHODS FOR ENSURING THE APPLICATION OF USER-MANDATED RULES TO PAYMENT TRANSACTIONS - Systems and methods for controlling and/or authorizing payment transaction are described which may facilitate verification that payment transactions initiated with a payment token of a user are in fact vetted by user-configured rules. According to some examples, a method for controlling payment transactions may include storing a firs and second sets of rules in a database, which rules are configurable by a user. The method may further include communicating and/or applying the first set of rules by a first entity, such as a merchant, a payment network, or other payment acceptance provider. A payment transaction may be routed to a particular network as a result of the application of the first set of rules. During a verification stage, a second set of rules may be applied at the issuer level to determine whether or not user-configured rules have been applied. The transaction may be accepted or decline based on the application of the second set of rules and/or notification may be sent to the user regarding the resolution or the verification stage. | 06-13-2013 |
20130151414 | MAKING A PAYMENT USING A PAYMENT PLUG-IN - Making a payment using a payment plug-in is disclosed, including: receiving a payment request from a device; receiving an indication that the payment plug-in is not installed at the device; determining that the device has received the payment plug-in, wherein the payment plug-in is configured to be installed at the device; receiving an activation message from the payment plug-in, the activation message including at least an attribute associated with the device; determining a stored user account that matches the attribute associated with the device; and receiving from the payment plug-in a confirmation to process the payment request based at least in part on the matching user account. | 06-13-2013 |
20130151415 | Financial Transaction Authentication Servers, Methods, and Computer Program Products for Facilitating Financial Transactions Between Buyers and Sellers - A financial transaction authentication server includes a wireless network interface that is configured to receive fund transfer requests from a buyer via a wireless communications terminal, a wireless terminal location module that is configured to identify the respective locations of the buyer and a seller, and a transaction authorization processor configured to authorize a transfer request if the geographic locations of wireless terminals of the buyer and seller are within a predetermined geographical proximity of each other. The wireless network terminal location module identifies the geographic locations of respective wireless terminals of the buyer and seller. The transaction authorization processor authorizes a fund transfer request if the respective locations of buyer and seller wireless terminals are within a predetermined geographical proximity and suspends a fund transfer request if respective locations of buyer and seller wireless terminals are not within a predetermined geographical proximity of each other. | 06-13-2013 |
20130159184 | SYSTEM AND METHOD OF USING LOAD NETWORK TO ASSOCIATE PRODUCT OR SERVICE WITH A CONSUMER TOKEN - Systems, devices, apparatuses, and methods for conducting a transaction in which a consumer purchases a product or a service by providing payment to a merchant whom is not the provider of the product or service. The invention permits a consumer to present cash or a payment device (such as a credit card or debit card) to a merchant, where that merchant may be an element of a load network or payment processing network. In a typical load network transaction, the merchant would accept the cash or payment device from the consumer and use the funds provided to “load” or recharge an account of the consumer. However, instead of this use of the network, embodiments of the invention operate to allow the consumer to provide the source of payment to the merchant for a product or service offered by a third party which is accessed by the consumer using a consumer token. | 06-20-2013 |
20130159185 | TRAVEL ACCOUNT - A user can set up a travel account with a payment provider, to inform the payment provider of expected dates and locations of travel, along with limits or restrictions at the various locations and/or dates. When the user travels and attempts to make a payment, the payment provider can determine the location and date to aid in processing the payment request, resulting in an easier process for the user, while still providing additional security with the limits and restrictions. | 06-20-2013 |
20130159186 | System and Method for One-Time Payment Authorization in a Portable Communication Device - A system for using a dynamic temporary credential with a portable communication device for use in a transaction with an electronic control point (e.g. point of sale, NFC access point) wherein the portable communication device has a geo-location module (e.g. GPS). The system has a centralized module that receives the portable communication device's current geo-location and transmits the dynamic temporary credential to the portable communication device and provides predictive transaction information—including the dynamic temporary credential and portable communication device's geo-location—to an authorization system operably associated with the electronic control point. The dynamic temporary credential has a predetermined time to live, which allows for the recycling of the dynamic credential, such recycling may take into account the geo-location for which the credential has been recently issued. A method for using a dynamic temporary credential with a portable communication device is also disclosed. | 06-20-2013 |
20130159187 | ELECTRONIC TRANSACTION PROCESSOR SYSTEM - An Internet based system for executing transactions is described. The system may include transaction data, a database, a business logic manager and user profiles. A rules may also be included, and store information about system responses to modifications of the data. The user profiles may be configured to store information concerning the availability of information and displays depending upon the user. | 06-20-2013 |
20130159188 | AUTOMATIC USER VALIDATION SYSTEM AND METHOD - Methods and apparatus support optional user authentication. Whether an authentication, or an enhanced type of authentication, is required before proceeding with a transaction can be determined on a user-by-user basis. Some credit card users subscribe to a service that provides the users with security tokens. Transactions involving these credit cards may require correct entry of a security token code, before the transactions are allowed to proceed. However, other credit card users, i.e., users who have not subscribed to the service, are not required to enter a security token code before their transactions are allowed to proceed. | 06-20-2013 |
20130159189 | TRUST MANAGEMENT SYSTEM - An automated method and system for managing Native American land trust rights is described. Login information may be received from a participant. An account record associated with the participant may be accessed to identify one or more land trust rights held by the participant. An offer to purchase at least one land trust right of the one or more land trust rights held by the participant may be made. An input from the participant accepting or rejecting the offer to purchase may be received. Upon acceptance of the offer, payment may be disbursed to the participant in accordance with the offer to purchase and account record associated with the participant may be updated to reflect a sale of the at least one land trust right. | 06-20-2013 |
20130159190 | LOCATION-BASED MONEY TRANSFER - The invention provides various systems and methods for performing money transfers using location information. The method includes staging, at computer system, a money transfer transaction from a sender to a receiver. The method further includes providing the receiver's mobile number to the computer system, and tracking the receivers location using a location tracking computer system. Further, the method includes determining if the receiver is within a proximity threshold to an agent location. The agent location is configured to distribute foods from the money transfer. The method then, in response to the receiver being within the proximity threshold to the agent location, notifies the receiver of the agent location's address, and dispenses the funds from the agent location. | 06-20-2013 |
20130159191 | METHOD AND SYSTEM FOR LIMITING RISK IN BANKING TRANSACTIONS - A system and method for processing banking transactions in risk limit mode when connectivity to a central application server is unavailable. The method includes calculating available balance in customer account associated with current transaction and determining if current transaction amount is less than the available balance. In case the current transaction amount is less than the available balance, a total amount associated with transactions for a plurality of customer accounts executed in risk limit mode is calculated. Thereafter, if it is determined that the total calculated transaction amount is less than a pre-defined risk limit value for a customer, the current transaction is allowed. Otherwise, the current transaction is rejected. | 06-20-2013 |
20130166446 | TRANSACTIONAL SERVICES PLATFORM - One or more devices within a transaction services hub receive, via an internal distribution network interface, configuration settings for a network connection between merchant devices and a host device and establish, based on the configuration settings, a virtual private network (VPN) session between the one or more devices within the transaction services hub and the host device. The one or more devices receive, from a first merchant device, a first transaction authorization request originating via a voice network and receive, from second merchant transaction device, a second transaction authorization request originating via an Internet Protocol network. The one or more devices route, via the VPN session, the first and the second transaction authorization requests to the host device, collect data regarding the first and the second transaction authorization requests, and provide, via a public network connection, an interface to retrieve reports based on the collected data. | 06-27-2013 |
20130166447 | GATEWAY APPLICATIONS FOR TRANSACTION SERVICES - A method may include receiving a first message from a transaction device via an intermediate component, the first message requesting an authorization or a settlement of a transaction. The method may also include emulating a customer host device based on a first portion of the first message, generating a second message via the emulation, and routing the second message via a persistent socket that forms a communication link with the customer host device. The second message may request a component on the customer host device to authorize the transaction or to settle the transaction. | 06-27-2013 |
20130166448 | FINANCIAL TRANSFERS FROM MOBILE DEVICES - Computer-implemented systems, methods, and computer-readable media for financial transfers from a mobile device, comprising: receiving a mobile device identifier, a unique user identifier, a merchant identifier, and an amount from a mobile device; determining whether the transaction is authorized based on the mobile device identifier and the unique user identifier; transmitting an authorization failure message to at least one of the mobile device and a merchant device associated with the merchant identifier if it is determined that the transaction is not authorized; and transmitting to a payment gateway an account identifier associated with the unique user identifier and mobile device identifier, the merchant identifier, and the amount if it is determined that the transaction is authorized. | 06-27-2013 |
20130166449 | APPARATUS AND METHOD FOR AUTHORIZATION OF ONLINE FINANCIAL TRANSACTION - A method and an apparatus for authorizing online financial transactions are provided. The apparatus for authorizing online financial transactions includes: randomly selecting, using an apparatus for authorizing online financial transactions, a portion of main transaction information corresponding to a user and combining the selected information to create authorization information; converting the authorization information into a form displayed to the user through a specific process; providing the main transaction information and the converted authorization information to the user; receiving user select information, which is recognized by the user and is part of the main transaction information, and the converted authorization information provided to the user; and comparing the user select information with the authorization information and determining whether the user recognizes the authorization information based on the comparison results. | 06-27-2013 |
20130166450 | Identity Verification System Using Network Initiated USSD - The invention provides a method and means of authenticating a user in a communications session (such as an on-line payment) on a first communications channel (such as the Internet | 06-27-2013 |
20130166451 | PAYMENT METHOD AND SYSTEM USING ELECTRONIC CARD - A method and a system of payment using an electronic card is provided. The payment system in accordance with an exemplary embodiment includes an electronic card, a merchant terminal and a payment server. The electronic card obtains server authentication information from the payment server, performs server authentication by using the obtained server authentication information, and sends a payment request including payment information to the payment server according to an authentication response of the payment server. The merchant terminal mediates a message for authentication and payment between the electronic card and the payment server. The payment server performs client authentication by obtaining client authentication information from the electronic card according to the server authentication and sends the authentication response to the electronic card, and sends payment approval pursuant to the payment request to the electronic card through the merchant terminal. | 06-27-2013 |
20130166452 | PAYMENT APPARATUS AND METHOD USING PORTABLE TERMINAL IN BROADCASTING RECEIVER - A method of operating a broadcasting receiver for payment. The method includes extracting an identifier code that is being displayed, receiving payment information matching to the identifier code from a portable terminal, and combining information extracted from the identifier code with the payment information and requesting payment approval to a payment service provider. | 06-27-2013 |
20130166453 | VIRTUAL TRAVELER'S CHECK - A purchase computer is used to make a purchase request including purchasing customer identification information and a request for one or more virtual traveler's checks. Each of the one or more virtual traveler's checks has a denomination. A server receives the purchase request and issues a check number for each of the one or more virtual traveler's checks and associates the check numbers with the purchasing customer identification information. A redemption computer is used to make a redemption request. The redemption request includes redeeming customer identification information and a request to redeem at least one of the one or more virtual traveler's checks. The server approves release of funds at the redemption computer in an amount equal to the denominations of the requested virtual traveler's checks if the redeeming customer identification information matches the purchasing customer identification information. | 06-27-2013 |
20130166454 | RECEIVER DRIVEN MONEY TRANSFER ALERT SYSTEM - A method for performing a money transfer initiated by a receiver of the money transfer, wherein the method includes receiving a money transfer initiation request from the receiver and the money transfer initiation request includes an amount of funds to be transferred, receiver information, and sender information. The method also includes staging a money transfer transaction after receiving the money transfer initiation request, wherein the money transfer transaction is pending an authorization by the sender to fund the money transfer. The method further includes providing the sender with a notification of the money transfer transaction, receiving the authorization to fund the money transfer transaction, and executing the money transfer to transfer the funds from the sender to the receiver. | 06-27-2013 |
20130173466 | METHOD AND APPARATUS FOR UTILIZING RECOGNITION DATA IN CONDUCTING TRANSACTIONS - An approach is provided for utilizing recognition data in conducting service transactions. | 07-04-2013 |
20130173467 | METHODS AND SYSTEMS FOR USING A CO-LOCATED GROUP AS AN AUTHORIZATION MECHANISM - Systems and methods to enable a co-located group to be used as an authorization mechanism are discussed. For example, a method to receive a group account configuration, define a group account according to the group account configuration, receive a transaction authorization request associated with the group account, and authorize payment from the group account. The account configuration including a membership list and a target location. The method further including determining whether the transaction authorization request includes data identifying an identified user on the membership list. The method also including determining whether the identified user on the membership list is physically proximate to the target location. The authorizing payment from the group account including verifying that the identified user is determined to be physically proximate to the target location. | 07-04-2013 |
20130173468 | FINANCIAL SERVICE INVOLVING COVERAGE NETWORK - Embodiments of the present invention relate to methods and apparatuses for providing a financial service that involves a coverage network. For example, in some embodiments, a method is provided that includes: (a) receiving transaction information, where the transaction involves an account and a holder of the account; (b) determining, based at least partially on the transaction information, that the account does not have sufficient funds or credit to cover the transaction amount; (c) prompting a member of a coverage network to consent to covering at least part of the transaction amount, where the coverage network is associated with the account or the holder, and where the prompting occurs after the determining that the account does not have sufficient funds or credit; (d) receiving the member's consent to covering at least part of the transaction amount; and (e) authorizing the transaction based at least partially on the member's consent. | 07-04-2013 |
20130173469 | CHIP CUSTOMIZATION TECHNIQUES - Some aspects of the present disclosure provide flexible techniques by which a customer may selectively disable unwanted features, and subsequently apply for a refund corresponding to the disabled feature. In some embodiments, these techniques are value-added for a customer because they allow a customer to flexibly change inventory or individual products to account for market shifts or changes in personal preferences. In addition, these techniques may also be value-added for the manufacturer because the refund request may give the manufacturer some real-time data regarding market conditions and customer preferences in an efficient manner. | 07-04-2013 |
20130173470 | METHODS AND SYSTEMS FOR USING A CO-LOCATED GROUP AS AN AUTHORIZATION MECHANISM - Systems and methods to enable a co-located group to be used as an authorization mechanism are discussed. For example, a method can include establishing a group account, receiving a request to access the group account, determining whether the requester is a group member, determining whether the requester is near an authorized location, and authorizing access to the group account. Authorizing access to the group account can be based on determining that the requester is a member and is within a pre-defined distance of an authorized location. | 07-04-2013 |
20130173471 | COMPUTER-BASED METHOD AND SYSTEM FOR AIDING TRANSACTIONS - A method for providing a warranty relating to a transaction between two parties in a system which includes an infrastructure composed of a plurality of locations each associated with a respective institution which provides services to clients, each party being a client of at least one of the institutions, the method comprising: transmitting a request for a warranty from one party to the transaction which is a client of the respective institution to a respective location associated with the respective institution, which request includes information identifying the other party to the transaction and information about the nature of the transaction; conducting an exchange of information between the respective location and a location associated with a institution of which the other party is a client; and transmitting a response to the request from the respective location to the one party. | 07-04-2013 |
20130173472 | Transaction Management System - A transaction management system ( | 07-04-2013 |
20130179344 | METHOD OF PROCESSING PAYMENTS - A method allowing a customer having registered payment account details with a service or product provider to place a purchase order and pay for a product or a service using a networked device such as a mobile phone. The customer may send, for example in a short messaging service (SMS) message, a product or service identifier identifying the product or the service to a designated telephone number to initiate a purchase. The identifier may for instance be an alphanumeric codeword included in an advertisement or a catalogue promoting the product or the service. In one embodiment, the purchase order system is a computer programme or software implemented as an application programming interface (API), which may be able to interface with a website of the product or service provider as well as communicating with a plurality of payment gateways. | 07-11-2013 |
20130179345 | PAYMENT SERVICE CAPABLE OF BEING INTEGRATED WITH MERCHANT SITES - A computer-implemented service integrates with merchant sites to enable registered users of the service to perform purchase transactions on the merchant sites. In one embodiment, a merchant can incorporate a reference to a display object served by the service into coding of a page of the merchant's site. When the page is loaded by a user's browser, the reference causes the browser to request the display object from the service for display on the page. If the user is recognized by the service, the service may return a personalized display object that includes functionality for the user to perform a purchase transaction using the service. Also disclosed are embodiments that enable users to initiate transfers of personal account information to the merchant sites. | 07-11-2013 |
20130179346 | HOSTED THIN-CLIENT INTERFACE IN A PAYMENT AUTHORIZATION SYSTEM - A methods and system of hosted thin-client payment authorization and authentication services for processing payments for value-added service (VAS) providers is described. A method, performed by a host server operating a thin-client device, includes receiving transaction request data at a host server computer from a thin-client device, where the transaction request data can include financial account data and biometric data. The host-server transmits a verification request message to a VAS provider and receives an indication that it is a valid merchant. The host-server transmits an authorization request message comprising the biometric data to a payment processing network (PPN), where the PPN communicates with an authentication server computer to validate the biometric data, sends the authorization request message to an issuer and receives an authorization response message from the issuer. The host-server receives the authorization response message from the PPN and sends a service fulfillment request to the VAS provider. | 07-11-2013 |
20130179347 | MOBILE APPLICATION FACILITATING MONETARY OR OTHER DONATIONS - The present invention relates to an application on a mobile phone or other portable digital device that allows a user to utilize a digital wallet to round up a purchase to the nearest dollar and then contribute that change to a third party, like a non-profit organization or fundraising campaign. In some embodiments, the present invention may be incorporated directly within a digital wallet on a mobile device. In other embodiments the present invention may be a stand-alone application on a mobile device that interfaces with a digital wallet. | 07-11-2013 |
20130179348 | Cloud Enabled Payment Processing System and Method - A comprehensive platform for processing financial transactions is disclosed. The platform is a cloud based and comprises an application programming interface so that application developers can take advantage of the services provided by the framework. The platform replaces many of the expensive, outdated or inefficient aspects of traditional payment processing methods. | 07-11-2013 |
20130179349 | Transaction Verification on RFID Enabled Payment and Transaction Instruments - A display enabled RFID tag (DERT) receives transaction details from the reader. DERT verifies that the details match their counterparts in the reader public key certificate. The process is aborted in case of a mismatch. DERT extracts and displays user-verifiable data. It then enters a countdown stage that lasts for a predetermined duration. A user observes the transaction information and, if the transaction amount and other details are deemed correct, presses an accept button provided on the DERT before the timer runs out. DERT signs the time-stamped transaction statement and sends it to the reader. This signed statement is then sent to the payment gateway and eventually to the financial institution that issued the payment DERT. | 07-11-2013 |
20130185205 | SECURE TRANSACTION AUTHORIZATION - Provided is an approach for credit transaction authorization/approval. Specifically, a particular transaction payment device/mechanism (e.g., credit card, etc.) may be associated with a set of purchase authorization criteria/rules that sets forth specific conditions (e.g., an authorization protocol) under which the transaction payment device may be utilized. When a user later attempts to conduct a proposed credit transaction using the transaction payment device, it will be determined whether the proposed credit transaction complies with this set of purchase authorization criteria (e.g., the authorization protocol). Based on this determination, the proposed credit transaction can be approved or declined. | 07-18-2013 |
20130185206 | Real-Time System for Approving Purchases Made with a Mobile Phone - An approach is provided to approving purchases made with a mobile device. In this approach, a purchase request relating to an item is received at the mobile device, with the purchase request including item data associated with the item. The item data is compared to a set of predetermined authorized criteria. If the item data falls within (meets) the predetermined authorized criteria, then a payment authorization is generated. On the other hand, if the item data not meet the predetermined authorized criteria, then a real-time interactive purchase request is sent from the device over a network to an authorizing agent with the purchase request including the item data. A response is received from the authorizing agent. If the response is a purchase approval, then the payment authorization is generated. | 07-18-2013 |
20130185207 | METHOD AND SYSTEM FOR ONLINE AUTHENTICATION USING A CREDIT/DEBIT CARD PROCESSING SYSTEM - A system for online authentication using a payment card processing system, the system comprises: a managing computer system of a payment card service provider, the managing computer system having a memory device capable of storing data associating identifying information of individual customers with payment card accounts, and a computer processor configured to: receive a request for personal information of a customer on a relying party website, and wherein the relying party website is a member of the payment card processing system; request and receive identifying information of the customer for at least one payment card of the customer; present at least one authentication question to the customer to validate the customer; and validate the customer upon receipt of at least one correct answer to the at least one authentication question. | 07-18-2013 |
20130185208 | HANDLING TRANSACTION AND TRIP DATA - A method for a transaction with a taxi includes receiving from a mobile device in a vehicle an amount of a fare for a passenger trip, receiving trip information from the mobile device, the trip information including a start time, an end time and a distance traveled for the passenger trip, receiving a card number from the mobile device, submitting the transaction for authorization of payment, receiving an indication that the transaction is authorized, accessing financial payment information associated with an account of a driver of the vehicle, the financial payment information sufficient to make a deposit to a financial account of the driver, submitting the transaction for processing to make the deposit in the amount of the fare to the financial account of the driver, and sending the trip information to a computer system of the dispatch service. | 07-18-2013 |
20130185209 | TRANSACTION-BASED ONE TIME PASSWORD (OTP) PAYMENT SYSTEM - Embodiments of the present invention provide a payment processing system. Specifically, a mobile client generates a request for payment of a payment transaction. The mobile client generates a one-time value associated with the payment transaction. The one-time value is a first hash value. The transaction information is received at an authorizing device. The authorizing device generates confirmation information and transmits the confirmation information to the mobile client. The authorizing device generates a second hash value based on the confirmation information. The request for payment is approved when the first hash value matches the second hash value. | 07-18-2013 |
20130185210 | Method and System for Making Digital Payments - Among other things, the present disclosure describes an authentication system that leverage a mobile phone to improve the security of web logins and web payments on a personal computer. The described embodiments do not require special hardware beyond a cell phone with a camera. Using embodiments of the present invention, memorization of passwords is avoided and the login process is faster and less error-prone than with existing systems. In a payment system according to an embodiment, users do not need to let retailers keep their passwords because credit card information need to be manually input. In addition, the present invention allows users to conveniently take advantage of one-time use credit cards for additional security. | 07-18-2013 |
20130185211 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR TOPPING UP PREPAID PAYMENT CARDS FOR OFFLINE USE - A card holder carries out an initial top-up of a balance of a pre-paid payment card. The prepaid payment card is configured for use in an infrastructure in accordance with a payment specification requiring different behavior for normal transactions in the infrastructure versus that required for topping-up of the balance. Contemporaneously with the initial top-up, the card holder registers risk mitigation information in association with the pre-paid payment card. Subsequent to the initial top-up, an indicator is written to the pre-paid payment card during a transaction with the pre-paid payment card outside the infrastructure. The indicator identifies the pre-paid payment card as having the risk mitigation information associated therewith. During subsequent presentation of the pre-paid payment card to the infrastructure, the pre-paid payment card is treated as a token backed up by the risk mitigation information, based on presence of the indicator on the pre-paid payment card. | 07-18-2013 |
20130185212 | APPARATUS AND METHODS FOR PROVIDING A PAYMENT SYSTEM OVER A NETWORK - Apparatus and methods provide an accumulator that processes electronic payments from an employer to a recipient via a network. The payments processed may be, for example, child support payments collected from an employee by the employer. The employer may submit one transaction made up of payments collected from multiple employees bound for multiple recipients and the accumulator may receive, translate, batch, and deliver the payments to the multiple recipients. The accumulator, employers, and recipients may communicate via a network such as the Internet. | 07-18-2013 |
20130191282 | TOKEN BASED TRANSACTION AUTHENTICATION - A token based transaction authentication system is disclosed. Issuer, merchants, and a payment processing network generate unique tokens or keys to authenticate messages between themselves and to authenticate a sending entity or consumer as they are redirected between entities. The tokens are also used to identify the particular authentication thread a message or sending entity is associated with. The sending entity authentication occurs over a web-based channel or a mobile based channel. | 07-25-2013 |
20130191283 | Authentication of a Data Card Using a Transit Verification Value - Transaction processing involves receiving data from an access transaction application of a portable consumer device, wherein the received data comprises data from an access transaction data string that includes a transit verification value wherein, with the exception of the transit verification value, the access transaction data string is substantially similar to a retail data string comprising retail data, wherein the access application data string is adapted for use with an access transaction processing system and the retail data string is adapted for use with a retail processing system. The transaction processing involves processing access transaction application data for selective authorization of the transaction. | 07-25-2013 |
20130191284 | P2P Transfer Using Prepaid Card - A method and system for making a payment is disclosed. In the method, a Payor can specify an account from which to withdraw funds for the payment and specify an activation code necessary to activate the payment. The payment can be sent to a Payee in the form of a pre-paid transaction account. The account will not be activated unless the Payee provides the activation code. Funds can be withdrawn from the account specified by the Payor either in full at the time the payment is made or are withdrawn as the Payee uses the transaction account to access the funds. | 07-25-2013 |
20130191285 | TRACK DATA MAPPING SYSTEM FOR PROCESSING OF PAYMENT TRANSACTION DATA - Systems and associated apparatuses and methods for processing payment transactions. A merchant's data processing system may provide payment transaction data in a first format (e.g., Track 1) to a payment processing network. The payment processing network may determine the issuer to which the data will be provided as part of a process for authorizing the payment transaction. It is determined if the issuer is one that is expecting or requires that the data be provided in a second format (e.g., Track 2). If the issuer is one that is expecting or requires that the transaction data be supplied in the second format, then it is determined if the issuer is enrolled in the appropriate data mapping service. If the issuer is enrolled in the data mapping service, then the inventive system performs the data mapping processes needed to provide the data in the second format to the issuer. The issuer may then use the received data to determine whether to authorize the payment transaction. | 07-25-2013 |
20130191286 | MERCHANT-BASED TOKEN SHARING - One embodiment of the present disclosure provides a system and associated processes for sharing cardholder data (CHD) between a merchant that utilizes tokenization and a second merchant that may or may not utilize tokenization. In one embodiment, the merchant, or an employee of the merchant, can use the system and associated processes to reacquire CHD from a tokenization provider system. In one embodiment, the merchant identifies to the tokenization provider system a desire to share CHD, which is associated with a token, with a second merchant. The merchant and/or the tokenization provider system can then invite the second merchant to register with the tokenization provider system. Once registered with the tokenization provider system, the second merchant can access any CHD that the merchant associated with the second merchant. | 07-25-2013 |
20130191287 | VIDEOCONFERENCE ACCESS FACILITY - A videoconference access facility is described that allows people to obtain services and engage in financial transactions via a face-to-face video conference with a remote moderator. Because the remote moderator is there to receive verbal instructions and provide verbal support, the facility allows people to engage in complex transactions even if they are unable to read or write. The facility can be equipped with numerous types of devices that allow the moderator to view and receive information from documents, financial instruments, identification cards, and smart cards; as a result, the facility can provide financial transactions without the support of a bank. The facility may be used as part of a greater telecommunication network to deliver such services. | 07-25-2013 |
20130198074 | SYSTEM AND METHOD FOR PRE-PURCHASING GASOLINE - A method is provided for permitting a consumer to purchase gasoline without contemporaneously taking delivery of the gasoline. The method includes establishing a credit of a purchase of gasoline at a specified price per unit, without delivery. The method further includes authenticating a purchase of a certain number of units of gasoline at a certain price per unit, with delivery, from a gas retailer. The purchase is compared with the credit to determine if the credit may be redeemed with the sale. If so, the sale amount is adjusted to reflect an adjusted sale amount, and the adjusted sale amount is then cleared as a final transaction. Advantageously, with the subject invention, a consumer may pre-purchase gasoline at an agreed-to price without delivery of the gasoline, with receiving credit at a subsequent purchase in a single transaction, even if the amount of gasoline exceeds the pre-purchase amount. | 08-01-2013 |
20130198075 | PROCESSING MONITOR SYSTEM AND METHOD - Systems and methods for monitoring transaction data and providing an indication regarding a performance parameter to a payment processing entity. Transaction data associated with a plurality of transactions conducted during a time interval is received. A server computer determines that the received transaction data meets a threshold. It is further determined whether a previous indication that the threshold has been met was provided to a payment processing entity, the previous indication being associated with a plurality of previous transactions conducted during a previous time interval. If the previous indication was not provided, an indication that the threshold has been met is provided to the payment processing entity, the indication including information regarding a performance parameter of the payment processing entity. | 08-01-2013 |
20130198076 | SYSTEMS AND METHODS TO PROVIDE CHECK-IN BASED PAYMENT PROCESSES - Systems and methods for providing check-in based payment processing are discussed. In an example, a method for check-in based payment processing can include receiving check-in data, generating a pre-approval, sending a one-time-use PIN, receiving a validated transaction, and processing a payment. The check-in data can include a merchant identifier and user information identifying a user registered with the check-in service and associated with a mobile device. The pre-approval can include a one-time-user PIN. The validated transaction can include the one-time-user PIN associated with the pre-approval. | 08-01-2013 |
20130198077 | SEEDING CHALLENGES FOR PAYMENT TRANSACTIONS - Systems, methods, and apparatus are provided for authenticating a consumer using challenge questions. A response to a challenge question is verified via seeding the challenge question, receiving response, and deductively determining the answer. The verified response and challenge question may then be used to authenticate a consumer as part of an authorization process. | 08-01-2013 |
20130198078 | SECURE GRAPHICAL CODE TRANSACTIONS - A method of making a payment using an encoded graphic by a user device may include acquiring an image of the encoded graphic, and determining payment information using information associated with the encoded graphic. The method may also include sending a request to an identity repository for a first signature for the payment. The method may additionally include receiving the first signature for the payment from the identity repository. The method may further include sending the payment information and the first signature to a payment gateway. | 08-01-2013 |
20130198079 | Verification of Online Transactions - Systems, methods and devices described herein enable improved identity verification during online financial transactions. In particular, the features of various implementations are used to enable identity verification of account holders of credit cards, debit cards, and other payment instruments during online transactions. For example, in some implementations systems, methods and devices are operable to compare one or more encoded and/or encrypted images of facial features obtained upon activation of the payment instrument or security measures with one or more encoded and/or encrypted images of facial features obtained during a subsequent online transaction to verify that the individual offering the payment instrument as a form of payment is the true and authorized user of the payment instrument. Additionally and/or alternatively, a voice print record and/or location information may be combined with the use of the encoded and/or encrypted images to provide additional security. | 08-01-2013 |
20130198080 | SYSTEM AND METHOD OF PROVIDING TOKENIZATION AS A SERVICE - Systems, devices, apparatuses, and methods for providing tokenization as a service are provided. Embodiments of the invention involve decoupling a “tokenization service” from other services offered by a merchant service provider, and offering the tokenization service as a stand-alone service. In accordance with an embodiment, a merchant service provider can receive payment data associated with a transaction between a consumer and a first entity. The merchant service provider can generate a payment token that represents the payment data and transmit a copy of the payment token to the first entity. The first entity can then transmit the payment token and order information to a second entity specified in the transaction. The merchant service provider can subsequently receive a request to complete the transaction from the second entity. The request can include the copy of the payment token from the second entity. | 08-01-2013 |
20130198081 | SYSTEMS AND METHODS FOR FACILITATING CARD PRESENT TRANSACTIONS - This disclosure describes systems and methods related to facilitating card present transaction. In one embodiment, a service provider system may receive a request from a merchant to initiate a card present transaction associated with a consumer. The service provider system may determine an identifier associated with a mobile device associated with the consumer. The service provider system may communicate to the mobile device, based at least in part on the identifier, a message that facilitates invocation of a transaction module associated with the mobile device. The service provider system may facilitate the car present transaction based at least in part on an interaction with the transaction module. | 08-01-2013 |
20130198082 | PAYMENT SERVICE THAT PROVIDES OPTION TO AUTHENTICATE WITH EXTERNAL AUTHENTICATION SERVICE - A system and associated methods are disclosed for enabling users to use third party account login information to make payments to merchants. A payment service receives a user's identifier in response to a user authentication request sent over a network to an authentication service of an information or credit service. The user authentication request includes login credentials of the user for the information service or credit and is associated with a payment page of a merchant that has an account with the payment service. The payment service receives the user identifier when the information or credit service validates the login credentials. Based at least in part on the user identifier, the payment service receives payment information from the information or credit service. The payment service provides the user with an option to use the retrieved payment information to make a payment to the merchant. | 08-01-2013 |
20130198083 | Systems, methods and devices for trusted transactions - The invention discloses a system for enhancing trust in transactions, most particularly in remote transactions between a plurality of transactional parties, for instance a seller and buyer(s) of goods and/or services over a public computer network such as the internet. Trust is disclosed to be a multivalent commodity, in that the trust that is to be enhanced relates to information about the subject matter of the transactions (e.g., the suitability of the goods and services sold), the bona fides of the supplier of the goods and services, the appropriateness of a pricing structure for a particular transaction or series of transactions, a quantum of additional transactional value that may be imparted to the transactional relationship, security of information exchange, etc. | 08-01-2013 |
20130198084 | UTILIZING PHRASE TOKENS IN TRANSACTIONS - A system and method for facilitating transactions utilizing phrase tokens are provided. Individual entities can be associated with unambiguous transaction phrase tokens, such as multiple word phrases. The transaction phrase tokens are associated with transaction accounts by a service provider such that the entities can complete a transaction without having to exchange transaction account information. In a transaction, a transaction phrase token is offered to an accepting party, which tenders the offered transaction phrase token to the service provider. The service provider processes the offered transaction phrase token according to configuration information specified for the transaction phrase token. The service provider can automatically process the transaction request or request additional information. | 08-01-2013 |
20130204784 | SYSTEM AND METHOD FOR PROCESSING TRANSACTIONS - An electronic transaction processing system comprising an inbound payment processing module, an outbound payment processing module, an authorization module, and a data store containing financial account data relating to an entity. The authorization module is arranged to authorize processing of outbound payments by the outbound payment processing module, the financial account data defines a currency amount corresponding to working capital of the entity, inbound payments processed by the inbound payment processing module are added to said currency amount, and authorized outbound payments processed by the outbound payment processing module are removed from said currency amount. | 08-08-2013 |
20130204785 | MOBILE MANAGED SERVICE - One embodiment of the invention is directed to a method comprising receiving, at a mobile payment system, transaction information from a mobile device operated by an originating user. The method further comprises generating, by the mobile payment system, a transaction request message using the transaction information from the mobile device operated by the originating user and analyzing, by the mobile payment system, the transaction request message to determine a type of the transaction. The method further comprises processing, by the mobile payment system, the transaction based on the type of the transaction, wherein the mobile payment system is configured to integrate at least two of an issuer, acquirer, and payment processing network functional modules. | 08-08-2013 |
20130204786 | Verification of Online Transactions - Systems, methods and devices described herein enable improved identity verification during online financial transactions. In particular, the features of various implementations are used to enable identity verification of account holders of credit cards, debit cards, and other payment instruments during online transactions. For example, in some implementations systems, methods and devices are operable to compare one or more encoded and/or encrypted images of facial features obtained upon activation of the payment instrument or security measures with one or more encoded and/or encrypted images of facial features obtained during a subsequent online transaction to verify that the individual offering the payment instrument as a form of payment is the true and authorized user of the payment instrument. Additionally and/or alternatively, a voice print record and/or location information may be combined with the use of the encoded and/or encrypted images to provide additional security. | 08-08-2013 |
20130204787 | AUTHENTICATION & AUTHORIZATION OF TRANSACTIONS USING AN EXTERNAL ALIAS - Described herein is a transaction system ( | 08-08-2013 |
20130204788 | Cost effective card reader and methods to be configured to be coupled to a mobile device - A decoding system, with a decoding engine, runs on a mobile device. The decoding engine decodes signals produced from a read of a first party's financial transaction card. The decoding engine accepts and initializes incoming signals from a read of the first party's financial transaction card until the signals reach a steady state, identifies peaks in the incoming signals and digitizes the identified peaks into bits. A transaction engine is coupled to the decoding engine. The transaction engine receives, as its input, decoded first party's financial transaction card information from the decoding engine, and serves as an intermediary between the first party and a second party. The first party does not have to share his/her financial transaction card information with the second party. The transaction engine is configured to be coupled to a payment system and a first party's financial transaction card institution or a first party's financial account. | 08-08-2013 |
20130204789 | UTILIZING PHRASE TOKENS IN TRANSACTIONS - A system and method for facilitating transactions utilizing phrase tokens are provided. Individual entities can be associated with unambiguous transaction phrase tokens, such as multiple word phrases. The transaction phrase tokens are associated with transaction accounts by a service provider such that the entities can complete a transaction without having to exchange transaction account information. In a transaction, a transaction phrase token is offered to an accepting party, which tenders the offered transaction phrase token to the service provider. The service provider processes the offered transaction phrase token according to configuration information specified for the transaction phrase token. The service provider can automatically process the transaction request or request additional information. | 08-08-2013 |
20130204790 | UTILIZING PHRASE TOKENS IN TRANSACTIONS - A system and method for facilitating transactions utilizing phrase tokens are provided. Individual entities can be associated with unambiguous transaction phrase tokens, such as multiple word phrases. The transaction phrase tokens are associated with transaction accounts by a service provider such that the entities can complete a transaction without having to exchange transaction account information. In a transaction, a transaction phrase token is offered to an accepting party, which tenders the offered transaction phrase token to the service provider. The service provider processes the offered transaction phrase token according to configuration information specified for the transaction phrase token. The service provider can automatically process the transaction request or request additional information. | 08-08-2013 |
20130204791 | Decoding systems with a decoding engine running on a mobile device and coupled to a payment system that includes identifying information of second parties qualified to conduct business with the payment system - A decoding system with a decoding engine running on a mobile device The decoding engine decodes signals produced from a read of a buyer's financial transaction card, accepts and initializes incoming signals from a read of a buyer's financial transaction card until the signals reach a steady state, detects the read of the buyer's financial transaction card once the incoming signals are in a steady stat, identifies peaks in the incoming signals and digitizes the identified peaks in the incoming signals into bits. A transaction engine runs on the mobile device and is coupled to the decoding engine. A payment system is in communication with the transaction engine and with a buyer's financial transaction card institution or a first party's financial account. The payment system includes identifying information of second parties qualified by the payment system to conduct business with the payment system. | 08-08-2013 |
20130204792 | Decoding systems with a decoding engine running on a mobile device and coupled to a social network - A decoding system has a decoding engine running on a mobile device. The decoding engine decodes signals produced from a read of a first party's financial transaction card, accepts and initializes incoming signals from a read of a first party's financial transaction card, and detects a read of the first party's financial transaction card. The transaction engine receives as its input decoded first party's financial transaction card information from the decoding engine, and serves as an intermediary between the first party and a second party, so that the first party does not have to share his/her financial transaction card information with the second party. A social network is in communication with the transaction engine. | 08-08-2013 |
20130212017 | TRANSACTION SYSTEM AND METHOD OF CONDUCTING A TRANSACTION - The invention pertains to a transaction system and method of conducting a transaction. Particularly, the invention pertains to a transaction system and method of conducting a transaction wherein the transaction is initiated by the consumer using a mobile device with a unique identifier. The consumer initiates the transaction by entering a vendor provided transaction initiation code into the mobile device. The transaction identifier code and unique identifier of the mobile device is transmitted to a server. Using the unique identifier the server can retrieve pre-existing transaction options specific to the unique identifier of the mobile device. The transaction options can either be transmitted to the mobile device to allow the consumer to input any preferences relating to the transaction options or to a vendor sales system of a vendor for further processing. | 08-15-2013 |
20130212018 | INTELLIGENT AUTHENTICATION - Systems and methods for intelligently authenticating payment transactions are disclosed. A user initiates a payment transaction to purchases goods or services from a merchant. The merchant sends a payment initiation request to a server computer in communication with a payment processing network and an issuer. The server computer queries various databases to determine one or more available communication channels that may be used as authentication channels by the issuer. The server computer also determines one or more communication channels, available for use by a mobile device of the user, that may be used as authentication channels to authenticate the payment transaction. The user is provided with a list of available/eligible authentication channels. User selects one of the authentication channels and the issuer is notified of the selection. The issuer uses the selected authentication channel to communicate with the user and authenticate the payment transaction. | 08-15-2013 |
20130212019 | TOKENIZATION OF PAYMENT INFORMATION IN MOBILE ENVIRONMENTS - Data can be protected in mobile and payment environments through various tokenization operations. A mobile device can tokenize communication data based on device information and session information associated with the mobile device. A payment terminal can tokenize payment information received at the payment terminal during a transaction based on transaction information associated with the transaction. Payment data tokenized first a first set of token tables and according to a first set of tokenization parameters by a first payment entity can be detokenized or re-tokenized with a second set of token tables and according to a second set of tokenization parameters. Payment information can be tokenized and sent to a mobile device as a token card based on one or more selected use rules, and a user can request a transaction based on the token card. The transaction can be authorized if the transaction satisfies the selected use rules. | 08-15-2013 |
20130212020 | AUTHENTICATION PLATFORM FOR PIN DEBIT ISSUERS - A system and method processes a transaction between a merchant and a consumer. Data indicate of the security of a digital processing device being used by the consumer to carry out the transaction with the merchant is received. A determination as to whether the digital processing device is secure is made using the received data. In response to determining the digital processing device is insecure, the transaction is aborted. In response to determining the digital processing device is in secure, the transaction is processed by at least one of authenticating the consumer, authorizing the transaction using a payment processing supply chain, and capturing funds for the transaction using a payment processing supply chain. | 08-15-2013 |
20130212021 | AMOUNT-EXCEEDING-CREDIT-THRESHOLD SERVICE SUBJECT TO CONDITION - In general terms, embodiments of the present invention relate to methods and apparatuses for providing an amount-exceeding-credit-threshold service subject to one or more predetermined conditions. For example, in some embodiments, a method is provided that includes: determining that an account will exceed a credit threshold associated with the account as a result of a transaction, determining that a predetermined condition is met and/or that the consent of the holder of the account is valid for the transaction, and authorizing the transaction based at least partially on receiving the consent, determining that the holder's consent is valid for the transaction, and/or determining that the predetermined condition is met. | 08-15-2013 |
20130212022 | SECURE AUTHENTICATION AND PAYMENT SYSTEM - The present invention provides a service for allowing secure financial transactions to be carried out, the service involving authenticating a user's identity and/or status as part of a financial transaction with another party and in the event that the user is authenticated arranging for the transaction to be completed without revealing the user's financial details and/or other personal details to that other party. Authentication data and transaction data may be communicated over any suitable communications channel(s). The invention provides a trusted authentication and payment environment that protects a user's financial details, but allows them to be securely authenticated and arranges for transactions to be fulfilled, whilst providing other parties with reassurance that transactions will be completed. In this way, fraud and theft due to misappropriation of financial details can be minimized. | 08-15-2013 |
20130212023 | OFFSETTING FUTURE EXCEEDED ACCOUNT THRESHOLD PAYMENTS - In general terms, embodiments of the present invention relate to methods and apparatuses for offsetting future exceeded account threshold payments. In some embodiments, a method is provided that includes: (a) receiving one or more payments for offsetting one or more future exceeded account threshold payments associated with an account; (b) receiving transaction information associated with a transaction, where the transaction involves the account, and where the transaction is initiated after the receiving the one or more payments; (c) determining, based at least partially on the transaction information, that the account will incur an exceeded account threshold as a result of the transaction; (d) determining that the one or more payments are sufficient to offset an exceeded account threshold payment associated with the exceeded account threshold; and (e) authorizing the transaction based at least partially on the determining that the one or more payments are sufficient. | 08-15-2013 |
20130218768 | Systems and Methods for Facilitating Secured Financial Transactions - Systems and methods for facilitating at least a portion of a secure electronic financial transaction are provided herein. Methods may include generating a unique payee identifier that represents a unique payment relationship between a payee and one or more payors, receiving a transaction request, the transaction request comprising the unique payee identifier and a payment, and authorizing a payment to the payee that corresponds to the payment. | 08-22-2013 |
20130218769 | Mobile Funding Method and System - Systems and methods for mobile funding are provided. One such method comprises receiving a transaction request to transfer funds from a payor to a payee. The transaction request can include a payor device identifier, a payee device identifier and an amount. A payor account identifier associated with the payor device identifier, and a payee account identifier associated with the payee device identifier can each be determined. Additionally, a first service provider associated with the payor device can be determined based on the payor device identifier, and a second service provider associated with the payee device can be determined based on the payee device identifier. The transfer of funds from the first service provider to the second service provider can then be initiated using the payor account identifier and the payee account identifier. At least one of the first and second service providers is a mobile network operator. | 08-22-2013 |
20130218770 | System and Method for Performing Financial and Other Transactions with Increased Automation, Improved Security and/or Usage of Data - An apparatus, system and method for securely withdrawing, exchanging, depositing and reconciling funds (cash and no-cash value) from automated media item(s) and delivery system for employees, patrons or other individuals so that cash equivalent value can be issued at authorized location, via a tracked and disbursed, exchanged or deposited funds, or other means of printed or credit transfer. Software to integrate various devices and associated databases that are remotely connected to a network, such as the web, including a login device, accounting device, funds delivery device and accounting device. | 08-22-2013 |
20130218771 | ELECTRONIC PAYMENT UNIT, ELECTRONIC PAYMENT ORIGIN AUTHENTICATION SYSTEM AND METHOD - An electronic payment unit including includes a data communications interface, a payment card reader and a memory. During a registration process between the electronic payment unit and a registering system at a location having a unique identifier associated with the location, the electronic payment unit is operative to store the unique identifier, or data derived from or including the unique identifier in the memory. The payment card reader is arranged to read a payment card during an electronic transaction, and to form for transmission, via the data communications interface, an electronic payment request including data on the payment card and on the content of the memory. An associated system and method are also disclosed. | 08-22-2013 |
20130218772 | METHOD AND SYSTEM FOR IMPLEMENTING A DYNAMIC VERIFICATION VALUE - A method is disclosed, which includes receiving a message including an account identifier and a first verification value. The method uses the account identifier to select a dynamic verification value process from at least two dynamic verification value processes. Then, using the selected dynamic verification value process, a second verification value is determined. Next, the method determines if the first verification value and the second verification value match or are within an expected range. | 08-22-2013 |
20130218773 | AGE VERIFICATION SYSTEM AND METHOD FOR EFFICIENT HANDLING OF AGE VERIFICATION REQUESTS - The disclosure relates to an age verification system and method for settling age verification requests. An age verification request is made unavailable for a processing display unit and other display units when the processing unit processing the age verification request does not settle the age verification request and issues an instruction for a customer at the supplier system. The instruction from the display unit to the supplier system is configured to generate a message for the customer at the customer terminal relating to the consumer image or the document image. The age verification request is made available again for settling at the display units when an instruction from the supplier system is received. | 08-22-2013 |
20130218774 | AGE VERIFICATION SYSTEM AND METHOD FOR EFFICIENT HANDLING OF AGE VERIFICATION REQUESTS - The disclosure relates to an age verification system and method for settling age verification requests. An age verification request is made unavailable for a processing display unit and other display units during a time interval when the processing unit processing the age verification request does not settle the age verification request and issues an instruction for a customer at the supplier system. The instruction from the display unit to the supplier system is configured to generate a message for the customer at the customer terminal relating to the consumer image or the document image. The age verification request is made available again for settling at the display units when the time interval during which the age verification request was unavailable has expired. | 08-22-2013 |
20130218775 | METHOD AND SECURE DEVICE FOR PERFORMING A TRANSACTION - A method for determining the presence of a human being, comprising:
| 08-22-2013 |
20130218776 | MONEY ALLOCATION SYSTEM - At a high level, software | 08-22-2013 |
20130218777 | SERVICE FOR ACCOUNT WITH UNAVAILABLE FUNDS OR CREDIT USING A PASSCODE - In general terms, embodiments of the present invention relate to methods and apparatuses for providing a service for account with unavailable funds or credit using a passcode for the account with unavailable funds or credit For example, in some embodiments, a method is provided that includes: (a) receiving transaction information associated with a transaction, where the transaction involves an account; (b) determining, based at least partially on the transaction information, that the account will exceed available funds or credit as a result of the transaction; (c) receiving a passcode for the account with unavailable funds or credit associated with the account; and (d) authorizing the transaction based at least partially on the receiving the passcode for the account with unavailable funds or credit. | 08-22-2013 |
20130218778 | SYSTEM AND METHOD FOR PROCESSING PAYMENT TRANSACTION RECEIPTS - Embodiments of the invention are directed to systems and methods for processing payment transaction receipts. When an authorization request message for a transaction of a consumer is received, it is determined whether an account associated with the consumer's portable consumer device is enrolled in an electronic receipt program. If the account is enrolled, an electronic receipt for the transaction is sent to the consumer. | 08-22-2013 |
20130226795 | VEHICLE IMMOBILIZING DEVICES, SYSTEMS, AND METHODS - A vehicle immobilizing device includes a lock, a user interface, memory configured to store an unlock code, and a processor. The lock has a latch mechanism and the processor controls movement of the latch mechanism from a locked position to an unlocked position so that the immobilizing device can be removed from a vehicle. A person installing the immobilizing device on a vehicle utilizes the user interface to enter and store an unlock code and an identification code in the device memory at the time of installation. Upon payment of an outstanding fine, a vehicle owner is provided with an unlock code. To remove the device from the vehicle the owner utilizes the user interface to enter unlock code and the processor causes the latch mechanism to move to the unlocked position upon determining that the unlock code input via the user interface matches an unlock code stored in the memory. | 08-29-2013 |
20130226796 | Presence-of-Card Code for Offline Payment Processing System - Preventing fraud during an offline transaction by encoding a randomly-generated card verification code onto a smart card. The verification code is transmitted to a contactless device during each transaction, wherein it is cross-referenced with the account number to ensure presence of the card. Also, every transaction record is signed by an access key resident on the contactless device and certified by a signing key resident on a remote system. Funds may be deposited onto the card when the contactless device creates a deposit request, signs the request using an access key and transmits it to the remote system, which in turn processes the request and certifies it with a signing key. Funds may be withdrawn when the contactless device creates a withdrawal record and signs it using an access key. The remote system verifies the signatures and certifies the records using a signing key when the records are later transmitted. | 08-29-2013 |
20130226797 | Transaction Signature for Offline Payment Processing System - Preventing fraud during an offline transaction by encoding a randomly-generated card verification code onto a smart card. The verification code is transmitted to a contactless device during each transaction, wherein it is cross-referenced with the account number to ensure presence of the card. Also, every transaction record is signed by an access key resident on the contactless device and certified by a signing key resident on a remote system. Funds may be deposited onto the card when the contactless device creates a deposit request, signs the request using an access key and transmits it to the remote system, which in turn processes the request and certifies it with a signing key. Funds may be withdrawn when the contactless device creates a withdrawal record and signs it using an access key. The remote system verifies the signatures and certifies the records using a signing key when the records are later transmitted. | 08-29-2013 |
20130226798 | METHODS AND SYSTEMS FOR AUTOMATING PAYMENTS UTILIZING RULES AND CONSTRAINTS - An event that potentially relates to payments of an entity is detected by an electronic payment system. In response to detecting the event, automatically and without user intervention, a set of rules relating to the payments of the entity that relates to the event is retrieved, financial information relating to the set of rules relating is retrieved, a payment is determined based on the event, the set of rules and the financial information and the payment is effected. The rules may be user defined and stored in a rules database. The financial information may be drawn from the electronic payment system and/or websites of various service providers based on one or more rules. The payment may be scheduled for future execution, or may be executed immediately based on one or more rules. | 08-29-2013 |
20130226799 | AUTHENTICATION PROCESS FOR VALUE TRANSFER MACHINE - Embodiments of the invention are directed towards improved transaction processing methods and systems with transaction apparatuses, including a value transfer machine, using a device identifier instead of a value transfer machine card to process a transaction. One embodiment of the transaction may be directed to a transaction apparatus and a method including receiving an authentication code from a consumer, sending the authentication code to a first server computer, wherein if the received authentication code matches a generated authentication code, the first server sends a confirmation message. The method continues by receiving the confirmation message from the first server, receiving a secret token from the consumer, and sending an authorization request message to a second server computer. Thereafter, the transaction apparatus receives an authorization response message from the second server, indicating whether the secret token matches an expected token. Other embodiments are directed to first and second servers and corresponding methods. | 08-29-2013 |
20130226800 | System and Method for Authenticating a Payment Transaction - A system and method of authenticating a payment transaction between a merchant and a customer in an electronic payment system are described. Transaction details presented by the merchant are received at a mobile electronic device, the customer is authenticated by means of an authentication token presented by the customer at an authentication terminal, and the geo-location of the mobile electronic device and the authentication terminal are compared to verify that the device and terminal are within a predefined geographical distance at the time the payment transaction is processed. | 08-29-2013 |
20130226801 | METHOD AND SYSTEM FOR FACILITATING MICROPAYMENTS IN A FINANCIAL TRANSACTION SYSTEM - A system for processing accounts includes a database configured to store a plurality of accounts, the accounts including a consumer account associated with a consumer and a plurality of merchant accounts including a transacting merchant account associated with a merchant, wherein at least one account includes an amount of a virtual currency associated with the account. The system further includes a processor configured to process a financial transaction, wherein the transaction includes the consumer and the merchant, is for a specified amount of virtual currency, and processing the transaction includes transferring the specified amount of virtual currency from the consumer account to the transacting merchant account. The processor is further configured to process the at least one account, wherein processing the at least one account includes converting the associated amount of virtual currency to or from a real currency when the at least one account meets a predetermined criteria. | 08-29-2013 |
20130226802 | VERIFICATION VALUE SYSTEM AND METHOD - A method is disclosed. The method includes generating a verification value in response to a transaction involving a portable consumer device, where the verification value is generated using a first dynamic data element and a second dynamic data element. The verification value is sent to a service provider associated with the portable consumer device so that the service provider can verify the transaction. | 08-29-2013 |
20130226803 | METHOD AND SYSTEM FOR AUTHENTICATING AN ENTITY USING TRANSACTION PROCESSING - A system for authenticating an entity includes a database configured to store a profile associated with an entity, the profile including at least an authentication status; a supplying device configured to supply transaction details including a unique virtual payment number (VPN) to a third party entity to be authenticated; a receiving means for receiving an authorization request that includes transaction details that include a VPN; and a processor configured to capture, from the authorization request, transaction details for a payment card transaction wherein the transaction details includes at least a payment card number, authenticate the entity requesting a transaction by comparing the captured transaction details including a payment card number to the supplied unique VPN, and update, in the database, the authentication status in the profile associated with the entity based on the authenticating of the entity based on said authentication. | 08-29-2013 |
20130226804 | MULTI-SOURCE DEBIT CARD OBJECT ORIENTED SYSTEM AND METHOD - The present invention involves a server based system and method which enables multiple source reloading of a single debit card. The multiple-source debit card system and method allows multiple individuals to provide funds to a single debit card without the multiple individuals needing to know any bank account information. Multiple sources, optionally identified through a multi-factor identification may reload the account associated with the debit card. Alternatively, a closed loop debit card may be funded from multiple sources. The system and method identifies the participants for purposes of the financial transaction, although the identification of the recipient may be managed by the donor. | 08-29-2013 |
20130226805 | PROTECTION FOR EXCEEDING A CREDIT THRESHOLD - In general terms, embodiments of the present invention relate to methods and apparatuses for providing protection for exceeding a credit threshold. In embodiments of the present invention are configured to: (a) receive a request to authorize a transaction involving a credit account, (b) determine that the credit account will exceed the credit threshold as a result of the transaction, and (c) authorize the transaction based at least partially on a determination that the credit account has protection through a source account for exceeding the credit threshold. As another example, other embodiments of the present invention are additionally and/or alternatively configured to: (a) determine that a credit account has exceeded, or will exceed the credit threshold as a result of a transaction, and (b) transfer funds from a source account to the credit account in an amount sufficient to offset the amount which exceeds the credit threshold. | 08-29-2013 |
20130226806 | Utilizing a Trigger Order with Multiple Counterparties in Implied Market Trading - An electronic trading system utilizes a Match Engine that receives orders, stores them internally, calculates tradable combinations and advertises the availability of real and implied orders in the form of market data. Calculating tradable combinations or cycles for certain strategies becomes complex. Strategies that utilize legs having different volume ratios may form tradable combinations that will traverse a trigger order more than one time. | 08-29-2013 |
20130226807 | ONLINE FUNDS TRANSFER METHOD - A method is provided for transferring funds related to a checkout process for a transaction initiated between a user and a merchant. The method may include storing information on a plurality of asset accounts associated with the user and receiving selection of a first account from the plurality of asset accounts as possible choices. The method may also include receiving authorization via the interface from the user to pay the merchant from the first account. The method may further include providing a digital IOU to the merchant and receiving a redemption request of the digital IOU. The method may additionally include determining, automatically with a funds transfer server, a second account associated with the merchant, and initiating, automatically with the funds transfer server in response to the redemption request, an electronic transfer between the first account and the second account that is related to the checkout process for the transaction. | 08-29-2013 |
20130226808 | Authorization System - An authorization system including an authorization server, an account server for storing account data relating to a plurality of accounts and an access terminal for inputting data that identifies one of the plurality of accounts. | 08-29-2013 |
20130226809 | METHOD AND APPARATUS ENABLING IMPROVED PROTECTION OF CONSUMER INFORMATION IN ELECTRONIC TRANSACTIONS - According to a commercial method of the present invention, a merchant forwards transaction data to a consumer. If the consumer accepts the transaction, a payment command is forwarded to a service provider. The service provider selectively applies authentication before approving payment. Once payment is approved, the service provider forwards a payment instruction, including consumer account information, to a payment service. The payment service forwards payment to the merchant and a payment confirmation is returned to the service provider and, through the service provider, to the consumer. The service provider stores information about each transaction performed by each subscriber. Consumer identity is protected because it is only exchanged between the service provider and the payment service, and is not made available to the merchant. In addition, the storage of the transaction information by various devices facilitates the return process and adds marketing capability to the service provider. | 08-29-2013 |
20130232066 | FINGER PRINT FUNDING SOURCE SELECTION - Each finger of a user can be uniquely associated with a funding source for a user account with a payment provider, such that the user can select or change a funding source by simply having the desired finger print read, such as on the display of a smart phone. | 09-05-2013 |
20130232067 | Charge Allocation and Distribution - Disclosed are various embodiments for facilitating the creation of allocation rules for distributing charges to one or more accounts associated with a payment instrument. The charge distribution application accesses allocation rules that are used to determine a charge distribution allocation for linked accounts associated with a master account identified in a charge request. The charge distribution application specifies a percentage of the amount indicated in the charge request to charge to one or more of the linked accounts. The charge distribution application charges up to the total amount specified in the charge request to one or more of the accounts depending on the applicable charge distribution allocation. | 09-05-2013 |
20130232068 | SYSTEMS AND METHODS FOR ENHANCED AUTHORIZATION FRAUD MITIGATION - A consumer uses a web client to transmit purchase information associated with a transaction to a merchant server. The purchase information is transmitted via a web acceleration server. The web acceleration server identifies enhanced authorization data associated with the transaction. The web acceleration server creates a pseudo authorization message. The web acceleration server transmits the pseudo authorization message to a transaction account issuer. The merchant server transmits an authorization request to the transaction account issuer. The transaction account issuer determines that the authorization request and the pseudo authorization message are associated with the same transaction. The transaction account issuer merges the authorization request and the pseudo authorization message and performs a fraud analysis. The transaction account issuer transmits an authorization response to the merchant. | 09-05-2013 |
20130232069 | SYSTEMS AND METHODS FOR ENHANCED AUTHORIZATION FRAUD MITIGATION - A consumer uses a web client to transmit purchase information associated with a transaction to a merchant server. The purchase information is transmitted via a web acceleration server. The web acceleration server identifies enhanced authorization data associated with the transaction. The web acceleration server creates a pseudo authorization message. The web acceleration server transmits the pseudo authorization message to a transaction account issuer. The merchant server transmits an authorization request to the transaction account issuer. The transaction account issuer determines that the authorization request and the pseudo authorization message are associated with the same transaction. The transaction account issuer merges the authorization request and the pseudo authorization message and performs a fraud analysis. The transaction account issuer transmits an authorization response to the merchant. | 09-05-2013 |
20130232070 | SYSTEMS AND METHODS FOR VALIDATING MONETARY TRANSACTION USING LOCATION INFORMATION OF A USER - The present invention in a preferred embodiment provides systems and methods for validating monetary transaction using location information of a user, wherein the system comprises,
| 09-05-2013 |
20130232071 | METHOD AND APPARATUS FOR MANAGING TRANSACTIONS - A system receives account access information from a user. The account is then accessed using the received access information. Data is harvested from a web page associated with the account or received from another financial data source. The user's ability to access the account is authenticated based on the obtained information. | 09-05-2013 |
20130232072 | Method of Using a Cell Phone to Authenticate a Commercial Transaction - A cell-phone or other user-side electronic device provides a user-side time-dependent key that is accessed through use of an entry key and/or a different seed. A bank or other funding institution, or an intermediary, uses the user-side time-dependent key to either approve or deny a commercial transaction. Entry keys and seeds can independently be typed passcodes, but could alternatively or additionally comprise one or more of audio signals, a tactile signal, a biometric, and/or a visual. Entry keys and/or seeds could vary by at least one of identity of user, day, date, time of day, and amount of transaction. | 09-05-2013 |
20130232073 | Authentication Using Biometric Technology Through a Consumer Device - Embodiments of the invention provide strong user authentication on a trusted consumer device without requiring the user to go through a formal registration process with the issuer or payment processing network. Certain embodiments allow the use of any biometric technology (e.g., fingerprint scan, iris scan, voice recognition, etc.) supported by their consumer device (e.g., smart phone, tablet computer) to authenticate the user. Additionally, the consumer device provides unforgeable evidence of the biometric match in the form of a biometric digital artifact to provide proof to a payment processing network that the match occurred. The payment processing network maintains a history of these authenticated transactions and biometric digital artifacts and as more and more non-fraudulent authenticated transactions occur over time, a higher level of trust (i.e., lower risk) is associated with the consumer device, biometric registration process, and the user. | 09-05-2013 |
20130232074 | System and Method for Providing Alert Messages with Modified Message Elements - Embodiments of the invention provide for alert messages with modified transaction alert message elements and non-modified transaction alert message elements. The modified transaction alert message elements are designed to call the user's attention to them. They may relate to transaction details that are somewhat abnormal, and therefore potentially fraudulent. | 09-05-2013 |
20130232075 | SYSTEM AND METHODS FOR TRANSFERRING MONEY - Aspects of the present invention relate to systems and methods for increasing security and privacy of financial transactions. More specifically, certain aspects of the invention provide consumers, financial institutions, and/or merchants with increased protection of sensitive information associated with financial accounts and transactions. Herein disclosed are methods and systems for allowing a consumer to pay a merchant without the consumer needing to disclose confidential information to the merchant. | 09-05-2013 |
20130232076 | Image Capture and Identification System and Process - A digital image of the object is captured and the object is recognized from plurality of objects in a database. An information address corresponding to the object is then used to access information and initiate communication pertinent to the object. | 09-05-2013 |
20130232077 | ELECTRONIC AUTHORIZATION SYSTEM AND METHOD - An electronic authorization system comprising a data source system configured to transmit transaction data. A secure data system is coupled to the data source system over an open network, the secure data system is configured to receive the transaction data from the data source system, generate a unique encrypted identifier for the transaction data and to transmit the unique encrypted identifier to the data source system. The data source system is configured to receive the unique encrypted identifier and replace payment card data associated with the transaction data in a database with the unique encrypted identifier. | 09-05-2013 |
20130232078 | Method and Apparatus to Validate a Subscriber Line - A method is described of providing validation data associated with a subscriber line of a telecommunication network. The method includes obtaining line data of the subscriber line wherein the line data is suitable for interrogating a line identification database (LIDB). The method interrogates the LIDB with the line data to obtain reference subscriber data associated with the line data, and processes the reference subscriber data to obtain validation data associated with the subscriber line. The invention extends to a subscriber line validation system to validate a subscriber line of a communication network. | 09-05-2013 |
20130232079 | TOKEN BASED TRANSACTION AUTHENTICATION - A token based transaction authentication system is disclosed. Issuer, merchants, and a payment processing network generate unique tokens or keys to authenticate messages between themselves and to authenticate a sending entity or consumer as they are redirected between entities. The tokens are also used to identify the particular authentication thread a message or sending entity is associated with. The sending entity authentication occurs over a web-based channel or a mobile based channel. | 09-05-2013 |
20130232080 | Private Label Promotion Card System, Program Product, and Associated Computer-Implemented Methods - Embodiments of the present invention provide a private label promotion card as a bank product, being issued and managed by the bank and using an open payment network for purchase authorization and payments. A bank computer processes activation information for a promotion card and receives funds into an account at the bank on behalf of a retailer for payment for the promotion card, perhaps at a discount to a customer value of the promotion card. The bank computer authorizes purchase requests to use one or more activated promotion cards as payment for a consumer purchase from the retailer via an open payment network and transfers funds to the open payment network to satisfy the authorized consumer purchase. Upon expiration, the bank computer sweeps the account of the remaining value for expired promotion cards to thereby establish a credit for the bank. | 09-05-2013 |
20130232081 | System and Method for Implementing Financial Assistance Programs - A system and method to provide food stamp benefits to recipients. The state agency responsible for distributing food stamp benefits to eligible recipients employs an issuer to produce consumer access devices for distribution to the recipients. The consumer access device is encoded with information enabling the food stamp recipients to purchase specified items from merchants. By imprinting the consumer access device with indicia identifying a commercial payment processing network and employing the commercial payment processing network to process the transactions, transaction funded by the food stamp program will appear to be credit or debit transactions personally funded by the food stamp recipient. | 09-05-2013 |
20130238499 | SECURITY SYSTEM INCORPORATING MOBILE DEVICE - In some embodiments, a first server computer may be provided. The first server computer may comprise a processor and a computer readable medium coupled to the processor. The computer readable medium may include code executable by the processor for implementing a method. The method may include the step of electronically receiving an authorization request message that includes a first device verification value from a merchant for a first transaction, where the first device verification value may have been received by the merchant from a mobile device based on an interaction between the mobile device and an access device. In some embodiments, the mobile device may have received the first verification value based on a first request. The method may further include the step of determining by a data processor if the first device verification value corresponds to a stored device verification value. | 09-12-2013 |
20130238500 | ONLINE MERCHANT EXPRESS PAYMENT USING A DYNAMIC TIME-DEPENDENT PASSCODE GENERATOR - The invention provides for accelerating online merchant transactions through the use of a dynamically generated time-dependent passcode. The transaction is conducted by the customer inputting only the passcode and, in some instances, a payment account identifier, which are communicated from the merchant to the payment processing entity. The payment processing entity uses the passcode to authenticate the customer, authorizes the transaction and communicates the customer's personal information back to the online merchant. The transaction is completed upon the customer confirming the personal information, in the form of name, shipping address, billing information/address and the like. Both the customer and the online merchant benefit from an express online transaction that can be completed in a simple and efficient manner and affords heightened security. | 09-12-2013 |
20130238501 | BIOMETRIC BASED AUTHORIZATION SYSTEMS FOR ELECTRONIC FUND TRANSFERS - A money transfer authorization method that includes the step of providing transferor biometric information to a party verification processor that verifies an identity of the transferor by comparing the transferor biometric information with previously registered biometric information from the transferor, where the transferor provides transfer identity information to receive the money. The method also includes confirming that the verified transferor has sufficient funds or credit for the money transfer, and providing transferee biometric identification to the party verification processor that verifies the transferee by comparing the transferee biometric information with previously registered biometric information from the transferee. The transferee has to provide transfer identity information before the money is given to the transferee. | 09-12-2013 |
20130238502 | COMPUTER NETWORK, AN ELECTRONIC TRANSACTIONS CLOUD AND A COMPUTER-IMPLEMENTED METHOD FOR SECURE ELECTRONIC TRANSACTIONS - The computer network for secure processing of a request from a mobile application on a mobile device, includes: a first communications channel that an electronic transactions cloud receives the request for processing an electronic transaction between a first and a second entity and over which a request for validation of a secure transaction code for processing the transaction from the mobile application; a second channel over which variable data from the request is verified; and a third channel to send instructions to process the transaction to an electronic data store of the second entity and the transaction code to the data store. If the transaction code is valid, the transactions cloud receives a receipt confirming completion of the transaction from the data store via the third channel and, if the transaction code is not valid, the transactions cloud receives an error message from the data store indicating the transaction code is invalid. | 09-12-2013 |
20130238503 | SYSTEM AND METHOD TO MANAGE INFORMATION FOR CONDUCTING SECURE TRANSACTIONS - In a secure electronic transaction method, a unique code associated with a payer and payer's selected transaction method is generated, responsive to a request from the payer computing platform to conduct a transaction using that transaction method. A unique code received from a recipient is validated by attempting to match it with a stored unique code associated with a payer and payer's selected transaction method. Information received from the payer, recipient, and/or a transaction authorization network is stored in electronic storage. The unique code associated with the payer does not contain any transaction method information and is at least one of time-limited, one-time use, and limited to use with a single transaction partner. | 09-12-2013 |
20130238504 | PERFORMING AUTOMATICALLY AUTHORIZED PROGRAMMATIC TRANSACTIONS - Techniques are described for facilitating interactions between computing systems, such as by performing transactions between parties that are automatically authorized via a third-party transaction authorization system. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. After one or more of the parties to a potential transaction supply reference tokens for the parties, the transaction authorization system can determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied. | 09-12-2013 |
20130238505 | System and Method for Linked Account Having Sweep Feature - A linked account instrument is used to access funds in an existing demand deposit account held at a financial institution. Merchant or other transactions are first processed against a demand deposit account via an electronic authorization network. If the demand deposit account does not have sufficient funds, the transactions may be processed as a credit charge against an designated credit account. The demand deposit account may subsequently be swept at predetermined times in search of funds to defray the overdraft. If adequate funds are present, they will be withdrawn from the demand deposit account, and the credit account will be cleared. Otherwise, the instrument holder's daily purchasing abilities may be temporarily suspended until the credit account is settled. The processing of overdraft amounts may be on a FIFO, smallest-first or other basis. | 09-12-2013 |
20130238506 | AUTHENTICATION METHOD AND SYSTEM - A method and system capable of authenticating transactions involving at least one service provider and one or more users who are each in electronic communication. This electronic communication can be, for example, SMS, MMS, e-mail or online account messaging. Certain embodiments provide for the transaction to be an authentication and/or verification of an entity. Examples of such entities are products, actions and users. | 09-12-2013 |
20130246266 | Secure Transaction Processing System and Method - A secure transaction processing system/method allowing injection and execution of credit card and ACH payment forms in a third party web page via cross domain requests is disclosed. The system/method provides a mechanism to inject and execute payment forms into a third (customer) party's website via Cross Domain Requests by providing a set of client application instructions that retrieves presentation and behavior logic and delivers it in a third party application. A browser based client application detects and manages style and behavior conflicts to render forms within in an existing third party web page. The client application then submits the forms via Cross Domain Requests to the transaction processing web server and directs the client application to a new navigation target within the third party website. | 09-19-2013 |
20130246267 | Systems, Methods, and Computer Program Products for Using Proxy Accounts - The present disclosure involves a method including creating a primary payment account for an account owner, in which the primary payment account is linked to a method of payment, and creating a proxy payment account, in which the proxy payment account is linked to the primary account but is not linked directly to the method of payment, in which payments to and from the proxy payment account are cleared through the primary account, further in which the primary payment account has first credentials, and in which the proxy payment account has second credentials, the first and second credentials being different. | 09-19-2013 |
20130246268 | METHOD AND SYSTEM FOR DEDICATED SECURE PROCESSORS FOR HANDLING SECURE PROCESSING IN A HANDHELD COMMUNICATION DEVICE - A communication device may comprise one or more dedicated secure processors and one or more other non-secure processors. The one or more dedicated secure processors may be utilized for handling secure transactions in the communication device. Each of the dedicated secure processors may run independent of the other processors in the communication device, and may utilize dedicated software that is unique for a particular payment provider for handling of secure transactions. The dedicate software may comprise a dedicated operating system and/or application for use in handling the secure transactions. Each of the dedicated secure processors may utilize dedicated resources in the communication device during handling of secure transactions. Handling secure transactions may comprise authenticating the user and/or the transactions, based on information relating to and/or provided by the user. | 09-19-2013 |
20130246269 | APPARATUS, METHOD, AND COMPUTER PROGRAM PRODUCT FOR RECOVERING TORN SMART PAYMENT DEVICE TRANSACTIONS - A first command is sent from a payment terminal assembly to a payment device with an on-device balance to compute a cryptogram to complete a putative transaction. It is detected that the cryptogram is not received as expected. In response, an identifier of the payment device and transaction recovery data associated with the putative transaction are stored in a storage area of a terminal memory of the payment terminal assembly. The payment terminal assembly obtains the identifier of the payment device, upon re-presentation of the payment device. Upon such re-presentation, the payment terminal assembly compares the obtained identifier of the payment device to contents of the storage area. Conditioned at least upon the comparing yielding a match, a second command is sent from the payment terminal assembly to the payment device to instruct the payment device to re-produce the cryptogram to complete the putative transaction. | 09-19-2013 |
20130246270 | Method and System for Multi-Modal Identity Recognition - A device, a system and a method are provided for multi-modal identity recognition. The device includes a face recognition unit, a voice recognition unit, and a control unit. The face recognition unit is configured for generating a first recognition result by obtaining and processing face recognition information of a customer and by comparing the processed face recognition information with face recognition information stored in a facial feature database. The voice recognition unit is configured for generating a second recognition result by obtaining and processing voice recognition information of a customer and by comparing the processed voice recognition information with voice recognition information stored in an audio signature database. The control unit is configured for confirming an identity of the customer based on the first recognition result and the second recognition result. | 09-19-2013 |
20130246271 | PAYMENT PROCESSING DEVICE SIGNATURE VERIFICATION - Devices and methods for signature authentication of a bearer of a payment processing device during financial transactions are provided. The payment processing device is provided with a signature input panel configured to receive user input signature information for the purpose of authenticating the signature. After the bearer of the payment processing device writes her signature into the signature input panel, the input signature information is compared to a pre-stored signature profile stored in the payment processing device for authentication. | 09-19-2013 |
20130246272 | SECURE MOBILE TRANSACTIONS - A method of providing secure information for a transaction between an access device and a relying party device may include sending, from the relying party device to the identity repository, a first transmission. The first transmission may include the identifier. The identifier may be associated with a user account and the user account may be maintained by an identity repository. The first transmission may also include an information request. The method may also include sending, from the identity repository to the access device, a second transmission including a request to authorize the transaction. The method may additionally include sending, from the access device to the identity repository, a third transmission including an indication that the transaction has been authorized. The method may further include sending, from the identity repository to the relying party device, a fourth transmission comprising information responsive to the information request. | 09-19-2013 |
20130246273 | SYSTEMS AND METHODS TO GENERATE A RECEIPT FOR A TRANSACTION - A system includes a transaction terminal that is configured to examine an authorization response for an indicator, which, when set, causes the transaction terminal to communicate with a portal to obtain content relevant to the receipt for the transaction approved by the authorization response. The content may identify the benefit of an offer applied to the transaction, which is not reflected in the authorization response. The content may direct the user to select an option regarding the delivery of the receipt. Options presented for selection include suppression of the printing of the paper receipt in favor of an electronic receipt transmitted to a communication reference of the user, printing a mini paper receipt in addition to transmitting an electronic receipt, and/or printing the full paper receipt at the transaction terminal. | 09-19-2013 |
20130246274 | SYSTEMS AND METHODS FOR REAL-TIME ACCOUNT ACCESS - Systems and methods for real-time account access, allowing access to accounts (such as deposit, credit, or debit accounts) through network processing infrastructures such as Electronic Funds Transfer (EFT). In some embodiments, consumers and/or merchants are able to effect transaction requests against accounts, using a pseudo-identifier or other identifier, and without the need to provide an account number or card number. In other embodiments, payment networks are able to route and process transaction requests against accounts, without having a card number or account number. In other embodiments, account processing systems are able to determine an appropriate account based on transaction requests that do not contain card numbers or account numbers. | 09-19-2013 |
20130246275 | ENHANCED COMMUNICATION PLATFORM AND RELATED COMMUNICATION METHOD USING THE PLATFORM - Pre-authorized communication services and/or transactions are provided via a plurality of networks in response to a request received from a user to provide at least one of a communication service, a transaction and user account information via a plurality of networks of different types. Prior to processing the request, there is verification of the user's authorization to receive the at least one of the communication service, the transaction, and the user account information, and that an account associated with the user has a sufficient amount currently available for payment of the at least one of the communication service and the transaction. After verification, an authorized account associated with the user is charged in real time as the at least one of the communication service and the transaction is provided. | 09-19-2013 |
20130246276 | METHOD AND SYSTEM FOR MOBILE IDENTIFICATION, COMMERCE AND AGREEMENT TRANSACTIONS - A method and system is described which uses the USSD (Unstructured Supplementary Services Data) protocol to allow users to conduct commerce and agreement transactions, and retrieve identification information in a secure manner. | 09-19-2013 |
20130254109 | Method and Apparatus for Identification Verification and Purchase Validation - A computer implemented method includes receiving a request for payment-related information at a wireless device. The method also includes communicating between the wireless device and a paired vehicle computing system (VCS) to verify the presence of a known vehicle. Further, the method includes transmitting requested payment-related information, responsive to the verification of the presence of the known vehicle. | 09-26-2013 |
20130254110 | Systems and Methods for Processing Payment Transactions - Embodiments of the disclosure relate to systems and methods for communicating transaction-related data to a recipient device. In at least one embodiment, a computer-implemented method can be provided. The method can include directing storage of transaction-related information comprising payment data and value added services data. The method can further include communicating the transaction-related information to a recipient device during a card emulation communication initiated by the recipient device, wherein the recipient device utilizes the transaction-related information to complete a payment transaction and provide one or more value added services associated with the payment transaction. | 09-26-2013 |
20130254111 | SYSTEM AND METHOD FOR FORMULA CALCULATION AND PAYMENT AUTHORIZATION WITH ELECTRONIC SIGNATURES - Techniques for electronic signature processes are described. Some embodiments provide an electronic signature service (“ESS”) configured to facilitate the creation, storage, and management of electronic signature documents. The ESS may facilitate payment processing via an electronic signature document that includes or is associated with a payment form. When the signature document is presented to a user for signature, the payment form collects payment data (e.g., card type, account number, name) that is used by the ESS to process payment upon completion of the signing process. | 09-26-2013 |
20130254112 | System and Method Including Chip-Based Device Processing For Transaction - Present embodiments are directed to a server computer. The server computer establishes a first channel of communication to receive payment device data in a first format (e.g., chip type) and establishes a second channel to receive the payment device data in a second format (e.g., legacy type). The server computer receives an authorization request message in the second format from a merchant and generates a new authorization request message in the first format. The server computer then forwards the new authorization request to the issuer for approval. | 09-26-2013 |
20130262305 | AUTHENTICATION FOR TRANSACTIONS USING NEAR FIELD COMMUNICATION - In a method for authenticating a current user of a near field communication (NFC) device, a profile for an authorized user of the NFC device is established based on data received from one or more sensors of the NFC device over a first period of time. Responsive to a request for a payment transaction, a profile for the current user of the NFC device is established based on data received from the one or more sensors over a second period of time after the first period of time. The profile for the current user is compared with the profile for the authorized user. A determination is made as to whether one or more values in the profile for the current user are within a range of one or more values in the profile for the authorized user at a confidence level. | 10-03-2013 |
20130262306 | Method, System and Program Product for Financial Transactions - A method, system and program product comprise initializing at least a financial transaction between a first user and a second user, in which the first user and the second user have created accounts by communicating with a server system. The account of the first user is associated with at least a first user's client device, and the account of the second user is associated with at least a second user's client device. A contact between the first user's client device and the second user's client device is recognized. Geographical locations are obtained. The geographical locations are compared for, in part, determining a validity of the financial transaction. At least an amount for the financial transaction is communicated to the server system for transaction processing. | 10-03-2013 |
20130262307 | PRE-ALLOCATING MERCHANT ID IN A CREDIT CARD PROCESSOR ENTITY SYSTEM BY A MASTER MERCHANT - A method to process credit card transactions, including obtaining available merchant account IDs allocated to a master merchant account at a credit card processor entity of a credit card transaction network, where the master merchant is authorized to set up merchant accounts based on the master merchant account and assumes merchant-side financial risks of the merchant accounts, receiving, after obtaining the available merchant account IDs, a request from a merchant to set up a merchant account, and assigning, in response to credit approval of the merchant, a merchant account ID selected from the available merchant account IDs to the merchant for setting up the merchant account, where a credit card transaction of the merchant is submitted, subsequent to assigning the merchant account ID, to the credit card processor entity for authorization based on the master merchant account, where the credit card transaction is tagged with the merchant account ID. | 10-03-2013 |
20130262308 | SPENDING LIMITS FOR OFFLINE CHARGING - Systems and methods that provide spending limits for offline charging. In one embodiment, an offline charging system monitors usage of an end user over a packet core network, and identifies a spending limit that the end user is allowed to consume during a time period, such as a billing cycle. The offline charging system determines that the usage of the end user is approaching the spending limit during a session, identifies options for the end user to continue with the session as the usage of the end user approaches the spending limit, and initiates a notification to the end user indicating the options. The offline charging system receives a response from the end user selecting one of the options, and conveys the selected option to a network element in the packet core network that modifies policies for the session. | 10-03-2013 |
20130262309 | Method and System for Secure Mobile Payment - A system and method for conducting secure payment using mobile communication devices, comprising: creating a first user account and a second user account in a central processing server, wherein the first user account creation comprises pairing a first mobile communication device with the first user account; generating, by the central processing server or a second device, a QR code for the second user; optically capturing and decoding the QR code by the first mobile communication device; transmitting the decoded information along with a security PIN provided by the first user to the central processing server upon user verification and confirmation; upon the successful authentication of the first user, transferring funds from the first user account to the second user account; and sending, by the central processing server, to the first user and the second user a notification of the result of the funds transfer. | 10-03-2013 |
20130262310 | Method and Apparatus for Custom Strategy Specification in a Hosted Electronic Transaction Service System - A merchant generates a customized service strategy related to a suite of electronic transaction services hosted by a service provider. The custom strategy specifies services to perform, and possibly an order in which to perform the services, by a service provider in relation to an electronic transaction associated with the merchant. Through use of a user interface, the strategy can be represented as a graphical decision tree, with terminal nodes representing services or actions. A customized strategy is transmitted to a service provider, as is transaction related information, whereby the service provider can service the transaction according to the strategy and based on the transaction information. Scheduling information that specifies different strategies to apply to different transaction scenarios can be generated. A strategy is selected by a service provider based on the scheduling information and transaction information, and is used to service one or more electronic transactions. | 10-03-2013 |
20130262311 | SYSTEM AND METHOD FOR AUTOMATED ANALYSIS COMPARING A WIRELESS DEVICE LOCATION WITH ANOTHER GEOGRAPHIC LOCATION - A system and method for automatically comparing obtained wireless device location information from a wireless network and comparing that location with another independent source geographic location is provided. Location information is derived from two or more sources in a multiplicity of ways and a comparison is made within a Location Comparison Engine. The Location Comparison Engine makes use of databases that assist in resolving obtained raw positioning information and converting that positioning information into one or more formats for adequate location comparison. Results of location comparison are deduced to determine if the wireless device is in some proximity to some other activity source location. Other location information used for comparison may be obtained from a multiplicity of sources, such as another network based on some activity of wireless device user, another wireless device via a wireless network, or any system capable of providing location information to the Location Comparison Engine. | 10-03-2013 |
20130262312 | Mobile Alert Transaction System and Method - A method and system for providing geographic location notifications of payment transactions is disclosed. One embodiment of the invention is directed to a method including receiving an authorization request message associated with a transaction, the transaction associated with a portable consumer device and an access device at a merchant. A geographic location of the transaction is determined. It is determined whether a notification message indicating that the transaction is occurring is required. Upon determining that the notification message is required, the notification message is sent to a notification device operated by a consumer and the notification device receives the notification message substantially simultaneously with the merchant's receipt of an authorization response message. A graphical depiction of the notification message is displayed on a map on the notification device. | 10-03-2013 |
20130262313 | INSTANTANEOUS MERCHANT INFORMATION RETRIEVAL FOR FINANCIAL TRANSACTIONS - A solution to resolve ambiguous merchant data in connection with processing a cashless transaction request in a real-time manner. Provided according to the present disclosure are a system and method including a binary-searchable non-transitory computer-readable medium is configure to store a first set of unambiguous merchant identification data having plural data entries therein, each entry corresponding to a merchant. A binary search of the first set of unambiguous merchant identification data is carried out using search keys based upon the ambiguous merchant identification data to determine whether one or more entries of the first set satisfies at least one of a second set of partial match criteria for comparing the ambiguous merchant identification data with the first set of unambiguous merchant identification data. An entry of the first set of unambiguous merchant identification data is assigned to correspond with the ambiguous merchant identification data where at least a predetermined number of the second set of partial match criteria are met. | 10-03-2013 |
20130268438 | Virtual Currency Payment Network - A method and system for making purchase payment transactions with merchants, using virtual (eg: points-based) currencies issued by parties other than that of the merchant. Specifically, this invention is a payment network that processes payment instructions across multiple merchants, the payments being made with virtual currency (ie: private, non-sovereign currency, such as loyalty points and social network credits) issued by multiple virtual currency programs (eg: as those from airline, hotel, credit card, social media and gaming companies). | 10-10-2013 |
20130268439 | VTEX3 FRAUD PROTECTION SYSTEM MOBILE VERIFICATION PROTOCOL (MVP) - The methods and systems for providing fraud protection and prevention of Identity theft, referred to as Personal Information Owner (PIO) to an user involving a transaction into an application server and application associated with customer mobile/portable communication device through a multi step verification process, the system allow users for controlling and managing of pre and post verification of all transaction/Personal Information Owner (PIO) based requests or personal information and providing the holder/user full control of confidential information. This system or process has the advantage of pre-screening any process request made against the user's information. | 10-10-2013 |
20130268440 | Gift Transaction Processing System and Method - A gift transaction processing system/method allowing collection and management of financial and non-financial gifts from gift donors to gift recipients using a distributed communication network is disclosed. The gift donor interacts with a graphical user interface (GUI) client to donate a gift under control of a gifting computing server (GCS). The GCS receives gift donor information and assigns an identification token to the gift donor and associates this token with the received gift donor information. The GCS then sends the token and an HTML document identifying the gift to the client along with a donation application activator. The client receives this information and displays the HTML document at which time the donor selects the donation activator and the client informs the GCS to complete the gift transaction and provide a receipt to the donor via the client. | 10-10-2013 |
20130268441 | METHODS AND SYSTEMS FOR VERIFYING CUSTOMER SUPPLIED FINANCIAL ACCOUNT INFORMATION USING DEBIT AND CREDIT TRANSACTIONS - Embodiment of the invention describe methods and systems for verifying customer supplied financial account information verification using debit and credit transactions. These methods include electronically transmitting an electronic debit and credit transaction to the customer financial account, based on the customer supplied financial account information. The method also includes electronically transmitting a first statement descriptor, as part of at least one of the electronic debit transaction and the electronic credit transaction, that includes a first verification code. The method also includes electronically receiving, from the customer, a second verification code, and comparing, by the computer system, the transmitted first verification code with the received second verification code with respect to each other. The method also includes verifying, by the computer system, the customer supplied financial account information based on the comparison of the verification codes. | 10-10-2013 |
20130268442 | SECURE PAYMENT SYSTEM - Systems and method for performing secure electronic payment transactions to allow merchants to perform payment processing such that the merchant is only required to identify a unique identifier of a customer account and not data specific to a particular payment device. | 10-10-2013 |
20130275303 | METHOD AND SYSTEM FOR TWO STAGE AUTHENTICATION WITH GEOLOCATION - Geographical location information provided by a mobile device is used to assist in providing a first authentication for payment transactions against a payment account number of a user. Mobile device identification is associated with a payment account number of the user such that the user is provided a first authentication for payment transactions against the payment account number when the mobile device has entered a premises of a merchant. | 10-17-2013 |
20130275304 | RULE-BASED SELECTION OF FINANCIAL ACCOUNT FOR PAYMENT CARD TRANSACTION - A method of operating a payment card system includes receiving, from a card holder, information indicative of at least one attribute of an account selection rule. The account selection rule is stored in a database. A request to authorize a payment card transaction is received. In response to the request, the stored account selection rule is retrieved. The method further includes selecting among a plurality of accounts belonging to the card holder based at least in part on the retrieved account selection rule. The selected account is used for the requested payment card transaction. | 10-17-2013 |
20130275305 | WIRELESS TRANSACTION COMMUNICATION - Indicating a request is disclosed. A transaction party identifier determined using an identification signal received via a first communication channel is received from a first communication party. A request is received from a second communication party identified by the transaction party identifier. It is identified that the first communication party provided the transaction party identifier associated with request. The request is indicated via a second communication channel to the first communication party. | 10-17-2013 |
20130275306 | APPARATUSES, METHODS AND SYSTEMS FOR COMPUTER-BASED SECURE TRANSACTIONS - The systems, methods and apparatuses described herein provide a computing environment for completing a secure transaction. An apparatus according to the present disclosure may comprise a screen, a first switching device coupled to the screen, an input device, a second switching device coupled to the input device, a non-secure processor, a secure processor and a credit card reader operatively coupled to the secure processor. The non-secure processor may generate a message containing a purchase transaction request. The secure processor may receive the message, assume control of the screen and input device while the apparatus is operating in a secure mode, establish a secure connection with a server, receive payment information to be submitted to the server, digitally sign certain transaction information and submit the digitally signed certain transaction information to the server to complete the secure transaction. | 10-17-2013 |
20130282577 | SOCIAL NETWORK TRANSACTION PROCESSING SYSTEM - A system for transferring funds using social network connections. The system sends application programming interface (API) requests to social networks to obtain “friend” information and create accounts into which funds are deposited and which may be retrieved by recipients via hyperlinks in messages provided through social networks. The system may also be used to request funds from social network friends. The system provides benefactor friends fund requests in the form of social network messages, which allow the benefactors to access the system and provide funds to a user via hyperlinks in the messages. | 10-24-2013 |
20130282578 | COMPUTER-BASED COLLECTIVE INTELLIGENCE RECOMMENDATIONS FOR TRANSACTION REVIEW - In an embodiment, a data processing method comprises obtaining a plurality of first transaction data items for a proposed online credit card purchase transaction that has been recommended for review; obtaining a plurality of second transaction data items for a set of similar past online credit card purchase transactions, wherein each member of the set has one or more transaction feature values that are similar to the transaction data items of the proposed online credit card purchase transaction, and a decision value specifying whether the member was accepted or rejected by a reviewer; obtaining a stored data model of features, feature values, transaction acceptance decisions and rejection decisions of the reviewer based at least in part on the set, determining, based on applying the first transaction data items to the stored data model and a subsequent query to the database among more recent transactions that were not included during model construction, a likelihood value of a particular decision of whether the proposed online credit card purchase transaction would be accepted or rejected by the reviewer of the merchant; causing the likelihood value to be displayed; wherein the method is performed by one or more computing devices. | 10-24-2013 |
20130282579 | METHOD AND SYSTEM FOR PROVIDING WIRELESS VULNERABILITY MANAGEMENT FOR LOCAL AREA COMPUTER NETWORKS - A Software-as-a-Service (SaaS) based method for providing wireless vulnerability management for local area computer networks. The method includes providing a security server being hosted by a service provider entity to provide analysis of data associated with wireless vulnerability management for a plurality of local area computer networks of a plurality of customer entities, respectively. The method includes creating a workspace for wireless vulnerability management for a customer entity on the security server and receiving configuration information associated with the workspace. The method also includes supplying one or more sniffers to the customer entity. The method includes receiving at the security server information associated with wireless activity monitored by the one or more sniffers at premises of the customer entity and processing the received information within the workspace for the customer entity using the security server. The method includes metering usage of the workspace for wireless vulnerability management for the customer entity. | 10-24-2013 |
20130282580 | SYSTEMS AND METHODS FOR EXTENDING IDENTITY ATTRIBUTES AND AUTHENTICATION FACTORS IN AN ePAYMENT ADDRESS REGISTRY - The present invention relates to a network of registries that are: synchronized in whole or in part to a root registry; and are compilations of registrant data from accredited Identity Providers that accept liability for registering verified and accurate identity attributes. Registries associate a unique identifier with: a financial account owner's Personally Identifying Information; one or more linked publicly discoverable ePayment addresses to an account at a Financial Institution; and a financial account owner's profile of preferences related to the capture, handling, transfer and storage of monetary and informational assets. Preferences extensions include: operating instructions and rule sets; and authentication factors that may make use of time sensitive data at one or more institutions. | 10-24-2013 |
20130282581 | MOBILE DEVICE-BASED CARDLESS FINANCIAL TRANSACTIONS - The technologies disclosed herein use mobile computing devices, such as smartphones, to facilitate purchases without the use of a credit or debit card (i.e., “cardless” purchases). A cardless purchase can be initiated by a user using their mobile device to connect with a merchant's acquiring bank (acquirer), the acquirer collecting a mobile device identifier (e.g., phone number), an issuer code, a merchant code, account security information (e.g., a card security code and an access code), and the acquirer sending a request to the user's issuing bank to authorize the purchase. The acquirer uses the information received from the mobile device to assemble an account number, typically 15 or 16 digits long, so as to leverage existing acquirer, issuer and credit card network infrastructure. Upon receiving a response from the issuer bank, the user and merchant are notified (via SMS, email or other method) whether the transaction has been authorized. | 10-24-2013 |
20130282582 | SYSTEM AND METHOD FOR DATA AND IDENTITY VERFICATION AND AUTHENTICATION - A system for verifying and authenticating the identity of a user in a transaction. The user's identity is authenticated through the user's computer, tablet computer, mobile computing device, web browser (as a web-page, or as a plug-in for the browser), or other computing device by means of a single-use, time sensitive, system-generated transaction token and user selected system PIN. The user presents the transaction token to the vendor or merchant, which forwards a request for authentication to the system. The system prompts the user to confirm the transaction and enter the PIN into the device used to generate the transaction token. Upon confirmation, the transaction is completed. | 10-24-2013 |
20130282583 | FRAUD DETECTION SYSTEM RULE PROFILE INTERACTION - Embodiments of the invention generally relate to methods and systems for generating rule profile reports, the rule profile reports comprising statistical data regarding the performance of rules. One embodiment of the invention discloses a method for generating a rule profile report. The method comprises determining, by a processor, a rule profile, wherein the rule profile comprises a plurality of rules, and wherein each rule in the plurality of rules is associated with a plurality of rule outcomes, determining for the plurality of rules a plurality of rule outcome frequencies associated with the plurality of rule outcomes, wherein each rule outcome in the plurality of rule outcomes is associated with an outcome for a transaction, and providing, by the processor, the plurality of rule outcome frequencies. | 10-24-2013 |
20130282584 | M-COMMERCE VIRTUAL CASH SYSTEM, METHOD, AND APPARATUS - A virtual cash system, method, and apparatus has an account record containing a record of money amounts associated with a wireless device and a transmitter for wirelessly transmitting to the wireless device predetermined information from the account record. Cash amounts can be spent from the account record directly from the wireless device via information derived from the wireless device via a bar code on the display, a short range radio signal, a light beam, or the like. A different security code is generated for each account transaction for verification. | 10-24-2013 |
20130282585 | PAYMENT CARD BASED REMITTANCE SYSTEM WITH DELIVERY OF ANTI-MONEY LAUNDERING INFORMATION TO RECEIVING FINANCIAL INSTITUTION - A request for a funds transfer is received by a sending financial institution (FI) located in a first country from a mobile network operator (MNO) for a recipient located in a second country. The funds transfer request includes the sender's mobile telephone number and transaction data, and the process includes translating the mobile telephone number into a sender's payment card account number, determining that the sender's payment card account can support the transfer amount, and transmitting the transaction data and the sender's payment card account number to a payment system. The sending FI receives a payment confirmation message that satisfies compliance with know your customer (KYC) information and anti-money laundering (AML) information requirements, and transmits a remittance confirmation message to the MNO. | 10-24-2013 |
20130282586 | SYSTEMS AND METHODS TO APPLY THE BENEFIT OF OFFERS VIA A TRANSACTION HANDLER - A system includes a transaction handler configured to split a transaction, initiated between an acquirer processor representing a merchant and an issuer processor representing an account holder, into separate transactions with the issuer processor and at least one sponsor processor that is configured to provide the benefit of offers to applicable transactions. A portal is configured to notify the account holder of the award/redemption of the benefit of an offer using a communication channel separate from the transaction terminal that initiates and approves the transaction between the account holder and the merchant. | 10-24-2013 |
20130290184 | VIRTUAL SPECIFIC PURCHASING CARD - Systems and methods of processing transactions via a computer network are provided. A virtual specific purchasing card server can receive a registration request to activate a virtual specific purchasing card, and can link the virtual specific purchasing card with a purchasing card associated with an acquirer network or an issuer network. The virtual specific purchasing card server can obtain restriction criteria of the virtual specific purchasing card. The restriction criteria can include a time restriction and at least one of a subject matter restriction, a geographic restriction, a product restriction, a service restriction, a merchant restriction, a value restriction, a frequency restriction, and a notification restriction. The virtual specific purchasing card server can identify a transaction corresponding to the virtual specific purchasing card, and can determine that the transaction satisfies the restriction criteria. | 10-31-2013 |
20130290185 | REAL AND VIRTUAL IDENTITY VERIFICATION CIRCUIT, SYSTEM THEREOF AND ELECTRONIC TRANSACTION METHOD - Disclosed are a real and virtual identity verification circuit, a system thereof and an electronic transaction method. The circuit is capable of being built in or connected with an electronic device to allow a user to carry out electronic identity verification with his or her unique biological characteristic on a remote server. The real and virtual identity verification circuit comprises a memory unit, an acquisition unit, a processing unit and a communication unit. A verification key code is stored by the memory unit. The acquisition unit acquires the biological characteristic and generates a corresponding biological characteristic code. The processing unit processes the verification key code and the biological characteristic code according to a deal process to generate a corresponding unverified code, and the communication unit transmits the unverified code to the server and awaits a verification result of the electronic identity verification. | 10-31-2013 |
20130290186 | PREAUTHORIZE BUYERS TO COMMIT TO A GROUP PURCHASE - A payment provider preauthorizes and commits consumers to a group purchase when the consumers provide an indication or intent to make a group purchase. Upon receiving the intent, the payment provider may ask the consumer whether they wish to irrevocably commit to the purchase at the advertised price. If so, the payment provider may process a payment request from the consumer to the merchant, but without actually moving funds to a merchant account. If the payment request can be approved, the payment provider may hold or freeze the appropriate amount in the user account or otherwise commit the funds to the merchant if the minimum number of purchasers is met for the group purchase. If the minimum number of purchasers is not met and/or the merchant cannot fulfill the group offer, the payment provider may take off the hold or release the funds back to the consumer's account. However, if the minimum number is met, the payment provider may release the funds to a merchant account even if the consumer decides, after the initial commitment, to not make the group purchase. Thus, others who committed to the group purchase will still be able to take advantage of the group deal. | 10-31-2013 |
20130290187 | MOBILE PAYMENT SYSTEM USING SUBACCOUNTS OF ACCOUNT HOLDER - A transaction system for coordinating processing of a transaction payment request associated with a transaction between a consumer and a merchant, the transaction associated with the merchant providing a product to the consumer, the system comprising: a computer processor coupled to a memory, wherein the computer processor is programmed to coordinate processing of the transaction payment request by: receiving the transaction payment request including consumer code data and identification information pertaining to the merchant and the product, the consumer code data representative of a subaccount registered with a transaction interface, the subaccount associated with a main account also registered with the transaction interface, such that a financial account is common to both the subaccount and the main account; accessing the subaccount or main account using the consumer code data to obtain payment information related to the transaction payment request including the financial account, mobile device contact information, and required authorization information; creating a payment confirmation request using said identification information; sending said payment confirmation request over the network to the mobile device using the contact information; obtaining authorization information from the mobile device; sending a funds transfer request to a payment platform based on the authorization information matching the required authorization information; receiving approval of the funds transfer request from the payment platform; and sending a confirmation of the approval of the funds transfer request to a computer device associated with the merchant. | 10-31-2013 |
20130290188 | System and Method for Approving Payments - A server system including one or more processors and memory obtains a payment instrument associated with a user. The server system sends, to a client associated with the user, an electronic calendar object corresponding to a respective date, where the electronic calendar object is associated with a fee and receives a user response to the electronic calendar object. In response to receiving the user response to the electronic calendar object, in accordance with a determination that the user response includes an acceptance of the electronic calendar object, the server system stores authorization information indicating that the user has authorized the fee to be paid using the payment instrument. In some implementations, the electronic calendar object includes an invitation to an event, the respective date is an event date on which the event is scheduled to occur, and the fee is an event fee associated with the event. | 10-31-2013 |
20130290189 | ALTERNATIVE PAYMENT METHOD FOR ONLINE TRANSACTIONS USING INTERACTIVE VOICE RESPONSE - A method for performing payments in remote transactions between a buyer and a vendor is provided. The method includes receiving buyer information from a vendor's network outlet when the buyer indicates a desire to purchase a selection at a later time through an Interactive Voice Response (IVR) center; providing a token to the buyer; receiving information about the token from the buyer through the IVR center; verifying the information about the token; transferring funds from a buyer account to a vendor account. Also provided is a system for processing payments in remote transactions including an IVR center to: receive a request for token from a buyer to purchase products from a vendor, and to receive information about the product; provide the token to the buyer; access a database, the database including information from vendor's and buyer's accounts; transfer funds from buyer's account to vendor's account upon buyer confirmation. | 10-31-2013 |
20130297507 | SYSTEM AND METHOD FOR WIRELESS TRANSACTION AUTHENTICATION - A transaction authentication system uses a mobile unit to connect with a wireless network and with an authentication station using a short-range transceiver. Prior to a transaction, the mobile unit transmits an Identity to an authentication processor using the wireless provider network and receives a Hash and Identifiers therefrom. During a transaction, the mobile unit connects to an authentication station using a short-range air link and transmits its Hash. The authentication station transmits the received Hash to the authentication processor, which confirms the Identity of the mobile unit. If identified, the authentication processor sends a Private Identifier to the authentication station and the mobile unit connects using an air link with the Private Identifier. The authentication station sends a success message if it connects to the mobile unit using the Private Identifier air link. A device authentication message is sent to a transaction processor to process the requested transaction. | 11-07-2013 |
20130297508 | SECURE FINANCIAL TRANSACTIONS - A primary account number (“PAN”) of a conventional credit or debit account with a bank or other financial institution is emulated or simulated, which incorporates, in encrypted form, the actual account number. The simulated PAN may also incorporate an amount to be debited from that account. Thus, an account number and an amount are encrypted and mapped into a string of digits which appears to be a valid PAN. The actual account number and the transaction amount are thus embedded in the simulated PAN. The simulated PAN is then processed by existing financial transacting infrastructure, with the issuing bank knowing that it is not a PAN and that the appropriate digits are to be decrypted to provide the embedded account number and the embedded amount. | 11-07-2013 |
20130297509 | MOBILE PAYMENT USING DYNAMIC AUTHORIZATION CODE AND MULTI-PAYER SHARED CARD NUMBER - Various technologies related to implementing payment via a mobile device are described. An authorization code and a credit card number can be provided by an issuer to a mobile device, which in turn provides the authorization code and the credit card number to a merchant. The merchant can then provide the authorization code and the credit card number to an issuing bank, which can reconcile the authorization code and the credit card number and issue payment authorization. | 11-07-2013 |
20130297510 | FINANCIAL INTERMEDIARY FOR ELECTRONIC COMMERCE - Disclosed are various embodiments for an electronic escrow intermediary application that permits a buyer and seller to conduct a digital escrow transaction involving a third-party intermediary. An electronic transaction can occur through a third-party electronic commerce application or through the escrow intermediary application itself. Registration of a buyer and a seller is verified and either party is permitted to choose a registered third-party intermediary. After a purchase is made by a buyer, the terms and regulations associated with the transaction are transmitted to the third-party intermediary. The purchase money is placed in an escrow account until verification has been received by the third-party intermediary that the item has been delivered, complies with government regulations, and is, in fact, what the seller represents. Upon verification, the purchase money is distributed according to the terms of the transaction to the seller and to the third-party intermediary. | 11-07-2013 |
20130297511 | Closed System Processing Connection - In one embodiment of the invention, a method is described. The method comprises receiving at a server computer, an authorization request message from a first merchant computer operated by a first merchant that includes information associated with a transaction conducted by a consumer using a prepaid device associated with a second merchant, determining, based on the information in the authorization request message, the second merchant associated with the prepaid device, transmitting the authorization request message to a second merchant computer operated by the second merchant, receiving an authorization response message from the second merchant computer, and sending the authorization response message to the first merchant computer. | 11-07-2013 |
20130297512 | CARDHOLDER VERIFICATION RULE APPLIED IN PAYMENT-ENABLED MOBILE TELEPHONE - A method includes a cardholder device receiving at least one cardholder verification rule from a computer, and storing the cardholder verification rule. The cardholder verification rule prescribes circumstances under which a cardholder is required to perform a cardholder verification process in connection with a purchase transaction. The method includes the cardholder device receiving purchase transaction information from a merchant device, and then determining by using the stored cardholder verification rule, and based on at least one of the received purchase transaction information and current circumstances, that cardholder verification is not required. The cardholder device then uploads payment information to the merchant device to complete the purchase transaction. | 11-07-2013 |
20130304646 | METHOD AND SYSTEM FOR IDENTITY AND KNOW YOUR CUSTOMER VERIFICATION THROUGH CREDIT CARD TRANSACTIONS IN COMBINATION WITH INTERNET BASED SOCIAL DATA - A method and system for verifying an identity of a card holder associated with a payment card using a payment device comprising a card reader and a mobile device. The method comprising the steps of initiating verification of identity of the card holder by inserting the payment card in the card reader of the payment device, reading card information from the payment card communicating the card information from the mobile device to a payment server, comparing received card information with stored card information in the payment server and accessing at least one web service. The account activity is analysed in the at least one web service and in that way verifying that the identity of the card holder is the same as the identity associated with the payment card, based on the analysis of information from the at least one web service and from the comparison of card information with stored card information. Terminating the verification process by communicating the result of the verification process from the payment server to the payment device. | 11-14-2013 |
20130304647 | Purchasing Transaction System & Method For Multi-media objects - Methods, apparatuses, and systems facilitating search, discovery, submission and/or distribution of digital objects over networks. In one implementation, the system allows users to search, discover, submit and/or purchase a digitally encoded multi-media object in any number of different formats and direct that content to any device or devices. | 11-14-2013 |
20130304648 | SYSTEM AND METHOD FOR AUTHENTICATION USING PAYMENT PROTOCOL - Methods, systems, and devices are disclosed for using a payment processing network as an authorization engine to access secure physical areas, such as college dormitories, office buildings. A keycard with a cryptogram generator is presented by a user to an access device, and the access device or associated computer sends an access request message formatted like a payment authentication request message to an aggregator/acquirer and payment processing network. The payment processing network validates the cryptogram and returns an access response message, again formatted like a payment authorization response message, indicating that the keycard is authentic. The gate, door, turnstile, or other barrier is then temporarily unlocked to let the user through. | 11-14-2013 |
20130304649 | METHOD AND SYSTEM FOR UTILIZING AUTHORIZATION FACTOR POOLS - One embodiment of the present disclosure provides a system and associated processes for sharing cardholder data (CHD) between a merchant that utilizes tokenization and a second merchant that may or may not utilize tokenization. In one embodiment, the merchant, or an employee of the merchant, can use the system and associated processes to reacquire CHD from a tokenization provider system. In one embodiment, the merchant identifies to the tokenization provider system a desire to share CHD, which is associated with a token, with a second merchant. The merchant and/or the tokenization provider system can then invite the second merchant to register with the tokenization provider system. Once registered with the tokenization provider system, the second merchant can access any CHD that the merchant associated with the second merchant. | 11-14-2013 |
20130304650 | METHOD AND SYSTEM FOR A PAYMENT TRANSACTION ASSOCIATED WITH A DECLARATION OF INTENT - The present invention relates to a method and a system for initiating and/or conducting a transaction that is associated with at least two corresponding declarations of intent, in particular a payment transaction, between at least two transaction parties via a processing unit ( | 11-14-2013 |
20130311368 | AUTOMATIC AUTHENTICATION AND FUNDING METHOD - Embodiments of an automatic authentication and funding method include a location-based transaction method according to which an overseer partners with multiple providers of at least one of goods and services to sell the goods and services to authorized users of a payment device. A controller entity defines and identifies an authorized user, and the controller agrees to fund predefined purchases on behalf of the authorized user, and further agrees to fund a user account for the purchases. The overseer receives user data and provider data from the controller, and generates a payment device for the user. The overseer uses at least one location-based mechanism to place funds on the payment device from the user account under predefined circumstances such that the user is enabled to make the predefined purchases from the approved providers. | 11-21-2013 |
20130311369 | Card Payment Processing of Partial Authorizations Allowing for Partial Captures and Full Deposits - A payment processing system allows partial captures and full deposits after receiving a partial authorization result on a requested card transaction. When the partial amount authorized is less than the full transaction amount, but above a certain value (which can be merchant specified), the system can accept the partial amount (a partial deposit or partial capture) as payment for the transaction. When the partial amount authorized is less than the full transaction amount, and below a certain value (which can be merchant specified), the system can make a full deposit of the transaction amount. The system can use one or more factors, including historical information, in determining whether to attempt a full deposit. | 11-21-2013 |
20130311370 | MULTIPLE PARTY ON-LINE TRANSACTIONS - A role associated with one or more parties involved with a purchase transaction is received. A routing rule associated with the purchase transaction is also received, the routing rule defining how the purchase transaction is routed among the one or more parties. The purchase transaction is processed based on the role of each party and the routing rule. | 11-21-2013 |
20130311371 | METHOD, APPARATUS, AND SYSTEM FOR CONTROLLING ACCOUNT MANAGEMENT OPERATION - Embodiments of the present invention provide a method, an apparatus, and a system for controlling an account management operation, where the method includes: determining to perform an account management operation on an account of a user at a management terminal; acquiring user location information, where the user location information is used to indicate a location of the user; acquiring operation location information, where the operation location information is used to indicate a location of the management terminal; and according to the user location information and the operation location information, performing first control on the account management operation. Through the method, the apparatus, and the system for controlling the account management operation according to the embodiments of the present invention, the financial fraud can be prevented in advance. | 11-21-2013 |
20130311372 | SECURE DATA STORAGE AND TRANSACTION SYSTEM - Embodiments of the invention are directed to a system, method, or computer program product for a transaction apparatus for secure data storage and consolidation of data for easy implementation and utilization during a transaction. The transaction apparatus may be configured, in various embodiments, for receiving, storing, encrypting, decrypting, encoding, decoding, accessing, transferring, writing, and/or presenting transaction data including, but not limited to, financial data, authentication data, identification data, health care data, access data, personal data, and/or other data associated with a user. As such, the transaction apparatus may receive data from a user and store the data. The user may then provide authorization to access the data. The user may then select the data to be copied to an output device associated with the apparatus. The output devices may include, but are not limited to, a writable transaction card, an E-ink display, the mobile device, and the like. | 11-21-2013 |
20130311373 | APPARATUS AND METHOD FOR PAYING FOR A PRODUCT USING A NEAR FIELD COMMUNICATION DEVICE - An apparatus and a method perform paying for a product using a near field communication device. The method includes: when payment for a particular product is requested by a user, generating a payment request message for requesting payment for the particular product and transmitting the payment request message to a security element server; when a personal identification information request message for requesting personal identification information in response to the payment request message is received, receiving an input of personal identification information from the user; transmitting the input personal identification information to the security element server; and receiving a payment result message representing a result of the payment. | 11-21-2013 |
20130311374 | SYSTEMS AND METHODS FOR VERIFYING IDENTITIES - A method for verifying the identity of one party on behalf of another party is provided. The method includes providing a money-transfer system and a communication system that communicates with the money-transfer system; receiving at the money-transfer system from the first party certain verification criteria for confirming the identity of a second party; and storing the verification criteria in the host computer system of the money-transfer system. When an ID is received from the second party at a money-transfer location; the verification criteria is retrieved from the host computer system; and the acceptability of the ID is determined in accordance with the verification criteria. If the identification device is acceptable, identification information is obtained from the identification device; and the identification information is processed to verify the identity of the second party. In other embodiments, a method for pre-verifying the identity of a party and a system for performing the method of the invention are provided. | 11-21-2013 |
20130311375 | SYSTEMS AND METHODS FOR DYNAMIC TRANSACTION-PAYMENT ROUTING - A mobile payment transaction aggregator designed to identify, on a per transaction basis, a payment processor from a plurality of available payment processors with the lowest processing fee for the given transaction. Additionally, the aggregator may bundle multiple payment transactions of a single consumer across multiple merchants for additional savings. | 11-21-2013 |
20130311376 | MONEY TRANSFER TRANSACTIONS VIA PRE-PAID WIRELESS COMMUNICATION DEVICES - Systems and methods for performing money transfer transactions via a wireless communication device, such as a cellular phone, are provided. The wireless communication device may be associated with, or automatically linked to, at least one payment source account. The wireless communication device may be associated with at least one pre-paid payment source account. In one example, the wireless communication device is a pre-paid cellular phone and/or is associated with a pre-paid money transfer account. The wireless communication device may access a pre-directed phone number, e.g., *55, to access a money transfer service provider. Once connected to a money transfer service provider, a user may initiate a money transfer via the wireless device, which is optionally paid to a payee in-person at a money transfer service provider location. | 11-21-2013 |
20130311377 | SYSTEMS AND METHODS TO FACILITATE REPEATED PURCHASES - Systems and methods are provided to facilitate repeated purchase and payment transactions. In one aspect, a system includes an interchange and a data storage facility configured to store payment transaction records associated with phone numbers. The interchange includes a common format processor and a plurality of converters to interface with a plurality of different controllers of mobile communications. The converters are configured to communicate with the controllers in different formats and to communicate with the common format processor in a common format. The common format processor is configured to identify a prior payment transaction associated with a phone number in response to a message from a mobile phone having the phone number, communicate with a merchant to repeat a purchase according to the prior payment transaction, and transmit via one of the converters premium messages to the mobile phone to collect funds for a payment to repeat the purchase. | 11-21-2013 |
20130311378 | SYSTEMS AND METHODS TO FACILITATE REPEATED PURCHASES - Systems and methods are provided to facilitate repeated purchase and payment transactions. In one aspect, a system includes an interchange and a data storage facility configured to store payment transaction records associated with phone numbers. The interchange includes a common format processor and a plurality of converters to interface with a plurality of different controllers of mobile communications. The converters are configured to communicate with the controllers in different formats and to communicate with the common format processor in a common format. The common format processor is configured to identify a prior payment transaction associated with a phone number in response to a message from a mobile phone having the phone number, communicate with a merchant to repeat a purchase according to the prior payment transaction, and transmit via one of the converters premium messages to the mobile phone to collect funds for a payment to repeat the purchase. | 11-21-2013 |
20130311379 | SYSTEMS AND METHODS TO APPROVE ELECTRONIC PAYMENTS - Systems and methods are provided to facilitate online transactions via mobile communications. In one aspect, a system includes a data storage facility to store an account identifier of a user and a phone number of the user and an interchange coupled with the data storage facility. The interchange includes a common format processor and a plurality of converters to interface with a plurality of different controllers of mobile communications. The converters are configured to communicate with the common format processor in a common format and to communicate with the controllers in different formats. The interchange uses the converters to communicate with the mobile phone of a user to confirm the identity of the user using a user terminal separate from the mobile phone for subsequent payment requests from the user terminal to be fulfilled using the account identifier. | 11-21-2013 |
20130317987 | TRANSACTION MANAGEMENT SYSTEM - A transaction management apparatus is provided, which comprises a request receiving section receiving a transaction request containing a transaction requesting amount indicating an amount of a transaction of local credits used by a user in a limited environment and a user's identification information; a storing section storing a first balance and a second balance, corresponding to the identification information, the first balance indicating a balance of first credit and the second balance indicating a balance of second credit with a larger limitation of use purposes than the first credit; a judging section judging whether the transaction is allowed based on a result of comparing the transaction requesting amount with the first and second balance corresponding to the identification information; and a managing section changing the first and second balance stored in the storing section based on the transaction requesting amount, when the judging section judges the transaction is allowed. | 11-28-2013 |
20130317988 | PAYMENT AND ACCOUNT MANAGEMENT SYSTEM USING PICTOOVERLAY TECHNOLOGY - A software application program on a computer platform uses PictoOverlay Technology to provide a completely unique and secure method of performing purchase transactions, accessing secure locations, or accessing email, websites, or downloading of min-apps or other software applications without entering, storing or transmitting personal identification information, or having a username and password to login. The uniquely developed PictoIdentity may associate an alphanumeric sequence with a series of static images and with a portion of one image from multiple layered dynamically presented images to for example access a financial account, perform financial transactions, login to a computer software program, access an email account, activate a mobile device, or enter a secure location. | 11-28-2013 |
20130317989 | Method and System for Performing Two Factor Authentication in Mail Order and Telephone Order Transactions - The method for authenticating a mail order or telephone order transaction according to the present invention includes receiving authentication information from a cardholder, providing authentication information to an issuer, and determining whether the authentication information is valid. If the authentication information is valid, the issuer informs the merchant that the transaction is valid. In an embodiment, the issuer may not supply a personal assurance message and/or other confidential cardholder information previously supplied by the cardholder in response to the authentication information. | 11-28-2013 |
20130317990 | SECURE TRANSACTION OBJECT CREATION, PROPAGATION AND INVOCATION - Functional data of a cash channel is encapsulated by at least two parties in succession to define an at least twice-encapsulated data object. The encapsulation and subsequent de-encapsulation can utilize digital signature systems of the parties that involve a private key for encapsulation and a public key for de-encapsulation. If constructed carefully over a series of rigorous events, the resulting at least twice-encapsulated data object can be practically impossible to counterfeit. In addition, a propagation of rights can be tracked for auditing and rights can be easily terminated or modified. | 11-28-2013 |
20130317991 | METHODS AND SYSTEMS FOR CONDUCTING PAYMENT TRANSACTIONS - A method of eliminating the need to wait in line to conduct a payment transaction in a retail establishment includes initiating a network-based electronic payment transaction with a communications device in a retail establishment. A shopper initiates the network-based electronic payment transaction. Moreover, the method includes entering a machine readable code from at least one good with the communications device, determining a price of the at least one good and a total payment transaction cost, and displaying the total payment transaction cost on a screen of the communications device. Furthermore, the method includes determining whether to approve payment for the electronic payment transaction, authenticating the shopper, completing the electronic payment transaction in the retail establishment, and transmitting a transaction complete message to the communications device when the shopper is authenticated. | 11-28-2013 |
20130325718 | In-Store Mobile Payment - An in-store mobile payment system and method can facilitate the use of a user's mobile device to facilitate payment for products purchased at a store. The user can take a picture of a product being purchased or can take a picture of a bar code for the product. The picture can be taken with the user's mobile device and can be used to identify the product. A payment provider can provide a unique PIN code for the transaction. The user can enter the PIN code into a keypad of the merchant and/or can swipe a card with a card reader of the merchant to complete the transaction. Thus, the user can avoid the inconvenience of waiting in line at a checkout counter and the merchant can reduce the store's overhead by eliminating at least some checkout counters and checkout clerks. | 12-05-2013 |
20130325719 | RELATED PARTY PAYMENT SYSTEM - Systems and methods are disclosed herein which that enable a first party, such as a child, to selected one or more items offered by an online retailer and to send a request to a second party, such as a parent or guardian, to request that the second party purchase the item or items for the first party. The systems and methods provide the second party with the ability to view requests received from the first party, to set limits on the number of requests and the amounts of the requests that the first party may make. The second party may also designate the parties to whom the first party may submit purchase requests. The child may also submit request to one or more non-parental contributors who may contribute money toward the purchase the one or more items for the child. | 12-05-2013 |
20130325720 | GLOBAL COMPLIANCE PROCESSING SYSTEM FOR A MONEY TRANSFER SYSTEM - An improved money transfer system. A rules database includes transaction rules that include an aggregation threshold. A customer database includes customers' transaction histories. A processing system receives transaction requests from points of entry and provides transaction responses. Based on information received in transaction requests, the processing system identifies customers and determines applicable transaction rules. An aggregation engine determines aggregation values as a function of customers' transaction histories. A transaction rules service determines whether information received in the transaction requests meets the applicable transaction rules and causes the aggregation engine to determine aggregation values if the applicable transaction rules include aggregation thresholds. Transaction responses are generated by the processing system in response to any aggregation values and other information. | 12-05-2013 |
20130325721 | Data Processing - A first data processing request initiated by a first communication terminal is received. The first data processing request includes second communication terminal direction information. A communication code of the second communication terminal is obtained according to the second communication terminal direction information. A request for processing data is sent to the second communication terminal according to the communication code of the second communication terminal A second data processing request initiated by the second communication terminal according to the request for processing data is received and a data processing platform is informed to process data. The present techniques triggers the request for processing data of the server through the first data processing request of the first communication terminal and prompts the second communication terminal to send the second data processing request, thereby forming a reliable online payment on delivery (POD). | 12-05-2013 |
20130325722 | PAYMENT RECONCILIATION SYSTEM - The methods and systems described herein include a data gateway adapted to automate payment reconciliation between a buyer and a supplier of goods and services. The data gateway can be configured to receive and validate payment instructions for one or more payment transactions between the buyer and the supplier to select a payment method based on the payment instructions. Transaction request messages are generated and transmitted to a payment processing network or a payment transfer system associated with the selected payment method. A payment reconciliation message can then be generated and transmitted by the data gateway to a buyer adapter associated with a buyer computer system and a supplier adapter associated with a supplier computer system when the data gateway receives payment authorization from the payment processing network or payment transfer system. | 12-05-2013 |
20130325723 | GROUP FUNDING PLATFORMS AND RELATED TECHNIQUES - A variety of techniques are described herein for facilitating group funding in a network computing environment. | 12-05-2013 |
20130325724 | REMITTANCE SUBSCRIPTION - A payment provider offers a subscription service for remittances. Users of the payment provider service may elect to pay a set monthly fee (or other periodic fee), which allows a user to send unlimited remittances during the period without any additional fees for each remittance transaction. In other words, a user may elect to pay a flat fee to forego per transaction remittance fees. The fee may be the same for all users or may differ based on various factors, which can include the number of remittances the user expects to send during the period, the total amount of money expected to be sent, the residences of intended recipients, etc. | 12-05-2013 |
20130332357 | SETTING PEER-TO-PEER AUTHORIZATION LEVELS WITH SOCIAL NETWORK CONTENT - The invention provides a computer-implemented method for using the social networking content of a user to determine authentication levels required for a peer-to-peer transaction. A user inputs transaction counter-party and transaction details into a payment application. The information can be transmitted to a server located in a peer-to-peer payment system. The system may search the social network content of the user to determine the account information of the counter-party and to assess the security risk of the counter-party according to a preconfigured set of factors that define the strength of the connection to the user. These factors may include the counter-party's status in the user's social networks, frequency of contact, prior transactions, or other factors that further establish a relationship. The system may determine the level of transaction authentication required to process the transaction. The user may enter the authentication data to complete the transaction. | 12-12-2013 |
20130332358 | FRAUD DETECTION SYSTEM - A fraud detection system includes a fraud database associating at least one payment account with at least one user device. A system provider device in the fraud detection system is coupled to a network and the fraud database. The system provider device is operable to receive first location data over the network. The first location data is associated with a payment request made using a first payment account from the at least one payment account in the fraud database. The system provider device will then retrieve second location data over the network from a first user device that is associated with the first payment account in the fraud database, determine that the first location data corresponds to a first location that is not within a predetermined distance of a second location corresponding to the second location data, and send a payment authorization request to the first user device. | 12-12-2013 |
20130332359 | ELECTRONIC PAYMENT ANTI-FRAUDULENT SYSTEM THROUGH REAL-TIME PHONE BASED VERIFICATION CODE - The Electronic Payment Anti-Fraudulent System through Real-Time Phone based Verification Code is introduced to provide a method or a mechanism to secure the online payments and transactions for both registered online buyers and electronic merchants; this is mainly performed through 2 major sub methods:
| 12-12-2013 |
20130332360 | SOFTWARE PIN ENTRY - A card reader configured to read a smart card can be detachably connected to a mobile computing device. When the card reader is attached to the mobile device, an application installed on the mobile computing device permits the mobile device to communicate with the card reader in order to process transactions. | 12-12-2013 |
20130332361 | SYSTEMS AND METHODS TO PROVIDE PRIVACY PROTECTION FOR ACTIVITIES RELATED TO TRANSACTIONS - A computing apparatus includes: a portal configured to present a privacy control panel to receive input from a user to create a privacy policy; a data warehouse configured to store the privacy policy in connection with account information of the user; and a transaction handler configured to provide a privacy indicator, in accordance with the privacy policy stored in the data warehouse, in an authorization response for a transaction made using the account information of the user. | 12-12-2013 |
20130332362 | SYSTEMS AND METHODS TO CUSTOMIZE PRIVACY PREFERENCES - A computing apparatus includes: a data warehouse storing first data representing a personal privacy policy of a user; a portal configured to communicate with a remote system storing second data representing a site privacy policy of an entity with whom the user interacts; and a rule engine coupled with the data warehouse and the portal to identify a policy customization to bridge a gap between the personal privacy policy of the user and the site privacy policy of the entity. | 12-12-2013 |
20130332363 | MOBILE INTEGRATED DISTRIBUTION AND TRANSACTION SYSTEM AND METHOD FOR NFC SERVICES, AND A MOBILE ELECTRONIC DEVICE THEREOF - A mobile integrated distribution and transaction system and method for NFC services are described. The system comprises a server for creating a widget having a lifecycle and a certificate, distributing the widget, and retrieving the widget information used on NFC transactions, and at least one mobile electronic device having a transaction terminal comprising a NFC modem and at least one secure element for storing a plurality of secure applications, and a virtual machine for managing the widget and changing the widget information during the valid lifecycle while the NFC modem is enabling the NFC transactions with the secure element under a specific secure application. | 12-12-2013 |
20130332364 | AUTHORIZING USE OF A FINANCIAL INSTRUMENT - Computer-implemented method and system are provided for verifying a financial instrument. The method comprises receiving, via a user interface, a request to use a financial instrument. A transaction processor initiates at least one transaction having a variable detail, using the financial instrument, and saves the variable detail. A requested detail relating to the at least one transaction is received via the user interface and the transaction processor compares the stored detail with the requested detail. The transaction processor authorizes the use of the financial instrument in response to receiving the correct input that matches the saved variable detail. | 12-12-2013 |
20130332365 | METHODS AND SYSTEMS FOR BIOMETRIC VERIFICATION - Methods, systems and apparatus for verifying a cardholder during a transaction involving a payment device and a terminal are provided. In some embodiments, the payment device transmits a first biometric information template to a terminal, receives a first sample template, determines that a match occurs between the first sample template and a first biometric reference template, and determines that a verification sequence applies to the transaction requiring satisfaction of a second biometric rule. In an implementation, the payment device then transmits a second biometric information template, receives a second sample template, determines that a match occurs between the second sample template and a second biometric reference template, and transmits a verification status of the cardholder. | 12-12-2013 |
20130339237 | METHODS AND SYSTEMS FOR INVESTIGATING FRAUDULENT TRANSACTIONS - Computer systems and methods for managing the investigation of potentially fraudulent payment card transactions are provided. The computer system includes a memory device for storing data and a processor in communication with the memory device. The computer system is programmed to retrieve a case representing at least one transaction initiated with a payment card and designated as potentially fraudulent, provide the case to a contact management system, retrieve cardholder card and contact information for the actual cardholder associated with the payment card used in the at least one transaction, and provide the cardholder card and contact information to the contact management system, wherein the contact management system is configured to initiate an investigation into the case based on the cardholder card and contact information. | 12-19-2013 |
20130339238 | Manufacturer-Based Purchase Transaction Benefit Processing - A method of facilitating a purchase transaction includes receiving an authorization request message that includes a consumer account code for a consumer, a manufacturer identification code for a manufacturer, a product identification code for a respective product associated with the manufacturer, and pricing data for the respective product. The consumer account code and the manufacturer identification code are obtained by a merchant from the consumer via an instrument presented by the consumer to the merchant during the purchase transaction. The respective product is identified at the merchant by filtering a plurality of products based on the manufacturer identification code. A memory in which program data is stored is accessed. The program data specifies a program factor for the manufacturer. A fund amount to be applied in connection with the purchase transaction is determined based on the program data and data in the authorization request message. | 12-19-2013 |
20130339239 | Method and Apparatus for Allowing Secured Overdrafts of Reloadable Debit Card Accounts - The invention discloses a reloadable debit card which may be overdrawn by authorized merchants thus allowing future and recurring payments to be made via ACH transactions against this debit card. In addition, the cardholder may repay indebtedness simply by depositing funds onto the reloadable debit card. | 12-19-2013 |
20130339240 | Systems and Methods for Tokenizing Financial Information - This disclosure describes systems and methods related to authorizing payment transactions using verbal recognition of a customer. In some embodiments, a payment transaction service provider system may receive payment authorization information from a user device. The payment authorization information may include a recording. The payment authorization information may be authenticated based at least in part on the recording. A payment credential may be communicated in response to authenticating the payment authorization information. | 12-19-2013 |
20130339241 | TRANSACTIONAL PERMISSIONS - In one example a computer-readable medium storing computer-executable components that comprise, at least, a guardian component configured to receive, from an authoritative entity, conditions upon which a potential transaction for a deferring entity may be authorized; and a transactional component configured to receive, from a transacting entity, a request for authorization for an actual transaction with the deferring entity, and to transmit, to the transacting entity, a determination as to whether the request for authorization for the actual transaction is acceptable in view of the stored conditions. | 12-19-2013 |
20130339242 | SYSTEM AND METHOD FOR FORMLESS, SELF-SERVICE REGISTRATION FOR ACCESS TO FINANCIAL SERVICES - A system for enabling users to register to use external financial services comprises a central office comprising an operating platform including a communication interface and a user database having a plurality of records for individual users; wherein the central office communicates via the communication interface with a plurality of remote formless, self-service registration stations; whereby a registration station scans an identification card with a card scanner, photographs the user to create a verification image and records a biometric parameter unique to the user, whereupon the registration station transmits an image of the identification card, the biometric parameter and the verification image to the central office; wherein the operating platform translates text from the identification card and creates a record for the user and wherein the operating platform uses the translated text to populate fields in the user record and retrieves and displays the record to an administrator for review. | 12-19-2013 |
20130339243 | OPEN SYSTEM ACCOUNT REMOTE VALIDATION FOR ACCESS - At each of a plurality of point of sale terminals (POS) of a transit system, for each of a plurality of riders, where each rider seeks access into a facility of the transit facility by using a payment device issued by an issuer in a payment system, data is read from the payment device. The data can include an identifier for an account issued by an issuer. For each such access, a communication including the account is addressed to a network address of a system remote from the payment processing system and remote from each of POS terminals. A response to the communication is received that includes information as to the validation of the access based upon the account being on a list keep by remote system. When the received information contains the validation of the access, the rider is permitted access to the facility of the transit system and the payment device is unchanged for the fare of the access to the facility of the transit system. | 12-19-2013 |
20130339244 | METHODS AND SYSTEMS FOR CHECK CASHING RISK ANALYSIS - Methods, systems, and computer-readable media are disclosed for generating a score for a check cashing transaction. A method includes receiving from a cashing station, having cashing station data, a transaction request including check data and identity data associated with a user, and determining whether the transaction request represents a first transaction request from the user at that cashing station. If so, an enrollment validation process and identification authentication process are performed; if not, a repeat validation process and check casher identification process are performed. The method includes determining whether there is a match between at least one of check data or identity data and data in a negative file or a knowledge file. The method includes calculating a score for the cashing transaction based at least in part on the check data, cashing station data, identity data, or checks of previously received transaction requests, determining whether the score is above a threshold, and approving the transaction based on the determination. | 12-19-2013 |
20130339245 | Method for Performing Transaction Authorization to an Online System from an Untrusted Computer System - Malicious software running in personal computers manipulates victims' bank accounts without their knowledge, performing transactions without the user's approval. The result is banking fraud, both against individual consumers and organizations. Using voice technologies, we demonstrate a prototype system to validate individual banking transactions without the need for out-of-band techniques such as telephone calls. | 12-19-2013 |
20130339246 | SECURITY SYSTEM - An apparatus for processing documents and/or tokens of monetary value, operable locally or remotely via an application used on device. The apparatus has a record of a security certificate of the application, and a receiver which receives a request for an identification code from the device, the request being signed by the application used on the device. The receiver verifies the device as an approved device if the signed request is recognised based on the record of the security certificate. The apparatus generates an identification code, stores the identification code, and sends the identification code to the approved device. The apparatus is configured to receive a command from the application used on the approved device, which command utilises the identification code. The apparatus is further configured to compare the identification code utilised in the command with the stored identification code, and execute the command if they match. | 12-19-2013 |
20130339247 | ISSUER IDENTIFICATION AND VERIFICATION SYSTEM - Embodiments of the present invention are directed to methods, systems, and apparatuses for identifying fraudulent portable devices and limiting fraudulent transactions. One embodiment of the invention is directed to a method. The method includes receiving, by a verification device, transaction data including an issuer identifier. The verification device further determines issuer information associated with the issuer identifier and provides the issuer information to a verifying entity. The verifying entity verifies that a portable device matches the issuer information before a transaction is authorized. | 12-19-2013 |
20130339248 | UBIQUITOUS PURCHASE PROCUREMENT APPARATUS - A system for facilitating paperless gifting and purchasing may include a server having computer implemented instructions stored thereon for performing the operations of receiving a first image, analyzing the first image for suitability as an identifier for a transaction, generating and issuing a validation code, receiving a transaction packet, and storing the transaction packet in association with the first image on the server. The instructions may separately or additionally include receiving a first image and transaction information relating to an attempted purchase, searching the server by comparing the first image to a plurality of images stored on the server, retrieving a transaction packet associated with a matching image, the matching image being identified amongst the plurality of images when the first image matches one of the plurality of images, comparing the transaction information to information in the transaction packet, and selectively approving the purchase based on the comparison. | 12-19-2013 |
20130339249 | ONLINE CHALLENGE-RESPONSE - Embodiments of the invention enable cardholders conducting an online transaction to be authenticated in real-time using a challenge-response application. The challenge-response application can be administered by an issuer or by a third party on-behalf-of an issuer. A challenge question can be presented to the cardholder, and the cardholder's response can be verified. The challenge question presented can be selected based on an analysis of the risk of the transaction and potentially other factors. A variety of dynamic challenge questions can be used without the need for the cardholder to enroll into the program. Additionally, there are many flexible implementation options of the challenge-response application that can be adjusted based on factors such as the location of the merchant or the location of the consumer. | 12-19-2013 |
20130339250 | Gateway Abstraction Layer - Systems, gateway computers, and methods for using a gateway abstraction layer and application platform interfaces for conducting service transactions are disclosed. A gateway abstraction layer computers can receive service requests in multiple message formats or communication protocols, transform those service requests into other message formats to process the service using one or more networks or third-party service providers. The results of the service request can then be translated back to the message format in which the original service request was received. The gateway abstraction layer can be maintained using update messages received from service providers. | 12-19-2013 |
20130346310 | Privacy Enhancing Personal Data Brokerage Service - The subject disclosure is directed towards a technology by which access to a protected entity's data is controlled by a data brokerage service. The service determines whether a requesting entity has appropriate access rights to requested information, and if so, the service returns a response corresponding to the protected data. In one aspect, the protected data may be location data of a protected entity that is maintained independent of a payment instrument. The location data is used to compute feasibility information as to whether the protected entity is authorized to perform a transaction using the payment instrument. | 12-26-2013 |
20130346311 | Method and System For Data Security Utilizing User Behavior and Device Identification - Embodiments of the invention broadly described, introduce systems and methods for detecting the likelihood that a transaction is fraudulent using user access pattern data and device fingerprint data. One embodiment of the invention discloses a method for determining the likelihood that a payment transaction is fraudulent. The method comprises receiving user access pattern data generated by a user client computer, receiving a device fingerprint associated with the user client computer conducting a payment transaction, determining, using the user access pattern data and the device fingerprint, a likelihood that the payment transaction is fraudulent. | 12-26-2013 |
20130346312 | TRANSACTION NOTIFICATION AND AUTHORIZATION METHOD - An added level of security is provided for charge transactions. Upon presenting a charge card number for a purchase, for example, the cardholder receives a message (e.g., SMS) on his cell phone or PDA that a charge authorization request has been received. The message may include the merchant, a charge amount, and a time and date. | 12-26-2013 |
20130346313 | METHODS AND SYSTEMS FOR USER AUTHENTICATION - Methods and systems for authenticating a user are provided. In an embodiment, an authentication service device receives a request to authenticate a user, and transmits a transaction history database query based on business rules concerning transactions conducted by the user. The response to the query includes a plurality of transactions, and the authentication service device generates a user authentication form that includes a set of transactions, and at least two of the transactions include a redacted transaction detail field. The user authentication form is transmitted to a user device, and user responses to the redacted transaction detail fields are received. The user is authenticated based on a monetary amount response that falls within a predetermined variance threshold, at least one positive information response, and on the user satisfying a permissible number of retry(s) requirement. | 12-26-2013 |
20130346314 | DYNAMIC SECURITY CODE PUSH - A system and method for fraud prevention is provided. This system and method may comprise a web browser having form filing capabilities. This system may interact with a financial institution to request and receive a dynamic security code to be used in merchant checkout page to complete a transaction. | 12-26-2013 |
20130346315 | ECOMMERCE SYSTEM WITH PAYMENT DATA DIVISION - In at least one embodiment of an ecommerce system, payment data is divided into proper subsets and distributed among multiple data processing systems, and each of the data processing systems stores less than all of the subsets of the payment data after the subsets of payment data are distributed and until at least sending the payment data to a payment authorization system for processing. In at least one embodiment, distributing proper subsets of the payment data among multiple data processing systems enhances security of the payment data by limiting an amount of time and the locations in which a complete set of payment data is persisted. | 12-26-2013 |
20140006279 | Consistent Interface for Business Transaction Authorisation Request and Rejected Direct Debits Post Processing Initiation Run | 01-02-2014 |
20140006280 | PAYMENT AUTHORIZATION SYSTEM | 01-02-2014 |
20140006281 | Systems and Methods for Facilitating Electronic Transactions Utilizing a Mobile Computing Device | 01-02-2014 |
20140006282 | METHODS AND SYSTEMS FOR CONNECTING MULTIPLE MERCHANTS TO AN INTERACTIVE ELEMENT IN A WEB PAGE | 01-02-2014 |
20140006283 | SYSTEMS AND METHODS FOR MANAGING MULTIPLE IDENTIFIERS | 01-02-2014 |
20140006284 | PRE-AUTHORIZATION OF A TRANSACTION USING PREDICTIVE MODELING | 01-02-2014 |
20140006285 | MOBILE TERMINAL AND CONTROLLING METHOD THEREOF | 01-02-2014 |
20140006286 | PROCESS TO INITIATE PAYMENT | 01-02-2014 |
20140006287 | MOBILE COMMUNICATION DEVICE FOR CONDUCTING FINANCIAL TRANSACTIONS | 01-02-2014 |
20140006288 | Product Level Payment Network Acquired Transaction Authorization | 01-02-2014 |
20140012754 | FINANCIAL DOCUMENT PROCESSING SYSTEM - Embodiments of the invention relate to systems, methods, and computer program products for providing a financial document processing system. The system receives an image of a financial document, such as a check, and identifies at least a transaction amount from the financial document. Then the system determines account information associated with the financial document. The system may identify a routing and account number on the financial document or identify the document based on a name on the document. Once the transaction amount and account information are known, the system determines a prospective balance for a financial account based on the account information and the transaction amount. If there are funds at least equal to the transaction amount in the financial account, the system validates the transactions. In some embodiments, the system also immediately updates the balance of the account and/or offers to complete the transaction. | 01-09-2014 |
20140012755 | METHOD AND APPARATUS FOR MANAGING SUBSCRIPTIONS - A subscription system allows a customer to establish a subscription to a product with one or more retailers (e.g., by establishing the subscription through a controller or central system). In one embodiment, a subscription may be established after receiving information that identifies a product. Terms of a subscription for the product are established, such as a frequency and a duration of the subscription. | 01-09-2014 |
20140012756 | FRAUD PREVENTION SYSTEM INCLUDING BIOMETRIC RECORDS IDENTIFICATION AND ASSOCIATED METHODS - A consumer identification system includes a first controller positioned at a facility and a second controller positioned at an information collection center and adapted to be in communication with the first controller. The first controller may transmit a first signal to the second controller responsive to an occurrence of an event. The second controller may initiate contact with a photograph or biometric scan database via a network interface in response to the first signal received from the first controller, and an official photograph or biometric scan associated with the consumer name may be identified. The second controller may transmit the official photograph or biometric scan to the first controller so that the official photograph or biometric scan is viewable on a user interface at the facility. A consumer identity may be verified by performing a comparison of a consumer with the official photograph or biometric scan of the consumer. | 01-09-2014 |
20140012757 | AUTHORIZATION OF CARDLESS PAYMENT TRANSACTIONS - A method of processing a transaction between a customer and a merchant includes receiving from a mobile device of the customer or from another device of the customer an indication of consent to perform a cardless payment transaction with the merchant, receiving from the mobile device an indication that the customer is within a predetermined distance of the merchant, after receiving both the indication of consent and the indication that the customer is within the predetermined distance, sending to a computer system of the merchant an indication of the presence of the customer and personal identifying information for the customer, receiving data indicating a transaction between the customer and the merchant, and submitting the transaction to a financial service for authorization. | 01-09-2014 |
20140012758 | SECURE AND EFFICIENT PAYMENT PROCESSING SYSTEM - A method is provided for carrying out commercial transactions. The method includes the steps of: establishing a transaction processing system on an electronic communications network; establishing an account within the transaction processing system for a corresponding account holder; obtaining from the account holder a session description of acceptable future commercial transactions related to the account; administering commercial transactions carried out via the transaction processing system; and, verifying that administered commercial transactions related to the account meet one or more of the session description. | 01-09-2014 |
20140012759 | SECURE AND EFFICIENT PAYMENT PROCESSING SYSTEM - A method is provided for carrying out commercial transactions. The method includes the steps of: establishing a transaction processing system on an electronic communications network; establishing an account within the transaction processing system for a corresponding account holder; obtaining from the account holder a session description of acceptable future commercial transactions related to the account; administering commercial transactions carried out via the transaction processing system; and, verifying that administered commercial transactions related to the account meet one or more of the session description. | 01-09-2014 |
20140012760 | SECURE AND EFFICIENT PAYMENT PROCESSING SYSTEM - A method is provided for carrying out commercial transactions. The method includes the steps of: establishing a transaction processing system on an electronic communications network; establishing an account within the transaction processing system for a corresponding account holder; obtaining from the account holder a session description of acceptable future commercial transactions related to the account; administering commercial transactions carried out via the transaction processing system; and, verifying that administered commercial transactions related to the account meet one or more of the session description. | 01-09-2014 |
20140019358 | SECURE PAYMENT METHOD AND SYSTEM - Representative embodiments of a server-based method of facilitating payment by a user registered with the server include, at the server, generating and storing, for the user, a code readable by a merchant device, transmitting the code to a mobile device of the user, facilitating provision of information characterizing a payment instrument from the user to a payment-processing entity without storing the data at the server, receiving, from the payment-processing entity, a token indicative of the payment instrument but not encoding data that would enable use of the instrument, associating the token with the user, receiving, from a merchant, the code and a payment amount, matching the received code to the user and retrieving the token associated with the user, and providing the token and the payment amount to the payment-processing entity to facilitate completion of a transaction between the user and the merchant. | 01-16-2014 |
20140019359 | ELECTRONIC REGISTRATION FOR SECURELY PROVIDING PRODUCTS AND SERVICES - Some embodiments are directed to a method of providing a product and/or a service, at least one non-transitory computer-readable storage medium comprising computer-executable instructions that, when executed by at least one processor, perform a method of providing a product and/or a service, and an apparatus for providing a product and/or service. An identifier of an asset is read and the asset is identified based on the identifier. A transaction is authorized based on the identified asset. The produce and/or service is acquired and a data associated with the transaction is recorded in at least one storage device. The recorded data is then transmitted to a server. | 01-16-2014 |
20140019360 | METHOD FOR ONLINE PAYMENT, AND SYSTEM AND ELECTRONIC DEVICE FOR IMPLEMENTING THE SAME - In a method for online payment, a seller-end electronic device allows a user input of an account number and payment information associated with a transaction, and transmits the same to a transaction platform. A buyer-end electronic device transmits a payment authorization signal to the transaction platform. The transaction platform transmits the payment information to the buyer-end electronic device. The buyer-end electronic device allows input of a personal identification number (PIN), and transmits a confirm signal to the transaction platform. The transaction platform is configured to communicate with a bank terminal to process a payment for the transaction. | 01-16-2014 |
20140019361 | ONLINE PAYMENT USING REAL-TIME VERIFICATION OF A PAYER'S IDENTITY - A system and/or method of authenticating the identity of a user desiring to conduct a transaction using an electronic device. | 01-16-2014 |
20140019362 | CENTRALIZED IDENTITY AUTHENTICATION FOR ELECTRONIC COMMUNICATION NETWORKS - A method of centralized identity authentication for use in connection with a communications network includes registering users of the communications network such that each registered user's identity is uniquely defined and determinable, and registering a plurality of vendors having a presence on the communications network. The registered vendors selectively transact with registered users, wherein the transactions include: (i) the registered vendor selling goods and/or services to the registered user; (ii) the registered vendor granting the registered user access to personal records maintained by the registered vendor; and/or (iii) the registered vendor communicating to the registered user personal information maintained by the registered vendor. The method also includes each user's identity being authenticated over the communications network prior to completion of transactions between registered vendors and registered users. | 01-16-2014 |
20140019363 | SWITCHING FUNCTIONS FOR MOBILE PAYMENTS SYSTEM - A data processing center computer receives a transaction request from a mobile payment platform (MPP) computer. The transaction request is related to a purchase initiated from an account holder's mobile telephone, and includes a mobile telephone number, a merchant identifier (ID) of a merchant, and a transaction amount. The MPP computer is operated by or on behalf of a service provider having the account holder as a customer. The process also includes translating the account holder's mobile telephone number into the account holder's payment card account number, identifying a merchant acquirer computer, and generating a purchase transaction request including the account holder's payment card account number, the merchant ID, and the transaction amount. The data processing center computer then transmits the purchase transaction request to the merchant acquirer computer for authorization processing. | 01-16-2014 |
20140025574 | READABLE INDICIA FOR A PAYMENT CLAIM - Embodiments of the invention are directed to systems, methods and computer program products for processing readable indicia for a payment claim. An exemplary system is configured to: receive information associated with readable indicia associated with a payment claim; receive authentication credentials associated with the payment claim; and process the readable indicia and the authentication credentials to authorize a payment associated with the payment claim. | 01-23-2014 |
20140025575 | TECHNIQUES FOR OUT-OF-BAND TRANSACTION VERIFICATION - Various embodiments are generally directed to cooperation among networked devices to seek out-of-band verification that an online transaction is requested by a person authorized to do so. An apparatus comprises a processor circuit and a storage communicatively coupled to the processor circuit and storing a sequence of instructions operative on the processor circuit to receive a transaction request requesting performance of a transaction via a first communications channel from a transaction device; transmit a verification request to another computing device via a second communications channel; receive a response to the verification request via the second communications channel; and perform the transaction in response to an indication in the response that the transaction has been verified. Other embodiments are described and claimed herein. | 01-23-2014 |
20140025576 | Mobile Check-In - Methods and systems can facilitate more convenient shopping by users of a payment provider, such as Paypal, Inc. A user can purchase a product simply by swiping a card without being required to enter additional information, such as the user's personal identification number (PIN). Thus, the checkout process at the point-of-sale can be performed more easily and quickly. More particularly, a user can open an app on a mobile device and sign in to a payment provider system using the app. The app can show merchants near the user. The user can select one or more of the merchants. Selecting a merchant allows the user to check in with the merchant. Checking in with the merchant can result in pre-authorization of a purchase by the user with the merchant. | 01-23-2014 |
20140025577 | SYSTEM AND METHOD FOR SECURE TRANSACTIONS UTILIZING PASSIVE NEAR-FIELD COMMUNICATIONS DEVICES - A method for authorizing a transaction between a first party utilizing a client device and a second party, including receiving an authorization request from the second party, the authorization request including first party data and second party data, retrieving stored data corresponding to the first party, comparing at least a portion of the first party data to at least a portion of the stored data corresponding to the first party, generating a first hash value from at least a portion of the authorization request, generating a second hash value from at least a portion of the stored data and at least a portion of the authorization request, and comparing the first hash value and the second hash value. | 01-23-2014 |
20140025578 | LEAST COST ROUTING INTERCHANGE FOR B2B PURCHASE CARD PAYMENTS - Methods and system for processing credit card payments, comprising receiving a credit card transaction, fabricating line item data to obtain favorable interchange rates for transactions, aggregating or disaggregating payments to obtain favorable interchange rates for transactions, and automatically deciding among various interchange rate options for transactions based on criteria chosen by the payer using these methods or system. | 01-23-2014 |
20140025579 | HUB AND SPOKES PIN VERIFICATION - A method for conducting PIN authorized EMV payments using an ordinary mobile phone. The credit card payment is conducted using a merchant's device comprising a card reader and a mobile phone a payment server and a buyer's mobile phone. A PIN entry request is sent from the merchant's device to the buyer's device via the payment server. A secure application in the buyer's device is executed and a PIN code may be entered securely. The entered PIN code is either verified, via the payment server, against the credit card in said merchant's device or against a bank server. Thus, secure credit card payments can be performed using an ordinary unsecure mobile device's. | 01-23-2014 |
20140025580 | Method and System for Securing Payment Transactions - A method for facilitating the widespread use of the PIN-Debit payment method for Internet “eCommerce” and mobile payments sales which requires little or no change for the cardholders, merchants, debit networks and card issuers based primarily on the introduction of a layer of middleware and wherein the Debit Networks and Issuing Banks may customize the implementation of the services based on individual strategy and cardholder preferences. | 01-23-2014 |
20140032407 | System and Method for Funds Transfer Processing - A system and method for processing lending transactions that may facilitate prompt transfer of funds (for example, loan funds) to an individual in a secure manner. An adaptive payment server may receive first identification information, second identification information, and a request for a fund transfer. The adaptive payment server may determine an account associated with the first identification information. The adaptive payment server may authenticate identification of the account based on the second identification information. The adaptive payment server may initiate a deposit of a fund amount associated with the request into the identified account, wherein the fund amount is deposited substantially immediately after the identified account has been authenticated. | 01-30-2014 |
20140032408 | ELECTRONIC TRANSACTION DOCUMENTATION - Embodiments described herein provide approaches for managing electronic documentation of transactions. Specifically, transaction details of an approved transaction between a user and a merchant terminal are sent to a mobile device document generator to create an electronic document memorializing the transaction. Based on the type of mobile device operated by the user, the mobile document is sent to the mobile device of the user according to an optimal communication transmission mode. | 01-30-2014 |
20140032409 | SYSTEMS AND METHODS FOR CORRECTION OF INFORMATION IN CARD-NOT-PRESENT ACCOUNT-ON-FILE TRANSACTIONS - In one aspect, a method for processing a card-not-present account-on-file transaction is provided. The transaction involves a cardholder using payment card information stored by a merchant. The method includes receiving an authorization request message for the transaction, the authorization request message received at a payment network from an acquirer associated with the merchant and receiving an authorization response message, the authorization response message received at the payment network from an issuer. The authorization response includes a denial indicator indicating that the transaction has been denied. The method further includes querying a database coupled to the payment network to determine whether the database includes updated payment card information for a payment card associated with the transaction. The method additionally includes transmitting the updated payment card information associated with the payment card account identifier associated with the transaction to the acquirer for the acquirer to communicate to the merchant. | 01-30-2014 |
20140032410 | METHOD AND SYSTEM FOR LINKING AND CONTROLING OF PAYMENT CARDS WITH A MOBILE - A unique payment card control system that controls payment for a transaction for goods or services, the control being implemented via a mobile communication device. In one embodiment, all transactions with user's payment card are blocked, wherein control system does not allow any transaction requests received. Prior to conducting a transaction, the user sends a control command via the mobile communication device to the control system in order to unblock (enable) the associated card. The control system then determines that the card is not blocked and allows the transaction. From its mobile device the user is able to send a command to customize both the number of consecutive transactions and duration before the card is blocked again automatically. Alternatively, rules are provided that restrict transactions based on the payment card designated for the transaction, the vendor, the type of goods or services being exchanged for payment etc. | 01-30-2014 |
20140032411 | Methods, Server, Merchant Device, Computer Programs and Computer Program Products for Setting up Communication - It is presented a security server arranged to set up communication between a merchant device and a customer payment application. The security server comprises: a receiver arranged to receive a first message comprising a customer identifier, an application identifier and a security token; a determiner arranged to determine whether the merchant device is authorised; a transmitter arranged to send a second message to the merchant device, the second message indicating that the merchant device is authorised to effect payment; and a channel establisher arranged to set up a secure channel between the merchant device and the customer payment application in a secure element being adapted to be comprised in a mobile communication terminal, wherein all communication between the merchant device and the customer payment application is controlled by the security server. Corresponding methods, merchant device, computer programs and computer program products are also presented. | 01-30-2014 |
20140032412 | Payment system and method for vending machine using mobile terminal and storage medium storing program for implementing the method - Disclosed herein are a payment system and method for a vending machine using a mobile terminal. The apparatus includes a mobile terminal, a service provider server, and a vending machine service provider server. The mobile terminal obtains the ID information of the vending machine from a tag attached to the vending machine, displays the amount of money to be paid for a product on a screen, and stores a receipt for the amount of money to be paid. The service provider server receives payment request information from the mobile terminal, approves the amount of money to be paid, and generates a transaction serial number. The vending machine service provider server receives the ID information, the transaction serial number, and the amount of money to be paid from the service provider server, and sends the information about the amount of money to be paid to the vending machine. | 01-30-2014 |
20140032413 | ELECTRONIC PAYMENTS TO NON-INTERNET CONNECTED DEVICES SYSTEMS AND METHODS - There is provided systems and method for an electronic payment to a non-Internet connected device. The methods include transmitting information corresponding to at least one item for sale at a non-Internet connected machine, receiving a purchase request from a user device for the at least one item from the non-Internet connected machine, and communicating, using a hardware processor of a payment provider server, an approval of the purchase request to the user device, wherein the user device is configured to transmit a purchase authorization to the non-Internet connected machine using a wireless connection. | 01-30-2014 |
20140032414 | ACCOUNT-TO-ACCOUNT TRANSFERS - Computer program products, methods, systems, apparatus, and computing entities are provided for transferring funds. In one embodiment, a sender can provide account information and be authenticated to transfer funds to a receiver. The funds can then be transferred to the receiver or held in escrow for transfer to the receiver upon receipt of the receiver's account information. | 01-30-2014 |
20140032415 | OFFLINE TRANSACTION PAYMENT SYSTEM, AND METHOD AND APPARATUS FOR THE SAME - The present invention related to an offline transaction payment system and a method and apparatus for the same, which receives an electronic payment request from a terminal, transmits a request for execution of an electronic payment application to the terminal, receives an application ID from the electronic payment application executed in the terminal, performs member verification using the received application ID, transmits the member verification result to the electronic payment application, receives a one-time password from the electronic payment application, and mediates an electronic payment for a transaction that takes place offline using the one-time password. | 01-30-2014 |
20140032416 | SYSTEM AND METHOD TO INITIATE FUNDING OF MULTIPLE MERCHANT ACCOUNTS - A system to initiate funding of a plurality of merchant accounts may include one or more computers configured to receive input specifying at least one payment item having a payment amount, determine a convenience fee based on the at least one payment amount, select a first merchant account based on the at least one specified payment item, and select a second merchant account associated with the convenience fee. The one or more computers may also be configured to receive a single input specifying credit card information, link the payment amount, received credit card information and the first merchant account to form a first transaction, and link the convenience fee, received credit card information and second merchant account to form a second transaction. The one or more computers may further be configured to submit the first and second transactions to a credit card authorization network, receive response data from the credit card authorization network for the first and second transactions indicating whether the first and second transactions are authorized, and generate output representing a receipt for the first and second transactions if the first and second transactions are authorized. | 01-30-2014 |
20140040129 | Electronic Payment Restriction - Methods and systems are provided for facilitating control of a child's purchasing of products from a merchant using a credit card, debit card, gift card, secure token, mobile device, or the like. A payment provider, such as Paypal, Inc., can authorized the purchase of a product from the merchant if both the child and the parent are checked in with the same merchant via one or more social networks (thereby indicating that the child and the parent are in or near the same store). This requirement for proximity between the child and the parent can provide the parent with an opportunity to more closely monitor purchases made by the child. | 02-06-2014 |
20140040130 | MERCHANT CATEGORY CODES IN A PROXY CARD TRANSACTION - Transmitting category codes to payment instruments in proxy card transactions comprises receiving a first payment request to authorize a proxy card transaction, the first payment request identifying a proxy account of a user for payment of the transaction and a merchant category code associated with the merchant; selecting a financial account associated with the proxy account to fund the transaction; communicating a second payment request to authorize the transaction to a financial account system associated with the selected financial account, the second payment request comprising the merchant category code associated with the merchant; receiving an authorization for the transaction from the financial account system to fund the transaction using the selected financial account; and communicating an authorization for the transaction to the merchant computing device in response to receiving the authorization for the transaction from the financial account system to fund the transaction using the selected financial account. | 02-06-2014 |
20140040131 | MATCHING REFUNDS TO PAYMENT INSTRUMENTS EMPLOYED IN A PROXY CARD TRANSACTION - Matching refunds to the appropriate payment instrument employed in a proxy card transaction comprises receiving a first payment authorization request for a transaction between a merchant and a user, the payment authorization request comprising an identification of an account of the user and an identifier for the transaction, the user account having associated therewith a plurality of payment instruments available for conducting payment transactions; determining a particular payment instrument with which to conduct the transaction; associating the transaction identifier with the particular payment instruments utilized in the transaction; receiving a first refund instruction to refund all or a portion of a payment amount of the transaction, the first refund instruction comprising the transaction identifier; determining the particular payment instrument associated with the transaction identifier provided in the first refund instruction; and initiating the refund to the particular payment instrument determined to be associated with the transaction identifier. | 02-06-2014 |
20140040132 | MOBILE DEVICE PAY METHOD - The present invention relates to a micropayment transaction technology, more particularly, the present invention relates to a mobile device payment method, which is able to control consumption and enhance transaction security for buyer. The present invention is able to process payment by letting the buyer register personal account number in a transaction platform in advance via a mobile device and generating a numbered account after verification for later prepay consumption. Thus, the numbered account and the mobile device are applied for user's personal identification. Thus the user is able to control consumption efficiently, and the prepayment or the consumption both need identification to prevent credit card from been stolen or leaked out and fraud financial transaction, and the transaction security is highly increased. | 02-06-2014 |
20140040133 | TEMPORARILY GRANTING PAYMENT AUTHORITY - In at least one example embodiment, an end device includes an input unit configured to receive an input of information regarding an original payment source and an identifier of an authorized device; a transmitter configured to transmit, to a server, a request to grant temporary payment authority for the authorized device, the request including the information regarding the original payment source and the identifier for the authorized device; and a receiver configured to receive a notification that the temporary payment authority has been granted from the server. | 02-06-2014 |
20140040134 | SYSTEMS AND METHODS TO PROTECT USER PRIVACY - A computing apparatus includes: a data warehouse storing first data representing a personal privacy policy of a user; a portal coupled between merchant systems and points of interaction of users; and a transaction handler coupled between acquirer processors and issuer processors. The portal and the transaction handler are configured to shield user data, such as address, account information, etc., from the merchant systems in accordance with the personal privacy policy of the user. | 02-06-2014 |
20140040135 | SYSTEMS AND METHODS TO DIGITALLY SIGN TRANSACTIONS - A computing apparatus is configured to collect data about the account presentation device used to initiate a transaction on a transaction terminal, data about the user using the account presentation device at the transaction terminal, and/or data about the details of the transaction. The computing apparatus combine the collected data to generate a code as a substitute of the signature of the user. | 02-06-2014 |
20140040136 | Government wide commercial transportation shipping debit card and smart phone application - A method for monitoring government Transportation Account Codes funding by providing mechanisms to verify shippers identity, schedule shipments of different types, schedule other TAC usages, approve and disapprove shipment funding according to the TAC funding availability. The system includes a Demilitarized zone for external access to the system while keeping the system protected internally. The system allows for an extensive reporting mechanism of all TAC activities. The system uses smart devices to implement control even when arranging shipments off-premises. The system allows Carriers to interact with the environment to confirm shipment pick up. The system allows for Internal and external tasking. The system allows a Fund Manager to add funding as necessary to facilitate government activities. The system results in saving the government wasted funding while providing efficiency and control. | 02-06-2014 |
20140040137 | SECURE CHECKOUT AND CHALLENGE SYSTEMS AND METHODS - A method for correlating information received directly from an access device operated by a user, and information from a merchant server is disclosed. The method includes receiving, at a server of a merchant entity from an access device used by a consumer, a checkout request to initiate a transaction, providing, from the merchant server to a server of a non-merchant entity, transaction information associated with said transaction, wherein the transaction information comprises a merchant ID, and receiving, at the merchant server from the non-merchant server, a response message regarding the transaction, wherein the response message is based on a correlation between the transaction information and device information specifically associated with the access device and provided directly from the access device to the non-merchant server, and is based on additional processing associated with the transaction information and the device information, performed by the non-merchant server. | 02-06-2014 |
20140040138 | METHOD AND APPARATUS FOR DISTRIBUTION OF MONEY TRANSFERS - A method for performing transactions comprises receiving registration information and money transfer transaction specifications, generating a distribution profile based on the registration information, and storing the money transfer transaction specifications in the distribution profile. The distribution profile is identified based on an initiation instruction and associated user authentication data, and one of the money transfer transaction specifications in the distribution profile is identified based on the initiation instruction. Payment source status is verified according to the identified money transfer transaction specification, and a staged send transaction is initiated, based on the payment source status at the time the send transaction is initiated. | 02-06-2014 |
20140040139 | SYSTEM AND METHOD FOR DYNAMIC TEMPORARY PAYMENT AUTHORIZATION IN A PORTABLE COMMUNICATION DEVICE - A system for issuing a dynamic temporary credential to a portable communication device for use in a transaction with an electronic control point. The system receives the current geo-location of the portable communication device and transmits a dynamic temporary credential to the portable communication device from the centralized computer. The system further scores the risk in authorizing a transaction associated with an electronic control point using the dynamic temporary credential it issued. The system may prevent the transmission of the dynamic temporary credential until the end user has been authenticated, which may include verifying one or more of a manually input passcode, the unique digital signature of the portable communication device, and know your customer queries. The system may further include a validation mapping gateway operably connected to one or more issuers that substitutes legacy payment data for the dynamic temporary credential in a payment transaction before sending the payment transaction along with the risk score to the issuer associated with the legacy payment data. | 02-06-2014 |
20140040140 | AUTHENTICATION OF AN END USER - A method, system, and computer program product for authenticating an end user. A login field is generated and sent to an end user, and a set of nodes is subsequently received from the end user. The login field includes first colored nodes having multiple colors distributed in a first random pattern. A transparent credit card controlled by the end user includes second colored nodes having multiple colors distributed in a second random pattern. An authenticity status of the end user is determined, and then sent to the end user, by determining whether each node of the set of nodes (i) corresponds to a unique node of the first colored nodes and (ii) has a same color determined by a function of a static integer and a dynamic integer D, wherein S and D are known only to the end user and the provider of the transparent credit card. | 02-06-2014 |
20140046843 | Leverage Transaction Card Acceptor Name for Cardholder Communication - A method for providing enhanced merchant information to the user of a cashless payment device generally includes the step of receiving a transaction request from an acquirer on behalf of a merchant in a cashless transaction clearing record, wherein the transaction request includes data identifying the merchant and the payment device. The data identifying the merchant is then compared to a database including a list of participating merchants to determine if a match exists in the database. In response to determining a match exists, it is then determined whether the data identifying the merchant in the transaction request should be enhanced with additional merchant information or information about a program the merchant participates in. If so, data enhancement is performed and the transaction request having the additional merchant or program information is forwarded to an issuer of the payment device. | 02-13-2014 |
20140046844 | Transaction Security Using Location Authentication - In certain embodiments, an method includes receiving an authorization request for a proposed transaction between a consumer and a retailer, the authorization request including transaction information associated with the proposed transaction. The method further includes accessing authentication information for the consumer and determining, based on the transaction information and the accessed authentication information, a risk score for the proposed transaction. The method further includes determining whether to grant the authorization request based on the determined risk score. | 02-13-2014 |
20140046845 | METHOD AND SYSTEM FOR A PAYMENT PROCESS TO REDUCE FRAUD - A method for processing a reservation includes: receiving reservation information, the information including a consumer identifier, merchant identifier, payment information, and a date and/or time; storing the information; transmitting the consumer identifier and the date and/or time to a merchant associated with the merchant identifier; identifying fulfillment of the reservation; and transmitting the information for payment of a transaction. A method for processing a financial transaction includes: receiving transaction information for a financial transaction to be processed, the information including a consumer identifier, merchant identifier, payment information, and an expected date and/or time of the financial transaction; storing the information; receiving an authorization request for the financial transaction, the request including the consumer identifier, the merchant identifier, a received date and/or time, and a transaction amount; and processing the transaction using the information if the received date and/or time is temporally proximal to the expected date and/or time. | 02-13-2014 |
20140046846 | METHOD AND SYSTEM FOR FACILITATING THIRD PARTY RECEIPT OF GOODS AND/OR SERVICES - A method for processing a reservation includes: receiving reservation information, the information including a preauthorization amount, payment information, merchant identifier, and predetermined period of time; storing the information; identifying a unique identifier associated with the information; transmitting the unique identifier and predetermined period of time to a merchant associated with the merchant identifier; receiving data identifying, within the predetermined period of time, fulfillment of the reservation; and transmitting the information for payment of a transaction using the payment information. A method for processing a transaction includes: receiving preauthorization information for a transaction to be processed, the information including a preauthorization amount, payment information, and predetermined period of time; storing the information; identifying a unique identifier associated with the information; receiving, within the predetermined period of time, an authorization request for a transaction, the request including the unique identifier and a transaction amount; and processing the transaction using the payment information. | 02-13-2014 |
20140046847 | ACCOUNTS PAYABLE SYSTEM WITH USER CONTROL - A method is disclosed. The method includes receiving a payment instruction file. In some cases, the payment instruction file contains a plurality of payment instructions with conditional control data to pay one or more suppliers. The conditional control data controls execution of the payment instructions. The method further includes receiving a plurality of transaction messages corresponding to the plurality of payment instructions, respectively, where each transaction message in the plurality of transaction messages is conducted using one or more payment accounts. If transaction data in a transaction message in the plurality of transaction messages does not satisfy the conditional control data, then the transaction message is declined by a server computer. If transaction data in the transaction message in the plurality of transaction messages does satisfy the conditional control data, then the transaction message is approved by the server computer. | 02-13-2014 |
20140046848 | AUTOMATIC REGISTRATION AND GENERATION OF CONSUMER PAYMENT CREDENTIALS USING INTERNET-CONNECTED APPLIANCES - Systems, apparatus and methods for allowing cardholders to conveniently and securely purchase items online using an Internet-connected appliance. An Internet-connected appliance reads payment account data from a cardholder payment device and transmits a cardholder registration request to a gateway server. The Internet-connected appliance receives a cardholder verification request, prompts the cardholder to respond, transmits the response, receives a cardholder authentication message, and then stores the cardholder payment account data in a dedicated storage element. In an implementation, the Internet-connected appliance receives a purchase instruction for an online purchase, automatically generates and transmits a purchase transaction request, receives a purchase transaction response, and provides the purchase transaction response to the cardholder. | 02-13-2014 |
20140046849 | HEURISTICS PROCESSING - An indication is provided to a transaction participant as part of a message originating from a transaction coordinator. The message indicates that the transaction coordinator supports a heuristic response. The transaction coordinator coordinates commitment of transactions as requested by an application in response to a determination by the transaction participant of a heuristic outcome. Heuristic outcomes include situations where transaction participants determine they are unable to honor transactional prior prepared commitments made to the transaction coordinator during first prepare phases of two-phase commits associated with the transactions. The heuristic response is received from the transaction participant in association with a transaction coordinated by the transaction coordinator and indicates that the transaction participant is unable to honor a transactional prior prepared commitment made by the transaction participant during a first prepare phase of a two-phase commit associated with the transaction coordinated by the transaction coordinator as requested by the application. | 02-13-2014 |
20140046850 | TRANSACTION PAYMENT METHOD AND SYSTEM - A transaction payment method includes the following steps: acquiring payment information about a user, the payment information including a contact number; calling the contact number through an Interactive Voice Response platform to acquire the payment password input by the user; and verifying the payment password and payment information, and performing payment if the verification is passed. The transaction payment method above can be applied to improve payment security. Additionally, also provided is a transaction payment system. | 02-13-2014 |
20140046851 | System and Method for Sending Money Via E-Mail Over the Internet - A method and system for transferring money from a sender to a receiver utilizing a computer network such as the Internet. The sender visits a web site and identifies, to the server over the Internet, the receiver, an e-mail address of the receiver, an amount of money to be transferred, and a withdraw account from which money is to be transferred. Money is transferred from the withdraw account and deposited into a holding account. The server automatically sends an e-mail to the receiver to inform the receiver that the sender has transferred money and to request the receiver to visit the web site to receive money. The receiver visits the web site of the server in response to the e-mail and identifies a deposit account to which money is to transferred. Money is withdrawn from the holding account and deposited in the deposit account. | 02-13-2014 |
20140052633 | PAYMENT IN A CHAT SESSION - Methods and systems for facilitating payments in a chat session are described. The methods include receiving instructions from a first user to configure a chat session to accept actionable text regarding payment, receiving the actionable text in a message entered by the first user to a second user, determining an action for the first user based on the actionable text, transmitting a request for the action to a second user, receiving approval of the request from the second user, and processing the payment. | 02-20-2014 |
20140052634 | MERGING BALANCES OF PAYMENT CARDS - A system, method, and computer-readable storage medium configured to merge the balances of payment cards into a fused card. | 02-20-2014 |
20140052635 | TIME-SENSITIVE READABLE INDICIA FOR FUNDRAISING - Embodiments of the invention are directed to systems, methods and computer program products for processing readable indicia for fundraising. An exemplary system is configured to receive information associated with readable indicia associated with a non-profit organization; and process the readable indicia to authorize a payment to the non-profit organization. The readable indicia is valid for a predetermined period. Additionally, the readable indicia enables tracking of various types of information associated with fundraising. | 02-20-2014 |
20140052636 | Image Processing For Credit Card Validation - Systems, methods and devices described herein enable the enhancement of the security of online financial transactions by assessing the authenticity of payment instruments, such as credit cards, using video processing analysis. For example, systems, methods and devices are operable to assess various characteristics of credit cards from video data provided by a user. Additionally and/or alternatively, one or more card characteristics captured during an online transaction may be compared against one or more of the same characteristics available in a card database indexed by card issuer, and which stores credit card characteristics for a number of cards provided by various credit card issuers. Additionally and/or alternatively, one or more card characteristics captured during an online transaction may be compared against one or more of the same characteristics captured during previous transactions to verify that the credit card currently offered matches the card used in previous transactions. | 02-20-2014 |
20140052637 | PORTABLE DEVICE WIRELESS READER AND PAYMENT TRANSACTION TERMINAL SECURE MEMORY FUNCTIONALITY - A user accesses an application on a reader mode device, activating a reader communication mode and disabling conflicting communication modes. The reader mode device activates a radio frequency field and creates a secure communication channel with a payment device. A secure element application on the reader mode device requests and receives payment information from a payment device. The secure element application on the reader mode device decrypts the payment information and requests account verification from the user. The secure element application on the reader mode device receives input from the user and verifies the payment information. In response to verifying the account information, the secure element application on the reader mode device encrypts the payment information and transmits it to a payment processing system. The payment processing system processes the payment transaction and transmits a notice of approved or declined transaction to the reader mode device. | 02-20-2014 |
20140052638 | METHOD AND SYSTEM FOR PROVIDING A CARD PAYMENT SERVICE USING A MOBILE PHONE NUMBER - A method and system for providing a card payment using a mobile phone number. A service server receives a payment request from an affiliate system through a wired/wireless data network, the payment request being inputted through a user terminal and including a mobile phone number of a mobile terminal of a user. A telephone call is connected to the mobile terminal using the mobile phone number included in the received payment request. When the telephone call is connected, an input of a service password is requesting through the connected telephone call. When a service password received through the telephone call from the mobile terminal is identical to a service password stored in the service server, a payment authentication process is performed using a virtual card number generated by the service server, the virtual card number being mapped to a card matching the mobile phone number. | 02-20-2014 |
20140052639 | PAYMENT SERVICE PROVISION WITH REDUCED TRANSACTION COSTS - A method for providing on-line payment services is provided where a payment service provider pays for a plurality of purchases that are made by a user during a plurality of on-line shopping sessions. An authorization is received for the payment service provider to collect a reimbursement amount from a financial institution of the user. The reimbursement amount is at least equal to a cumulative amount of the payments for the plurality of purchases made by the user during the plurality of on-line shopping sessions. The payment service provider collects the reimbursement amount in a single transaction from the financial institution of the user and pays a fee to the financial institution of the user. The fee is based on the single transaction carried out to collect the reimbursement amount rather than being applied to each of the plurality of purchases or assessed as a percentage of the reimbursement amount, which allows the payment service provider to reduce the costs associated with providing payment services. | 02-20-2014 |
20140058945 | ANONYMOUS PAYMENT BROKERING - A payment brokering request is received from a first entity corresponding to a particular payment requested of an anonymous user, the payment brokering request including banking information of the first entity. A payment partner is identified that is associated with the anonymous user and it is communicated, to the payment partner, that the particular payment from the anonymous user has been requested. Confirmation data is received from the payment partner confirming that the particular payment was authorized by the anonymous user and that the payment partner will transfer funds to the broker banking system. In some instances, the payment request is forwarded by the privacy broker from the first entity, the payment request including a user identifier paired to the anonymous user and the first entity. The user can be identified, for instance, by the payment partner, from the user identifier. | 02-27-2014 |
20140058946 | On Demand Self Checkout - A method and system provide on demand self checkout for users purchasing products from a store, according to an embodiment. When a user believes that lines at a conventional clerk operated checkout counter are too long or when the user merely wants to do a self checkout, the user can go to a designated area in the store. The user can open an app installed on the user's mobile device and can perform a self checkout by scanning the products with the mobile device. | 02-27-2014 |
20140058947 | PARALLEL AVAILABILITY CONTROL CHECKS IN FINANCIAL MANAGEMENT SYSTEM - A rule set for an AVC system permits AVC operations to be performed at various levels of hierarchy within a governing budget data structure. A rule set contains a plurality of rules, each having an address field which relates an arbitrarily assigned control object to budget nodes in a budget data structure. Control objects typically are assigned to various units and aggregation levels within an organization and also across other dimensions. Rule arrays with several independent rule sets can be activated in parallel for checking an individual input data record against multiple budgetary requirements defined for the organization. This structure provides a comprehensive AVC control feature even for very large budget data structures and complex budgetary control environments. | 02-27-2014 |
20140058948 | USER ENHANCED AUTHENTICATION SYSTEM FOR ONLINE PURCHASES - Embodiments of the invention are directed to methods, systems, devices and computer-readable media. In embodiments of the invention, a user is authenticated using an authentication process that is capable of authenticating a user using an inline authentication form that can authenticate a consumer without transferring a session maintained by a merchant. The inline authentication form is used if the components of the authentication system are capable of supporting an inline authentication form. If the components of the system cannot support an inline authentication form, a different authentication process is used. In one embodiment, an inline authentication form is presented to the user asynchronously. This inline authentication form may be presented within an iFrame embedded in a merchant's checkout page after verifying that the components to be used during the authentication can support the inline authentication form. | 02-27-2014 |
20140058949 | AUTHENTICATION PROCESS USING SEARCH TECHNOLOGY - Systems and methods are presented for improved authentication and risk analysis processes using search engine technology. In one potential implementation, an authorization request message is received at a payment processing network as part of a transaction between a user and a merchant. The payment processing network analyzes risk based on a search history associated with the user involved in the transaction with the merchant. A response to the authentication request is made based in part on the risk associated with the user search history. In further embodiments, a user registers with a search engine as part of a service for improved authentication, where the user accepts privacy settings allowing storage of search and transaction data by a search engine server. The search engine server passes search and transaction data to a risk analysis server for creation of risk parameters which may be used to authenticate transactions. | 02-27-2014 |
20140058950 | SYSTEMS, METHODS, AND DEVICES FOR COMBINED CREDIT CARD AND STORED VALUE TRANSACTION ACCOUNTS - The present invention generally relates to a single transaction account identifier that can be used for in transactions with one of multiple transaction accounts. The method includes one or more of the following steps: establishing at least two transaction accounts, wherein the transaction accounts are respectively associated with transaction account identifiers; receiving, at a transaction processing system, a common account identifier; recognizing the common account identifier as being associated with more than one account; and determining, which of the at least two transaction accounts to access for processing the transaction. The determining step may be based on selection criteria and the selection criteria may be modified by a user. One of the first and second transaction account identifiers may be forwarded to the respective first and second transaction accounts based on the determining step; and the transaction may be processed via the selected transaction account. | 02-27-2014 |
20140067669 | Methods and Systems for Managing Communication Streams - Methods and systems for managing communication streams from multiple sources while utilizing a single short code employ a processor coupled to memory and other computer hardware and software components for establishing at least one conversation session with an outbound message to a recipient and defining a lifespan of the outbound message of the at least one conversation session. At least one reply to a response from the recipient to the outbound message of the at least one conversation session is delivered during the lifespan of the outbound message of the at least one conversation session. | 03-06-2014 |
20140067670 | SYSTEMS AND METHODS FOR PERFORMING FINANCIAL TRANSACTIONS - A request associated with a financial transaction may be received on behalf of a requestor. At least one financial account to be debited and at least one financial account to be credited in connection with the financial transaction may be identified based on information included or provided in association with the request. Respective payment networks that provide access to the financial accounts may be identified. One or more of the financial accounts may be accessible in real-time via a respective payment network. A respective debit or credit instruction may be transmitted to each of the identified payment networks to post a debit or credit to a corresponding financial account. Corresponding debit and/or credit status information may be received, and various status indications may be generated and transmitted, potentially for presentation to the requestor. | 03-06-2014 |
20140067671 | Virtual Gift Card - A simple, easy, and convenient way to give gift cards is provided. A virtual gift card can be purchased by a user via a mobile device or computer of the user and the gift card can be given to a recipient when the recipient checks in with merchant via a social network, such as Facebook. The merchant can accept payment via a payment provider, such as Paypal, Inc. Any of the recipient's social network friends can purchase the virtual gift card for the recipient, such as via an app on a mobile device of the friend. When the recipient begins a payment transaction for goods being purchased, then the virtual gift card can be used to at least partially pay for products purchased by the recipient. The virtual gift card can appear via a merchant device and/or via a mobile device of the recipient. | 03-06-2014 |
20140067672 | SYSTEMS AND METHODS FOR PERFORMING FINANCIAL TRANSACTIONS - Systems, methods and computer-readable media for initiating, facilitating and/or performing financial transactions are disclosed. A request associated with a financial transaction may be received on behalf of a requestor. At least one financial account to be debited and at least one financial account to be credited in connection with the financial transaction may be identified based on information included or provided in association with the request. Respective payment networks that provide access to the financial accounts may be identified. One or more of the financial accounts may be accessible in real-time via a respective payment network. A respective debit or credit instruction may be transmitted to each of the identified payment networks to post a debit or credit to a corresponding financial account. Corresponding debit and/or credit status information may be received, and various status indications may be generated and transmitted, potentially for presentation to the requestor. | 03-06-2014 |
20140067673 | TRUSTED USER INTERFACE AND TOUCHSCREEN - A method for preventing a user from being lured into an electronic transaction that is different than one they intended to launch uses a transaction processor to encrypt a payment instruction message for private display and viewing by a user mobile electronics device. The mobile electronics device is configured to forward an encrypted payment instruction from the transaction processor to decoding and display circuitry secure from other access and reserved to the display of decoded payment instructions on a private display. The user is signaled when the private display is presenting a payment instruction from the transaction processor. The user is able to signal back to the transaction processor that the payment instruction is approved. Electronic transactions can only be completed if the user has signaled back to the transaction processor that the payment instruction is approved. | 03-06-2014 |
20140067674 | SMARTPHONE BARCODE TRANSACTIONS - Systems and methods for processing payments using a dynamic security code are provided. An account authorization system may generate a plurality of dynamic security codes and transmit the plurality of dynamic security codes to a portable consumer device. The portable consumer device may generate a payment code comprising a transaction account number and a dynamic security code. A merchant may scan the payment code and transmit a transaction request to the account authorization system. The account authorization system may compare the transaction account number and dynamic security code in the transaction request to a transaction account number and dynamic security code stored in a database. The account authorization system may transmit an authorization message to the merchant. | 03-06-2014 |
20140067675 | AUTHENTICATION USING DYNAMIC CODES - Systems and methods for processing payments using a dynamic security code are provided. A dynamic security code generator may generate one or more dynamic security codes and transmit the plurality of dynamic security codes to a portable consumer device. The portable consumer device may display the dynamic security code. A merchant transmit a transaction request to the account authorization system including the dynamic security code in a card security code field. The account authorization system may compare the transaction account number and dynamic security code in the transaction request to a transaction account number and dynamic security code stored in a database. The account authorization system may transmit an authorization message to the merchant. | 03-06-2014 |
20140067676 | MANAGEMENT OF DIGITAL RECEIPTS - Digital receipts for purchases can be managed using a variety of techniques. Digital receipts can be obtained by an application running on a computing device and can be authenticated when not connected to a server, such as when offline. Digital receipts can be efficiently synchronized, such as when connected to a network for other reasons. A last synchronization timestamp can be obtained and sent to a server environment and digital receipts can be received that are new and/or have been updated since the last synchronization timestamp. | 03-06-2014 |
20140067677 | SECURE PAYMENT SYSTEM - A method for facilitating secure payment for a transaction, the method comprising: Systems, methods, and devices for facilitating secure payment for a transaction are described. In some embodiments, secure tokens that are linked with remotely- and securely-stored purchaser payment information may be exchanged and transmitted during transaction processing so as to avoid direct transmission of sensitive purchaser information. | 03-06-2014 |
20140067678 | DISPUTE CODE SYSTEM FOR SECURE MOBILE PAYMENT - A method for resolving disputes arising from failed and incomplete payment transactions conducted over a mobile communication infrastructure, comprising generating, by a central processing server, a key and a dispute code using the key and a payment transaction status; receiving, by a payer user device, the dispute code; receiving, by a payee user device, the key; updating, by the central processing server, the dispute code with updated payment transaction status when the payment transaction is completed; receiving, by the payer user device, the updated dispute code; entering into the payee user device the updated dispute code received by the payer user device; generating, by the payee user device, a verifying dispute code using the key and one of the one or more preset status codes; and verifying, by the payee user device, the updated dispute code by comparing the updated dispute code to the verifying dispute code generated. | 03-06-2014 |
20140067679 | Transaction Verification System - An analytics server for use in a transaction system with a terminal for performing authenticated user-initiated transactions and generating transaction data including a user identity associated with each transaction and a camera for capturing image data of a user performing an authenticated transaction at the terminal is configured to extract user characteristic features from the image data associated with authenticated transactions and iteratively update a user database of the user characteristic features over multiple authenticated transactions. The analytics server is further configured to compute a match score, based on preset rules, of the user characteristic features for a current transaction with the user characteristic features associated with a current user stored in the user database, and raise an alarm when the match score fails to meet a threshold value. | 03-06-2014 |
20140067680 | ELECTRIC VEHICLE CHARGING STATION MOBILE DEVICE PAYMENT SYSTEM - Disclosed herein are representative embodiments of methods, apparatus, and systems for a mobile device payment system for electric vehicle charging stations (“EVCSs”) or electric vehicle supply equipment (“EVSE”). This system can be used to control the access to EVCS or EVSE and to ensure proper billing for the use of EVCS or EVSE. | 03-06-2014 |
20140067681 | MACHINE, METHODS, AND PROGRAM PRODUCT FOR ELECTRONIC INVENTORY TRACKING - Machine, methods, and program product for facilitating electronic inventory tracking and management of products through messaging over a payment network, are provided. An example includes an inventory management computer in communication with a merchant POS apparatus or terminal over an existing financial services payment network and configured to receive and process purchase transaction data associated with a product being purchased, for use by a product provider. The computer can include electronic inventory management program product configured to perform various operations including receiving a purchase transaction message sent through the payment network, storing purchase transaction data, and notifying a product provider of the purchase transaction data. The purchase transaction message can include a financial services electronic payment network compatible universal product-transaction identifier, which can be received through the POS terminal in response to a consumer or merchant interfacing the product's container, or an associated purchase ticket or slip storing the transaction identifier, with the POS terminal. | 03-06-2014 |
20140067682 | NFC-BASED INFORMATION EXCHANGE METHOD AND DEVICE - The present invention discloses a Near-Field-Communication (NFC)-based information exchange method and device. The method comprises: in response to an information reading request from an NFC scanning device, detecting whether the NFC scanning device works properly; performing security examination on the mobile terminal when the NFC scanning device works properly; acquiring contextual information associated with the information reading request after completing the security examination; choosing one of pre-set risk levels for the information reading request based on the contextual information; selecting an authentication method corresponding to the chosen risk level; prompting a user of the mobile terminal to perform an authentication operation required by the authentication method; and exchanging information with the NFC scanning device according to the information reading request after the authentication operation is verified. | 03-06-2014 |
20140067683 | SYSTEM AND METHOD FOR GENERATING A DYNAMIC CARD VALUE - A method and system is provided for generating a dynamic card value (DCV) from a mobile user device for use in a transaction between a user cardholder and a transaction provider. The DCV may be configured for use as a card verification value (CVV), also known as a card security code (CSC), a primary account number (PAN), or a portion of a PAN. The DCV may be generated using a DCV generator which may include an algorithm and a DCV generation key. The DCV generation key may be camouflaged. Obtaining a DCV from the user device may require inputting a PIN, a device identifier, a challenge or transaction information. The DCV may be used for any transaction requiring the input of a user identification number and a verification value, including, credit card transactions, debit card transactions, online or telephonic transactions. | 03-06-2014 |
20140067684 | SYSTEMS AND METHODS FOR SECURE AND TRANSPARENT CARDLESS TRANSACTIONS - Systems, methods, and apparatus for handling and/or authorizing payment requests by a consumer for a transaction are provided. Payment information can be sent directly from a consumer to a non-merchant, thereby allowing no new entities to obtain the payment information. Transaction identifiers can be used to facilitate communications among the entities. The payment information can be sent to the non-merchant via a merchant application with a submit payment button directed to the non-merchant so little or no deviations from standard practices are required. | 03-06-2014 |
20140067685 | APPARATUS, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PROVIDING A QUALITY CONTROL MECHANISM FOR THE CONTACTLESS INTERFACE OF A DUAL-INTERFACE CARD - Techniques for enabling performance of a quality control function on the contactless interface while the contactless interface is disabled are provided. The techniques include implementing, on a dual-interface payment device, one or more security mechanisms, wherein the dual-interface payment device comprises a first interface and a second interface, using the one or more security mechanisms to prevent a subset of data corresponding to the first interface from being read using the second interface while allowing data corresponding to the second interface to be read using the first interface, and personalizing the dual-interface payment device and the one or more security mechanisms according to one or more requirements of an issuer of the dual-interface payment device. | 03-06-2014 |
20140074709 | EFFICIENT TRANSFER OF FUNDS BETWEEN ACCOUNTS - A transfer management system receives a request to transfer an amount of funds from a transferring account maintained by a transferring bank to a receiving account maintained by a receiving bank. The transfer management system determines whether the transferring bank maintains an intermediate transferring account, and whether the receiving bank maintains an intermediate receiving account. If the transferring bank maintains an intermediate transferring account and the receiving maintains an intermediate receiving account, the transfer management system transmits to a transferring bank system of the transferring bank an intra-bank transfer request. The intra-bank transfer request is to transfer the amount of funds from the transferring account to the intermediate transferring account. Additionally, the transfer management system transmits an intra-bank transfer request to a receiving bank system of the receiving bank to transfer the amount of funds from the intermediate receiving account maintained by the receiving bank to the receiving account. | 03-13-2014 |
20140074710 | Consumer Processing of Payments for Merchants - Methods and systems are provided for facilitating payment to a merchant for products purchased by a customer. A merchant identification card of the merchant can be swiped on a user device to facilitate such payment. Thus, the payment can be made in a manner that does not compromise personal information of the user to the merchant or to others. The user does not have to be concerned with receiving unwanted advertisements or with other problems associated with such undesirable disclosure of the user's personal information. | 03-13-2014 |
20140074711 | OBTAINING A SIGNATURE FROM A REMOTE USER - The present invention is directed to receiving a signature (or other type of verification or confirmation) from a remote user. The present invention enables a merchant to send a signature request over a network to any device having a browser and touch screen or other means for receiving user input. An input area is displayed within the browser on the user's device. When the user inputs a signature, the signature can be routed over a network back to the merchant to provide authorization for a transaction. | 03-13-2014 |
20140074712 | MEDIA DISTRIBUTION SYSTEM AND PROCESS - A media distribution system that records media segments of performances at a live event. The system generates and stores media data files representing respective ones of the recorded segments and segment metadata associated with the respective recorded segments. The system determines if one of the recorded media segments is associated with a user based on the stored metadata and corresponding user data associated with the user, and generates alert data, representing the associated segment, for a client application in a user device associated with the user in the user data, wherein alert data generates an alert in a user interface of the user device. The system receives user response data, generated by the client application, representing a segment ID to identify the associated segment and a response from the user associated with the associated segment. | 03-13-2014 |
20140074713 | Obtaining User Input From A Remote User to Authorize a Transaction - The present invention is directed to receiving a signature (or other type of verification or confirmation) from a remote user. The present invention enables a merchant to send a signature request over a network to any device having a browser and touch screen or other means for receiving user input. An input area is displayed within the browser on the user's device. When the user inputs a signature (or other form of user input acting as authorization), the signature can be routed over a network back to the merchant to provide authorization for a transaction. Various forms of authentication can be used to verify the identity of the user providing authorization for the transaction. | 03-13-2014 |
20140074714 | ATTENDED DISPENSING ENVIRONMENT UTILIZING MOBILE PAYMENT - A payment system is provided for attended vending machines allowing customers to initiate mobile payment for goods or services with an attendant handheld. The handheld can generate a transaction identifier based on obtained transaction information related to goods or services dispensed, which can be provided to a mobile payment server. The handheld can render a representation of the transaction identifier for consumption by a mobile device, such as a quick response (QR) code, bar code, near field communication (NFC) field, Bluetooth communication, etc. The mobile device can process the representation to obtain the transaction identifier for initiating payment with the mobile payment server. | 03-13-2014 |
20140074715 | REQUEST MONEY SOCIAL NETWORKING APPLICATIONS - In some example embodiments, a system and method is illustrated as including receiving a funds request that contains an identifier to uniquely identify a first member of a social networking community, the funds request including an amount of funds requested. Further, this method may include receiving a funds authorization from a grantor of funds. Additionally, this method may include transmitting a funds transfer instruction based upon the funds authorization. Moreover, this method may include transferring the amount of funds requested from an account held by the grantor of funds to an account held by the first member of a social networking community. | 03-13-2014 |
20140074716 | METHOD AND DEVICE FOR SECURING AN INFORMATION INTERACTION PROCESS - An electronic device with one or more processors, memory, and a display detects a user interaction with a user interface of a first application and, in response to detecting the user interaction with the user interface of the first application, determines whether one or more security parameters are satisfied, where a first security parameter is satisfied when a network access point being used by the electronic device satisfies predefined criteria. In accordance with a determination that the one or more security parameters are satisfied, the device: displays a security keyboard on the display corresponding to a second application different from the first application; and receives user information input via the security keyboard by a user of the electronic device. The device transmits the user information to a target terminal. | 03-13-2014 |
20140074717 | System and Method for Verification, Authentication, and Notification of Transactions - A system and method are provided for verifying, authenticating, and providing notification of a transaction such as a commercial or financial transaction, with and/or to at least one party identified as engaging in the transaction and/or identified as having a potential interest in the transaction or type of transaction. | 03-13-2014 |
20140081859 | FINANCIAL STRENTGH INDICATION - A method for providing an indication of financial strength includes receiving a financial indicator and a predetermined spending budget status from a user. The predetermined spending budget status is associated with a spending budget for the user that has at least one payment account. The financial indicator is then associated with the predetermined spending budget status. A payment request that includes one of the at least one payment accounts is then received from a merchant. A current spending budget status is then determined using the spending budget and the at least one payment account. The financial indicator is then sent to the merchant for provision to the user in response to the current spending budget status being included in the predetermined spending budget status. | 03-20-2014 |
20140081860 | NEAR FIELD CONTACTLESS SYSTEM AND METHOD FOR ONLINE TRANSACTIONS - Systems, methods, and apparatuses are directed to conducting online transactions by virtue of a near field communication (NFC) reading mechanism configured to contactlessly read NFC-compliant provisioning information including a monetary value. Moreover, logic is configured to initiate establishment of a communication link, automatically send a request message to confirm the read provisioning information via the communication link, store at least a portion of the provisioning information in a secure memory unit, and based on the confirmation of the provisioning information, automatically present on a display unit, the monetary value, selectable transaction options, and an online information resource link to accommodate execution of a selected transaction option. | 03-20-2014 |
20140081861 | SYSTEM AND METHOD FOR CREATING SPEND VARIFIED REVIEWS - The systems, methods, and computer program products (collectively “systems”) described herein are generally configured to monitor actions in digital channels. More specifically, the systems are capable of creating spend verified reviews based on a transaction and/or an action in a channel. The systems are capable of syncing transaction accounts with various digital channels. Moreover, the systems are capable of initiating or completing transaction based on user information. The systems may also be capable of providing rewards based on activities or accomplishments in the digital channels. Moreover, the systems may be capable of verifying activities based on transaction information. | 03-20-2014 |
20140081862 | TRANSACTION PROCESSING USING A GLOBAL UNIQUE IDENTIFIER - A Globally Unique IDentifier (GUID) is used to match an authorization request with an authorization response for a transaction between a merchant and a consumer upon an account within a payment processing system where the payment amount is unknown until after the merchant receives the authorization response that includes the GUID. After receiving the authorization response and when the payment amount is known, the merchant forms a transmission that has information for delivery to an issuer of the account. This information is sufficient for the issuer to forward the payment amount from the account to pay the merchant for the transaction. While including the GUID and the payment amount, the information does not include an identifier of the account. | 03-20-2014 |
20140081863 | UNIVERSAL MERCHANT PLATFORM FOR PAYMENT AUTHENTICATION - A method of processing of a transaction between a first and second party is provided. The method includes: receiving payment information at a server operatively connected to a communications network, the payment information identifying a particular payment option used by the second party for the transaction, and the server being equipped to format and route messages over the communications network in different manners to accommodate a plurality of different authentication protocols; determining which of the different authentication protocols is prescribed for the type of payment option identified in the payment information; selecting a particular authentication protocol from the plurality of different authentication protocols supported by the server; obtaining an authentication determination for the transaction, including formatting messages and routing the formatted messages over the communications network in accordance with one or more mandates of the selected authentication protocol. | 03-20-2014 |
20140081864 | Data Shares in Data Storage Clouds - Computer-implemented methods, systems, and computer programs of maintaining perpetual data shares in cloud storage are provided. An example of an embodiment of a method includes receiving a perpetual storage request including user information, a fund transfer authorization, and cloud storage parameters from a user device, sending a fund transfer request to transfer funds from a user account to a trust bank account based on the fund transfer authorization to a bank server, responsive to receiving confirmation that the trust bank account has received the transfer amount, obtaining a certificate of ownership associated with the trust bank account from a trust server, sending a cloud storage request including an identifier associated with the trust bank account and the cloud storage parameters for the perpetual data share of the cloud storage to a cloud server, and sending the login credentials for the perpetual data share to the user device. | 03-20-2014 |
20140081865 | ELECTRONIC TRANSACTION PROCESSOR MANAGER - An Internet based system for executing transactions is described. The system may include transaction data, a database, a business logic manager and user profiles. A rules may also be included, and store information about system responses to modifications of the data. The user profiles may be configured to store information concerning the availability of information and displays depending upon the user. | 03-20-2014 |
20140081866 | METHOD FOR TRANSMITTING A CODE - The present invention relates to a method for transmitting a code to a user in which the user transmits his or her financial account identifier information to a code allocation unit | 03-20-2014 |
20140081867 | SYSTEMS AND METHODS FOR TRANSFERRING VALUE - Systems and methods are provided for transferring value from a first user to a second user by using substantially random codes that are associated with the values to be transferred. A trusted authority enables users to create user accounts used to store value. A first user may request a payment code, which is associated with a specified value, and may be communicated to a second user, who may submit the payment code to the trusted authority. If the payment code is valid, the trusted authority debits the specified value from the first user's account and credits the specified value to the second user's account. Alternatively, the second user may request an invoice code, which is associated with a specified value, and may be communicated to the first user, who may submit the invoice code to the trusted authority. If the invoice code is valid, the trusted authority debits the specified value from the first user's account and credits the specified value to the second user's account. | 03-20-2014 |
20140081868 | SYSTEMS AND METHODS FOR TRANSFERRING VALUE - Systems and methods are provided for transferring value from a first user to a second user by using substantially random codes that are associated with the values to be transferred. A trusted authority enables users to create user accounts used to store value. A first user may request a payment code, which is associated with a specified value, and may be communicated to a second user, who may submit the payment code to the trusted authority. If the payment code is valid, the trusted authority debits the specified value from the first user's account and credits the specified value to the second user's account. Alternatively, the second user may request an invoice code, which is associated with a specified value, and may be communicated to the first user, who may submit the invoice code to the trusted authority. If the invoice code is valid, the trusted authority debits the specified value from the first user's account and credits the specified value to the second user's account. | 03-20-2014 |
20140081869 | METHOD OF BILLING A PURCHASE MADE OVER A COMPUTER NETWORK - A method of effecting a sale over a computer network in which it is determined whether a user passes fraud control before effecting a sale over a computer network. Information associated with a method of payment, such as credit card information, debit card information, checking account information, a telephone service account, a cable television account, a utility service account, or an Internet service provider account, is requested from the user after the user passes the fraud control. Information associated with the method of payment is received from the user in real time. Method-of-payment information is communicated to a payment authorization database, which can be located locally or remotely. The method-of-payment information includes the received information associated with the method of payment. Payment authorization information associated with the method of payment is received from the payment authorization database. A sale transaction is completed when the payment authorization information is affirmative. Sale charge information associated with the sale effected over the computer network is transmitted to the payment authorization database when the sale transaction is complete. The sale charge information includes information for charging the method of payment an amount representing a charge for the sale. | 03-20-2014 |
20140081870 | LOCATION AUGMENTED BIOTRANSACTION SYSTEMS AND METHODS - A biotransaction system and method. An example method includes receiving a first signal from a first device that is positioned at a first location, wherein the first device includes a biometric scanner adapted to scan biometric information of a first user and to use scanned biometric information to facilitate generating the first signal; employing the first signal to match information associated with the first user to information associated with a second user based on the information associated with the second user, resulting in a match in response thereto; and exchanging information between a first portion of a database associated with the first user and a second portion of a database associated with a second user in response to the match. | 03-20-2014 |
20140089189 | SYSTEM, METHOD, AND APPARATUS TO EVALUATE TRANSACTION SECURITY RISK - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving a request for a transaction associated with personally identifiable information (PII); determining values for a plurality of security parameters based on the requested transaction; determining that the transaction should be authorized based on the values for the plurality of security parameters; and based on determining that the transaction should be authorized, authorizing the transaction. | 03-27-2014 |
20140089190 | CLAIM RATE BLACK BOX - Apparatus for electronically modifying a rule-based relationship between bank and a merchant is provided. The apparatus may comprise a receiver configured to receive information relating to a plurality of merchant transactions and a plurality of claims associated with at least a portion of the merchant transactions. The apparatus may further comprise a processor configured to calculate a first value, the first value corresponding to a sum of the plurality of claims divided by a sum of the plurality of merchant transactions. The processor may be further configured to electronically divide the first value by an industry benchmark value. In the event that the resultant value is greater than a predetermined threshold value, the processor may be further configured to electronically modify a database storing data corresponding to rules defining the relationship between the bank and the merchant. | 03-27-2014 |
20140089191 | Secure Payment System and Method - A secure payment system allowing customers to purchase goods or services from a vendor and authorize transactions from their account in a financial institution without either the vendor or the secure payment system having access to the sensitive financial information of the customer. Funds are pushed from the customer's account to the vendor's account at the direct instruction of the customer to their financial institution, rather than being pulled from the customer's account when instructed to do so by a third party. | 03-27-2014 |
20140089192 | SECOND LEVEL PROCESSING SYSTEM AND METHOD - Embodiments of the invention are directed to computer that can utilize a first computer and a second computer. The first computer may determine a first fraud score based on transaction data. If the first fraud score is indeterminate, the transaction may be assigned to a transaction review queue. If the subsequent review takes too long to complete, then a second computer may be used to compute a second fraud score to determine an outcome for the transaction. | 03-27-2014 |
20140089193 | Replay Engine and Passive Profile/Multiple Model Parallel Scoring - Systems and methods for testing new profiles and rules against past transaction data in a quick manner are provided. A set of transactions is identified by a merchant based on a selection criterion that is replayed against the new profile. Results of the replay are recorded and compared against the original results obtained from applying an existing profile to the same set of transaction data. A tic-tac-toe report is generated for the merchant showing shifts in transaction results between the existing profile and the new profile. Embodiments of the invention further allow merchants to generate multiple scores, in parallel, against different transaction models using knobs or hedges. | 03-27-2014 |
20140089194 | UNIVERSAL MERCHANT PLATFORM FOR PAYMENT AUTHENTICATION - A method of processing of a transaction between a first and second party is provided. The method includes: receiving payment information at a server operatively connected to a communications network, the payment information identifying a particular payment option used by the second party for the transaction, and the server being equipped to format and route messages over the communications network in different manners to accommodate a plurality of different authentication protocols; determining which of the different authentication protocols is prescribed for the type of payment option identified in the payment information; selecting a particular authentication protocol from the plurality of different authentication protocols supported by the server; obtaining an authentication determination for the transaction, including formatting messages and routing the formatted messages over the communications network in accordance with one or more mandates of the selected authentication protocol. | 03-27-2014 |
20140089195 | PERSON TO PERSON PHOTO PAYMENTS - Photos of recent or prior payees are shown on a user device, such as a smart phone or tablet. The user or payer can select a photo, enter an amount to send, and confirm a payment. The payment provider then processes the payment with minimal input from the payer. Because the photos are of recent or previous payees, the user is able to make a person to person payment with less steps than conventional person to person payments. | 03-27-2014 |
20140089196 | SECURING PERSONAL IDENTIFICATION NUMBERS FOR MOBILE PAYMENT APPLICATIONS BY COMBINING WITH RANDOM COMPONENTS - Systems and methods can secure personal identification numbers associated with secure elements within mobile devices. A host application of the mobile device can receive a personal identification number (PIN) or user PIN from a user. The application can generate one or more random PIN components. The application can compute a PIN for the secure element based upon the user PIN and each of the one or more random components. The SE can be configured using the PIN computed for the secure element. Each of the one or more random components may be stored in one or more distinct, diverse locations. In addition to entering the correct user PIN, each of the one or more random components must be retrieved from the diverse locations in order to reconstruct the PIN for the secure element whenever performing a transaction using the secure element. | 03-27-2014 |
20140089197 | COMPUTER-IMPLEMENTED METHOD, SYSTEM AND APPARATUS FOR THE DYNAMIC VERIFICATION OF A CONSUMER ENGAGED IN A TRANSACTION WITH A MERCHANT AND AUTHORIZATION OF THE TRANSACTION - Disclosed is a computer-implemented method ( | 03-27-2014 |
20140089198 | Method and System to Verify the Identity of a User - A method and system to verify the identity of a user are described. The system may include a communications module to receive a billing telephone number and a private data segment associated with a user; an address detector to obtain a street address associated with the user; a private data processor to obtain one or more identification records, utilizing the obtained street address and the private data segment; and a matching module to compare the one or more identification records with the private data segment associated with the user to generate a match result. | 03-27-2014 |
20140089199 | SYSTEMS AND METHODS FOR PROVIDING INDIVIDUALIZED FINANCIAL ACCESS - Systems and methods for implementing one or a series of value transfers. In some instances, the systems and methods include web or Internet based user interfaces that provide a mechanism whereby a user can implement a transfer plan without interacting with a human operator. Further, in some instances, such systems and methods provide a mechanism for authorizing access to one or more asset accounts from which value is transferred, and/or recipient accounts to which value is transferred. In some cases, the authorization function is performed by an entity that enjoys a pre-existing relationship with a user accessing the systems of the present invention, while any actual transfers are performed by a third party entity. This can be an advantage where authorization requires a signature or other interaction with a user sufficient to conform to electronic signature laws. | 03-27-2014 |
20140095384 | Systems and Methods For In Store Shopping With Instant Cash - Systems and methods are disclosed herein for a buyer who does not have an immediate source of funds to request funds in the form of instant cash from a third party account holder of a payment service provider for use in making purchases. The buyer may receive the pre-authorized instant cash in the form of a coupon code from the payment service provider on a mobile device. The seller, who has an account with the payment service provider, may transmit the coupon code and a security code to the payment service provider to request approval for the payment. When approved, the payment service provider may deduct a purchase amount from a balance in the instant cash and credit the amount to the seller's account. Advantageously, the buyer and the seller may easily and securely conduct business transactions even when the buyer does not have an immediate source of funds. | 04-03-2014 |
20140095385 | SELECTING MERCHANTS FOR AUTOMATIC PAYMENTS - Establishing a merchant as an automatic payment recipient includes a payment system that employs a server configured for receiving a request for a first transaction with a merchant; identifying one or more transactions of the merchant; determining that the merchant is a candidate to be a payment recipient requiring a reduced authorization level; communicating a notice of the determination; receiving an indication of an acceptance of the merchant as a payment recipient requiring a reduced authorization level; establishing a reduced level of transaction authorization required for a subsequent transaction between the user and the merchant; recognizing that the user computing device is at a location of the merchant for a second transaction that is after the establishing step; and configuring the user network device to conduct the second transaction using the reduced level of transaction authorization. | 04-03-2014 |
20140095386 | Universal Substantiation System - A universal substantiation system and method that can be used to allow or prevent a consumer to purchase products or services using a payment or identification device having one or more rules or conditions. | 04-03-2014 |
20140095387 | VALIDATING A TRANSACTION WITH A SECURE INPUT AND A NON-SECURE OUTPUT - In accordance with the invention, in order to validate a transaction on a mobile handset, PC, tablet or similar device, a user closes the loop between a non-secure display controlled by a host processor and a secure keypad controlled by a secure processor such as a master secure element or trusted execution environment. The user validates the transaction by entering on the secure keypad the data shown on the non-secure display. The transaction is validated because the user only enters the data that the user agrees to and only the user is able to enter the data. | 04-03-2014 |
20140095388 | VALIDATING A TRANSACTION WITH A SECURE INPUT WITHOUT REQUIRING PIN CODE ENTRY - A method for secure transactions on a mobile handset or tablet equipped with a touch screen controlled by a secure processor such as a master secure element or Trusted Execution Environment having gesture recognition capabilities. Since the touch screen is fully controlled by the secure processor, the user can securely enter the transaction amount using gestures to validate the transaction. | 04-03-2014 |
20140095389 | AUTOMATIC PAYMENT AND DEPOSIT MIGRATION - The disclosure extends to methods, systems, and computer program products for migrating automatic financial services from one institution to another institution with minimum user input required. | 04-03-2014 |
20140095390 | MOBILE TRANSACTION APPROVALS - A method, system, and computer program product for delivery of enterprise application data to users. Processing commences by identifying an enterprise application running on a server (e.g., an application server) for which approval processing is to be performed to approve transactions pertaining to the enterprise application. Further processing aggregates groups of transactions, and generates transaction approval display data (e.g., for display screens) that can be displayed on a mobile device (e.g., a smartphone, a mobile terminal, etc.). A sending module participates in sending the transaction approval display data to the mobile device, after which a mobile user performs approvals (e.g., singly or in groups), and transmits data back to (e.g., as an approval or as a disapproval or both). The approvals or disapprovals responsive to the displayed transaction approval display data are processed (e.g., as approvals or as disapprovals or both) for retrieval by the enterprise application. | 04-03-2014 |
20140095391 | SYSTEM AND METHOD FOR RECEIVING REQUESTS FOR TASKS FROM UNREGISTERED DEVICES - Embodiments of a system and method for receiving task requests from unregistered devices are described. Embodiments may include a communication interface service configured to receive from a communication device a message indicative of a request to perform a task. The communication interface service may determine that the communication device is not registered with an existing account that provides information for performing said task. The communication interface service may obtain identification and authentication information for an existing account via a communication channel. The existing account may be an account for that is accessible via a network-based interface. The communication channel through which the identification and authentication information is received by the communication interface service may be any communication channel that does not include the network-based interface of the existing account. Additionally, the communication interface service may use the identification and authentication information for performance of the task using the existing account. | 04-03-2014 |
20140095392 | SYSTEMS AND METHODS FOR OPTIMIZATIONS INVOLVING INSUFFICIENT FUNDS (NSF) CONDITIONS - Systems and methods for optimizations involving insufficient funds conditions are provided. An identification of a first account of a customer of a financial institution may be received by a financial system comprising one or more computers. The first account may be a deposit account at the financial institution. Interest income and non-interest income attributable to one or more of a plurality of accounts, including the first account, that the customer has with the financial institution may be analyzed by the financial system. Based at least in part on the analyzed interest income and non-interest income, a recommended next action associated with the first account may be determined by the financial system. The recommended next action may be associated with an actual or potential insufficient funds (NSF) condition associated with the first account. | 04-03-2014 |
20140095393 | MERCHANT FRAUD RISK SCORE - Methods and systems are presented for a fraud risk score to be given to a merchant for a proposed transaction with a consumer. The fraud risk score is generated by a payment account service provider, such as a credit card processor, using information from a pending transaction as well as information from other payment accounts that the consumer holds to which the payment account service provider is privy. Various factors, including indicators of elevated risk in other payment accounts, are custom-weighted by the merchant for the score. | 04-03-2014 |
20140101043 | Sound-Based Payment Transactions - According to an embodiment, a payment is facilitated though sound-based communication. A first sound-based communication is received. The first sound-based communication is received over a local network that is distinct from a general communications network. The method determines that the first sound-based communication comprises an entity identifier. Entity data comprising a plurality of entities is accessed. The method determines that the plurality of authorized entities comprises an entity associated with the entity identifier. The method determines that the entity associated with the entity identifier is authorized to participate in sound-based payment transactions. A second sound-based communication is transmitted authorizing a payment of a payment amount to the entity. The second sound-based communication is transmitted over the local network that is distinct from the general communications network. | 04-10-2014 |
20140101044 | GIFT CARD TRANSACTION PROCESSING - Embodiments of the invention are directed to systems, methods and computer program products for processing information associated with a transaction that qualifies for a gift card. An exemplary apparatus is configured to: receive information associated with a transaction executed using a payment method associated with an account, the information including an alias associated with the account and an amount of the transaction; determine, based on accessing a database, whether the alias is associated with a gift card; in response to determining the alias is associated with the gift card, determine whether the transaction qualifies for the gift card; and in response to determining the transaction qualifies for the gift card, apply a balance of the gift card to the amount of the transaction. | 04-10-2014 |
20140101045 | Payment Action Page Queue for a Mobile Device - In an exemplary embodiment, a method includes identifying a plurality of initiated payments awaiting approval. An initiated payment is associated with a plurality of payment details describing the initiated payment. A queue comprising a plurality of payment action pages is generated. A payment action page comprises the plurality of payment details describing a corresponding initiated payment. The method further includes displaying on a mobile device a first payment action page of the plurality of payment action pages in the queue and displaying on the mobile device a second payment action page of the plurality of payment action pages in the queue in response to receiving a payment action associated with the first payment action page from the user of the mobile device. | 04-10-2014 |
20140101046 | SYSTEM AND METHOD FOR ONLINE FINANCIAL TRANSACTIONS - Systems, methods, and articles of manufacture capable of approving financial transactions are disclosed. An on-line merchant may store consumer transaction account information. The merchant may transmit an authorization request with an indicator that indicates that a consumer has logged into their account. A transaction account issuer may detect the indicator and determine that the authorization request has a lower fraud risk. The transaction account issuer may approve the authorization request and transmit an authorization response to the merchant. | 04-10-2014 |
20140101047 | System and Method for Authenticating a Payment Transaction - In an electronic payment transaction, a mobile merchant device captures customer card details using an integrated camera. The customer enters card security details on a touch-screen of the mobile merchant device, which also captures fingerprint data from the customer. The fingerprint data are stored in a transaction record, for non-repudiation purposes. | 04-10-2014 |
20140101048 | System and Method for Enrollment of Payment Transaction Services - In an electronic payment transaction, a mobile device captures customer payment token data using an integrated camera. A user is registered to initiate the payment transaction using a mobile payment application on the mobile device. The registration process involves retrieving customer data associated with the captured customer payment token data to pre-populate an enrollment form. The user authentication is provided by verifying input authentication data or by an existing mobile service application. | 04-10-2014 |
20140101049 | Self-Authenticating Peer To Peer Transaction - A system and method of transaction processing is provided. The system includes a central server, which, after receiving transaction and recipient information from an initiator, sends a verification code to the initiator. The server also sends instructions for the initiator to send the code to a recipient via an outside communication channel. The server receives the verification code from the recipient, and verifies the transaction. In this manner, security may be maintained. | 04-10-2014 |
20140101050 | DO-NOT-RECOGNIZE TRANSACTION HANDLING - A technique for improving collaboration between relevant parties in a commercial transaction involves sending a timely alert including descriptors useful for reducing the number of do-not-recognize (DNR) transactions. A system constructed in accordance with techniques described in this paper can integrate multiple stakeholders and service providers. The system can facilitate alerting stakeholders of a presumably fraudulent transaction and/or enabling stakeholders to alert other stakeholders, while reducing DNR resource costs. | 04-10-2014 |
20140101051 | SIMPLE VISUAL AUTHENTICATION OF DOCUMENTS EXCHANGED IN COMMERCE - Verifying the integrity of a received binary object by calculating a first displayable authenticator derived from an input binary object. The first authenticator is then attached to the input binary object, producing a first composite binary object, which is sent to a remote receiver. A second composite binary object is received back from the remote receiver, wherein the second composite binary object includes a received binary object, a received first displayable authenticator, and a second displayable authenticator. A third displayable authenticator is calculated, derived from the second composite binary object, then a display of the first displayable authenticator is compared to a display of the third displayable authenticator, and verification of the integrity of the received binary object is indicated by an exact match between displays of the first and third displayable authenticators. | 04-10-2014 |
20140101052 | MOBILE FINANCIAL TRANSACTION SYSTEM - A computer system and computerized methods enable users to conduct financial transactions in a secured manner without using traditional financial instruments, such as credit cards, debit cards, prepaid cards, checks, cash, etc. | 04-10-2014 |
20140108246 | Apparatus and Method for Presenting Electronic Notices - In certain embodiments an apparatus includes a memory operable a processor. The processor is operable to detect a first and second authentication of a user and detect a first plurality of events. The processor is operable to present information associated with a first event in response to the second authentication of the user and present the information associated with a second plurality of events. The processor can detect a touch indicating a request to present a second event and scroll a first region of the display. The processor is further operable to determine that each one of the first plurality of events has been presented and scroll the first region of the display in conjunction with a second region of the display at least in response to determining that each one of the first plurality of events has been presented. | 04-17-2014 |
20140108247 | Peer-To-Peer Payment Processing - Systems and related methods facilitating payments with a mobile device are discussed herein. Circuitry in a networked-based payment system may be configured to receive payment information from a first device. The first device may include circuitry configured to wirelessly receive wallet identifying data from the payment system. The wallet identifying data may be used to secure messages between the first device and another device over a wireless link. For example, the first device may be configured to send the wallet identifying data to a second device, which may then communicate with the payment system. In response, consumer identifying data associated with the wallet identifying data may be received by the second device from the payment system. In some embodiments, use of wallet identifying data may be applied to other communications, such as for messages that authorize payment. | 04-17-2014 |
20140108248 | Method for Facilitating Payment of a Computerized Transaction - A system and method for facilitating the transfer of a payment for a computerized transaction between a buyer and a seller for the purchase of an item using a computer network, such as the Internet. For example, the method can include communicating data regarding the transaction between the buyer and the seller, receiving an actual payment from the buyer at one or more agent locations, and upon receiving the actual payment from the buyer at one of the agent locations, communicating a message to the seller that the actual payment for the transaction was received at the agent location, thereby permitting the seller to begin shipment of the item. | 04-17-2014 |
20140108249 | INTEROPERABLE FINANCIAL TRANSACTIONS VIA MOBILE DEVICES - A method and system provide interoperable electronic financial services using mobile communications devices and without the need for traditional banking systems like plastic cards, POS machines, branches and ATMs. A consumer can deposit and/or withdraw money from his account using his mobile device and with the help of a local agent without ever stepping inside a branch of a bank where the consumer has an account. The system uses the consumers ID and his mobile number to generate a PAN for the consumer, which is then used to route the transactions. The system uses indicators in the transaction to identify transaction purpose and thus enable appropriate interchange, clearing and settlement between participating entities. The system provides real-time feedback on the transactions and reduces costs by enabling an agent to service consumers of multiple banks and payment service providers. | 04-17-2014 |
20140108250 | UNIVERSAL MERCHANT PLATFORM FOR PAYMENT AUTHENTICATION - A method of processing of a transaction between a first and second party is provided. The method includes: receiving payment information at a server operatively connected to a communications network, the payment information identifying a particular payment option used by the second party for the transaction, and the server being equipped to format and route messages over the communications network in different manners to accommodate a plurality of different authentication protocols; determining which of the different authentication protocols is prescribed for the type of payment option identified in the payment information; selecting a particular authentication protocol from the plurality of different authentication protocols supported by the server; obtaining an authentication determination for the transaction, including formatting messages and routing the formatted messages over the communications network in accordance with one or more mandates of the selected authentication protocol. | 04-17-2014 |
20140108251 | Collaborative Fraud Determination And Prevention - A computer implemented method and system for determining a fraudulent payment transaction in a collaborative environment is provided. A collaborative database, accessible by multiple reviewing entities via a network, receives and stores transaction history data of payment transactions from the reviewing entities. A collaborative fraud prevention platform (CFPP) receives a fraud determination query associated with a transaction request associated with a consumer account. The CFPP performs a search in the collaborative database based on the fraud determination query by comparing current transaction data from the transaction request with the stored transaction history data, performs an analysis of characteristics of the consumer account, and generates a fraud determination report based on the comparison and analysis. The fraud determination report indicates authenticity or non-authenticity of the transaction request for configurable time periods to enable a reviewing entity to determine the fraudulent payment transaction and complete or discontinue processing of the transaction request. | 04-17-2014 |
20140108252 | MOBILE IMAGE PAYMENT SYSTEM USING SOUND-BASED CODES - A non-transitory computer readable storage medium with an executable payment application stored thereon, the payment application configured for generating a payment request for receipt by a transaction interface over a communications network such that that the transaction interface is separate and remote from a merchant interface over the communications network, a transaction of the payment request associated with a merchant providing a product to a consumer, wherein the payment application instructs a computer processor to perform the following steps of: receiving a sound code containing sound-based transaction data, wherein the transaction data is representative of merchant data associated with the product; receiving a consumer identifier, wherein the consumer identifier identifies the consumer; sending the payment request including the product data and the consumer identifier to the transaction interface over the communications network; and receiving a confirmation of approval or denial of the payment request from the transaction interface. | 04-17-2014 |
20140108253 | System and Method for Prepaid Account Replenishment - A method of processing a transaction for provision of funds to a mobile telephone prepayment account associated with a mobile telephone is disclosed. The method includes: an Automated Teller Machine (ATM) receiving, from a card associated with a user of the mobile telephone, information identifying a financial account associated with the user of the mobile device; the ATM receiving, from a user, an identifier associated with the mobile telephone; the ATM receiving, from the user, information indicating an amount of funds to be provided to the mobile telephone prepayment account; and the ATM sending, to a financial institution associated with the financial account, an instruction to transfer the indicated amount of funds from the financial account to the wireless service provider, so as to provide the indicated amount of funds to the mobile telephone prepayment account. | 04-17-2014 |
20140108254 | TRAVEL ACCOUNT - A user can set up a travel account with a payment provider, to inform the payment provider of expected dates and locations of travel, along with limits or restrictions at the various locations and/or dates. When the user travels and attempts to make a payment, the payment provider can determine the location and date to aid in processing the payment request, resulting in an easier process for the user, while still providing additional security with the limits and restrictions. | 04-17-2014 |
20140108255 | Message Multiplexing Method, Device and Corresponding Program - A method is provided for multiplexing messages exchanged between a payment terminal and a communication terminal via a connection between the payment terminal and the communication terminal using the iPod Accessory Protocol, iAP. The method includes: an initialization step of initializing an external communication interface with the communication terminal, a first transmission step of transmitting, to the communication terminal, a request for creation of remote virtual channels via the external communication interface; a creation step of creating, within the payment terminal, local virtual channels corresponding to the remote virtual channels; and a second transmission step of transmitting data frames associated with the local virtual channels via the external communication interface. | 04-17-2014 |
20140108256 | Electronic System for Quickly and Securely Processing Transactions Using Mobile Devices - The invention relates to a secured element ( | 04-17-2014 |
20140108257 | MANAGEMENT OF BIOMETRIC INFORMATION - Fraud risk is monitored in financial transactions. Biometric information is received over the communications interface configured to exchange data with multiple distinct financial institutions. The received biometric information is compared with a database of biometric information to identify an individual. A fraud-detection analysis is performed on the financial transaction information associated with the individual. The financial transaction information associated with the individual is identified as suspicious in accordance with a result of the fraud-detection analysis. The biometric parameters associated with the individual are designated as associated with suspicious financial activity. | 04-17-2014 |
20140114852 | INSTANT CLEARING AND SETTLEMENT FOR PAYMENT TRANSACTIONS - A method to perform a payment comprises receiving a request from a payer to pay a payee, wherein the request comprises a payer account ID and a payee account ID; receiving, based on the payer account ID, a reservation confirmation that a payment amount is reserved from the payer's payment account; retrieving, based on the payee account ID, a receiving clearing account (RCA) ID identifying an RCA held at the payee financial institution; and initiating, by a computer processor and in response to the reservation confirmation, a settlement process comprising: transferring the payment amount from the RCA to the payee's payment account using a payee electronic funds transfer (EFT) capability of the payee's financial institution within a single business day of receiving the request by the payment service provider; and debiting the payment amount from the payer's payment account to reimburse the RCA. | 04-24-2014 |
20140114853 | Online payment system and method according to the mirror authorization server principle - A system and method for online payments over the Internet, able to handle several transactions coming from various participants and contributing to a single payment on a merchant's bank account. In many cases, the modifications designed to make a merchant server capable of managing transactions from several participants contributing to a single payment are difficult, even impossible, to carry out since the server's architecture is imposed by the structure of the e-commerce platform used. A server ( | 04-24-2014 |
20140114854 | FUNDING A RADIO FREQUENCY DEVICE TRANSACTION - A transponder-reader payment system includes an RFID reader for interrogating a transponder and an RFID transponder device. The RFID reader receives, from the RFID transponder device, a code that is associated with a first funding source and a second funding source. The RFID reader communicates a request associated with a transaction to a payment processor. The request includes the code and the transaction is funded using the first funding source and the second funding source associated with the code. In one embodiment, the transaction is funded according to a funding account protocol associated with the code. | 04-24-2014 |
20140114855 | SYSTEMS AND METHODS FOR SECURE MOBILE PAYMENTS - Systems and methods are provided that enable purchase and adjustment transactions using a visual indicium displayed on a mobile device. In some embodiments, these indicia are in the form of bar codes, include alias information, and do not include an account number associated with a payment account. A mobile device receives first user input, displays the indicium to a merchant device. The merchant device scans the indicium and sends a transaction request including the alias information to a payment network. The payment network determines an appropriate financial institution for processing the transaction, and sends the transaction request to the appropriate financial institution. Based on the result, the payment network sends an approval to the merchant device. Additionally, a mobile processor system sends new alias information to the mobile device for use in a next transaction. | 04-24-2014 |
20140114856 | SYSTEM FOR PERFORMING PAYMENT IN MOBILE TERMINAL - Disclosed are a system for performing payment, and a recording medium storing a program source for the method. The method employed by a first terminal enables a second terminal to perform payment for a product purchase using one or more pieces of financial account information accessible by the first terminal by: transmitting the one or more pieces of financial account information to the second terminal using an NFC connection; generating a registration request message comprising a request for registration of the second terminal associated with the transmitted financial account information enabling the second terminal to perform the payment by using the transmitted financial account information; and transmitting the registration request message to a financial organization server, the financial organization server being associated with the transmitted financial account information. | 04-24-2014 |
20140114857 | TRANSACTION INITIATION DETERMINATION SYSTEM UTILIZING TRANSACTION DATA ELEMENTS - Embodiments of the invention directed to systems and methods that allow for determining a transaction initiation mode used to conduct a transaction and applying a specific set of rules associated with the transaction initiation mode to the transaction. A transaction authorization request message is received at a server computer. The transaction authorization message is for a transaction between a consumer and a merchant and includes a plurality of data elements. The server computer determines a transaction initiation mode, from among at least three different transaction initiation modes, used to conduct the transaction based at least in part on the data elements. The server computer applies a specific set of rules associated with the transaction initiation mode to the transaction. | 04-24-2014 |
20140114858 | METHOD AND APPARATUS FOR CONTACTLESS PAYMENT AUTHENTICATION - The present disclosure relates generally to the authentication of contactless payments attempted by a device having embedded contactless payment functionality. In particular, the disclosure is directed to systems and methods that utilize authentication schemes that already exist on a device in which the contactless payment functionality is embedded. One example of such authentication schemes is the use of password protection to lock or unlock the device in which the contactless payment functionality is embedded. Using the password protection functionality may provide varying levels of authentication protection based on the desires of the user. A number of exemplary uses of such a method and apparatus are disclosed herein. | 04-24-2014 |
20140114859 | ENCRYPTED E-COMMERCE PRODUCT - A system for conducting a financial transaction in e-commerce on the internet includes objects prepared by a seller and a buyer. The seller's object includes a clear text header file (advertisement), an encrypted overhead file which contains verification data pertaining to the financial transaction, and an encrypted content file containing the subject matter for sale by the seller. With a purchase solicitation from the buyer, an overhead key can be used by a transaction agency to ensure there is a compliance between the purchase solicitation and the verification data of the overhead (from seller's object). Next a revelation key is provided to give the buyer access to the content when such compliance has been ensured. | 04-24-2014 |
20140122333 | METHOD AND APPARATUS FOR CONFIRMING A TRANSACTION ON A MOBILE DEVICE - A method and apparatus that improves the display treasury management functionality for a cash positioning and reporting system is provided. Several portions of the payment process may be improved. The approval process may be streamlined by providing supplemental contact information at each stage of the approval process. Confirmation of payments via wire transfers may be sent to a payee. Transactions may be approved or rejected from increasingly detailed descriptions of the transactions. Transactions that have been successfully completed may be confirmed. Incomplete or unsuccessful transactions may be reconciled for further action by a user. Each transaction list by sorted as needed. | 05-01-2014 |
20140122334 | Payment Processing with a User Identifier - According to an embodiment, a payment is processed. It is determined that a user should receive a payment. A user identifier associated with the user is received. The user identifier allows the user to receive communications. The user identifier does not comprise information regarding any financial account of the user. Whether the user identifier is registered with an account server operable to maintain associations between user identifers and financial accounts is determined. The user is requested to register the user identifier with the account server if the user identifier is not registered with the account server. Transfer of the payment is facilitated by a selected one of a transfer to a financial account associated with the user identifier and issuance of the payment by an alternative mechanism according to whether the user identifier is registered with the account server. | 05-01-2014 |
20140122335 | Real-Time Regulation of Personal Expenditures and Transactions - Machines, process, and articles of manufacture are provided wherein evaluations of a subscriber transaction or expenditure are provided. This evaluation may include receiving and considering one or more measured real-time physiological metrics of the subscriber, evaluating one or more received physiological metrics of the subscriber, receiving two or more financial metrics, one related to the transaction or the expenditure, and one related to the subscriber, and determining whether the subscriber transaction or expenditure should be assigned a full or partial authorized status. | 05-01-2014 |
20140122336 | METHODS AND SYSTEMS FOR MODIFYING A STATUS OF A PAYMENT CARD - Computer systems and methods for managing the investigation of potentially fraudulent payment card transactions are provided. The computer system includes a memory device for storing data and a processor in communication with the memory device. The computer system is programmed to receive an authorization request message associated with at least one transaction initiated with a payment card. The computer system transmits a scoring request message associated with the at least one transaction to a fraud scoring system. The computer system receives a fraud scoring response associated with the at least one transaction from the fraud scoring system. The fraud scoring response includes a first instruction directing a change to a status of the payment card. The computer system transmits a status change message to a cardholder management system. | 05-01-2014 |
20140122337 | PAYMENT METHOD THROUGH A PAYMENT INSTRUMENT AND SERVER AND MOBILE TERMINAL PERFORMING THE SAME - A payment method is performed through a payment server connectable to at least one mobile terminal and a payment terminal. The payment method includes: receiving payment information including a payment identification code and a payment location code from the payment terminal; estimating a payment location based on the payment location code; determining the at least one mobile terminal associated with the payment identification code; transmitting the estimated payment location to the at least one mobile terminal; and receiving a location-based approval or a payment rejection from a particular mobile terminal, the approval/rejection determined based on the estimated payment location and a location of a particular mobile terminal belonging to the at least one mobile terminal. | 05-01-2014 |
20140122338 | METHOD AND SYSTEM FOR SYSTEM CONTROL - Embodiments of the invention are directed to systems and methods that allow for system control. Certain embodiments allow for creating a hold on an amount of a user's available credit balance and releasing the hold upon the occurrence of an event. Other embodiments allow for the comparison of user transaction history to transaction history of other users having similar demographic characteristics. Further embodiments allow for the conversion of a previously completed transaction to an installment plan. | 05-01-2014 |
20140122339 | MUTUAL MOBILE AUTHENTICATION USING A KEY MANAGEMENT CENTER - A system, method, and server computer configured to authenticate a consumer device. The consumer device is authenticated via a mobile gateway using challenge-response authentication. If the consumer device is successfully authenticated, a secure channel is established between the consumer device and a first entity. The secure channel allows for secure communication between the consumer device and the first entity. | 05-01-2014 |
20140122340 | CREDIT CARD SYSTEM AND METHOD HAVING ADDITIONAL FEATURES - A credit card system is provided which has the added feature of providing additional limited use credit card numbers and/or cards. These numbers and/or cards can be used for a single or limited use transaction, thereby reducing the potential for fraudulent reuse of these numbers and/or cards. The credit card system finds application to “card remote” transactions such as by phone or Internet. Additionally, when a single use or limited use credit card is used for “card present” transactions, so called “skimming” fraud is eliminated. Various other features enhance the credit card system, which will allow secure trade without the use of elaborate encryption techniques. Methods for limiting, distributing and using a limited use card number, controlling the validity of a limited use credit card number, conducting a limited use credit card number transaction and providing remote access devices for accessing a limited use credit card number are also provided. | 05-01-2014 |
20140129441 | SYSTEMS AND METHODS FOR AUTHORIZING SENSITIVE PURCHASE TRANSACTIONS WITH A MOBILE DEVICE - Systems, apparatus and methods are presented that enable an issuer financial institution (FI) to contact a financial account holder concerning a possibly fraudulent purchase transaction via a non-intrusive notification transmitted to a mobile device. An embodiment includes receiving, by the cardholder's mobile device, a transaction alert message, providing an indication of the transaction alert message, and displaying transaction alert information along with a validate indicator and a decline indicator. The process also includes receiving a selection of the validate indicator, prompting the cardholder to enter a mobile personal identification number (mPIN), validating the mPIN, and then transmitting a validation signal to an issuer FI. | 05-08-2014 |
20140129442 | FINANCIAL INSTITUTION ACCOUNT NETWORKING - Embodiments of the invention include systems, methods, and computer-program products for provide a user with a central location that links one or more of the user's financial accounts into a single location for viewing and transacting with any of the one or more financial accounts. As such, the invention provides a facilitated access to one or more user financial accounts from any or all financial institutions consolidated into one source. Embodiments of the present invention provide a system for financial account linkage. Specifically, embodiments of the invention allow for monitoring, viewing, transacting, and transferring funds associated with any of the financial accounts of a user. The financial account monitoring program may be provided to a user via his/her mobile device in an interactive account monitoring/transaction fashion. | 05-08-2014 |
20140129443 | TRANSACTION COST BROKERING - Methods and apparatus may include a calculator for use in determination of a cost of acceptance associated with a purchase and/or group of purchases. The calculator may determine one or more surcharge attributes based on input provided by a transaction participant and one or more transaction fee rules. Apparatus and methods may include a device for dynamically adjusting the transaction cost based on a change in a surcharge attribute. Apparatus and methods may include determining a transaction cost by obtaining authorization services from one interchange provider and final settlement with a second interchange provider. Apparatus and methods may implement a secondary market for trading bundled transactions associated with specified surcharge attributes. | 05-08-2014 |
20140129444 | SERVICE LEVEL AGREEMENT CONTRACT CREDIT VALIDATION - A service level agreement validation device may, upon receiving a service level agreement credit request from a customer, identify a type of the service level agreement credit request; validate the service level agreement credit request based on the type of the service level agreement credit request; update a disposition of the service level agreement credit request based on result of the validation; and selectively provide a credit to the customer based on the disposition of the service level agreement credit request. The service level agreement validation device may further provide credit refunds to the customer for service level agreement credit requests determined to be valid. | 05-08-2014 |
20140129445 | Method for Processing a Payment, and System and Electronic Device for Implementing the Same - In a method for processing a payment, a seller-end electronic device transmits payment information to a transaction platform, which transmits an authentication code to the seller-end electronic device. A buyer-end electronic device allows the user thereof to input a verification code associated with the authentication code, and to transmit the verification code to the transaction platform. When the verification code is deemed valid, the buyer-end electronic device receives a personal identification number (PIN), and transmits a confirm signal to the transaction platform when the PIN is correct. The transaction platform then communicates with a bank terminal to process a payment, according to the payment information. | 05-08-2014 |
20140129446 | INACTIVE CREDIT OR DEBIT CARD ACTIVATED BY A BIOMETRIC FEATURE FOR A LIMITED TIME OR NUMBER OF PURCHASES - A method of verifying ownership of credit or debit cards is disclosed. An apparatus is provided which can compare a biometric representation on the credit or debit card with a biometric feature of the purchaser. For example, the cardholder's fingerprint may be on the card. The apparatus would contain a spot for the purchaser to place the same portion of his finger that was used to create the biometric on the apparatus. The card would be inserted in the apparatus, and the apparatus would compare the fingerprint on the card with the fingerprint of the customer and if they matched, the card would be activated for a limited period of time, or a limited number of purchases. The apparatus may also comprise a remote biometric feature reader, such as a facial scanner or hand scanner. | 05-08-2014 |
20140129447 | SYSTEM AND METHOD FOR ANONYMOUS MICRO-TRANSACTIONS - Disclosed herein are systems, methods, and computer-readable storage devices for processing anonymous micro-transactions of any type, such as purchases, donations, subscriptions, rewards, and so forth. An example system configured for subscriptions can register a user by assigning the user an anonymous user identifier, and prefund a payment account associated with the anonymous user identifier from a third party payment service, based on authorization from the user. This process can be part of a separate registration phase prior to attempting any transactions. Then, the system can complete a subscription transaction as a micro-transaction via the payment account on behalf of the user in response to a user request made via a micro-transaction button on a website, for example. The system can maintain a subscription transaction history for the payment account, and confirm, upon request from a merchant, validity of the subscription transaction based on the transaction history. | 05-08-2014 |
20140129448 | CLOUD-BASED SYSTEMS AND METHODS FOR PROVIDING CONSUMER FINANCIAL DATA - Systems and methods are disclosed for providing cloud-based access to consumer financial information. A cloud-based platform may receive a notification from a server, the notification comprising a request to access consumer data associated with a financial services account. After confirming authorization by both the associated financial services account provider and the consumer, the platform may configure a software object identifying the server and at least a portion of the consumer data that the server is authorized to access. After presentation of the configured software object by the third party server, the platform may verify the configured software object, and provide to the server access to the authorized consumer data. The server may then utilize the provided consumer data to perform a mobile service for the consumer. | 05-08-2014 |
20140129449 | RECEIVING AN INDICATION OF A SECURITY BREACH OF A PROTECTED SET OF FILES - Embodiments include a system, a computer program product, an apparatus, a device, and a method. An embodiment provides a method. The method includes a tripwire file into a protected set of files that includes at least one normal file. The method facilitates a communication to a second party of at least a portion of the protected set of files. The method also receives a signal indicating an occurrence of an activity related to the tripwire file. | 05-08-2014 |
20140129450 | SECURE PAYMENT METHOD AND SYSTEM - Representative embodiments of a server-based method of facilitating payment by a user registered with the server include, at the server, generating and storing, for the user, a code readable by a merchant device, transmitting the code to a mobile device of the user, facilitating provision of information characterizing a payment instrument from the user to a payment-processing entity without storing the data at the server, receiving, from the payment-processing entity, a token indicative of the payment instrument but not encoding data that would enable use of the instrument, associating the token with the user, receiving, from a merchant, the code and a payment amount, matching the received code to the user and retrieving the token associated with the user, and providing the token and the payment amount to the payment-processing entity to facilitate completion of a transaction between the user and the merchant. | 05-08-2014 |
20140129451 | P2P Transfer Using Prepaid Card - A method and system for making a payment is disclosed. In the method, a Payor can specify an account from which to withdraw funds for the payment and specify an activation code necessary to activate the payment. The payment can be sent to a Payee in the form of a pre-paid transaction account. The account will not be activated unless the Payee provides the activation code. Funds can be withdrawn from the account specified by the Payor either in full at the time the payment is made or are withdrawn as the Payee uses the transaction account to access the funds. | 05-08-2014 |
20140136410 | Credit Card Fraud Detection - Methods and systems are provided for detecting and preventing fraudulent use of credit cards and the like. The amount of wear of a magnetic strip of a suspect credit card can be compared to an amount of wear of the magnetic strip of the corresponding legitimate credit card. If the amount of wear of the magnetic strip of the suspect credit card is less than the amount of wear of the magnetic strip of the legitimate credit card, then both the suspect credit card and the legitimate credit card can be deactivated. | 05-15-2014 |
20140136411 | ELECTRONIC DEVICE AND METHOD FOR CONTROLLING PAYMENT FUNCTION OF INPUT MEANS - An electronic device and a method for controlling a payment function of an input means are provided. The operating method of the electronic device includes receiving a packet periodically transmitted from an input means, determining a distance from the electronic device to the input means based on determining a signal reception strength of the packet, extracting a distance value from storage associated with a matching reception strength and sending to the input means a signal according to the extracted distance value of the input means and the received packet. | 05-15-2014 |
20140136412 | LEAST COST ROUTING INTERCHANGE FOR B2B PURCHASE CARD PAYMENTS - Methods and system for processing credit card payments, comprising receiving a credit card transaction, fabricating line item data to obtain favorable interchange rates for transactions, aggregating or disaggregating payments to obtain favorable interchange rates for transactions, and automatically deciding among various interchange rate options for transactions based on criteria chosen by the payer using these methods or system. | 05-15-2014 |
20140136413 | SYSTEM AND METHOD FOR PROVIDING A FINANCIAL TRANSACTION INSTRUMENT WITH USER-DEFINABLE AUTHORIZATION CRITERIA - Authorization limits on the use of a financial transaction instrument, such as a credit card and the like, may be set by an owner of a financial account corresponding to the financial transaction instrument. The owner provides information identifying the owner, the financial account, and the financial transaction instrument corresponding to the financial account to a computer, and also provides an owner-defined authorization limit on use of the financial transaction instrument to the computer. The authorization limit is stored in a database, which is accessed when there is a request to authorize a purchase to be made with the financial transaction instrument. The owner may communicate with the computer via a Web site, an automated call program, a kiosk, or the like. | 05-15-2014 |
20140136414 | AUTONOMOUS NEIGHBORHOOD VEHICLE COMMERCE NETWORK AND COMMUNITY - A method, device and system of an autonomous neighborhood vehicle commerce network in a community are disclosed. An autonomous neighborhood vehicle includes a set of wheels aligned in a pattern to provide the autonomous neighborhood vehicle stability while traversing a sidewalk, a bike lane and a roadway. The autonomous neighborhood vehicle has an electronic locking mechanism and a storage compartment which is capable of storing items. The embodiment includes a computer system of the autonomous neighborhood vehicle communicatively coupled to a commerce server of a neighborhood communication system through a wireless network to autonomously navigate the autonomous neighborhood vehicle to a destination specified by the commerce server. A navigation server of the autonomous neighborhood vehicle provides a remote sensing capability to the autonomous neighborhood vehicle such that the autonomous neighborhood vehicle is autonomously navigable to the destination. | 05-15-2014 |
20140136415 | WIRELESS FINANCIAL TRANSACTION SYSTEMS AND METHODS - A system operates to carry out financial transfers in response to data read from data bearing records. A cell phone having a camera stores in memory indicia corresponding to account data from a plurality of magnetic stripe cards. A user can operate the phone to select one of the accounts stored in the memory. The memory further includes a scanned user-identifying written signature. The user can use the phone during an item purchase to wirelessly transmit each of an item's identifier captured by the camera, selected account data, and the user signature. | 05-15-2014 |
20140136416 | METHOD AND SYSTEM FOR LICENSE SERVER SYNCHRONIZATION - A method and system for license server synchronization are disclosed. According to one embodiment, a computer-implemented method comprises receiving a first capability request from a licensing server, transmitting a first capability response to the licensing server. The licensing server provides a second capability response to a device, and the second capability response is in response to a second capability request sent by the device to the licensing server. The second capability response includes one or more capabilities included in the first capability response. A server synchronization message is received from the licensing server and a request for payment is transmitted to a service provider, wherein the request for payment is generated based on the server synchronization message. | 05-15-2014 |
20140143143 | USING CARD IMAGE TO EXTRACT BANK ACCOUNT INFORMATION - A method to complete a sales transaction. The method includes (a) obtaining, by a merchant mobile device, a digital image of a financial card of a consumer, wherein the digital image captures a code and an account number, (b) requesting a payment of the sales transaction by (i) extracting, by a processor of the merchant mobile device using optical character recognition, the account number and the code, (ii) identifying a depository financial institution and a consumer financial account based on the code and the account number, respectively, and (iii) sending a request to the depository financial institution to transfer an amount of the payment from the consumer financial account to a merchant financial account controlled by the merchant, and (c) receiving, by the merchant mobile device, a confirmation of completing the electronic funds transfer, wherein the sales transaction is completed in response to the confirmation. | 05-22-2014 |
20140143144 | SYSTEMS AND METHODS FOR PROCESSING ELECTRONIC PAYMENTS USING A GLOBAL PAYMENT DIRECTORY - A computer system for use with a memory device for facilitating electronic payments to a payee from an account associated with a payor is provided. Payor profile information is stored in the memory device, which payor profile information is associated with the payor. A token identifier is created which is associated with the payor profile information. The token identifier is transmitted to a payee, for retransmittal of the token identifier by the payee to the computer system during a subsequent transaction between the payor and the payee. | 05-22-2014 |
20140143145 | ENVIRONMENT AND METHODS FOR ENABLING ELECTRONIC TRANSACTIONS - A method includes receiving a request for registered payment options associated with a user computing device, where the request includes an identifier uniquely identifying one of the user computing device and the user. The method includes identifying one or more payment options associated with the device identifier, where each of the one or more payment options is associated with respective payment instrument information. The method includes providing one or more codes, where each code of the one or more codes identifies a respective payment option of the one or more payment options. The method includes receiving a first code of the one or more codes and transaction information. The method includes accessing, based upon the first code, payment instrument information associated with the payment option identified by the first code, and causing the processing of the payment instrument information in relation to a transaction identified by the transaction data. | 05-22-2014 |
20140143146 | SYSTEMS AND METHODS FOR GENERATING AND USING A TOKEN FOR USE IN A TRANSACTION - Systems and methods are provided for generating and using a token for authorizing a payment to satisfy an agreement for goods and/or services. The token may be generated based on information related to the agreement, as well as a specified validity period and token type. The generated token may then be used within the specified validity period to authorize a payment to satisfy the agreement. The token may be a limited-use token having a predetermined number of uses, such that after the token has been used the predetermined number of times, the token may be destroyed such that the payment is not authorized more than the predetermined number of uses. | 05-22-2014 |
20140143147 | TRANSACTION FEE NEGOTIATION FOR CURRENCY REMITTANCE - Described herein are systems and methods for conducting remittances transactions with mobile and other electronic devices. In some embodiments, the systems and methods permit a user of a mobile or other electronic device to query multiple service providers for fee information from a single location. And in some instances, such fee information is provided to the user in real time. | 05-22-2014 |
20140143148 | SYSTEM AND METHOD FOR IMPROVING RELIABILITY OF DISTRIBUTED ELECTRONIC TRANSACTIONS - A system and method are disclosed that separate control functionality from the management functionality for conducting electronic transactions. The control functions are performed by a third party resulting in a low overhead since significant overhead is incurred in response to an anomalous event, thus facilitating high throughput electronic transactions when anomalous events are infrequent. Further, the third party does not need to have access to confidential information since it only controls by observing, validating and certifying the observed communications in a specified manner to prevent confidential information from leaving the context of the transaction. Management of the transactions based on consideration of substantive information is provided by the participants. A preferred system of the invention comprises a validation authority, a logical boundary at which validation authority undertakes control of communications, and validation rules specifying parameters for observation and the nature of comparisons. | 05-22-2014 |
20140143149 | Contextualized Access Control - Contextual information associated with a mobile device can be automatically acquired using various sensors on the device. Based on the contextual information and an access control policy associated with an application on the mobile device, a level of access to the application can be determined. An entity may be identified, authenticated and authorized to gain full access, varying degree of restricted access or no access to the application based on the access control policy. Different applications may be provided different levels of access based on the access control policy associated with each application. | 05-22-2014 |
20140143150 | ELECTRONIC PAYMENT METHOD AND DEVICE FOR SECURELY EXCHANGING PAYMENT INFORMATION - The present invention relates to an electronic payment method for securely exchanging information between an authentication device and a server via a communication device. The method comprises the following steps: acquiring by the authentication device a payment amount and a seller identifier, displaying the payment amount on a display of said authentication device, acquiring by the authentication device user feedback data by means of a user interface of said authentication device, generating, at the authentication device, a secure payment request comprising the displayed payment amount, said seller identifier and an authentication device identifier stored in the authentication device, and transmitting said secure payment request to the server by using said communication device as relaying device. | 05-22-2014 |
20140143151 | SYSTEM AND METHOD FOR SIMPLIFIED CHECKOUT - In various embodiments, a system and method for providing simplified checkout are provided. In example embodiments, an identifier that corresponds to a payment account of a user is received at a payment provider system. Account information from the payment account of the user is retrieved from a payment data storage of the payment provider system. The account information is used in a payment transaction involving a merchant system. A payment interface having transaction fields populated with the account information retrieved from the payment account of the user is presented to the user while the user maintains a presence on a webpage of a merchant system. | 05-22-2014 |
20140143152 | METHODS AND SYSTEMS USING CONTACTLESS CARD - It is desirable to implement security features that can prevent the unauthorized use of a customer's sensitive account information from an RFID sticker. The methods and systems described herein attempt to resolve the deficiencies with the conventional RFID stickers. In a more secure implementation, a financial institution allows a customer to activate or deactivate the account for use with the RFID sticker by submitting a request to the financial institution using internet banking, mobile banking, SMS texting, or other communications method. | 05-22-2014 |
20140149287 | System and Method for Donating Money Using a Mobile Electronic Device - This invention allows a patron at an event who is without cash to donate money using a mobile electronic device. The invention is a mobile electronic-device based method for sending money from a donor to a donee. Location detecting means detect the location of the donor's mobile electronic device and the locations of possible donees in close proximity to the mobile electronic device. The donor may additionally search for donees who are not in close proximity to the mobile electronic device and donate to them. The donor is prompted to choose its intended donee, prompted to enter validating information, and prompted to select the intended donation amount. Upon sending the money it is routed through a mobile application and a website application, at which time the funds are deducted from the donor's account and a barcode receipt is generated. The funds are then routed to the donee's account. | 05-29-2014 |
20140149288 | Personalized Budgets for Financial Services - An illustrative embodiment of a computer-implemented process for personalized financial budget tracking receives a request for a user purchase transaction, wherein the user purchase transaction is one of a purchase transaction and a payment transaction and responsive to a determination of a payment method, determines whether the user purchase transaction is authorized. Responsive to a determination the user purchase transaction is authorized, the computer-implemented process determines whether personalized expense categories are activated and responsive to a determination the personalized expense categories are activated, prompts for a category code. Responsive to receiving the category code, the computer-implemented process tracks expenses using a personalization category code received, wherein the personalization category code received is associated with the user purchase transaction. | 05-29-2014 |
20140149289 | Method and Apparatus for the Restricted Transfer of Funds - The following invention is a method and apparatus for the restricted transfer of funds that allows for users to set a transfer amount they are willing to transfer, place restrictions on the transfer of the funds through the insertion of a restriction identity or category, transfer the funds to a second bank account subject to the restrictions placed on the funds. This invention allows payor's to associate restrictions on future expenses such as which merchant, which category of item, or which specific item a payee is allowed to purchase. Further, a method for the creation of a secure digital check is disclosed and claimed. | 05-29-2014 |
20140149290 | RESERVATION-BASED PREAUTHORIZATION PAYMENT SYSTEM - A method and system for allowing the setting of reservations and the pre-authorization of credit to purchase a desired service for which a reservation is made. A customer accesses a reservation system that is integrated with a credit authorization system. The customer may make a reservation and substantially simultaneously become pre-authorized to pay for services to be provided at the reservation by one of any number of credit providers. Pre-authorized credit and reservation information is then supplied to the service provider in advance of services being provided, expediting the overall transaction time and allowing for a secure and cardless transaction procedure. The reservation and preauthorization information are typically stored upon the reservation system and then passed to the point-of-sale systems, but other types of input/output storage devices could be used to perform this function. | 05-29-2014 |
20140149291 | SYSTEM AND METHOD FOR ELECTRONIC COMMERCE - A method for secure electronic commercial transactions that uses a networked payment server to communicate a pre-defined purchase ticket to a registered buyer of the payment server in response to a purchase request received over a network that identifies the registered buyer and a registered seller of the payment server with whom the registered buyer is entering into a commercial transaction. | 05-29-2014 |
20140149292 | MERCHANT CATEGORY CODES IN A PROXY CARD TRANSACTION - Transmitting category codes to payment instruments in proxy card transactions comprises receiving a first payment request to authorize a proxy card transaction, the first payment request identifying a proxy account of a user for payment of the transaction and a merchant category code associated with the merchant; selecting a financial account associated with the proxy account to fund the transaction; communicating a second payment request to authorize the transaction to a financial account system associated with the selected financial account, the second payment request comprising the merchant category code associated with the merchant; receiving an authorization for the transaction from the financial account system to fund the transaction using the selected financial account; and communicating an authorization for the transaction to the merchant computing device in response to receiving the authorization for the transaction from the financial account system to fund the transaction using the selected financial account. | 05-29-2014 |
20140149293 | TRANSACTION TOKEN ISSUING AUTHORITIES - Systems, methods, apparatus, processes, computer program code and means for conducting transactions are described which allow a first party to a transaction to identify a second party to a transaction. | 05-29-2014 |
20140156527 | PRE-PAYMENT AUTHORIZATION CATEGORIZATION - Systems, methods, and computer program products are provided for categorizing transactions prior to authorization. The system includes a computer apparatus including a processor and a memory; and a software module stored in the memory. The software module includes executable instructions that when executed by the processor cause the processor to receive an input from a user associated with a component of a future transaction; determine that the user is conducting a transaction; determine a category associated with the input; associate the category with the transaction that is being conducted by the user; and store the category in association with the transaction. In some embodiments, the user provides the input by scanning a product or service using a mobile device. In further embodiments, the system determines the category by evaluating the product or service, evaluating previous categories identified at the user's location, or some combination thereof. | 06-05-2014 |
20140156528 | METHOD AND SYSTEM FOR SECURE MOBILE PAYMENT OF A VENDOR OR SERVICE PROVIDER VIA A DEMAND DRAFT - A method and system for consumers to pay vendors or service providers is presented. A demand draft is created and sent to a vendor or service provider from a trusted third party on behalf of a consumer. The verification of consumer funds available to cover the demand draft is not necessary because the demand draft is from a trusted third party to a vendor or service provider. The method employs real-time geolocation information available within mobile devices and time-synchronized one time passwords to increase the security of the process. | 06-05-2014 |
20140156529 | SYSTEM AND METHOD FOR TRANSFERRING ELECTRONIC MONEY - The present invention concerns a system and method for transferring electronic money. More particularly, it relates to improving the checking method used to validate the transfer at a central server. Furthermore the proposed solution improves the traceability of the operations. It is also proposed a data record to implement efficiently the electronic money. Its purpose is to make the check of the consistency of the history of transactions related to a particular electronic banknote easier. The proposed solution minimizes the access to the database by embedding the history of transaction within the coding of the electronic banknote itself. | 06-05-2014 |
20140156530 | Method and Device for Carrying Out Cashless Payments - A method for carrying out cashless payments by means of mobile telecommunications terminals, wherein each mobile telecommunications terminal stores a subscriber identifier and a payment limit, which is assigned to the subscriber identifier, a transaction code, which is specific to the payment transaction, includes generating them using an algorithm and transmitting the mobile telecommunications terminal. The telecommunications terminal transmits the subscriber identifier, the transaction code and the payment limit to a cash register system of a cashless payment transaction, where the transmitted payment limit is compared to the desired payment amount and the validity of the transaction code is checked using a verification algorithm stored in the cash register system. If the check is positive, the payment is released in the cash register system. | 06-05-2014 |
20140156531 | System and Method for Authenticating Transactions Through a Mobile Device - A user may claim to have not made or allowed a transaction and that the transaction was made in error. Where it appears the user has not authorized the transaction, the funds of the transaction are returned to the user, or are charged back. Systems and methods provide a way to confirm whether or not a transaction was actually authorized by the user, thereby settling a chargeback dispute for a previously executed transaction. The method comprises receiving the dispute regarding the transaction including associated transaction data, and retrieving a digital signature associated with the transaction data, the digital signature computed by signing the transaction data. The digital signature is then verified using a public key, wherein the public key corresponds to a private key stored on a mobile device. It is then determined whether or not the transaction is fraudulent based on a verification result of the digital signature. | 06-05-2014 |
20140156532 | UNIVERSAL MERCHANT PLATFORM FOR PAYMENT AUTHENTICATION - A method of processing of a transaction between a first and second party is provided. The method includes: receiving payment information at a server operatively connected to a communications network, the payment information identifying a particular payment option used by the second party for the transaction, and the server being equipped to format and route messages over the communications network in different manners to accommodate a plurality of different authentication protocols; determining which of the different authentication protocols is prescribed for the type of payment option identified in the payment information; selecting a particular authentication protocol from the plurality of different authentication protocols supported by the server; obtaining an authentication determination for the transaction, including formatting messages and routing the formatted messages over the communications network in accordance with one or more mandates of the selected authentication protocol. | 06-05-2014 |
20140164237 | METHOD AND SYSTEM FOR SHARING AND DISTRIBUTING CONTENT DURING A CONSUMER EXPERIENCE - A method for funding and sharing an experience includes: reading a code encoded with an identifier; transmitting the identifier; receiving details for a transaction, the details including a transaction amount; displaying the amount to a consumer; receiving an indication of transaction options; transmitting the transaction options for processing the transaction; receiving an indication of transaction approval; and displaying a prompt to share experience information with a social network. A method for distributing content includes: storing details for a transaction, the details including an identifier, an amount, and a stage; receiving a content request including an identification; identifying specific details where the identifier corresponds to the identification; transmitting content based on the stage included in the specific details where if the stage indicates the transaction is to be processed the content includes the amount included in the specific details; and receiving an indication of approval of the financial transaction. | 06-12-2014 |
20140164238 | Concurrent Servicing of Multiple Processing Requests - Example systems and methods of concurrent servicing of multiple processing requests are presented. In one example, a plurality of first graphical objects representing processing requests are displayed in a first area of a display. Each of the first graphical objects presents information concerning its corresponding processing request. In response to selection of more than one of the first graphical objects, a plurality of second graphical objects corresponding to the selected first graphical objects are displayed in a second area of the display. Each of the second graphical objects presents second information having a greater level of detail than that of the first information of the corresponding first graphical object. A user-selectable region associated with the second graphical objects is also displayed. In response to a user selection of the user-selectable region, the processing requests associated with the second graphical objects are serviced. | 06-12-2014 |
20140164239 | ACCOUNT BORROWING SYSTEM AND METHOD - An account borrowing system includes at least one client operated by a first user and a second user and a server. The processor includes a communication module, to receive an account borrowing request submitted by the first user using the at least one client. A forwarding module forwards the account borrowing request to the second user using the at least one client. A linking module obtains the account information of the second user from a storage unit and generate a super link address for accessing a login page of the account of the second user when the second user approves the account borrowing request. In addition, a communication module transmits the supper link address to the first user using the at least one client. | 06-12-2014 |
20140164240 | METHOD AND SYSTEM FOR NETWORK-BASED ALLOWANCE CONTROL - Methods and systems for network-based allowance control are disclosed. A user creates an allowance in association with a recipient account such that funds are available in the recipient account for use by a recipient for the purchase of goods over a network (e.g., Internet). Specifically, by creating an allowance, a user initiates a periodic (recurring) transfer (i.e., credit) of an amount of money (i.e., funds) to the recipient account. This money may then be used by the recipient for the purchase of goods over the network. The recipient account may be related to a parent account as a sub-account, enabling the user of the parent account to monitor purchases made by the recipient, as well as limit the items that can be purchased by the recipient. | 06-12-2014 |
20140164241 | SECURELY RECEIVING FROM A REMOTE USER SENSITIVE INFORMATION AND AUTHORIZATION TO PERFORM A TRANSACTION USING THE SENSITIVE INFORMATION - Payment information and user input to serve as authorization to perform a transaction using the payment information can be obtained from a remote user having a client computing device. A merchant can send a request for payment information and authorization over a network to any device having a browser and touch screen or other means for receiving user input. A user interface having overlaid fields can be used to receive the payment information in a secure manner that prevents the payment information from being stored on the client computing device. An input area can also be displayed within the browser on the user's device. When the user inputs a signature (or other authorization information) into the input area, the signature can be routed over a network back to the merchant to provide authorization for a transaction. | 06-12-2014 |
20140164242 | Controlling Accounts of Online Transaction Platform - The present disclosure provides an example method, apparatus, and server for controlling accounts of an online transaction platform. Leveled control functions are provided to a user account. Functions provided to the user account are classified into at least two levels. Each level may include one or more functions and each level corresponds to respective security verification. The leveled control functions or authorizations are initiated for the user account. When the user account is used to log-in subsequently, a request for opening a level of the user account is received. If the user account passes a security verification corresponding to the requested level, functions of the requested level are opened to the user account. An opening status of the opened level is maintained until the user account logs off a system or the opened level is closed to the user account. | 06-12-2014 |
20140164243 | Dynamic Account Identifier With Return Real Account Identifier - Embodiments of the invention are directed to systems, apparatus, and methods for receiving an account token for a transaction, and returning an associated real account identifier if the transaction is approved. In one embodiment, an authorization request message for a transaction is received by a server computer, the authorization request message including an account token associated with a real account identifier. The server computer determines the real account identifier associated with the account token. If the transaction is approved, an authorization response message including the real account identifier is transmitted. | 06-12-2014 |
20140164244 | Method and Apparatus for Conducting Secure Financial and Informational Transactions via Portable Smart Devices - A technique for conducting secure financial and informational transactions via portable smart devices is disclosed, in which two transaction devices, e.g. an ATM and a smartphone or other smart connected device are both substantially simultaneously accessible by the user and are both independently connected with the account server by a secure connection between the transaction device for the ATM and a secure connection between the smartphone and a cellphone tower. Thus, authentication is provided by secure login on the two devices, i.e. the transaction device and the cellphone. Once the devices are both connected to the account server, handshaking between the two devices to confirm pairing of the right two devices is prompted, at which point, a transaction may proceed. | 06-12-2014 |
20140164245 | Systems, Devices and Methods for Online Transaction Verification - Systems and methods are provided for online transaction verification. For example, a status of a commodity on flash sale is acquired; a verification code associated with the commodity on flash sale is acquired in response to the commodity on flash sale being purchasable; the verification code is output; an input voice password for flash sale is recorded; the voice password for flash sale is uploaded to a server for voice recognition, where order data is processed by the server in response to the uploaded voice password for flash sale matching with a predetermined verification code and a result related to the order data processing is returned; and the result is received and output. | 06-12-2014 |
20140164246 | PAYMENT IDENTIFICATION CODE AND PAYMENT SYSTEM USING THE SAME - A method for effecting electronic payment, safeguarding banking and account information, while utilizing existing payment systems. The method comprises generating a system routing number and a payment identification code (PIC) relating to the beneficiary's account information, distributing payment identification codes to the existing payment system and financial institutions owning the account related to the payment identification codes, and the originator receiving a system routing number and the beneficiary's PIC number. The method also includes the originator communicating a payment instruction to a financial institution of the originator, wherein the payment instruction includes the system routing number beneficiary's payment identification code, the originator's financial institution receiving the payment instruction from the originator, wherein if the received PIC matches the originator's financial institution internal list of PICs, the originator's financial institution performs an “on us” transaction, and transmitting a payment instruction to an existing payment system in a case where the received PIC does not match originator's financial institution internal list of PICs. The method also includes the existing payment system validating the received PIC, wherein if the PIC is invalid, the payment instruction is returned to the originator's financial institution, converting the PIC and system routing number to a receiving payment instruction in a case where the PIC is a valid PIC, wherein the receiving payment instruction includes the beneficiary's financial institution's routing number and the beneficiary's account number. The existing payment system transmits the receiving payment instruction to a financial institution of the beneficiary, that financial institution credits the beneficiary's account if no problem exists, and otherwise returns a receiving payment instruction to the existing payment system. Upon receipt of the returned receiving payment instruction, the existing payment system translates the receiving payment instruction into the payment instruction prior to transmitting the payment instruction back to originator's financial institution. | 06-12-2014 |
20140172704 | Shared Pools for Common Transactions - Methods and systems according to one or more embodiments are provided for establishing, managing or using a shared pool between a group of users in connection with one or more common transactions. In an embodiment, a system comprises: one or more processors; and one or more memories adapted to store a plurality of machine-readable instructions which when executed by the one or more processors are adapted to cause the system to: pull funds from one or more members of a shared pool, wherein the shared pool is created between a group of users or members in connection with one or more common transactions, and wherein the funds are pulled according to one or more rules set up by each member for pulling funds from their respective funding sources when the shared pool is selected to be used in connection with the common transaction(s); and process the common transaction(s) using the shared pool. | 06-19-2014 |
20140172705 | SYSTEMS AND METHODS FOR EXTENDING SIGNATURE TECHNOLOGY - Systems and methods extending signatures are provided. Some of the disclosed systems and methods can include receiving, on a computing device, transaction data associated with one or more entities, wherein the transaction data is associated with one or more keys; determining one or more keys associated with the one or more entities, wherein each entity has corresponding signature data, and wherein signature data includes one or more associated keys; matching the one or more keys associated with the transaction data to one or more keys associated with the signature data corresponding to the one or more entities; and retrieving the signature data corresponding to the one or more entities. The systems and methods may further comprise updating the signature data with the transaction data; using a scoring engine to score the updated signature data; and storing the updated signature data. | 06-19-2014 |
20140172706 | SECURITY BROKER - An attempted transaction is identified involving a customer device and the first customer device is redirected to a security broker. A security report for the first customer device is received from the security broker. The security report is based on security data transmitted from the customer device to the security broker. An action can be performed in association with the attempted transaction based at least in part on the received security report. In some aspects, the security broker receives security data describing security conditions on the customer device in connection with the transaction between the customer device and a transaction partner. A risk tolerance policy is identified that corresponds to the transaction partner, such as an ecommerce provider. A security report is generated based on a comparison of the risk tolerance policy and the security data and the security report. | 06-19-2014 |
20140172707 | DYNAMIC AUTHENTICATION TECHNOLOGY - A request to perform a transaction is detected. Based on the request to perform the transaction, one or more factors related to a context in which the transaction is being requested are determined. Based on the one or more factors, one or more parameters for authenticating a user that requested performance of the transaction are determined. The user that requested performance of the transaction is authenticated based on the determined one or more parameters for authenticating the user that requested performance of the transaction. Based on to authenticating the user that requested performance of the transaction, performance of the requested transaction is allowed. | 06-19-2014 |
20140172708 | SYSTEMS AND METHODS FOR PROVIDING VIRTUAL CURRENCIES - Systems and methods for conducting reliable financial transactions, credit decisions, and security assessments are provided. Connectivity values may be assigned to members of a community by users, third parties, or automatically based on the frequency of interactions between members of the community. Connectivity values may represent such factors as alignment, reputation within the network community, or the degree of trust. Information about a financial transaction may be automatically published to other qualifying members of the community based on connectivity values. The other qualifying members may then be given the opportunity to participate in the same financial transaction or access the same financial application in order to initiate their own financial transaction, or to take action based on information about the financial transaction, credit decision, and/or security assessment. These transactions may also be based on virtual and/or electronic currencies. | 06-19-2014 |
20140172709 | System and Method for Independently Authorizing Auxiliary Communication Services - Systems and methods which determines the likelihood that a calling (or in some cases the called) user will pay for a particular auxiliary service are described. A system of an embodiment considers the user's credit risk and his/her propensity to pay, when deciding if the user is eligible for a particular auxiliary service. A methodology used for determining propensity to pay for an auxiliary service according to embodiments is independent from a determination of propensity to pay for a basic calling service. Thus, the criteria used, and the weight given to each criteria, for determining eligibility for auxiliary services can be different from the criteria and criteria weight used for basic communication connections. | 06-19-2014 |
20140172710 | SYSTEM AND METHOD FOR PAYING A MERCHANT BY A REGISTERED USER USING A CELLULAR TELEPHONE ACCOUNT - A system and method allows users to make purchases by charging or funding a prepaid debit card with their cell phone accounts by simulating a user roaming with their mobile device. | 06-19-2014 |
20140172711 | SYSTEM AND METHOD FOR PAYING A MERCHANT BY A REGISTERED USER USING A CELLULAR TELEPHONE ACCOUNT - A system and method allows users to make purchases by charging or funding a prepaid debit card with their cell phone accounts by simulating a user roaming with their mobile device. | 06-19-2014 |
20140172712 | Transaction Authorisation - A method for authorising a remote transaction comprises receiving a request to complete a remote transaction from a remote user, for example over the Internet. A telephone number of a telephone, in particular a mobile telephone, associated with the remote user is identified in a database. A subscriber identity associated with the telephone number is requested from a telephone network operator associated with the identified telephone number. The subscriber identity received from the network operator is compared with a stored subscriber identity associated with the remote user. If the received subscriber identity matches the stored subscriber identity authentication information is communicated with the remote user via the telephone. If the received subscriber identity does not match the stored subscriber identity additional identifying information is requested from the remote user. The method has the advantage of preventing fraudulent authorisation of the transaction by a fraudster redirecting the telephone number to their own telephone. | 06-19-2014 |
20140172713 | APPARATUS AND METHOD FOR INCREASED SECURITY OF WIRELESS TRANSACTIONS - A mobile communication device with security mechanisms is provided for enabling wireless personal information transfer with increased security. In another embodiment of the disclosure, a mobile communication device is used to confirm a transaction. | 06-19-2014 |
20140172714 | SYSTEM AND METHOD FOR DELEGATING MANAGEMENT OF A FINANCIAL TRANSACTION ACCOUNT TO A DESIGNATED ASSISTANT - Systems, methods and computer program products for enabling a holder of a transaction account linked to a financial transaction instrument to delegate management of the transaction account to an assistant. Information relating to the transaction account, including at least identification information relating to the holder of the transaction account, is stored in a database. The database stores financial transaction data relating to financial transactions performed using the financial transaction instrument. A designation of at least one assistant to manage the transaction account on behalf of the holder is accepted and stored. Assistant management authentication data associated with the transaction account is established, to be used by the assistant to execute management instructions at a designated level of management access. An instruction from the assistant is accepted to access transaction data associated with the transaction account. | 06-19-2014 |
20140172715 | SYSTEMS, METHODS, AND DEVICES FOR COMBINED CREDIT CARD AND STORED VALUE TRANSACTION ACCOUNTS - The present invention generally relates to a single transaction account identifier that can be used for in transactions with one of multiple transaction accounts. The method includes one or more of the following steps: establishing at least two transaction accounts, wherein the transaction accounts are respectively associated with transaction account identifiers; receiving, at a transaction processing system, a common account identifier; recognizing the common account identifier as being associated with more than one account; and determining, which of the at least two transaction accounts to access for processing the transaction. The determining step may be based on selection criteria and the selection criteria may be modified by a user. One of the first and second transaction account identifiers may be forwarded to the respective first and second transaction accounts based on the determining step; and the transaction may be processed via the selected transaction account. | 06-19-2014 |
20140172716 | Payment System and Method - In one embodiment, transferring payment between a first user and a second user of a communication system includes displaying a contact list in a user interface of a client executed at a user terminal of the first user, the contact list including the second user. The client retrieves and displays at least one page from a payment provider responsive to the first user selecting the second user from the contact list. The client transmits, to the payment provider, information related to the payment entered into the page by the first user, which causes the payment provider to transfer the payment from an account of the first user to an account of the second user. | 06-19-2014 |
20140172717 | AUTHENTICATION DATA-ENABLED TRANSFERS - Some embodiments may provide a method comprising receiving an identification of an entity from a payment requestor and receiving authentication data associated with the entity from the payment requestor, a combination of the authentication data and the identification including data operable to facilitate a transfer of value from a first account of the entity to a second account corresponding to the payment requestor. The data identifying the first account of the entity as being inaccessible to the payment requestor. | 06-19-2014 |
20140180920 | Method and system for improving client server transmission over fading channel with wireless location and authentication technology via electromagnetic radiation - Wireless personal area network (Zigbee, Bluetooth, UWB) and wireless identification technologies (Near Field Communication (NFC), Radio Frequency Identification (RFID)) are implemented in particular client server functions and communications. Connected with an Authentication Server, a wireless HUB authenticates user identification and provides the user with access to secure data communication with a wireless terminal such as a cellular phone or a PDA. A Location Server provides user locations via methods such as RSSI, TDOA, and GPS and sends location information to a Center Control Server and the Authentication Server. With location information, the Center Control Server initiates and optimizes secure information processes and coordinates the functions of servers and user terminals. | 06-26-2014 |
20140180921 | CASH PAYMENT FOR REMOTE TRANSACTIONS - Methods coordinate payment for a remote transaction with a first party. An identification of the first party is received at a host system. Acknowledgment of receipt of a cash payment from a second party is received. The cash payment is associated with the identification of the first party. A money transfer corresponding to the cash payment to the control of the first party is executed with a request for the first party to perform on previously agreed terms of the remote transaction. | 06-26-2014 |
20140180922 | ELECTRIC CHARGING APPARATUS AND CONTROL METHOD THEREOF - An electric charging apparatus and a control method thereof are provided. According to a method of operating a master charging apparatus which controls a plurality of slave charging apparatuses, the master charging apparatus receives payment information, transmits a payment approval message including the payment information to a payment server through an external communication network, and receives a payment approval through the external communication network from the payment server. When receiving the payment approval, the master charging apparatus transmits an electric vehicle charging instruction to a slave charging apparatus corresponding to the payment information among the plurality of slave apparatuses through an internal communication network. | 06-26-2014 |
20140180923 | TRANSACTION SYSTEM AND METHOD PERFORMED BY USING PERIPHERAL DEVICE - A transaction system and method of performing a transaction by using a peripheral device are provided. The method includes receiving transaction information from an external device, searching for a peripheral device when the transaction information is received, and performing the transaction with a transaction server by using information received from the searched peripheral device and the transaction information. | 06-26-2014 |
20140180924 | SYSTEMS AND METHODS FOR COST ALTERING PAYMENT SERVICES - Cost altering payment services (“CAPS”) system in association with a distributed enhanced payment (“DEP”) processing system includes a merchant point of sale (“POS”) terminal system and a remote enhanced payment management system (“EPMS”). The remote EPMS receives payment transactions including additional risk mitigating payment transaction (“RMPT”) information and based on that additional RMPT information provides altered transaction costs. The remote EPMS provides facilities for the merchant to review and revise payment management services so as to utilize additional RMPT information received from the merchant POS terminal system so as to alter transaction costs. Such facilities provide information to determine the relative potential transaction cost benefits of various payment management service sets utilizing cost profiles that represent the costs of archival, recorded and projected future transactions. The remote EPMS provides “transaction guidance” technology to be utilized by the merchant's POS terminal system to facilitate prompting for and acquiring additional RMPT information. | 06-26-2014 |
20140180925 | DELAYED SETTLEMENT TRANSACTIONS - Methods for deferring settlement of a transaction are disclosed. A server computer receives an authorization request message for a transaction. The server computer then receives an authorization response message for the transaction. The server computer then receives a deferred settlement indicator for the transaction. | 06-26-2014 |
20140180926 | REAL-TIME INDICATION TO REMITTANCE SENDER THAT REMITTANCE TRANSACTION FAILS - A method includes receiving, by a payment system a funds transfer request from an acquiring financial institution (FI) which includes an amount, recipient information, and funding account information identifying a funding FI, and transmitting a funds transfer authorization request to the funding FI. The payment system next receives an authorization response from the funding FI, determines that know your customer (KYC) and anti-money laundering (AML) requirements are satisfied, determines a receiving FI, transmits funds transfer information, and receives, from the receiving FI, confirmation of the validity and availability of a recipient's payment card account for receiving the funds transfer. In addition, the process includes the payment system transmitting a funds transfer in the amount to the recipient's payment card account at the receiving FI. | 06-26-2014 |
20140180927 | SYSTEM AND METHOD FOR FACILITATING ACCOUNT-BASED TRANSACTIONS - Systems, methods and apparatus are presented for facilitating account-based transactions. In an embodiment, the method includes associating a first person with an account, associating a second person with the account, receiving a request from a third party to authorize a transaction between the second person and the third party, determining a first communication address of the first party, and contacting the first party. The process also includes determining that the first person desires to communicate with the second person, determining a second communication address of the second person, initiating a communication between the first person and the second person, and receiving a signal from the first person that authorizes the transaction or declines the transaction. | 06-26-2014 |
20140188725 | FINANCIAL TRANSACTION SYSTEM WITH INTEGRATED ELECTRONIC MESSAGING, CONTROL OF MARKETING DATA, AND USER DEFINED CHARGES FOR RECEIVING MESSAGES - A method of performing financial transactions between users of accounts comprising electronic messaging and crediting and debiting of at least one financial account. The invention also allows each user to define a schedule of receipt charges associated with the identities of other users to be charged as compensation for accepting delivery of their messages. With the user's permission, a record of purchases made may be maintained in a marketing database, increasing the value of use's market identity and the corresponding value of receipt charges they user may collect. Major benefits of the invention include, but are not limited to: (1) electronic financial transactions are completed in a more secure manner with appropriate tracking and verification, (2) message recipients receive income from the value of their market identities, and (3) commercial enterprises can more readily identify individuals interested in receiving their commercial offers. | 07-03-2014 |
20140188726 | PAYMENT VALIDATION SYSTEMS AND METHODS - Example payment validation systems and methods are described. In one implementation, a request is received from a user to pay for an online order using an image of a negotiable instrument. Information associated with the negotiable instrument is identified from the image of the negotiable instrument. The identified information is communicated to a validation service. An indication is received from the validation service regarding whether the negotiable instrument is valid. If the negotiable instrument is valid, payment for the online order is processed using the image of the negotiable instrument. | 07-03-2014 |
20140188727 | MANAGEMENT OF EMAILED PAYMENT RECIPIENTS - An email payment system and method to provide users with the ability to initiate and send payments to one more recipients via email messaging. A user interface is provided in an email client that allows a user to insert payment with the email. Payment details are collected through one or more payment modals displayed in the email client. A payment object is inserted into the body of the email and is displayed to both the sender and recipient. The payment details captured in the payment object are communicated to a payment processor. The payment processor uses electronic payment accounts associated with the corresponding sender and recipient email addresses to identify the relevant electronic payment accounts and transfer the payment between said accounts. A status of the payment transaction is tracked and displayed within the payment object of the emails residing in both the sender and recipient email client. | 07-03-2014 |
20140188728 | SYSTEMS AND METHODS FOR PERFORMING FINANCIAL TRANSACTIONS - Systems, methods and computer-readable media for initiating, facilitating and/or performing financial transactions are disclosed. A request associated with a financial transaction may be received on behalf of a requestor. At least one financial account to be debited and at least one financial account to be credited in connection with the financial transaction may be identified based on information included or provided in association with the request. Respective payment networks that provide access to the financial accounts may be identified. One or more of the financial accounts may be accessible in real-time via a respective payment network. A respective debit or credit instruction may be transmitted to each of the identified payment networks to post a debit or credit to a corresponding financial account. Corresponding debit and/or credit status information may be received, and various status indications may be generated and transmitted, potentially for presentation to the requestor. | 07-03-2014 |
20140188729 | REMOTE NOTIFICATION AND ACTION SYSTEM WITH EVENT GENERATING - A method for managing event communications and actions is presented. The method comprises receiving and storing data representing a plurality of event categories for a plurality of events detectable on a plurality of electronic devices and receiving, from a particular electronic device, event data associated with a particular event occurring at the particular electronic device. Based, at least in part, on the event data and a plurality of event categories, for the particular event, a particular event category, from the plurality of event categories is determined. Based, at least in part, on the particular event category, one or more recipients and one or more actions associated with the particular event category are determined. For each recipient, if a preferred communications method with the recipient is specified, then a communication, specifying the particular event and the one or more actions, is transmitted to the recipient according to the preferred communications method. | 07-03-2014 |
20140188730 | SYSTEMS AND METHODS FOR AUTHENTICATING POTENTIALLY FRAUDULENT TRANSACTIONS USING VOICE PRINT RECOGNITION - Methods and systems are disclosed for providing fraudulent transaction processes. In one embodiment, a method is disclosed for performing fraudulent transaction processes that may include receiving an indication that a payment transaction has been identified as potentially fraudulent, the payment transaction involving a payment account associated with a user. The method may also include receiving a candidate voice print and comparing the candidate voice print to a user voice print that is associated with the payment account, The method may further include determining, based on the comparison, whether the candidate voice print matches the user voice print, and providing an indication whether the candidate voice print matches the user voice print, the indication configured for use to determine whether to approve or deny the payment transaction. | 07-03-2014 |
20140195428 | AUDIO-BASED ELECTRONIC TRANSACTION AUTHORIZATION SYSTEM AND METHOD - Methods and systems for facilitating and authorizing electronic transactions with various devices and systems are disclosed. Embodiments of the present invention utilize audio messages to initiate, process and complete transactions between two or more parties, allowing users to efficiently and effectively enter into and complete financial transactions with businesses and other users. The need to utilize text-based entry as part of the verification process—an inefficient, error-prone and insecure authorization mechanism—is minimized and, in some embodiments, avoided altogether. Unlike recently developed authorization methods, embodiments of the present invention may be implemented using any number of existing devices including, analog or digital televisions, radios, smartphones, tablets computers, and other devices. Embodiments of the present invention may also be utilized to facilitate authorization for various other transactions including to access to an account, website or other locations, to accept or propose trades, to sign a legal or non-legal document, and to verify identity. | 07-10-2014 |
20140195429 | METHOD FOR PROTECTING CARDHOLDER DATA IN A MOBILE DEVICE THAT PERFORMS SECURE PAYMENT TRANSACTIONS AND WHICH ENABLES THE MOBILE DEVICE TO FUNCTION AS A SECURE PAYMENT TERMINAL - A system and method system and method for enabling a portable electronic appliance such as a mobile telephone or tablet computer to be able to function as a device that may store account information in order to make a secure payment, or to be able to use the portable electronic appliance as a secure payment terminal so that a credit card holder may use it to make a secure payment. | 07-10-2014 |
20140195430 | APPARATUS AND METHODS FOR PROVIDING A PAYMENT SYSTEM OVER A NETWORK - Apparatus and methods provide an accumulator that processes electronic payments from an employer to a recipient via a network. The payments processed may be, for example, child support payments collected from an employee by the employer. The employer may submit one transaction made up of payments collected from multiple employees bound for multiple recipients and the accumulator may receive, translate, batch, and deliver the payments to the multiple recipients. The accumulator, employers, and recipients may communicate via a network such as the Internet. | 07-10-2014 |
20140195431 | Aggregate Constraints for Payment Transactions - This document describes tools capable of authorizing or enabling authorization of multiple payment transactions without requiring that a buyer or seller authorize each transaction separately. The tools may do so by enabling a buyer or seller to select aggregate constraints, such as a total price or number of transactions. Based on these selected constraints, the tools may authorize every payment transaction that meets the aggregate constraints without requiring the buyer to authorize every transaction separately. | 07-10-2014 |
20140195432 | SYSTEMS AND METHODS FOR PROCESSING PAYMENTS WITH PAYMENT REVIEW - Methods and systems of processing a plurality of payments. One method can include receiving the plurality of payments from a plurality of customers, the plurality of payments payable to at least one receiver, determining a first set of payments included in the plurality of payments to automatically accept based on validation parameters, determining a second set of payments included in the plurality of payments to reject based on the validation parameters, determining a third set of payments included in the plurality of payments to conditionally accept based on the validation parameters, and electronically prompting at least one user to accept or reject payments included in the third set of payments. | 07-10-2014 |
20140195433 | UPGRADING OF RECURRING PAYMENT CANCELLATION SERVICES - A method of reducing chargebacks due to a cancelled recurring payment, wherein the payment occurs within a card-based financial network, and wherein the network includes a database of unauthorized recurring charges and a defined chargeback procedure. The method generally includes the step of upgrading a recurring payment cancellation services file based on predefined occurrences relating to the identifying of cancelled recurring payments. | 07-10-2014 |
20140195434 | SYSTEM AND METHOD FOR PROVIDING ADVICE TO CONSUMER REGARDING A PAYMENT TRANSACTION - Systems, apparatuses, and methods for providing a consumer with an alert or other information regarding a payment transaction. When a consumer conducts a payment transaction, an alert may be sent to a device to enable the consumer to view the alert. The contents of the alert, the triggers for sending the alert, or the delivery channel for the alert may be determined by a set of preferences that the consumer set when registering for the alert service. In response to the alert, the consumer may send an SMS or other message that requests “help”, “advice”, “need information”, etc. In some embodiments, the consumer may select or activate a user interface element that enables them to obtain advice or information regarding the transaction. In some embodiments, a consumer request for help, advice, or more information may be generated by the consumer during or after a payment transaction. In response to the request for help, advice, or information, the invention may provide the consumer with a menu or list of topics of information that is available regarding the transaction. | 07-10-2014 |
20140195435 | METHOD AND SYSTEM FOR FACILITATING MICROPAYMENTS IN A FINANCIAL TRANSACTION SYSTEM - A system for processing accounts includes a database configured to store a plurality of accounts, the accounts including a consumer account associated with a consumer and a plurality of merchant accounts including a transacting merchant account associated with a merchant, wherein at least one account includes an amount of a virtual currency associated with the account. The system further includes a processor configured to process a financial transaction, wherein the transaction includes the consumer and the merchant, is for a specified amount of virtual currency, and processing the transaction includes transferring the specified amount of virtual currency from the consumer account to the transacting merchant account. The processor is further configured to process the at least one account, wherein processing the at least one account includes converting the associated amount of virtual currency to or from a real currency when the at least one account meets a predetermined criteria. | 07-10-2014 |
20140195436 | METHOD AND SYSTEM TO PROCESS CREDIT CARD PAYMENT TRANSACTIONS INITIATED BY A MERCHANT - A system, to process credit card payment transactions initiated by a merchant, includes an interface to receive a merchant-initiated request for a transfer of funds from a buyer credit card account. A credit card processing application initiates the transfer of funds from the buyer credit card account to a third-party merchant bank account, held by a third-party payment service. The third-party merchant bank account receives funds from the buyer credit card account on behalf of the merchant. A funds allocation application allocates the received funds to a receiving account of the merchant, the receiving account being maintained by the third-party payment service. The credit card processing application may be virtual point of sale (POS) terminal application, hosted at a server computer system operated by the third-party payment service, and accordingly may be accessible by the merchant via a network. | 07-10-2014 |
20140195437 | Method and apparatus for electronic transactions - Communication and a communications apparatus are controlled with a communication intermediating apparatus. Multiple methods of processing communication requests are provided. Decided rules comprising of pairs of identification information of communication requests and methods of processing are recorded beforehand. When a communication request is received, the identification of the communication request is distinguished, an applying rule is picked from the recorded rules, and the communication request is processed. A virtual account to be set maximum payment amount beforehand is used, and electronic transactions communication is done. | 07-10-2014 |
20140201076 | SYSTEMS AND METHODS FOR PROCESSING OFF-NETWORK TRANSACTION MESSAGES - A computer-implemented method for applying payment services to a payment transaction over a first payment network using a payment services computer system hosted on a second payment network is provided. The method includes receiving a service request at the payment services computer system from a requestor. The service request has a first format that is readable by the second payment network. The method includes determining, at the payment services computer system, the payment services the service request is registered to receive. The method includes processing the service request by applying the registered payment services to the service request. The method includes generating, at the payment services computer system, a services response. The services response is generated based on the registered payment services and the payment transaction data. The method additionally includes transmitting the services response to at least one of the cardholder and the requestor. | 07-17-2014 |
20140201077 | FRAUD DETECTION EMPLOYING PERSONALIZED FRAUD DETECTION RULES - Detection of fraud in financial transactions is facilitated. A financial transaction is initiated by a user, and based on the financial transaction, information is obtained by an electronic device of the user. Using the information, the electronic device evaluates a set of rules personalized for the user; the set of rules to be used to determine whether the financial transaction is to be approved for the user. The electronic device provides an initial indication, based on the evaluating, of whether the financial transaction is to be approved. | 07-17-2014 |
20140201078 | PAYMENT SYSTEM, PAYMENT TERMINAL, PAYMENT METHOD, PAYMENT PROGRAM, AND COMPUTER-READABLE RECORDING MEDIUM FOR RECORDING SAME PROGRAM - A settlement system includes a mobile terminal including a plurality of payment means for performing the payment process, and a reader/writer including an acquisition unit that sequentially inquires to the mobile terminal about each of a plurality of acceptable payment means and accepting a payment with one payment means specified among payment means confirmed to be present by the settlement acquisition unit by using a settlement unit corresponding to the one payment means, the mobile terminal further including a storage means that stores limitation information, and the reader/writer further includes a limitation information acquisition means that acquires the limitation information stored in the storage means, and an electronic money type narrowing down unit that stops inquiries by the acquisition unit when presence of payment means limited by the limitation information acquired by the limitation information acquisition means is confirmed by the acquisition unit. | 07-17-2014 |
20140201079 | TRANSACTION PROCESSING - A transaction processing system for the real time authorization of payment transactions. The system comprises a verification system ( | 07-17-2014 |
20140201080 | SYSTEMS AND METHODS FOR PROCESSING CUSTOMER PURCHASE TRANSACTIONS USING BIOMETRIC DATA - A system and method is provided for processing customer purchase transactions using biometric data. Consistent with disclosed embodiments, a processing entity receives biometric data of a customer, wherein the biometric data is unique to the customer. The processing entity may additionally receive transaction data, the transaction data reflecting the price of a purchase transaction by the customer. The processing entity may compare the received biometric data to stored biometric data associated with customers of a financial service provider and identify common biometric data. Additionally, the processing entity may correlate the common biometric data to a customer account associated with the financial service provider, compare the customer account associated with the financial service provider with the transaction data, and verify the customer account associated with the financial service provider contains adequate funds. Furthermore, the processing entity may authorize the purchase transaction. | 07-17-2014 |
20140201081 | PRESENTING A DOCUMENT TO A REMOTE USER TO OBTAIN AUTHORIZATION FROM THE USER - The present invention is directed to receiving a signature (or other type of verification or confirmation) from a remote user. The present invention enables a merchant to send a signature request over a network to any device having a browser and touch screen or other means for receiving user input. An input area is displayed within the browser on the user's device. When the user inputs a signature (or other form of user input acting as authorization), the signature can be routed over a network back to the merchant to provide authorization for a transaction. Various forms of authentication can be used to verify the identity of the user providing authorization for the transaction. A document can be presented to a remote user in conjunction with a request for authorization input from the user. | 07-17-2014 |
20140201082 | SYSTEMS AND METHODS FOR ENHANCED AUTHORIZATION FRAUD MITIGATION - A consumer uses a web client to transmit purchase information associated with a transaction to a merchant server. The purchase information is transmitted via a web acceleration server. The web acceleration server identifies enhanced authorization data associated with the transaction. The web acceleration server creates a pseudo authorization message. The web acceleration server transmits the pseudo authorization message to a transaction account issuer. The merchant server transmits an authorization request to the transaction account issuer. The transaction account issuer determines that the authorization request and the pseudo authorization message are associated with the same transaction. The transaction account issuer merges the authorization request and the pseudo authorization message and performs a fraud analysis. The transaction account issuer transmits an authorization response to the merchant. | 07-17-2014 |
20140207675 | METHOD AND APPARATUS FOR INITIATING A TRANSACTION ON A MOBILE DEVICE - A method and apparatus that improves the operation of treasury management functionality for a cash positioning and reporting system is provided. Several portions of the payment process may be improved. The initiation process may be streamlined by providing supplemental contact information. Transactions may be initiated from trusted templates or groups of templates. Likewise transfers between internal accounts may be created. At each stage of the process views of current transaction/transfer initiations may be viewed. Transactions that have been successfully initiated may be confirmed. Incomplete or unsuccessful initiation may be reconciled for further action by a user. Templates and transfers may be grouped and sorted. | 07-24-2014 |
20140207676 | PORTABLE BANDWIDTH ROUTER - Systems and methods are disclosed for a user to share bandwidth among multiple devices, and for a sharing device to share available bandwidth among different users. The bandwidth sharing platform can leverage social network techniques to facilitate user access, and sharing is incentivized by rewarding various types of sharing activity. | 07-24-2014 |
20140207677 | PORTABLE BANDWIDTH - Systems and methods are disclosed for a user to share bandwidth among multiple devices, and for a sharing device to share available bandwidth among different users. The bandwidth sharing platform can leverage social network techniques to facilitate user access, and sharing is incentivized by rewarding various types of sharing activity. | 07-24-2014 |
20140207678 | DISBURSEMENT AND SETTLEMENTS SYSTEM AND METHOD - A system conducts online person-to-person monetary transactions between individuals or between individuals and entities such as banks, merchants or other companies. An individual establishes an electronic payment user interface associated with an entity which gives access to an online system used to transact money transfers. Any user can complete a receipt or a payment transaction directly with any other person or entity in real-time and at any time and from anywhere providing that each user operates an account from or to which money can be received or disbursed. | 07-24-2014 |
20140207679 | ONLINE MONEY TRANSFER SERVICE IN CONNECTION WITH INSTANT MESSENGER - The disclosure is related to performing online money transfer operation in connection with an instant messenger installed in and executed by user equipment. First user equipment may monitor messages transmitted to and received from second user equipment through the instant messenger upon initiation of the online money transfer operation. The first user equipment may obtain information on an online money transfer event upon detection of a predetermined service initiation word based on the monitoring result. The first user equipment requests a service server to perform the online money transfer operation based on the obtained information. | 07-24-2014 |
20140207680 | SYSTEM AND METHOD FOR PROVIDING A MOBILE WALLET SHOPPING COMPANION APPLICATION - A system and method in accordance with example embodiments may include systems and methods for providing a mobile wallet shopping companion application. In an example embodiment, a method for providing a mobile wallet shopping companion application includes, receiving, via a network, confirmation of a transaction using a financial account; receiving, via a network, data relating to both the financial account and a customer associated with the financial account; and transmitting, via a network, processing the data relating to the financial account and the customer associated with the financial account in order to create a tailored offer and/or targeted data for the customer. | 07-24-2014 |
20140207681 | SYSTEM AND METHOD FOR ENHANCED PROTECTION AND CONTROL OVER THE USE OF IDENTITY - A method of protecting use of an entity's identity is provided. The method comprises setting a status of the identity to a first slate, the first state defining a scope of permitted use of the identity, changing, in advance of an intended use of the identity, the status to a second state defining a scope of permitted use of the identity that is different from the first state, requesting use of the identity after the changing; and returning, after the requesting, the state back to the first state. | 07-24-2014 |
20140207682 | SYSTEMS AND METHODS FOR CONTACTLESS TRANSACTION PROCESSING - Systems and methods for performing mobile commerce transactions using mobile devices. A transaction initiation request is received at a transaction server from a merchant device. The transaction server generates a transaction identifier, which is transmitted to the merchant device. The merchant device communicates the transaction identifier to a customer device. The customer device transmits the transaction identifier to the transaction server and authorizes the transaction with the transaction server. | 07-24-2014 |
20140207683 | COMBINATION PAYMENT CARD AND METHODS THEREOF - Systems and methods for processing payment transactions using combination payment cards. The combination payment card is associated with an open-loop account and one or more closed-loop accounts. Transaction information is received from a point-of-sale device. At least one of the closed-loop and open-loop account is debited. | 07-24-2014 |
20140207684 | METHOD AND SYSTEM FOR PAYMENT AUTHORIZATION AND CARD PRESENTATION USING PRE-ISSUED IDENTITIES - Systems and methods for authenticating a party are disclosed. A transaction may be initiated between a relying party and a presenter. The relying party can send the presenter a message with transaction information and requirements for authentication. The presenter can forward the message to a third party, which can authenticate the presenter to the relying party. | 07-24-2014 |
20140207685 | MONEY TRANSFER SMART PHONE METHODS AND SYSTEMS - A method of implementing collaborative funds transfer includes receiving, by a host computer system, from an entity a collaborative funds transfer request for a relief effort to be executed within a collaborative environment. The methods further includes verifying, by the host computer system, validity of the entity, receiving funds provided to the entity via the collaborative environment, reviewing services offered within the collaborative environment, reviewing communications regarding the funds transfer within the collaborative environment, and transferring the funds to the entity. | 07-24-2014 |
20140214669 | Methods for Reducing the Merchant Chargeback Notification Time - A method is provided of alerting a merchant after completion of a transaction that the payment instrument used for the transaction has been identified as being suspect. A reporting processor receives payment instrument indicia regarding payment instruments which have been used for completion of transactions by the merchant, and payment instrument indicia regarding payment instruments which have been identified as being suspect. The reporting processor compares the payment instrument indicia which have been used for completion of transactions by the merchant with the payment instrument indicia which have been identified as being suspect to identify matching payment instrument indicia. The matching payment instrument indicia is associated with suspect payment instrument indicia used by the merchant for completion of the transaction. An electronic communication is provided to the merchant regarding any identified suspect payment instrument indicia. In this manner, the merchant can automatically suspend delivery of a good or service associated with the transaction if payment is suspect. | 07-31-2014 |
20140214670 | METHOD FOR VERIFYING A CONSUMER'S IDENTITY WITHIN A CONSUMER/MERCHANT TRANSACTION - A method for verifying a consumer's identity in connection with a consumer/merchant transaction, including receiving a user-identifier from a user, receiving a unique device identifier from an electronic device associated with the user, associating the user-identifier and the unique device identifier of the user to a user account residing on a secured transaction server (“STS), the STS not operated by the merchant and including an identity verification agent. The method further includes receiving a consumer identity verification request at the STS, receiving a unique device identifier associated with an electronic device of the consumer at the STS, comparing, through the identity verification agent, the user's unique device identifier and the consumer's unique device identifier to determine at least one of a positive or negative user-identity verification, and then communicating to the merchant the at least one of the positive or negative user-identity verification. | 07-31-2014 |
20140214671 | SERVER SIDE MOBILE PAYMENT PROCESSING AND AUTHENTICATION - A web browser inserts a user-neutral identifier into its webpage requests. A proxy server creates records of the webpage requests, and further processes these records to create and update profiles for the corresponding user-neutral identifiers. Upon receiving a webpage request including payment transaction information, which is redirected from a payment provider, the proxy server determines whether payment should be processed by analyzing one or more data elements in the request in view of the corresponding profile. Upon determining that the payment should be processed, the proxy server forwards the payment transaction information to a payment provider. By indexing the profiles according to user-neutral identifiers, rather than specific user information, user privacy can be maintained while still being able to authenticate whether a payment transaction is legitimate. | 07-31-2014 |
20140214672 | SELF-SERVICE TRANSACTION AND AUTOMATIC EMERGENCY HEDGE SYSTEM - A self-service transaction and automatic emergency hedge system, including an emergency signal generation module ( | 07-31-2014 |
20140214673 | METHOD FOR AUTHENTICATION USING BIOMETRIC DATA FOR MOBILE DEVICE E-COMMERCE TRANSACTIONS - Generally, this disclosure describes authentication using biometric data for mobile device e-commerce transactions. A method may include capturing a mobile device user's biometric data; comparing the captured biometric data to authorized user biometric data stored on the mobile device; and authenticating an e-commerce transaction if the captured biometric data corresponds to the authorized user biometric data stored on the mobile device. | 07-31-2014 |
20140214674 | METHOD AND SYSTEM FOR CONDUCTING SECURE TRANSACTIONS WITH CREDIT CARDS USING A MONITORING DEVICE - A system is presented for performing secure transactions, the system including a payment member, such as a payment card, a monitoring device monitoring that the payment member is physically near the monitoring device and a portable communication device, such as a cell phone, used to communicate with a credit card server. The monitoring device checks to see if it can establish a close range communication link with the payment member and the sends information to the credit card server permitting transactions to be completed. The customer associated with and carrying the payment member, the monitoring device and the portable communication device is authenticated using a biometric sensor in the monitoring device. | 07-31-2014 |
20140214675 | PUSH PAYMENT SYSTEM AND METHOD - Embodiments of the invention introduce systems and methods for using a payment processing network to conduct transactions between accounts not associated with the payment processing network. One embodiment of the invention discloses a method for conducting a funds transfer transaction. The method comprises receiving a recipient bank identifier and a recipient account identifier associated with a recipient account, determining a recipient bank primary account number (PAN) using the recipient bank identifier, generating an authorization request message comprising the recipient bank PAN and the recipient account identifier, sending an authorization request message for a transaction to a recipient bank computer, wherein the recipient bank PAN is used to route the authorization request message to the recipient bank computer, and receiving an authorization response message. | 07-31-2014 |
20140214676 | Automatic Learning Fraud Prevention (LFP) System - A computerized learning fraud prevention system and method for generating a voice signature of a user, such as one engaged in electronic commerce, to prevent fraudulent activities by machines and persons imitating the user. Steps comprise: fetching a signal of a user's signature stored in memory; generating at least one challenge sequence based on the signal to create a second signature; presenting the generated challenge sequence to the user; collecting the user's challenge voice response to the generated challenge sequence; computing a quality factor between the user's challenge response and the generated challenge sequence; computing a transaction quality factor and content quality factor and reporting an impostor or re-challenging if the quality factor is below a threshold. Lastly, generating new signature based on any portion of user's challenge voice response and/or any portion of the previously generated signature and/or any portion of collectable information from user's device memory. | 07-31-2014 |
20140214677 | REMITTANCE SYSTEM WITH IMPROVED SERVICE FOR UNBANKED INDIVIDUALS - A service provider computer receives a request for a transfer of a remittance amount from a sender's payment card account to a recipient without an account. The service provider computer transmits a transaction authorization request and a hold on the sender's payment card account for the remittance amount via a payment card system to the sender's financial institution (FI), receives transaction request approval, and establishes a transaction data record. The service provider computer then transmits the transaction identification code to the sender, receives a transaction identification code and a transaction data record validity request from a receiving FI, provides the transaction data record, and receives the transaction identification code and a newly issued recipient payment card account number from the receiving FI. The service provider computer then initiates a payment transaction in a payment card system to route the remittance amount from the sender's payment card account to the recipient's newly issued payment card account. | 07-31-2014 |
20140214678 | ONLINE PAYMENT - The present disclosure relates to computing systems that support authorization of payments to online merchants. The computer receives from the merchant or a financial institution of the merchant (merchant FI) a payment request. The computer determines a customer FI and sends the payment request to the customer FI to cause the customer FI to send to the customer an authorization code. The computer then receives an authorization request associated with the payment having the authorization code as provided by the customer to the merchant. The computer determines the customer FI and sends the authorization request to the customer FI to cause the customer FI to verify the authorization code. In reply the computer receives from the customer FI an authorization confirmation for the payment and sends the authorization confirmation to the merchant or merchant FI. | 07-31-2014 |
20140214679 | SYSTEM AND METHOD FOR PROCESSING TRANSACTIONS - A method, computer program product, and computer system for receiving a first scan of an identifier from a first computing device is disclosed. The identifier is associated with a financial transaction. A second scan of the identifier is received from a second computing device. The financial transaction is processed based upon, at least in part, receiving the second scan of the identifier from the second computing device. | 07-31-2014 |
20140214680 | SYSTEM AND METHOD FOR CHECKLESS CASH ADVANCE SETTLEMENT - Methods, devices, and systems for conducting a checkless cash access settlement are provided. In one embodiment, a cash advance method includes the following: a customer initiates a cash access transaction with a financial card via a cash access system; the customer receives authorization or denial; the customer provides identification and the financial card to a cashier or attendant; the cashier or attendant validates the customer's identity, retrieves the transaction information, and completes the cash advance application; the application prints a non-negotiable instrument, such as a transaction receipt; the customer signs the receipt confirming the transaction with a physical receipt or electronic capture; the receipt image is stored electronically for subsequent transmittal to a central server; the transaction information, including the receipt image if applicable, is recorded on the central server; and the central server generates an ACH file and electronically transmits the ACH file to a designated financial institution. | 07-31-2014 |
20140214681 | PRODUCT LEVEL PAYMENT NETWORK ACQUIRED TRANSACTION AUTHORIZATION - A flexible spending account system can be implemented according to one embodiment of the invention so as to automatically substantiate purchases made at a retailer merchant. For example, according to one embodiment of the invention, a method of authorizing products for purchase can be implemented by determining via a computer that a product requested for purchase at a point of sale by a consumer matches a qualified product category under the flexible spending account, sending an authorization request message for requesting use of said flexible spending account of said consumer, wherein said authorization request message comprises a total purchase amount field and a first qualified amount field for a first type of qualified items. | 07-31-2014 |
20140222675 | System and method for enabling anonymous money transfer - A method for enabling the transfer of currency between two parties that is comprised of an electronic application through which a receiver specifies the amount of money requested on a device, the device relays this information to a web server, which organizes this information and sends it to a central database which generates a unique transaction ID that is sent back to the web server and back to the device. The device translates this ID into a QR code, the payer scans the QR code, their device passes the ID through a web server and security filters for verification, routes the request to a central database, and executes the requested transfer without compromising the identities of either party. The application can be run on any compatible electronic platform and implements varying security verification techniques based on user preference. | 08-07-2014 |
20140222676 | MOBILE PAYMENT METHOD, SYSTEM AND DEVICE USING HOME SHOPPING - The present embodiment relates to a mobile payment method, system and device using home shopping, wherein OTP (One Time Password) information is verified through a telephone conversation with an agent, ARS or a webpage, depending on the method for purchasing the specific merchandise chosen by the user in the process of executing a mobile payment using home shopping, and electronic payment is executed more rapidly and securely thereby. The present embodiment also relates to a mobile payment method, system and device adapted for transmission using an applicable payment device, without need for direct user input of OTP (One Time Password) information based on payment-means information chosen by the user in the process of executing a mobile payment using a terminal, and adapted to allow the execution of more secure payments through verification in accordance with the selected payment means. | 08-07-2014 |
20140222677 | METHODS AND SYSTEMS FOR VERIFYING TRANSACTIONS - An aspect of the present invention provides a computer-implemented method for verifying authorisation of a transaction. The method comprises the steps of: receiving a request to process an electronic transaction for a predetermined amount of money ( | 08-07-2014 |
20140222678 | SYSTEM AND METHOD FOR AUTHENTICATION USING SPEAKER VERIFICATION TECHNIQUES AND FRAUD MODEL - Embodiments of the invention provide for speaker verification on a communication device without requiring a user to go through a formal registration process with the issuer or network. Certain embodiments allow the use of a captured voice sample attempting to reproduce a word string having a random element to authenticate the user. Authentication of the user is based on both a match score indicating how closely the captured voice samples match to previously stored voice samples of the user and a pass or fail response indicating whether the voice sample is an accurate reproduction of the word string. The processing network maintains a history of the authenticated transactions and voice samples. | 08-07-2014 |
20140222679 | Method and Apparatus to Validate a Subscriber Line - A method is described of providing validation data associated with a subscriber line of a telecommunication network. The method includes obtaining line data of the subscriber line wherein the line data is suitable for interrogating a line identification database (LIDB). The method interrogates the LIDB with the line data to obtain reference subscriber data associated with the line data, and processes the reference subscriber data to obtain validation data associated with the subscriber line. The invention extends to a subscriber line validation system to validate a subscriber line of a communication network. | 08-07-2014 |
20140222680 | APPARATUS, SYSTEM AND METHOD FOR SECURE TRANSACTIONS AND MONITORING IN A RETAIL ENVIRONMENT - An apparatus, system method of providing mobile checkout. The apparatus, system and method may include obtaining, via an opt-in to an in-store wireless network, of consumer device data regarding a plurality of consumer mobile devices, the consumer data comprising device use data, prior purchase data, and GPS data, receiving video surveillance data related to at least one consumer having consumer device data, interrelating, from at least one non-transitory computer-readable medium storing at least the consumer device data and the video surveillance data, of at least the consumer device data and the video surveillance data by at least one computing processor, and applying, by the computing processor, of a plurality of business rules to the interrelated datas to enable at least the mobile checkout, wherein the mobile checkout includes a purchase of at least one in-store item via the consumer device associated with the purchasing one of the at least one consumer. | 08-07-2014 |
20140222681 | ONLINE PAYMENT SYSTEM AND METHOD - System, method, and computer program product are provided for a user to send and receive P2P payments using the Internet. Through the use of a network, a user may access accounts the user has at a financial institution and direct payments to other individuals or entities using the other individuals or entities alias. In this way, the user may ensure a secure payment to a third-party through the network associated with a financial institution. The payments may be directed to individuals the user may input into the system by providing the user's alias. A user's alias may be a unique identifier of the user and tied to a financial account of that user. In this way, the sender of the P2P payments may input the recipient's alias and transfer funds via the P2P payment system without having to input the recipient's account information. | 08-07-2014 |
20140222682 | PROVISIONING A MOBILE COMMUNICATION DEVICE WITH ELECTRONIC CREDENTIALS - A novel system and methodology for conducting financial and other transactions using a wireless device. Credentials may be selectively issued by issuers such as credit card companies, banks, and merchants to consumers permitting the specific consumer to conduct a transaction according to the authorization given as reflected by the credential or set of credentials. The preferred mechanism for controlling and distributing credentials according to the present invention is through one or more publicly accessible networks such as the Internet wherein the system design and operating characteristics are in conformance with the standards and other specific requirements of the chosen network or set of networks. Credentials are ultimately supplied to a handheld device such as a mobile telephone via a wireless network. The user holding the credential may then use the handheld device to conduct the authorized transaction or set of transactions via, for example, a short range wireless link with a point-of-sale terminal. | 08-07-2014 |
20140222683 | FINANCIAL INSTRUMENT HAVING LOAN PROCEEDS AND PRE-PAID CHARACTERISTICS - Financial methods and systems for using a financial instrument are disclosed. A financial account includes both a loan balance portion and a pre-paid cash balance portion. The loan balance portion and the pre-paid cash balance portion are used in performing a purchase transaction. The purchase transaction is initiated by the account holder using the financial instrument. A prioritization scheme is selected that indicates an order of priority of the loan balance portion and the pre-paid cash balance portion of a financial account. A purchase amount is applied to the financial account according to the prioritization scheme. A transaction fee is not charged by the financial institution when any portion of the loan balance portion is applied to the purchase amount. And, a transaction fee is charged by the financial institution when no portion of the loan balance portion is applied to the purchase amount. | 08-07-2014 |
20140236821 | METHOD AND SYSTEM FOR THE TRANSMISSION OF AUTHENTICATED AUTHORIZATION REQUESTS - A method for verifying the source of an authorization request includes: storing an integrated circuit card (ICC) master key; receiving an authorization request for a transaction, wherein the request includes an ICC dynamic number, and the ICC dynamic number is extracted from signed data, based on the ICC master key, generated by a payment card during combined data authentication (CDA); verifying the authenticity of the ICC dynamic number using the stored ICC master key; and transmitting the authorization request to a third party. A method for transmitting an authentic authorization request includes: storing payment card data, the data including an ICC master key associated with the payment card; authenticating the card data using CDA to generate signed data; extracting, from the signed data, an ICC dynamic number based on the ICC master key; and transmitting an authorization request for a transaction, the request including the extracted ICC dynamic number. | 08-21-2014 |
20140236822 | SYSTEM AND METHOD FOR VEHICULAR FLEET MANAGEMENT - A method for effecting a transaction between a vendor and a customer comprises: transmitting to the purchaser information related to at least one of a vendor service and a vendor commodity selected by the customer; notifying the vendor of tagged funds established in a purchaser bank for payment of at least one of the vendor service and vendor commodity; verifying a delivery to the customer of at least one of the vendor service and vendor commodity; and in response to the step of verifying a delivery, initiating a transfer of the tagged funds | 08-21-2014 |
20140236823 | Online Prepaid Gift Card Identification - Methods and systems are provided for authorizing online purchase transactions made with non-reloadable prepaid cards, such as gift cards. An online purchase transaction using a non-reloadable prepaid card can be identified by performing a balance inquiry and an Address Verification System (AVS) inquiry. If the balance inquiry results in a positive balance and the AVS inquiry returns an indication that the billing address is not supported and/or that information is not available, then the card being authorized can be identified as the non-reloadable prepaid gift card. | 08-21-2014 |
20140236824 | METHOD TO DETECT AND CONTROL UNWANTED OUTGOING PAYMENT SERVICES USAGE IN SMART DEVICES - In the method of the invention an outgoing payment service is requested by an application running on a smart device and it comprises the development of specific software residing in said smart device and the mobile network to control and detect if said outgoing payment service has the corresponding authorization and can be executed or if it is part of a fraud. | 08-21-2014 |
20140236825 | APPARATUS AND METHODS FOR PROVIDING A PAYMENT SYSTEM OVER A NETWORK - Apparatus and methods provide an accumulator that processes electronic payments from an employer to a recipient via a network. The payments processed may be, for example, child support payments collected from an employee by the employer. The employer may submit one transaction made up of payments collected from multiple employees bound for multiple recipients and the accumulator may receive, translate, batch, and deliver the payments to the multiple recipients. The accumulator, employers, and recipients may communicate via a network such as the Internet. | 08-21-2014 |
20140236826 | APPARATUS AND METHODS FOR PROVIDING A PAYMENT SYSTEM OVER A NETWORK - Apparatus and methods provide an accumulator that processes electronic payments from an employer to a recipient via a network. The payments processed may be, for example, child support payments collected from an employee by the employer. The employer may submit one transaction made up of payments collected from multiple employees bound for multiple recipients and the accumulator may receive, translate, batch, and deliver the payments to the multiple recipients. The accumulator, employers, and recipients may communicate via a network such as the Internet. | 08-21-2014 |
20140236827 | RESTRICTED USE CURRENCY - A first method comprises receiving at a computer apparatus an authorization request message comprising a first merchant identifier. The request message may also comprise an account identifier associated with an account and a first transaction amount for a first transaction conducted with a first merchant. The first method further comprises determining, by the computer apparatus, if an account comprises merchant specific currency associated with the first merchant that may be used to conduct the first transaction. It may then be determined if there is sufficient merchant specific currency associated with the first merchant in the account to pay for the first transaction amount. If there is insufficient merchant specific currency associated with the first merchant to pay for the first transaction amount, then non-specific currency in the account is applied automatically to a remainder of the first transaction amount. | 08-21-2014 |
20140236828 | SYSTEMS AND METHODS FOR SECURE AND TRANSPARENT CARDLESS TRANSACTIONS - Systems, methods, and apparatus for handling and/or authorizing payment requests by a consumer for a transaction are provided. Payment information can be sent directly from a consumer to a non-merchant, thereby allowing no new entities to obtain the payment information. Transaction identifiers can be used to facilitate communications among the entities. The payment information can be sent to the non-merchant via a merchant application with a submit payment button directed to the non-merchant so little or no deviations from standard practices are required. | 08-21-2014 |
20140236829 | ITERATIVE PROCESSING OF TRANSACTION INFORMATION TO DETECT FRAUD - A fraud management system is configured to store rules for detecting fraud, receive a transaction from a merchant, process the transaction using a first subset of rules to generate a fraud score for the transaction, and output information regarding the fraud score to the merchant to assist the merchant in determining whether to accept, deny, or fulfill the transaction. The fraud management system is further configured to receive, after outputting the information regarding the fraud score to the merchant, additional information relating to the transaction, re-process the transaction using a second subset of rules to generate an update fraud score, and output information regarding the updated fraud score to the merchant to assist the merchant in determining whether to accept, deny, or fulfill the transaction. | 08-21-2014 |
20140236830 | MANAGING RECURRING PAYMENTS FROM MOBILE TERMINALS - Equipments and methods are disclosed for facilitating service provisioning in a system that comprises a payment processor, a number of service providers and a mediator that mediates information exchange between the payment processor and service providers, and a mobile terminal operated by payment card holder. In some implementations, service provisioning can be facilitated in cases wherein the payment processor must reside in a strictly regulated Payment Card Industry (PCI) compliant environment and the service providers operate servers that are not PCI-compliant. | 08-21-2014 |
20140236831 | CREDIT CARD SYSTEM AND METHOD - A credit card system is provided which has the added feature of providing additional limited use credit card numbers and/or cards. These numbers and/or cards can be used for a single or limited use transaction, thereby reducing the potential for fraudulent reuse of these numbers and/or cards. The credit card system finds application to “card remote” transactions such as by phone or Internet. Additionally, when a single use or limited use credit card is used for “card present” transactions, so called “skimming” fraud is eliminated. Various other features enhance the credit card system which will allow secure trade without the use of elaborate encryption techniques. Methods for limiting, distributing and using a limited use card number, controlling the validity of a limited use credit card number, conducting a limited use credit card number transaction and providing remote access devices for accessing a limited use credit card number are also provided. | 08-21-2014 |
20140236832 | METHODS AND SYSTEMS FOR VALIDATING NEGOTIABLE INSTRUMENTS - Methods and systems for validating a negotiable instrument. One method can include obtaining an electronic image of the negotiable instrument, electronically determining a first value and a second value of the negotiable instrument based on the electronic image, and automatically validating the negotiable instrument if the first value is substantially equal to the second value. | 08-21-2014 |
20140236833 | TRANSACTION METHOD BASED ON THE GENETIC IDENTITY OF AN INDIVIDUAL AND TOOLS RELATED THEREOF - The current invention relates to a method for establishing a transaction between an individual and a third party, based on the genetic identity of an individual, characterized in that said individual allows third party to access and analyze only a subset of said genetic identity, required for the offer and establishment of the transaction. In a second aspect, the invention discloses tools for the analysis of the genetic identity of individuals. | 08-21-2014 |
20140244502 | MULTI-PLATFORM IN-APPLICATION PAYMENT SYSTEM - Systems and methods for providing multi-platform, in-application payments include transferring funds, by a payment service provider device, from a funding source to a payment account in response to receiving a first fund transfer instruction from one of a first user device and a second user device over a network. The payment service provider device then associates the payment account with a first platform application in response to receiving a first association instruction from the first user device over the network, and associates the payment account with a second platform application in response to receiving a second association instruction along with the user account information from a second user device over the network. The payment service provider device will pay for each of a first in-application purchase associated with the first platform application and a second in-application purchase associated with the second platform application using the payment account. | 08-28-2014 |
20140244503 | SYSTEM AND METHOD FOR AUTOMATIC THRESHOLDING FOR PAYMENT CARD SPEND CONTROL - A method for providing an automatic threshold for payment card controls includes: storing historical data for financial transactions involving a payment card; receiving an automatic threshold request, the request including a threshold model and a card use control; identifying a use threshold associated with the card use control based on an application of the threshold model to the historical data; receiving an authorization request for a financial transaction involving the payment card, the request including transaction data related to the financial transaction; and identifying if the use threshold is exceeded based on the transaction data and the card use control, wherein if the use threshold is exceeded, transmitting an authorization response indicating the threshold has been or will be exceeded by the financial transaction, and, if the use threshold is not exceeded, transmitting, an authorization response indicating approval with respect to not exceeding the threshold of the financial transaction. | 08-28-2014 |
20140244504 | METHODS AND SYSTEMS FOR PROCESSING ELECTRONIC TRANSACTIONS AND MANAGING VEHICLE COSTS - A computer-implemented method for performing an electronic transaction over a payment network system is provided. The transaction is initiated by a cardholder using a cardholder computer device in communication with a merchant computer device of a merchant, wherein the cardholder computer device is associated with a vehicle. The method includes receiving first merchant data at the cardholder computer device when the vehicle is located within a predetermined distance of the merchant computer device. The cardholder is prompted to select a purchase item from first merchant data. The method includes transmitting purchase data including at least one of an account data and a purchase item data to the merchant computer device, wherein the merchant computer device is configured to generate a payment authorization request message. The cardholder computer device receives a confirmation message in response to the authorization request message. | 08-28-2014 |
20140244505 | APPARATUSES, METHODS AND RECORDING MEDIUM FOR CONTROL PORTABLE COMMUNICATION TERMINAL AND ITS SMART WATCH - Disclosed are an apparatus, a method, and a recording medium for controlling a portable communication terminal and a smart watch of the portable communication terminal, which control an operation of a display unit only when a user obtains information on a movement of the smart watch from a sensor installed in the smart watch and view the smart watch. | 08-28-2014 |
20140244506 | DYNAMIC PAYMENT AUTHORIZATION SYSTEM AND METHOD - A computer program, system, and method for facilitating payment processing, including requesting authorization information from a user, with the authorization information confirming that the user intends to complete a payment transaction at a payment terminal. After initial authorization information is received, transaction information is received, with the transaction information being indicative of the payment transaction being initiated at the payment terminal. Finally, the authorization information is compared with transaction information, and based on the result of the comparison, the payment transaction is either allowed or disallowed. | 08-28-2014 |
20140244507 | OFFLINE TRANSACTION - An electronic device, including a code creator for creating a machine-readable transaction code for identifying an information transaction between the electronic device and a second electronic device, the transaction code including information on a first security document and on one or more first identifiers for uniquely identifying the transaction, and a communication unit for providing the transaction code to be receivable by the second electronic device. | 08-28-2014 |
20140244508 | Prepaid Micropayments Solution - An infrastructure and method for making online payments without the use of a credit card is disclosed. The infrastructure includes a prepaid technology module for receiving information related to a purchased pre-paid card. The prepaid technology module stores at least one of a PIN number and a serial number associated with a plurality of pre-paid cards. The infrastructure also includes a interface for receiving information from the consumer, related to the purchased pre-paid card, and a digital settlement network for receiving a purchase request from a consumer, the digital settlement network further for authenticating the purchased pre-paid card. | 08-28-2014 |
20140244509 | METHOD AND APPARATUS FOR DISTRIBUTION OF MONEY TRANSFERS - A method for performing transactions comprises receiving registration information and money transfer transaction specifications, generating a distribution profile based on the registration information, and storing the money transfer transaction specifications in the distribution profile. The distribution profile is identified based on an initiation instruction and associated user authentication data, and one of the money transfer transaction specifications in the distribution profile is identified based on the initiation instruction. Payment source status is verified according to the identified money transfer transaction specification, and a staged send transaction is initiated, based on the payment source status at the time the send transaction is initiated. | 08-28-2014 |
20140244510 | PRIVACY PROTECTION SYSTEM AND METHOD - Disclosed herein are privacy protection systems and related methods for providing subscribers of the system or method, such as credit card issuers, banks, etc., independent verification of the identity of individuals attempting to do business with the subscriber. The independent verification disclosed herein does not rely solely on the information accessible or maintained by an entity that issued a piece of identification data to the individual. Instead, disclosed systems and methods may not only check with the entity that issued the piece(s) of identification data presented by a user to identify himself, but also may review the records of that issuing entity such that older records can be actively compared to current records in an effort to determine if the currently issued identification data is correct. Furthermore, the disclosed technique checks at least one other informational source to verify the identity of the user, and typically several other source of information that are not related to one another and are not administered by the entity issuing the identification data to the individual. | 08-28-2014 |
20140244511 | ONLINE CHALLENGE-RESPONSE - Embodiments of the invention enable cardholders conducting an online transaction to be authenticated in real-time using a challenge-response application. The challenge-response application can be administered by an issuer or by a third party on-behalf-of an issuer. A challenge question can be presented to the cardholder, and the cardholder's response can be verified. The challenge question presented can be selected based on an analysis of the risk of the transaction and potentially other factors. A variety of dynamic challenge questions can be used without the need for the cardholder to enroll into the program. Additionally, there are many flexible implementation options of the challenge-response application that can be adjusted based on factors such as the location of the merchant or the location of the consumer. | 08-28-2014 |
20140250007 | METHOD AND SYSTEM OF COOKIE DRIVEN CARDHOLDER AUTHENTICATION SUMMARY - A method for authenticating a financial transaction includes: storing a plurality of transaction data entries, each transaction data entry including data related to a financial transaction and including transaction data and a consumer identifier; receiving cookie data, the cookie data including a computing device identifier and historical browsing data; receiving an authorization request for a financial transaction, the authorization request including a consumer identification; identifying, in the transaction database, a subset of transaction data entries, wherein each transaction data entry in the subset includes a consumer identifier corresponding to the consumer identification; identifying an authentication score for the financial transaction based on a correlation of transaction data included in each transaction data entry of the subset and the historical browsing data; and transmitting the identified authentication score and consumer identification for use in approval of the financial transaction by an issuer. | 09-04-2014 |
20140250008 | SERVICE ASSISTED RELIABLE TRANSACTION SIGNING - Techniques are disclosed for authenticating transactions conducted over computer networks, e.g., online banking transactions or other transactions performed by a financial institution at a customer's request. After receiving a transaction request (and associated transaction details), the transaction signing service signs the transaction data and sends the resulting blob to the user requesting the transaction. After being transmitted to the user, the signed transaction data itself is then signed using PKI credentials of the user, which then returns the twice-signed bundle to the financial institution. Rather than rely on the cryptographic signature of the client, the financial intuition (or other replying party) validates that the transaction data signed using its own highly trusted key has not been altered prior to being signed and returned by the client | 09-04-2014 |
20140250009 | Debit/Credit Card Fraud Prevention Software and Smart Phone Application System and Process - The present invention is a bank card fraud prevention system comprising a smart phone application and fraud prevention software placed within financial institutions that provide the subscriber the option to approve or decline a bank card transaction in real time based on a comparison between the user's smart phone geographical location at the time of the pending bank card transaction and the location of the purchase. The subscriber will have the ability to either immediately approve or decline the pending transaction by responding to the alert on the subscriber's present invention's smart phone application. The present invention smart phone application and fraud prevention software placed is within the subscriber's financial institution will further allow the subscriber to block all bank card transactions until the subscriber and the financial institution can determine if the subscriber's account has been compromised. | 09-04-2014 |
20140250010 | METHOD AND SYSTEM OF COOKIE DRIVEN CARDHOLDER AUTHENTICATION SUMMARY - A method for authenticating a financial transaction includes: storing a plurality of transaction data entries, each transaction data entry including data related to a financial transaction and including transaction data and a consumer identifier; receiving cookie data, the cookie data including a computing device identifier and historical browsing data; receiving an authorization request for a financial transaction, the authorization request including a consumer identification; identifying, in the transaction database, a subset of transaction data entries, wherein each transaction data entry in the subset includes a consumer identifier corresponding to the consumer identification; identifying an authentication score for the financial transaction based on a correlation of transaction data included in each transaction data entry of the subset and the historical browsing data; and transmitting the identified authentication score and consumer identification for use in approval of the financial transaction by an issuer. | 09-04-2014 |
20140250011 | ACCOUNT TYPE DETECTION FOR FRAUD RISK - A server computer can provide a merchant or other entity with a payment card (or other payment device) detection service that can determine a level of fraud based on the account type being presented (e.g., credit, debit, prepaid, etc.) at the time of purchase. For example, a payment account number (PAN) can be used to perform a database lookup (e.g., a range lookup) to identify the payment account type, which can then be fed into a fraud detection system. The level of fraud can then be used to determine an authorization result (e.g., accept, reject, or review). A use of a merchant processor computer that implements fraud processing can allow a merchant to implement discounting, acceptance, and/or fraud rules based on the card type. | 09-04-2014 |
20140250012 | SYSTEM AND METHOD FOR ACQUIRING TRANSACTIONAL DATA ON CONSUMER USE OF GIFT CERTIFICATES AT MERCHANT RETAIL LOCATIONS - Disclosed herein are systems, methods, and computer-readable storage devices for acquiring transactional data on consumer use of discounted gift certificates at merchant retail locations. The system sells a discounted gift certificate in combination with a payment network branded prepaid gift account to a consumer. The consumer can use the prepaid gift account to make a purchase and redeem the gift certificate. The point of sale terminal recognizes that the prepaid gift account has an associated gift certificate value and credits the value of the gift certificate to the purchase. If the purchase amount exceeds the gift certificate, the prepaid gift account processor partially authorizes the amount of the gift certificate and presents the remaining balance of the purchase to the consumer for additional payment. The system can create transaction data describing the amount spent by the consumer in excess of the gift certificate value. | 09-04-2014 |
20140250013 | TECHNIQUES FOR MOBILE TRANSACTION PROCESSING - Techniques for automated mobile transaction processing are provided. A consumer traverses to a web portal or other type of enterprise terminal device of an enterprise and proceeds to shop. During checkout, the portal contacts a transaction service and is delivered back an identifying barcode or Quick Response (QR) code. The consumer uses a mobile device to scan the code and send it to the transaction service. Previously registered payment details of the consumer are located and payment is received from the consumer. The portal is notified that payment is completed by the transaction service. | 09-04-2014 |
20140250014 | SEND AND RECEIVE SIDE CONTROL OF MONEY TRANSFER PARAMETERS - A computer system in a money transfer transaction. A request is received from a sender on a send computer to send a money transfer having a send amount. The sender is prompted on the send computer to select one or more parameters associated with the money transfer, the one or more parameters comprising money transfer receiver information including a receiver location. Money transfer fees associated with the money transfer are analyzed for a plurality of receive locations proximate the receiver location based on the selected one or more parameters. A receive location offering a lowest money transfer fee is selected from the plurality of receive locations. The send amount and fee for the selected receive location are collected from the sender. Information related to the money transfer is then stored, including the selected one or more parameters and the receive location, in a money transfer server. | 09-04-2014 |
20140250015 | USER INTERFACE FOR APPLICATION MANAGEMENT FOR A MOBILE DEVICE - This specification describes technologies relating to user interfaces for mobile devices. In general, one aspect of the subject matter described in this specification can be embodied in methods that include the actions of receiving a touch input to access an application management interface on a mobile device; presenting an application management interface; receiving one or more inputs within the application management interface including an input to install a particular application; installing the selected application; and presenting the installed application. | 09-04-2014 |
20140250016 | Method and System for Controlling Risk in a Payment Transaction - Example embodiments of the presently described subject matter are described that require a customer to use a secure payment token if, during a payment transaction, it is determined that the payment transaction poses a risk. A risk analysis may be performed based at least in part on data related to the payment transaction, such as data related to the customer, the transaction itself, the merchant, etc. If the results of the risk analysis indicate that an unacceptable amount of risk exists, the merchant or any interested party may require the customer to use a secure payment token, for example, a smart card, to conduct the transaction. Otherwise, the customer may proceed by using a static payment token, for example a credit card or PIN/password-based payment token. | 09-04-2014 |
20140258118 | PREDICTING APPROVAL OF TRANSACTIONS - Method, systems, and apparatus for processing a payment transaction includes determining that a network connection between a first destination in a payment system and a second destination in a payment system does not satisfy a latency threshold; receiving data indicating a payment transaction between a customer and a merchant; determining whether the payment transaction should be stored, where the determining is based on a risk algorithm model that considers risk factors associated with data regarding the payment transaction, risk factors associated with data regarding the customer, and risk factors associated with data regarding the merchant; if the payment transaction should be stored: storing the payment transaction for future processing; displaying an indication that the payment transaction has been successfully processed; if the payment transaction should not be stored: attempting to send a request for authorization for the payment transaction at a payment service system included in the payment system. | 09-11-2014 |
20140258119 | Fraud Decision Processing System and Method - The present invention relates to a method and system for performing fraud screening and choosing whether to accept or deny an online transaction. The system includes a server that receives a transaction request and performs a first fraud screen based on transaction information of the requested transaction. The server further determines which operation to perform: whether to issue a final response right away (accept, reject) or whether to gather more information before issuing a final response. The first fraud screening may be a predictive fraud screening which generates a probability of fraud. The information gathering may be an authentication of the payment instrument. One aspect of the invention further provides selecting an operation flow based on the transaction information. | 09-11-2014 |
20140258120 | SYSTEMS AND METHODS FOR DEBIT CARD ACCOUNT CONFIRMATION - Systems and methods that receive one or more information associated with a debit card account and receive verification of the information associated with the debit card. Upon the verification, a proxy associated with the information may be generated and stored in association with the information. The proxy may further be provided to other entities that may use the proxy as an indicator of the verification of the debit card account and for initiating transactions using the verified debit card account. | 09-11-2014 |
20140258121 | METHOD AND APPARATUS FOR PROVIDING SECURED ANONYMIZED PAYMENT - An approach for secured payment through anonymized settlement services without the use of physical trusted service management (TSM) devices includes receiving a payment request from a first user directed to a second user, wherein the payment request includes, at least in part, an abstracted identity of the first user, determining one or more payment accounts associated with the first user based, at least in part, on the abstracted identity, initiating a payment using the one or more payments accounts to the second user based on the payment request, and sending an acknowledgement message of the payment to the second user, wherein the acknowledgement message includes anonymized information associated with the payment. | 09-11-2014 |
20140258122 | FRAUD DETECTION BASED ON AGE OF CONTACT INFORMATION - Systems and methods for determining trustworthiness of a user are described. The methods include receiving information provided by the user to set up a new financial account, extracting contact information from the received information, transmitting the contact information to a third party to determine an age of the contact information, receiving the age of the contact information, and based on the age, assigning a confidence metric, wherein the confidence metric is associated with the trustworthiness of the user. | 09-11-2014 |
20140258123 | Tokenized Payment Service Registration - Processes for registering a user for a payment service are disclosed herein. Some of the processes involve the delivery of tokenized external fund transfer information from a financial institution to a payment service. Some of the process are conducted such that the external fund transfer information is never stored or handled by the payment service, but the identity of the user is still adequately verified by the payment service on behalf of the financial institution. | 09-11-2014 |
20140258124 | AUTHENTICATION PROCESS USING SEARCH TECHNOLOGY - Systems and methods are presented for improved authentication and risk analysis processes using search engine technology. In one potential implementation, an authorization request message is received at a payment processing network as part of a transaction between a user and a merchant. The payment processing network analyzes risk based on a search history associated with the user involved in the transaction with the merchant. A response to the authentication request is made based in part on the risk associated with the user search history. In further embodiments, a user registers with a search engine as part of a service for improved authentication, where the user accepts privacy settings allowing storage of search and transaction data by a search engine server. The search engine server passes search and transaction data to a risk analysis server for creation of risk parameters which may be used to authenticate transactions. | 09-11-2014 |
20140258125 | MULTIPLE PARTY BENEFIT FROM AN ONLINE AUTHENTICATION - An account authentication service where a trusted party verifies an account holder's identity for the benefit of a requestor during an online transaction. The account authentication involves requesting a password from the account holder, verifying the password, and notifying the requestor whether the account holder's authenticity has been verified. An alternative embodiment of the account authentication service includes a value-adding component where information about a customer is shared with a value-adding party. The customer information is rich in detail about the customer since it is collected by each of the parties in the account authentication process. The value-adding party can then use this information in various manners. All of the parties involved can benefit from sharing the customer information. The value-adding party can be, for example, a merchant, a shipper, a security organization, or a governmental organization. A transaction identifier identifies a specific transaction between a customer, a merchant, and the customer information. | 09-11-2014 |
20140258126 | OFFSITE FINANCIAL ACCOUNT ONBOARDING - Offsite financial account onboarding is provided which creates a more streamlined process for a customer. The customer accesses a money services business electronic system to request financial account setup. The onboarding system establishes account access to a pooled custodial account managed by the money services business based on preliminary identification (ID) data from the customer. With only preliminary ID data, account access limits are assigned which reduces the risk of fraud or criminal activity with the customer's account access. Because account access is established with just the preliminary ID data, the customer may fully obtain account access directly from a mobile device. The money services business provides additional graduated access levels depending on additional ID data provided by the customer. Thus, depending on the type of ID data provided by the customer, the customer's account access will have corresponding access level rights to the custodial account. | 09-11-2014 |
20140258127 | Using Low-Cost Tags to Facilitate Mobile Transactions - Systems, methods and computer program products for facilitating payments using low-cost barcode or RFID tags are disclosed. Such tags can be attached or affixed to physical, real-world objects thus allowing the objects to be purchased using a customer mobile device, without the need for a dedicated, on-site point-of-sale system. The tags may be constructed from paper, metal, leather, plastic or some other low-cost material. The tag allows a unique visual identifier such as a tag code to be imprinted so that it can be read using a mobile camera or other sensor enabled telephone. | 09-11-2014 |
20140258128 | Method for managing fund security and mobile terminal - The disclosure discloses a method for managing fund security, including that: a fund-security controlling strategy is generated according to a preset fund-security-controlling-strategy configuring file; and permission of using a paid function by an application is controlled according to a strategy controlling permission of using a paid function in the fund-security controlling strategy when it is detected that the application is about to use a paid function defined in the fund-security controlling strategy. The disclosure also provides a mobile terminal. With the disclosure, it is possible to control permission to a malicious application in a mobile terminal to use a paid function in the mobile terminal, thereby prevent loss of fund of the mobile terminal. | 09-11-2014 |
20140279494 | METHOD AND SYSTEM OF DETECTING AND USING GEOFENCING FOR FRAUD DETECTION AND MODELING - A method for identifying fraud factors includes: storing data points; storing financial transactions; storing a plurality of consumer data entries, each data entry associated with a consumer and including a mobile device identifier and account identifier; identifying a home market for a data entry based on usage patterns of an associated financial account; identifying, at a predetermined time, a geographic location of a mobile device associated with the data entry; storing a location data point for the geographic location if the geographic location is outside of a predetermined distance from the home market, wherein the location data point includes the identified geographic location, the consumer associated with the data entry, and a time and/or date at which the geographic location was identified; and identifying a fraud factor for detecting fraud in a transaction, the fraud factor based on the financial transactions, the data points, and the location data point. | 09-18-2014 |
20140279495 | Social Network Prestige Program - The disclosure generally describes computer-implemented methods, software, and systems for creating and using shared queries based on heterogeneous data sources. One example method includes providing a visualization on a social network platform, the social network platform communicably linked to a financial platform; receiving, from the financial platform, a request to change a status of a user of the social network based on possessions of the user associated with a financial institute; and updating the visualization to reflect the user's status. | 09-18-2014 |
20140279496 | METHOD AND SYSTEM FOR IMPLEMENTING A CO-BUY ORDER CAPTURE MECHANISM - Disclosed is an improved approach to implement a shopping interface that includes a co-buy purchase option. The co-buy mechanism permits any purchase decision by a consumer to be implemented as a group purchase. The co-buy mechanism provides functionality to automatically implement sharing of the purchase prices by the participants to the group purchase. | 09-18-2014 |
20140279497 | Secure Identity Element - Methods, systems, computer-readable media, and apparatuses for providing a secure identity element are presented. In some embodiments, a computing device may authenticate a user of the computing device. Subsequently, the computing device may capture an image of the user, and further may store the image in a secure element. Then, responsive to receiving a request to provide a credential for a payment transaction, the computing device may cause the image from the secure element to be provided as the credential. In some instances, the image from the secure element may be provided as an identity credential for a payor in the transaction, while in other instances, the image from the secure element may be provided as an identity credential for a payee in the transaction. | 09-18-2014 |
20140279498 | Secure Identity Element - Methods, systems, computer-readable media, and apparatuses for utilizing a secure identity element to facilitate transactions are presented. In some embodiments, a computing device may detect a payment device. Subsequently, the computing device may cause a payment credential to be displayed on the payment device, where the payment credential includes an image of an authorized user of the computing device. Thereafter, the computing device may receive, from the payment device, a request to complete a payment transaction. Responsive to receiving user input approving the payment transaction, the computing device may cause a payment to be made to an account associated with the payment device. In some embodiments, in receiving the request to complete the payment transaction, the computing device also may receive a photo credential for an authorized user of the payment device and/or an amount to be paid in the payment transaction, which can be displayed by the computing device. | 09-18-2014 |
20140279499 | SINGLE USE QR CODE AUTHORIZATION SYSTEM - An electronic secured payment system where a single use QR CODE is assigned to a consumer account, displayed on a consumer's electronic device, and scanned by a merchant's device to permit a merchant to access and verify the consumer's account and enter transaction information. | 09-18-2014 |
20140279500 | Methods and Systems for Generating a Transaction Lifecycle Output for a Payment Card Transaction - Systems and methods for generating a transaction lifecycle output using a transaction lifecycle (TL) computer system are provided herein. The TL computer system includes a memory device for storing data and a processor in communication with the memory device. The processor is programmed to receive transaction data associated with a transaction being processed over a payment network. The transaction data includes authorization data, clearing data, and fraud data. The processor is also programmed to generate the transaction lifecycle output by processing the authorization data, the clearing data, and the fraud data. The transaction lifecycle output includes output data organized by pre-defined stages of the transaction. | 09-18-2014 |
20140279501 | METHODS AND DEVICES FOR FRAUD DETECTION BASED ON ROAMING STATUS - Methods, devices and servers for assisting in financial transaction fraud detection are described. In one aspect, a method for notifying of a roaming status of an electronic device is described. The method is implemented by a wireless service provider server associated with a wireless service provider. The electronic device is associated with a subscription service package of the wireless service provider. The method includes: detecting a roaming condition associated with the electronic device; and after detecting the roaming condition, retrieving financial institution information associated with the electronic device, the financial institution information identifying a financial institution, and sending a notification of the roaming status of the electronic device to a financial institution server associated with the identified financial institution. | 09-18-2014 |
20140279502 | System and Method of Processing Payment Transactions - A system and method for processing payment transactions via payment devices are provided. Issuer application selection criteria associated with a payment device, merchant application selection criteria associated with an acceptance device, and/or payment network card program file(s) may be evaluated to determine the payment application to be used for processing a payment transaction. | 09-18-2014 |
20140279503 | PROVIDING CUSTOMER ALERTS BASED ON GEO-THRESHOLDS - Embodiments of the invention provide unauthorized-transaction protection with user location verification. It is determined whether a geographic location associated with a transaction is geographically located within geo-thresholds associated with an authorized user and/or whether the geographic location associated with the transaction is geographically proximate to a geographic location associated with a mobile device that is associated with the authorized user. If neither the geographic location associated with the transaction is geographically located within the geo-thresholds nor the geographic location associated with the transaction is geographically proximate to the geographic location associated with the mobile device, an alert is sent to the authorized user and/or to a merchant associated with the transaction. | 09-18-2014 |
20140279504 | SYSTEM AND METHOD FOR GENERATING A SINGLE-USE TIME-LIMITED PURCHASE CODE FOR COMPLETING TRANSACTIONS WITH A PORTABLE COMPUTING DEVICE - A request for a purchase code may be received from a portable computing device (PCD) from a communications network. The request may further include a purchase amount and location information of the PCD. The system determines if a funding account has sufficient funds to cover the purchase amount. If the funding account has sufficient funds to cover the purchase amount, then the system generates a single-use time limited purchase code to the PCD. The system may receive the purchase code from a POS terminal and then it may determine if the received purchase code matches purchase code issued to the PCD. The system may compare the location of the PCD against the POS terminal. If a requested transaction amount is less than or equal to the purchase amount and if the purchase codes and location information match, then they system may generate a message approving the transaction. | 09-18-2014 |
20140279505 | RECOMMENDING VEHICLE FOR PAYMENT BASED ON SOCIAL NETWORK DATA - Embodiments of the invention are directed to a system, method, or computer program product for recommending payment vehicles for a transaction based on social network data. Embodiments of the invention allow a customer to receive a recommended payment vehicle for a transaction with a merchant where the recommended payment vehicle is determined based on social network data. In this way, a payment recommendation may be based on one or more preferences of a trusted advisor, social network friend, family member, celebrity, or an aggregation of data related to how a group of individuals on a social network are selecting payment vehicles for various merchants. The invention may review this social network data and provide the customer with a payment vehicle recommendation for a transaction with a merchant. | 09-18-2014 |
20140279506 | USER INTERFACE FOR MOBILE PAYMENT VIA TRANSFER NETWORK - Embodiments of the invention are directed to systems, methods and computer program products for making a mobile payment via a transfer network. In some embodiments, a first apparatus is configured to: receive readable indicia from a second apparatus; enable a user to input payment information, wherein the payment information comprises at least one of a payee, a payment amount, or a payment source; transmit the readable indicia and the payment information to a third apparatus. | 09-18-2014 |
20140279507 | CUSTOMER DRIVEN SECURITY SUITE - Systems and methods for providing a customer driven security suite are provided. The system may process a banking activity. The system may receive an account parameter from a customer. The system receive customer information corresponding to a banking activity. The system may determine whether the customer information is anomalous. The system may flag the banking activity with a first value if: (1) the information is anomalous and the account parameter overrides the anomalous information; or (2) the information is not anomalous and the account parameter does not override the information. The system may flag the banking activity with a second value if: (1) the information is not anomalous and the parameter is configured to prevent the activity when the parameter corresponds to the information, and the parameter corresponds to the information; or (2) the information is anomalous and the parameter does not override the anomalous information. | 09-18-2014 |
20140279508 | SELECTIVE OPERATION OF EXECUTABLE PROCEDURES BASED ON DETECTED GESTURE AND CONTEXT - In embodiments, a generic gesture made with a computing device may be detected. In various embodiments, a context of the apparatus and/or a user of the apparatus may be determined. In various embodiments, at least one of a plurality of executable procedures may be selectively operated based on the detected generic gesture and the determined context. | 09-18-2014 |
20140279509 | METHOD FOR IMPLEMENTING AN ALTERNATIVE PAYMENT - One variation of a method includes: receiving a transaction request, the transaction request comprising an identity of a user, a location of a vendor, and a price of a transaction; identifying a set of payment methods available to the user, a particular payment method in the set of payment methods characterized by a discrete payment structure defining a discrete payment increment; ranking the available payment methods according to a preferred payment method associated with the location of the vendor, according to the discrete payment structure of the particular payment method, and according to the price of the transaction; receiving a selection from the user for the particular payment method for the transaction; and authorizing a payment to the vendor with the particular payment method. | 09-18-2014 |
20140279510 | Direct Deposit Money Transfer - Systems, devices and methods which provide for funding money transfer transactions via a direct deposit of transaction funds from a sender are provided herein. In some embodiments an account may be provided by a money transfer service to a sending party which may receive funds from a direct deposit. A money transfer transaction may be staged, or in some embodiments pre-staged, by a sending party and may be completed upon receiving the transaction funds via a direct deposit. | 09-18-2014 |
20140279511 | Systems and Methods for Management of Local Devices - Systems, methods and devices which provide controls to a parent entity over computing resources residing with an agent entity are discussed herein. In one example, embodiments may allow a parent entity to control peripheral hardware devices which are otherwise controlled locally by a computing device at an agent location. Further, in one embodiment, a parent entity may control the receipt of information from an agent computing device in order to authenticate the agent device. In one embodiment, such control may be implemented via a shell application that executes on an agent computing device when the agent is processing a financial transaction via a web browser interface. | 09-18-2014 |
20140279512 | RESERVE CARD SYSTEM AND METHOD - A system, method and/or computer program product for enrolling in and/or issuing a transaction account with enhanced capabilities and improved functionality is disclosed herein. This new type of transaction account, a reserve transaction account, is disclosed herein. Similar to credit and/or charge transaction accounts, the reserve transaction account avails its users the ability to purchase now and pay for the purchase at a later date. This is in contrast to a debit transaction account where payment for the purchase is effective almost immediately. Similar to credit and/or charge transaction accounts, the reserve transaction account is associated with a line of credit. Similar to credit and/or charge transaction accounts for authorization and settlement, the reserve transaction account follows a dual messaging protocol for authorization of transactions. | 09-18-2014 |
20140279513 | RESERVE CARD SYSTEM AND METHOD - A system, method and/or computer program product for enrolling in and/or issuing a transaction account with enhanced capabilities and improved functionality is disclosed herein. This new type of transaction account, a reserve transaction account, is disclosed herein. Similar to credit and/or charge transaction accounts, the reserve transaction account avails its users the ability to purchase now and pay for the purchase at a later date. This is in contrast to a debit transaction account where payment for the purchase is effective almost immediately. Similar to credit and/or charge transaction accounts, the reserve transaction account is associated with a line of credit. Similar to credit and/or charge transaction accounts for authorization and settlement, the reserve transaction account follows a dual messaging protocol for authorization of transactions. | 09-18-2014 |
20140279514 | PRO-ACTIVE IDENTITY VERIFICATION FOR AUTHENTICATION OF TRANSACTION INITIATED VIA NON-VOICE CHANNEL - A method of using biometric verification comprises identifying a validation requirement during the execution of a non-voice channel interaction, and initiating a contact to the user, at a pre-registered device. The method further comprises executing a biometric verification of the user's identity and possession of the device, via a user interaction at the pre-registered device, and providing the validation when the user is successfully identified. | 09-18-2014 |
20140279515 | SYSTEMS AND METHODS FOR CREDIT CARD PROTECTION - Systems, computer programs and methods are provided to protect consumer credit card data and/or other private information by tying such information to a particular hardware identification number, such as without limitation an individual Media Access Control (MAC) Address of a user's computer and/or mobile device. Credit card or other data is registered and associated with a hardware identification number for computer(s) or mobile device(s) of the registrant. Then, when a transaction involving the credit card occurs, the hardware identification number for the device initiating the transaction is compared with the registered hardware identification number for the credit card. If the numbers do not match, the transaction is not allowed to complete, preventing those without the hardware identification from using the registered credit card, debit card, or other registered item. | 09-18-2014 |
20140279516 | AUTHENTICATING A PHYSICAL DEVICE - Among other things, a physical device is determined to be validly issued by a party that issues physical devices that include security features. At least a portion of a photographic or video image of the physical device is processed automatically to determine if the physical device includes at least one of the security features. | 09-18-2014 |
20140279517 | Method, A System and a Computer Program Product for Connecting Profiles in Social Networking System - A method, system and a computer program product for connecting a Fan profile to a Business profile in a social networking system. The method comprises at least one Fan profile, at least one Talent profile and at least one Business profile, comprising a computer that has access to the social networking system and is configured to: receive purchasing information of the Business profile purchasing a sponsor item from the Talent profile; and send on behalf of the Talent profile Business information from the Business profile to the Fan profile, where the Fan profile is assigned as a Fan of the Talent profile. | 09-18-2014 |
20140279518 | SYSTEM AND METHOD FOR CONSUMER FRAUD PROTECTION - The present invention relates to system and method for authorizing a financial transaction using user-data collected from third party websites, such as Social Media Networks. In operation, collected user-data may be compared to a financial-data collected during a financial transaction to identify potential fraud and/or other discrepancies, confirming the identity of the user with a greater degree of accuracy. | 09-18-2014 |
20140279519 | METHOD AND SYSTEM FOR OBTAINING AND USING IDENTIFICATION INFORMATION - A method of identifying a user for transactions includes receiving an image of an identification document of the user during a first transaction with a first party, wherein the image is obtained using an image acquisition module of a device of the user, receiving a device ID of the user's device, extracting identification credentials of the user from the image, storing the identification credentials of the user and the device ID of the user's device on a server, wherein the device ID is associated with the identification credentials of the user, during a subsequent transaction with a second party, receiving the device ID of the user's device, retrieving the identification credentials of the user based on the device ID, and transmitting the retrieved identification credentials to the second party to identify the user for the subsequent transaction. | 09-18-2014 |
20140279520 | METHOD, SYSTEM AND APPARATUS FOR INTEGRATING TRANSACTION REQUEST FUNCTIONALITY WITH WEB CONTENT - A system is provided for connecting a client device configured to display content and generate transaction requests, with merchant systems configured to receive and process transaction requests. The system includes an intermediate server and a payment data server. The intermediate server stores a web application including content, and delivers the web application to the client device. The content includes a selectable element for generating a transaction request. The client device detects a selection of the selectable element and sends a transaction request to the intermediate server, which identifies the merchant system associated with the transaction request. The intermediate server determines whether to supplement the transaction request with payment data associated with the client device. When the determination is affirmative, the intermediate server retrieves payment data from the payment data server, other additional data from a database, or both, and adds any retrieved data to the transaction request before forwarding the request to the relevant merchant system. | 09-18-2014 |
20140279521 | SYSTEMS AND METHODS FOR PROCESSING PAYMENT CARD TRANSACTIONS - Systems and methods for processing payment card transactions for a payment card using a payment card processing system are disclosed. Method for processing one or more payment card transactions for a payment card using a payment processing system in communication with a computer readable storage medium includes receiving an authorization request from an acquirer and a corresponding authorization response from a card issuer, the authorization response including a status identifier for the payment card, associating the payment card with a payment card listing based on the status identifier, the payment card listing indicating transaction processing information relating to the payment card, and storing the payment card listing in the computer readable storage medium. | 09-18-2014 |
20140279522 | MEANS OF AUTHENTICATING A CONSUMER USING DEMAND DEPOSIT ACCOUNT DATA - Authenticating a device holder using a payment device. The method comprises receiving identifying information related to a payment device from a device holder to be authenticated. A data repository is solicited for transactional information related to an account drawn upon by the payment device. One or more challenge questions are presented to the device holder to be authenticated, the challenge questions being related to the transactional information. The device holder to be authenticated responds to the one or more challenge questions. Based on the responses, it is determined whether at least a predetermined number of the responses to the one or more challenge questions corresponds with the transactional information. The device holder may be authenticated based upon the determining that at least a predetermined number of the responses to the one or more challenge questions correspond with the transactional information. | 09-18-2014 |
20140279523 | System and Method for Authenticating Payment Transactions - A request to authorize a payment transaction initiated on the client device is received by the system. In some embodiments, the request is received from a mobile client device connected to a cellular communications network. The request includes an IP address associated with a client device and a cellular phone number associated with the client device. The IP address is determined automatically without human intervention from the request. A cellular telephone carrier system associated with the cellular communications network is then queried using the cellular phone number associated with the client device. A response is received from the carrier system. The response includes the current IP address associated with the client device. The payment transaction is authorized when the IP address received from the carrier system matches the IP address received from the client device. | 09-18-2014 |
20140279524 | Interchange Rate Based Convenience Fee, Service Fee, and Surcharge System Patent - Methods for processing payments electronically over a network-based system, such as Internet, phone, wireless communications, and other channels, wherein a third party or intermediary facilitates payment transactions to enable the processing of payments on behalf of individuals or businesses through credit card and debit card electronic transactions while providing a real-time, automated determination of a convenience fee associated with the transaction, the convenience fee being based upon the interchange rate for the specific card being used for the payment. | 09-18-2014 |
20140279525 | SYSTEMS, DEVICES, AND METHODS FOR PROCESSING PAYMENTS FOR A CARD - Embodiments of the disclosure include systems, methods, and devices for processing payments for a card. Such embodiments include receiving payment information from a payor at an intermediate entity server as well as authorizing the payment transaction, by the intermediate entity server, based on the payment information. Further such embodiments include providing instructions, by the intermediate entity, to debit a payor card account and credit payee shadow ledger account based on the payment information as well as providing instructions, by the intermediate entity, to debit the payee shadow ledger account and to credit the payee card account based on payment rules. | 09-18-2014 |
20140279526 | SYSTEMS AND METHODS FOR A PRIVATE SECTOR MONETARY AUTHORITY - Systems and methods are provided for a payment system for use with base money of one or more alternative currencies. Steps may include administering accounts, each of which belongs to one or more account owners; receiving spend instructions specifying an account-to-account transfer of a quantity of base money from a paying account to a recipient account; receiving spend authorizations for the spend instructions from system users with requisite privileges for the paying account; and executing the authorized spend instruction if they conform to all applicable system rules by crediting the paying account and debiting the recipient account in an atomic transaction that executes in its entirety or not at all. At least one of the one or more alternative currencies may be based on at least one commodity and may be continuously backed by a 100% reserve of the at least one commodity. | 09-18-2014 |
20140279527 | Enterprise Cascade Models - Methods, systems, computer-readable media, and apparatuses for detecting unauthorized activity are disclosed. Detecting unauthorized activity is done by accessing first data that represents activity involving a first service provided to a customer, accessing second data that represents activity involving a second service provided to a customer. The activity involving the second service and the activity involving the first service both include authorized customer activity, and the activity associated with the second service further includes unauthorized activity. The first data is filtered using a filtering criteria and a portion of the first data is selected to be retained. The second data and the retained portion of the first data are analyzed, and the analysis includes classifying the activity associated with the second service in a way that distinguishes the unauthorized activity from the authorized activity associated with the second service. | 09-18-2014 |
20140279528 | Wearable Authentication Device - In embodiments, a wearable authentication device includes a fingerprint sensor to capture a fingerprint image that is used to authenticate a user to an associated device of the wearable authentication device. The wearable authentication device can also include a presence sensor, or a presence sensing mode of the fingerprint sensor, to periodically detect a presence of the user wearing the wearable authentication device, and presence data is communicated to the associated device to maintain operability of the associated device. | 09-18-2014 |
20140279529 | BANK ACCOUNT PROTECTION METHOD UTILIZING A VARIABLE ASSIGNING REQUEST STRING GENERATOR AND RECEIVER ALGORITHM - A novel method of substantially, if not totally, eliminating financial account fraud through the implementation of a specific algorithm that permits a financial institution the means to communicate directly and nearly instantaneously with an account holder for verification purposes during a financial transaction. The overall system depends on a string variable method that accords a limited number of representations to all the words and numbers of a specific human language in order to provide a suitable machine language translation for the capability of communicating quickly and effectively between a financial institution, an account holder, and possibly, a third party. Through a link between the digital communication platform set up by the variable string algorithm between the financial institution's system and at least one account holder electronic device, such communications, which do not require any need to divulge personal or other information of the account holder, ensure such transactions are proper. | 09-18-2014 |
20140279530 | Systems and Methods for Initiating Payment from a Client Device - The disclosed embodiments include a mobile client device for automatically performing a mobile financial service function, including a memory storing software instructions, the software instructions including a mobile financial service application configured to perform financial service processes. The system may also include and one or more processors configured to execute the software instructions to detect a physical action performed on the mobile client device, and determine a first financial service function to perform based on the detected physical action, wherein the first financial service function is a function provided by the mobile financial service application. The one or more processors may also determine whether verification of a user is required, verify the user if verification of the user is required, and automatically initiate the first financial service function. | 09-18-2014 |
20140279531 | SYSTEMS AND METHODS FOR FINANCIAL TRANSACTIONS BETWEEN MOBILE DEVICES VIA HAND GESTURES - Systems and methods for a financial transaction between mobile device that include identifying a second mobile device associated with a recipient of a financial transaction to be conducted with a first mobile device associated with a sender of the transaction; enabling the sender to initiate the transaction from the first mobile device via a hand gesture on the touchscreen of the first mobile device to transfer an amount of money specified by the sender to the recipient; presenting visually the transaction from the first mobile device on the screen of the second mobile device associated with the recipient; accepting request for the financial transaction and processing the financial transaction by financial institutions; and updating relevant financial records related to the sender and the recipient, respectively once the financial transaction is cleared by the financial institutions. | 09-18-2014 |
20140279532 | Secure authentication based on physically unclonable functions - The invention relates to an electronic device, and more particularly, to systems, devices and methods of authenticating the electronic device using a challenge-response process that is based on a physically unclonable function (PUF). The electronic device comprises a PUF element, a processor and a communication interface. The PUF element generates an input signal based on at least one PUF that has unique physical features affected by manufacturing variability. A challenge-response database, comprising a plurality of challenges and a plurality of corresponding responses, is set forth by the processor based on the PUF-based input and further provided to a trusted entity. During the trusted transaction, the processor generates a response in response to a challenge sent by the trusted entity based on the PUF-based input, and thereby, the trusted entity authenticates the electronic device by comparing the response with the challenge-response database. | 09-18-2014 |
20140279533 | REAL-TIME APPLICATION PROGRAMMING INTERFACE FOR MERCHANT ENROLLMENT AND UNDERWRITING - The disclosed embodiments include methods and systems for providing a real-time application programming interface for merchant enrollment and underwriting. In one embodiment, a process is disclosed that may include receiving, from a first computing device, a request for applying for the merchant financial account for a merchant applicant. The request may also include verifying the information associated with the merchant applicant and providing, via the first computing device, at least one question with a plurality of answer choices to the merchant applicant if the merchant applicant information associated with the applicant is verified. In one aspect, the method may include receiving an answer choice to the at least one question from the merchant applicant via the first computing device and validating the received answer choice. If the answer choice is validated, the method may include activating the first computing device and authenticating the merchant applicant for the merchant financial account. | 09-18-2014 |
20140279534 | SYSTEM AND METHOD FOR PROVIDING AN ACCOUNT HOLDER A NOTIFICATION - Systems and methods provide for notifying an account holder of an attempted transaction. The systems and methods include a transaction data communication module that receives, via a network, transaction data associated with a transaction, a transaction processor that associates the transaction data with an account of an account holder, compares the transaction data to one or more spending limits associated with the account, and compares the transaction data to one or more fraud detection rules associated with the account, an account holder notification system associated with the transaction processor that notifies the account holder, via a network, based on the results of the comparison steps, and an authorization response module that receives, via a network, a response from the account holder and approves or deny the transaction based at least in part on a response received. | 09-18-2014 |
20140279535 | APPARATUS FOR USE IN AN AUTOMATED FUEL AUTHORIZATION PROGRAM FOR REFRIGERATED TRAILERS - An automated fuel authorization system equips refrigerated trailers with a reefer tag that implements the function of tracking run time data for a compressor in the refrigerated trailer that is responsible for refrigeration. The reefer tag automatically sends the run time data to a fuel vendor as part of an automated fuel authorization request. Based on the run time data, a known fuel tank size, and a normal fuel consumption rate for the compressor, the fuel vendor automatically determines an amount of fuel to authorize for dispensing into the fuel tank at the refrigerated trailer. If the fuel authorization request is approved, the fuel vendor automatically authorizes a fuel transaction for the amount of fuel so determined. An exemplary reefer tag includes a radio frequency data link for sharing the run time data. No run time data will be shared if the trailer is not coupled to a tractor. | 09-18-2014 |
20140279536 | Online Jury Research System - An apparatus and a method are provided for an online jury research system which enables a multiplicity of end-users to build surrogate jury surveys by way of a communications network, such as the Internet. The online jury research system comprises a survey builder which enables the end-users to upload information for which responses of surrogate jurors are desired and to assemble surrogate jury surveys. The uploaded information may include questions, videotaped opening or closing statements, depositions, exhibits, and graphics. A host site is accessible to the end-users by way of the communications network and provides access to a jury services package. In an embodiment, the survey services package comprises services operated by one or more third-party service providers. The online jury research system provides the surrogate jury survey to selected respondents and then compiles the results for review by the end-users. | 09-18-2014 |
20140279537 | FINANCIAL TRANSACTION SYSTEM AND METHOD CAPABLE OF UTILIZING A MOBILE DEVICE - The method and system of this invention employs a mobile application and hardware of a mobile device, such as a smart phone, to recognize a merchant code, such as uniquely identifiable two-dimensional images, to identify a select merchant or vendor. Each merchant code is associated with a particular mechanical device, goods or service available for purchase or payment. Upon recognition of the merchant code, a secure transmission is initiated and created by the consumer/user with a remote server, given that the consumer confirms a secure identity. The remote server also determines credit/funds availability in a transaction account created by the consumer. The transaction account is linked to a funding account. As directed by the consumer/user using the mobile device, a portion or all of the credit/funds are then transferred by the remote server to the vendor/merchant. Upon receipt, the mechanical device or vendor authorizes the delivery of select goods or service to the consumer. | 09-18-2014 |
20140279538 | SYSTEMS, METHODS, AND DEVICES FOR VERIFYING A USER IDENTITY AND/OR ENABLING/DISABLING AN ACTION, USING A CURRENT AND/OR PREVIOUS USER LOCATION - Methods for enabling or disabling an electronic message or a financial transaction are provided. The methods may include enabling or disabling the electronic message or the financial transaction based on whether a current or previous physical location of a wireless user device corresponds to a specified location. Related wireless user devices, servers, and third-party devices are also described. | 09-18-2014 |
20140279539 | SYSTEMS AND METHODS FOR PROVIDING AUTOMATED TIPPING SUGGESTIONS - The disclosed embodiments include methods, systems, and articles of manufacture for providing tipping suggestion services. A financial service provider configures a financial service account for a user. After the user makes a purchase at a merchant associated with leaving a tip, such as a restaurant, the financial service provider may determine metrics related to tipping, such as the user's own tipping behavior, or the tipping behavior of other users at the same merchant over time. The financial service provider may rapidly transmit the tipping metrics to a client device when a notification is received that a user has made a tip-eligible purchase, so that the user may factor the metrics into a decision of how much to tip in real time as the decision is being made. | 09-18-2014 |
20140279540 | SYSTEMS AND METHODS FOR A PRIVATE SECTOR MONETARY AUTHORITY - Embodiments of the present invention may provide systems and methods for administering a private sector Monetary Authority. The systems and methods may include providing access to End Users; and enabling performance of specialized Roles required for the administration of the system. The systems and methods may be self-contained for creation, holding, circulation and retirement of the Base Money such that outside money or value cannot be transmitted into or out of the system. | 09-18-2014 |
20140279541 | VAULT PLATFORM METHODS, APPARATUSES AND MEDIA - A payment token request may be obtained from a customer's smartphone. A payment token associated with the customer's account may be generated and sent to the customer's smartphone. A payment request including the payment token may be obtained from a consumer engagement device (CED). Payment information associated with the customer's account may be retrieved based on the payment token. Payment for the payment request may be authorized and a payment confirmation may be sent to the CED. | 09-18-2014 |
20140279542 | MOBILE CURRENCY MESSAGING SYSTEMS - Exemplary embodiments provide methods, mediums, and systems for facilitating mobile transactions. For example, a routing system and protocol is provided to allow a user of a mobile financial application, which may be provided in a closed loop network, to connect to external entities located outside of the closed loop network. In some embodiments, requests to perform transactions may be aggregated and prioritized in order to perform load balancing among the request. In further embodiments, records related to the transactions may be purged after a predetermined period of time, subject to regulatory requirements, in order to protect the privacy of the user. | 09-18-2014 |
20140279543 | CLOSED-LOOP MOBILE MONEY TRANSACTION SYSTEM - The present disclosure relates to methods, techniques, and systems for settling trusted money request and/or transfer transactions between individuals, and also between individuals and business partners based on social network connections between these entities as represented in social graphs of virtual social networks to establish the transaction connection between the two transaction partners and directly settle the financial transaction between these partners using e.g. a mobile device application without the necessity of a further entity, like e.g. a bank, credit card company and the like, for clearing the transaction initiated on the mobile device. | 09-18-2014 |
20140279544 | CREATION AND USE OF MOBILE IDENTITIES - Exemplary embodiments provide methods, mediums, and systems for generating and applying an electronic identity. The electronic identity may allow an individual's electronic or online presence to be secured and verified, thereby providing increased levels of trust in the identity of the individual. The electronic identity may correlate data from multiple different sources, including social networks, career websites, online marketplaces, financial institutions, and the individual. Based on the amount of data that can be verified or correlated with other data, a trust score may be assigned to the electronic identity. The electronic identity may be used to verify an individual's identity for various purposes, such as obtaining a financial account, obtaining identification, performing transactions, and social interactions. | 09-18-2014 |
20140279545 | SYSTEMS AND METHODS FOR CREDIT CARD PROTECTION - Systems, computer programs and methods are provided to protect consumer credit card data and/or other private information by tying such information to a particular hardware identification number, such as without limitation an individual Media Access Control (MAC) Address of a user's computer and/or mobile device. Credit card or other data is registered and associated with a hardware identification number for computer(s) or mobile device(s) of the registrant. Then, when a transaction involving the credit card occurs, the hardware identification number for the device initiating the transaction is compared with the registered hardware identification number for the credit card. If the numbers do not match, the transaction is not allowed to complete, preventing those without the hardware identification from using the registered credit card, debit card, or other registered item. | 09-18-2014 |
20140279546 | ENHANCED NEAR FIELD COMMUNICATIONS ATTACHMENT - A secure fob that enables a user to pay for an item or items without needing to present a mobile device. A secure fob may include a proximity capability to ensure that a mobile device is within a particular range, thereby eliminating the risk of fraudulent charges on a stolen fob. In such an embodiment, a fob may be disabled if the fob is not paired with the mobile device by virtue of being disconnected and/or physically separated from the mobile device. The secure fob also may include enhanced features to authorize transactions and locate the mobile device and/or the secure fob. | 09-18-2014 |
20140279547 | AUTHENTICATION OF FINANCIAL TRANSACTIONS VIA WIRELESS COMMUNICATION LINK - Examples include autonomously authenticating a financial transaction, on behalf of the user, without interacting with the user, via wireless communication link. In various embodiments, the user's cellular phone may be configured to process a message that provides at least partial service context and autonomously authenticate the financial transaction. | 09-18-2014 |
20140289115 | SYSTEMS AND METHODS FOR VEHICLE INFORMATION-BASED FUEL PURCHASING - A method for facilitating the purchase of fuel from a fuel pump, by a driver using a credit instrument to make a request for fuel, for a vehicle forming part of a fleet of vehicles owned by a fleet owner having fleet management software, comprising causing the driver to be prompted to submit vehicle information and driver information via the fuel pump, responsive to a credit request to purchase fuel for a vehicle using the credit instrument, ensuring the credit instrument has the required credit, confirming the vehicle information and the driver information, and if the ensuring and confirming are affirmed: authorizing the dispensing of fuel by the fuel pump; and if the ensuring or the confirming are denied: declining the dispensing of fuel by the fuel pump. | 09-25-2014 |
20140289116 | SYSTEM AND METHOD FOR PERFORMING AUTHENTICATION FOR A LOCAL TRANSACTION - A system, apparatus, method, and machine readable medium are described for strong authentication for a local transaction. For example, one embodiment of a system comprises: a local transaction device; a client device performing one or more authentication transactions including receiving biometric input from the user to generate an authentication result; a secure transaction service communicatively coupled to the local transaction device over a network, the secure transaction service receiving the authentication result from the client device; and the remote secure transaction service transmitting a signal to the local transaction device to perform one or more operations if the authentication result is sufficient to complete a transaction. | 09-25-2014 |
20140289117 | SYSTEM AND METHOD FOR USER CONFIRMATION OF ONLINE TRANSACTIONS - A system, apparatus, method, and machine readable medium are described for confirming a user transaction. For example, one embodiment of a method comprises: detecting at a relying party a transaction triggered by a first user over a network and performing one or more authentication techniques to authenticate the first user to the relying party over the network; identifying one or more other users who are required to confirm the transaction before allowing the transaction to be performed, the one or more other users being registered with the relying party; transmitting notifications to the one or more other users or a subset thereof indicating that a transaction has been triggered by the first user; and the one or more other users or subset thereof confirming the transaction by performing remote authentication with the relying party over the network. | 09-25-2014 |
20140289118 | METHOD AND SYSTEM FOR A SECURE REGISTRATION - Methods and apparatus for secure registration to enable transactions between a first user and a vendor that is facilitated by a payment server are disclosed. The method may comprise storing a form soliciting customer information including a plurality of fields, wherein at least one of the plurality of fields is associated with an attribute. The method including receiving a copy of the form including customer data in all of the plurality of fields and transmitting a first subset of the customer data based on the attribute associated with the first subset of the customer data. The method including receiving a token in response to the transmission of the first subset of customer data and transmitting the token and a second subset of the customer data, wherein the second subset is based on the attribute associated with the second subset of customer data. | 09-25-2014 |
20140289119 | SYSTEM AND METHOD FOR PROVIDING SECURE DATA COMMUNICATION FUNCTIONALITY TO A VARIETY OF APPLICATIONS ON A PORTABLE COMMUNICATION DEVICE - A system for providing an application associated with a portable communication device the ability to communicate via a secure element. The system has a digital identifier and digital token operably associated with the application; a card services module that provides an application programming interface to the secure element; and a secure data table associated with the card services module. The secure data table includes a list of trusted applications each identifiable by paired digital identifier and token. The card services module [includes] compares the identifier and the token with each of the identifier-token pairs in the table until a match indicates the application is trusted. The card services module issues commands to the secure element based on an action requested by a trusted application in conjunction with the presentation of the digital token. A method of providing an application with the ability to communicate via secure element is also disclosed. | 09-25-2014 |
20140289120 | VERIFICATION METHODS FOR FRAUD PREVENTION IN MONEY TRANSFER RECEIVE TRANSACTIONS - A computer system is operated to prevent fraud in a money transfer receive transaction. A send transaction request is received from a sender for a money transfer including a send amount. The sender is prompted to select one or more security inputs to be supplied by a receiver for redemption of the money transfer. A send transaction record is stored with the selected one or more security inputs in a server. A receive transaction request is then received from the receiver. The receiver is prompted for the one or more security inputs set for redemption of the money transfer, and the provided one or more security inputs from the receiver are received. The received one or more security inputs are authenticated, and release of funds in the send amount is authorized if the received one or more security inputs are authenticated. | 09-25-2014 |
20140289121 | METHOD FOR PROCESSING A PAYMENT - In a method for processing a payment, an electronic device receives transaction information related to a transaction and to a payment for the transaction, accesses a payment card via a portable payment device, cooperates with the payment card to generate a payment command to include at least the transaction information, establishes a session with a banking server, and transmits the payment command to the banking server under the session. The banking server identifies validity of the payment card based on the payment command, and processes the payment according to the transaction information afterward. The electronic device then receives a payment result generated by the banking server after completing the payment. | 09-25-2014 |
20140289122 | SYSTEMS AND METHODS FOR PROCESSING ELECTRONIC PAYMENTS USING A GLOBAL PAYMENT DIRECTORY - A computer system for use with a memory device for facilitating electronic payments to a payee from an account associated with a payor is provided. Payor profile information is stored in the memory device, which payor profile information is associated with the payor. A token identifier is created which is associated with the payor profile information. The token identifier is transmitted to a payee, for retransmittal of the token identifier by the payee to the computer system during a subsequent transaction between the payor and the payee. | 09-25-2014 |
20140289123 | System And Method For Providing Recovery For Victims Of Check Fraud - A method for a consumer or business to protect against loss associated with specified forms of check fraud. Upon purchasing checks, a consumer or business can subscribe to a check fraud protection program, for an additional fee. A consumer or business may purchase Check Fraud Protection for an additional fee independent of purchasing checks. The subscription will enable the consumer or business to obtain reimbursement from the service provider for the consumer's losses due to specified causes. The consumer or business reciprocally assigns any right of recovery from the consumer's or business's bank or financial institution to the service provider, which can then seek reimbursement from the bank, or financial institution and institute proceedings against the fraud perpetrator. Protection may be obtained for forged signatures, forged endorsements and altered check. A symbol to indicate such protection is also disclosed. | 09-25-2014 |
20140289124 | SECURE PAYMENT SERVICE AND SYSTEM FOR INTERACTIVE VOICE RESPONSE (IVR) SYSTEMS - A secure payment method includes receiving, by a merchant, a purchase request from a purchaser in a transaction. The merchant requests a payment that is in a specified medium and that is uniquely identified by a unique identification. A merchant computer controlled by the merchant receives the payment that is in the specified medium and that is uniquely identified by the unique identification. The transaction is authorized by the merchant in response to receiving the payment that is in the specified medium and that is uniquely identified by the unique identification. The specified medium is issued by a private third party. | 09-25-2014 |
20140289125 | SYSTEM FOR PERSONALIZED PAYMENTS VIA MOBILE DEVICES - Methods and apparatus for conducting a payment card system payment transaction initiated from a customer's mobile device. In an embodiment, the customer's mobile device processor receives transaction information from a payment services provider computer, and generates a request for a payment transaction including a customer identification code that identifies the customer's payment card account, the transaction amount, and instructions to transfer funds from the payment card account to a merchant payment card account. The method includes transmitting the payment transaction request to the payment services provider computer, receiving a challenge to provide at least one item of security information, transmitting the security information to the payment services provider, and then receiving a confirmation message indicating execution of the payment transaction. | 09-25-2014 |
20140289126 | System and Method for Managing Merchant-Consumer Interactions - A system for combining a payment mechanism with an offer to a consumer is described. The system includes a virtual payment account number generation engine to generate virtual payment account numbers that can be used by a consumer in a payment transaction at a merchant, the virtual payment account number generation service also operable to take a portion of the virtual payment account number and send it as a checkout code to a consumer using the consumer's mobile device, and an offer generation engine used to set rules for an offer to be sent to consumers, create a fund for the offer, and determine individual consumer's eligibility for the offer. The offer is associated with the checkout code such that the offer is processed as part of the payment during the payment transaction using the virtual payment account number. | 09-25-2014 |
20140297527 | SYSTEM AND METHOD FOR LOCATION BASED VALIDATION VIA MOBILE DEVICE - A system and method is presented for approving or disapproving a transaction requested by an initiating device based on a physical location of a mobile device associated with a user relative to a physical location of the initiating device. A user attempting to perform a sensitive action at an initiating device provides user data to the initiating device. After validating the user data, the system determines a mobile device associated with the user. In order to confirm the user data, the system determines a location of the initiating device relative to a location of the associated mobile device. If the mobile device is within a predefined proximity of the initiating device, the received user data is confirmed as valid and the transaction is approved. | 10-02-2014 |
20140297528 | METHOD AND SYSTEM FOR VALIDATING PERSONALIZED ACCOUNT IDENTIFIERS USING BIOMETRIC AUTHENTICATION AND SELF-LEARNING ALGORITHMS - A system and method for biometric authentication of a user using a personalised identification and associated biometric data therewith is disclosed. In one embodiment, a plurality of personalised identifiers and biometric data may be captured from a number of users and stored in a repository as stored records. The process of authentication may be divided into two phases. In the first phase, either a speech recognition or character recognition process may be applied in order to determine the text spoken or written by the user. Subsequently a few records may be fetched from the repository on the basis of text mapping. In the second phase, biometric authentication may be performed by comparing the biometric sample with the stored biometric data corresponding to the fetched records to uniquely identify a single user. Further a machine learning technique may be applied in order to periodically refine a plurality of models stored in the repository. | 10-02-2014 |
20140297529 | Point Of Access Device For Use With A Mobile Device - Methods and systems relating to enabling a transaction are described. The system includes a point of access device comprising a magnetic card reader adapted to read financial data stored on a magnetic stripe of a card, a fingerprint sensor adapted to detect fingerprint data of a user, a processor adapted to generate an analog signal encoding the financial data and the fingerprint data. The system further includes a transaction processing system comprising an interface for receiving the analog signal and a processor for processing the analog signal and enabling the financial transaction based on the processed signal. The system may further include a mobile phone coupled to the point of access device. The mobile phone receive the analog signal from the point of access device and transmits the analog signal to the transaction processing system. | 10-02-2014 |
20140297530 | System and Method for Transaction Authentication - Some implementations provide a method that includes: generating an association, at a mobile device, between a government-issued identification document of a user and a mode of payment; receiving, at the mobile device, a presentation of the government-issued identification document of the user to support a request for payment; validating whether the presented government-issued identification document is a valid identification of the user; and in response to validating the presented government-issued identification document, proceeding with payment by using the mode of payment. | 10-02-2014 |
20140297531 | VIRTUAL MONEY BALANCE BYPASS INQUIRY METHOD, SYSTEM AND COMPUTER-READABLE STORAGE MEDIUM - Provided is a virtual money balance bypass inquiry method, comprising: receiving a purchase demand submitted by a client, wherein the purchase demand contains the sum to be paid; receiving a balance inquiry request which is transmitted by the client in asynchronous mode, wherein the balance inquiry request contains the sum to be paid; inquiring the balance of a user account according to the balance inquiry request, and obtaining a result flag by comparing the balance of the user account with the sum to be paid; returning the result flag to the client in asynchronous mode. | 10-02-2014 |
20140297532 | ITEM-SPECIFIC MONEY TRANSFER METHODS AND SYSTEMS - The invention provides various systems and methods for implementing item-specific money transfers. The method includes receiving identification of an item, determining a vendor and a price of the item, and receiving, from a receiver, a money transfer request for an amount of the price of the item. The money transfer request identifies a sender. The method further includes sending the money transfer request to the sender, receiving, from the sender, authorization for a money transfer in an amount of the price of the item. The authorization includes an indication that funds from the money transfer are restricted for use only for the item. | 10-02-2014 |
20140297533 | SYSTEM AND METHOD OF ELECTRONIC PAYMENT USING PAYEE PROVIDED TRANSACTION IDENTIFICATION CODES - Computerized payment method using short, temporary, transaction ID (TID) symbols for secure payer (customer) financial transactions. Payees (e.g. merchants) register their unique ID telecommunications devices (e.g. Smartphone and phone number), and financial institution a payment server. When a payee (merchant) and wish to do a financial transaction, the payee requests a TID from the server for that amount. The server sends a TID to the payee, which the payee then communicates to the payer. The payer in turn relays this TID to the server, which validates the transaction using the payer device. The server then releases funds to the payee. The server preserves records for auditing, but security is enhanced because the merchant never directly accesses the customer's financial account. Use of GPS coordinates and/or payer provided Group IDs may also be used to reduce the number of symbols used in the TID while continuing to ensure uniqueness. | 10-02-2014 |
20140297534 | ACCOUNT PERMANENCE - A system and method for using derived account identifiers. The derived account identifiers are associated with a single permanent account identifier. Each derived account identifier is associated with a communication channel or portable consumer device. | 10-02-2014 |
20140304157 | IDENTITY THEFT AND FRAUD PROTECTION SYSTEM AND METHOD - A system and method protects users against theft of personally identifiable information during both online and offline purchase transactions, registration transactions and identity authentication transactions. The system initially obtains a user's personally identifiable information as storable computer data, establishes an anonymous email address on behalf of the subscribing user, provides the anonymous email address to an email recipient when the subscribing user sends an email to the recipient, receives email communications from the recipient at the anonymous email address, stores the routing information from the email communications, scrubs the email communications for electronic viruses, forwards the email communications received from the recipient at the anonymous email address to the subscribing user, and forwards email communications to the recipient that are sent from the subscribing user to the anonymous email address by matching the stored routing information without ever revealing the subscribing user's real email address to the recipient. | 10-09-2014 |
20140304158 | Processor Issuer Detection and User Level Stand-In Authorization - Embodiments of the invention are directed to systems and methods for stand-in processing using data driven capabilities. Transaction activity of an issuer may be monitored to detect a major incident and to automatically invoke stand-in processing. By modeling each individual account holder's behavior, improved authorization outcomes may be provided by a payment processing network during stand-in processing. | 10-09-2014 |
20140304159 | USING A MOBILE DEVICE AS A POINT OF SALE TERMINALWITH RECEIPTS - A method and system for conducting an online payment transaction through a point of sale device. The method includes receiving input from a user selecting an item for purchase through the point of sale device; calculating a total purchase amount for the item in response to a request from the user to purchase the item; and sending payment authorization for the total purchase amount from the point of sale device to a payment entity, in which the payment authorization is sent to the payment entity via a mobile communication device of the user. The method further includes receiving a result of the payment authorization from the payment entity through the mobile communication device; and completing the payment transaction based on the result of the payment authorization. | 10-09-2014 |
20140304160 | USING A MOBILE DEVICE AS A POINT OF SALE TERMINAL WITH A SERVER AND DIGITAL ARTIFACTS - A method and system for conducting an online payment transaction through a point of sale device. The method includes receiving input from a user selecting an item for purchase through the point of sale device; calculating a total purchase amount for the item in response to a request from the user to purchase the item; and sending payment authorization for the total purchase amount from the point of sale device to a payment entity, in which the payment authorization is sent to the payment entity via a mobile communication device of the user. The method further includes receiving a result of the payment authorization from the payment entity through the mobile communication device; and completing the payment transaction based on the result of the payment authorization. | 10-09-2014 |
20140304161 | USING A MOBILE DEVICE AS A POINT OF SALE TERMINAL WITH A SERVER AND RECEIPTS - A method and system for conducting an online payment transaction through a point of sale device. The method includes receiving input from a user selecting an item for purchase through the point of sale device; calculating a total purchase amount for the item in response to a request from the user to purchase the item; and sending payment authorization for the total purchase amount from the point of sale device to a payment entity, in which the payment authorization is sent to the payment entity via a mobile communication device of the user. The method further includes receiving a result of the payment authorization from the payment entity through the mobile communication device; and completing the payment transaction based on the result of the payment authorization. | 10-09-2014 |
20140304162 | System and Method for Data and Identity Verification and Authentication - A system for verifying and authenticating the identity of a user in a transaction. The user's identity is authenticated through the user's computer, tablet computer, mobile computing device, web browser (as a web-page, or as a plug-in for the browser), or other computing device by means of a single-use, time sensitive, system-generated transaction token and user selected system PIN. The user presents the transaction token to the vendor or merchant, which forwards a request for authentication to the system. The system prompts the user to confirm the transaction and enter the PIN into the device used to generate the transaction token. Upon confirmation, the transaction is completed. | 10-09-2014 |
20140304163 | FINANCIAL TRANSACTION SYSTEM WITH INTEGRATED ELECTRONIC MESSAGING, CONTROL OF MARKETING DATA, AND USER DEFINED CHARGES FOR RECEIVING MESSAGES - A method of performing financial transactions between users of accounts comprising electronic messaging and crediting and debiting of at least one financial account. The invention also allows each user to define a schedule of receipt charges associated with the identities of other users to be charged as compensation for accepting delivery of their messages. With the user's permission, a record of purchases made may be maintained in a marketing database, increasing the value of use's market identity and the corresponding value of receipt charges they user may collect. Major benefits of the invention include, but are not limited to: (1) electronic financial transactions are completed in a more secure manner with appropriate tracking and verification, (2) message recipients receive income from the value of their market identities, and (3) commercial enterprises can more readily identify individuals interested in receiving their commercial offers. | 10-09-2014 |
20140304164 | INVOICELESS TRADING AND SETTLEMENT METHOD AND SYSTEM - Methods and systems consistent with the present invention overcome the shortcomings of existing trading systems by providing an invoiceless trading system that creates incentives for customers to pay suppliers within a predetermined period of time, such as a settlement period. Specifically, the invoiceless trading system enables a customer to obtain a discount on orders placed with suppliers in return for an immediate payment (e.g., within 24 hours) by the customer. The supplier receives payment within the predetermined period of time, and the customer receives additional cash benefits by providing an early payment to the supplier. To communicate with and transfer funds between customers and suppliers, the invoiceless trading system may use an electronic gateway and a settlement bank. In addition to creating an incentive to embrace e-commerce, both customers and suppliers avoid the need to manually process orders and use invoices to complete transactions. | 10-09-2014 |
20140304165 | MOBILE COMMUNICATIONS DEVICE PAYMENT METHOD UTILIZING LOCATION INFORMATION - A method includes receiving, by a payment server, a request for a payment from a mobile communication device; and, generating, a request to verify the location of the mobile communication device. In response to receiving the location of the mobile communication device, determining whether or not to authorize the requested payment. | 10-09-2014 |
20140304166 | ALTERNATIVE PAYMENT METHOD FOR ONLINE TRANSACTIONS USING INTERACTIVE VOICE RESPONSE - A method for performing payments in remote transactions between a buyer and a vendor is provided. The method includes receiving buyer information from a vendor's network outlet when the buyer indicates a desire to purchase a selection at a later time through an Interactive Voice Response (IVR) center; providing a token to the buyer; receiving information about the token from the buyer through the IVR center; verifying the information about the token; transferring funds from a buyer account to a vendor account. Also provided is a system for processing payments in remote transactions including an IVR center to: receive a request for token from a buyer to purchase products from a vendor, and to receive information about the product; provide the token to the buyer; access a database, the database including information from vendor's and buyer's accounts; transfer funds from buyer's account to vendor's account upon buyer confirmation. | 10-09-2014 |
20140310171 | CERTIFIED PERSON-TO-PERSON PAYMENT SYSTEM - Disclosed is a system for providing certified person-to-person payments. The system is typically configured to (i) receive payment instructions from a payer, wherein the payment instructions include a payment account, a payment amount, an alias associated with a payee, and a payment certification request; (ii) determine that the payment account has funds sufficient to cover the payment amount; (iii) place a hold on funds in the payment account sufficient to cover the payment amount; (iv) communicate a payment certification code to the payer and a certified payment notification to the payee based upon determining that the payment account has funds sufficient to cover the payment amount; (v) receive the payment certification code from a payee; and (vi) transfer the funds sufficient to cover the payment to an account associated with the payee based upon receiving the payment certification code from the payee. | 10-16-2014 |
20140310172 | CERTIFIED PERSON-TO-PERSON PAYMENT SYSTEM - Disclosed is a system for providing certified person-to-person payments. The system is typically configured to (i) receive payment instructions from a payer, wherein the payment instructions include a payment account, a payment amount, an alias associated with a payee, and a payment certification request; (ii) determine that the payment account has funds sufficient to cover the payment amount; (iii) place a hold on funds in the payment account sufficient to cover the payment amount; (iv) receive a payment cancelation request from the payer; (v) determine whether a payment certification code has been communicated to the payer; and (vi), if a payment certification code has not been communicated to the payer, approve the payment cancelation request. | 10-16-2014 |
20140310173 | Syncing two separate authentication channels to the same account or data using a token or the like - Syncing two separate authentication channels to the same account or data using a token or the like is performed. Two authentication channels could be an online login and a mobile device login. Login for one channel creates a unique authentication code. When login from the second channel is desired, the login information is passed to the first channel device to obtain the appropriate authentication code. Then login at a service layer and data access are accomplished. | 10-16-2014 |
20140310174 | METHODS FOR CONDUCTING ELECTRONIC PAYMENT TRANSACTIONS WITH SCANNABLE CODES - One embodiment of the invention provides for making electronic payments by scanning a merchant 2D code located near the point of sale with the customer's cell phone and transmitting the code or data embodied by the code to a payment center where the merchant's account can be credited and the customer's account debited without transmitting account information over the airwaves. In another embodiment of the invention, both parties transmit the same randomly generated 2D code or data embodied by the code to the payment center where they are matched to each other and to the buyer and seller to process the transaction. In a further embodiment of the invention, an inked tattoo or barcode marking is employed as a password to authorize access to smartphone applications for example, to make an electronic payment over a threshold amount. | 10-16-2014 |
20140310175 | SYSTEM AND DEVICE FOR EXCHANGING CLOUD-BASED DIGITAL PRIVILEGES - A system includes one or more processors and computer-readable storage media storing instructions executable by a processor to storing a digital privilege in a cloud data store that is accessible by terminals which create the digital privilege and access rights associated therewith. When a request to exchange the access rights to the digital privilege for the digital privilege, or an attribute thereof, is received, the exchange is authorized based on satisfaction of one or more exchange criteria and the access rights are exchanged for the digital privilege (or an attribute associated therewith) while the digital good remains in the cloud data store. The access rights are deleted from the account of the user. | 10-16-2014 |
20140310176 | ANALYTICS RULES ENGINE FOR PAYMENT PROCESSING SYSTEM - According to some embodiments, a payment system authorization platform may receive an authorization message from an acquirer platform. The payment system authorization platform may determine that the authorization request meets a pre-determined condition and transmit information about the authorization message to an analytics rules engine, such as by transmitting the authorization message. The analytics rules engine may analyze the information about the authorization message in accordance with at least one rule to generate a result and transmit information about the authorization message to the payment system authorization platform, such as by transmitting a supplemented authorization message or an authorization approval decision. | 10-16-2014 |
20140310177 | UNIVERSAL PAYMENT MODULE AND SYSTEM - Methods, systems and instructions stored on computer-readable media for receiving an invoice associated with a buyer from a vendor that includes an invoice amount. The invoice is sent to the buyer. A buyer financial institution and a buyer account are determined. A check is received from the buyer to pay the invoice. A vendor financial institution and a vendor account is determined. A custodian financial institution and a custodian account is determined. An ICL is created based in part on the received check. The ICL includes the buyer account, the buyer financial institution, the custodian account, and the payment amount to transfer into the vendor account. The ICL is sent to the custodian financial institution to transfer the payment amount from the buyer account into the custodian account. An ACH transfer of funds in the amount of the payment amount from the custodian account to the vendor account is initiated. | 10-16-2014 |
20140310178 | SYSTEM AND METHOD FOR A MERCHANT DEBIT CARD PROGRAM INCLUDING A PLURALITY OF ISSUERS - A merchant debit card program is described that includes a plurality of authorized issuers for debit card accounts. The merchant debit card program includes a merchant loyalty program that provides rewards to enrolled debit card accounts. The authorized issuers provide management of the debit card accounts including customer statements, payment authorizations and customer service. Application data for a new debit card account is transmitted from the merchant to the selected issuer by a card processing system. Enrollment data to the merchant loyalty program may also be transmitted from the merchant to an authorized issuer by the card processing system. | 10-16-2014 |
20140310179 | MASS TRANSIT FARE PROCESSING SYSTEM - An implementation of a system and method for using existing identification token infrastructures for mass transit fare product entitlement and payment is provided. The system and method make use of tokens—usually issued by a third party—for identification purposes and optionally for settlement purposes. The system does not store information on the tokens and instead maintains access control data (i.e., “white” and “black” lists). This implementation differs from known systems that require specially issued credit cards that have dedicated mass transit functionality. | 10-16-2014 |
20140310180 | MOBILE DEVICE CREDIT ACCOUNT - Providing for a mobile communication device (MCD) credit account and credit transactions by way of such an MCD is described herein. As an example, a credit account sponsored by a financial or commercial entity can be associated with a unique ID of an MCD. The MCD can interface with another electronic device and initiate credit transactions, such as commercial purchases, credit transfers, currency conversions, and the like, via the interface. Further, rules provided by the sponsoring entity can guide such transactions, enforcing credit limits, for instance. A management component can then synchronize transactions conducted by the device with a server of a financial institution over a remote communication interface, such as the Internet or a cellular/mobile communication network. Accordingly, a mobile device can replace a traditional credit card in transacting credit business. | 10-16-2014 |
20140316984 | MOBILE DEVICE TRANSACTION METHOD AND SYSTEM - A method and system involves using continual authentication and transactional information in a probabilistic framework to provide user and transactional authentication and authorization. | 10-23-2014 |
20140316985 | SYSTEMS AND METHODS FOR VERIFYING IDENTITIES - A method for verifying the identity of one party on behalf of another party is provided. The method includes providing a money-transfer system and a communication system that communicates with the money-transfer system; receiving at the money-transfer system from the first party certain verification criteria for confirming the identity of a second party; and storing the verification criteria in the host computer system of the money-transfer system. When an ID is received from the second party at a money-transfer location; the verification criteria is retrieved from the host computer system; and the acceptability of the ID is determined in accordance with the verification criteria. If the identification device is acceptable, identification information is obtained from the identification device; and the identification information is processed to verify the identity of the second party. | 10-23-2014 |
20140316986 | GENERATION SYSTEMS AND METHODS FOR TRANSACTION IDENTIFIERS HAVING BIOMETRIC KEYS ASSOCIATED THEREWITH - A system for generating transaction settlement identifiers includes an arrangement configured to receive a biometric sample from a customer and an arrangement configured to use the biometric sample to select the transaction settlement identifier from a pool of predetermined transaction settlements. A mapping arrangement configured to map the selected financial transaction settlement identifier to an identifier of the customer also may be included. | 10-23-2014 |
20140316987 | SYSTEMS AND METHODS FOR PRE-AUTHORIZED MONEY TRANSFER TRANSACTIONS - Methods and systems which allow one or more money transfer transactions to be implemented in a manner which provides additional certainty to a receiving party are provided. In one embodiment, a money transfer service authorizes a sender to transfer up to a certain amount of money. With this authorization, a money transfer transaction regiment is established, while the money transfer service maintains an accounting of the balance to insure that the balance remains below the pre-determined authorized amount. In another embodiment, a money transfer services utilizes reliability criteria to authorize a sender to transfer money with the money and service charge being collected after the transfer is completed. | 10-23-2014 |
20140316988 | INSTANT AVAILABILITY OF ELECTRONICALLY TRANSFERRED FUNDS - A system and method for making funds of a transaction available to a user before a funding entry clears is provided. The system may be part of an on-line system configured to facilitate payments or fund transfers from users. In example embodiments, a transaction request from a user is received. A risk score indicating a perceived risk involved with releasing funds before the funding entry clears is computed. Funds of the transaction are caused to be released prior to the funding entry clearing a financial institution based on the risk score exceeding a transfer threshold. | 10-23-2014 |
20140316989 | AUTHENTICATING ONLINE USERS WITH DISTORTED CHALLENGES BASED ON TRANSACTION HISTORIES - In one embodiment, a system includes one or more processors having memory coupled thereto. The memory stores instructions executable to cause the system to perform a method that includes generating a request based on 1) transaction information that is available to a user and a service provider and relating to one or more transactions by a user, and 2) at least one user-specified preference as to a type of the transaction information upon which the request is based, communicating the request to a device of the user, receiving a response to the request from the user device, and determining the authenticity of the user based on the response. The request can be in visually or audibly form, such as a Captcha. | 10-23-2014 |
20140316990 | APPLICATION STORE INTERFACE FOR REMOTE MANAGEMENT OF CLIENT DEVICES - Example embodiments relate to an application store interface provided to enable remote management of client devices. In example embodiments, a server transmits an application store interface identifying applications available for installation by an administrative user associated with a number of client devices. The application store interface may then receive a selection of an application to be installed from the administrative user. In response, the application store interface may trigger installation of the selected application on each of the client devices by an agent executing on each device. | 10-23-2014 |
20140324695 | PAYMENT SYSTEM - The present disclosure relates to a system facilitating payment for goods or services, a method for providing an authorization signal, a method for payment and a vending machine. The present disclosure presents several views on how best to achieve | 10-30-2014 |
20140324696 | BILLING GATEWAY AUTHORIZE-AND-CAPTURE METHOD AND SYSTEM - A transaction is authorized by receiving an authorize API call from a merchant server, detecting a select carrier server, and transmitting an authorize request to the select carrier server. The carrier server will then reserve an amount of funds based on the authorization request. The authorized transaction is then recorded based on the authorize request. The consumer may then request to cancel the transaction. If a capture request is received, a determination is made whether the cancel request has been received and whether the authorized transaction has been cancelled. If the transaction has not been cancelled, a billing request is transmitted to the carrier server so that the carrier server charges for the transaction. | 10-30-2014 |
20140324697 | REMOTE TRANSACTION PROCESSING OF CONTENT - A method and system for conducting an online payment transaction through a point of sale device. The method includes receiving input from a user selecting an item for purchase through the point of sale device; calculating a total purchase amount for the item in response to a request from the user to purchase the item; and sending payment authorization for the total purchase amount from the point of sale device to a payment entity, in which the payment authorization is sent to the payment entity via a mobile communication device of the user. The method further includes receiving a result of the payment authorization from the payment entity through the mobile communication device; and completing the payment transaction based on the result of the payment authorization. | 10-30-2014 |
20140324698 | METHOD, DEVICE, ADD-ON AND SECURE ELEMENT FOR CONDUCTING A SECURED FINANCIAL TRANSACTION ON A DEVICE - A device, an add-on and a secure element for conducting a secured financial transaction are disclosed. The device comprises a central processing unit; a communication interface for establishing a communication between the device and a financial institution related to a financial account; an interface for acquiring data relating to the financial account; the secure element for processing at least a portion of the data relating to the financial account acquired by the interface; and control logic for acquiring a purchase amount to be debited from the financial account and for obtaining a transaction authorization from the financial institution related to the financial account, the transaction authorization being based, at least partially, on data processed solely by the secure element independently of data processed by the central processing unit. A method of conducting the secured financial transaction, and a computer program product for execution by the secure element are also disclosed. | 10-30-2014 |
20140324699 | SYSTEMS AND METHODS FOR LARGE-SCALE TESTING ACTIVITIES DISCOVERY - Embodiments of the invention relate in part to determining a testing model and providing a testing transaction score for transactions. The testing transaction score may indicate a likelihood that the transaction is a testing transaction. One embodiment of the invention discloses a method comprising receiving a first authorization message for a first transaction using an account, determining a testing transaction score for the first transaction using a testing model, and determining that the first transaction is a testing transaction based on the testing transaction score, wherein the testing transaction score for the first transaction is used for declining a second transaction using the same account conducted after the first transaction. | 10-30-2014 |
20140324700 | METHOD AND SYSTEM FOR PROCESSING OBJECT TO BE PROCESSED - A method and system for processing an object to be processed are disclosed in the field of Internet communication. In the method, a client device acquires data including: order data of the object to be processed, a first account of a first main body, and a user password. The client device transmits the acquired data to an instant messaging server. The instant messaging server forwards the data to a third party system. The third party system subtracts the total numerical value of the object to be processed from a first numerical value included in the first account of the first main body according to the data and adds the total numerical value to a second numerical value included in a first account of the second main body. | 10-30-2014 |
20140324701 | METHOD FOR COMPLETING PAYMENT BY USING TWO MOBILE TERMINALS - The present invention relates to the field of communications, and in particular, to a mobile payment method. A payment method is provided, including: receiving a money receiving request that carries first payment information and is sent by a money receiving terminal; receiving a payment request indicating that a payment is agreed from a paying terminal, where the payment request carries second payment information; verifying whether the first payment information and the second payment information meet a transaction condition; and after the verification succeeds, transferring, according to the second payment information, money from an account corresponding to the paying terminal to an account corresponding to the money receiving terminal. A money receiving request and a payment request are initiated at a same time through two channels, thereby reducing delays caused by various transaction message notifications, simplifying a transaction procedure, and accelerating a transaction process. | 10-30-2014 |
20140324702 | HIGH VOLUME SERIALIZED POSTAGE AT AN AUTOMATED TELLER MACHINE OR OTHER KIOSK - A system and method for retrieving a plurality of indicia are described. The method includes receiving, by a computer system associated with a postage provider a request from a user, the request including a number of the plurality of indicia, and a monetary value of each of the plurality of indicia; and authenticating the request. The method further includes verifying whether sufficient funds exist in an account of the user for the number and monetary value of the plurality of requested indicia. If the request is found authentic and the computer system determines that sufficient funds exist in the account of the user for the number and monetary value of the requested indicia, extracting the plurality of indicia. The method further includes assembling in a return message the plurality of indicia as at least one binary data message; and transmitting the message to a computer associated with the user. | 10-30-2014 |
20140330720 | System to utilize telecommunications data to authorize and activate equipment - This system enables equipment that previously has been activated by coin, bill, token, payment cards, etc to be activated from a telecommunications device, which will typically but not necessarily be mobile. The system maintains a database of registered users, their payment mode, prepaid or paid at time of service, account balance and allowed commands. The system is able to recognize when a message has been received from an authorized user and respond to that message with a return message as well as activating the equipment if appropriate and debiting the user's account or triggering an electronic payment in some cases. This system has a wide range of applications including but not limited to car washes, laundry machines, parking meters, vending machines, arcade games any equipment that is activated by payment or human attendant currently or which could benefit from the use of a remote activation capability. | 11-06-2014 |
20140330721 | SYSTEMS AND METHODS FOR VERIFYING AND PROCESSING TRANSACTIONS USING VIRTUAL CURRENCY - A payment processing system may be integrated with a centralized virtual currency issuing and transaction processing system to provide a standardized and more efficient virtual currency that can provide easier tracking of and use of a consumer's virtual currency balance. The payment processing system may implement a network communications systems that may allow the payment processing system to obtain additional consumer, merchant and transaction information for a transaction by data fields transmitted in a network header portion of a network communications protocol packet. The additional information may be stored and cross-referenced to provide greater transaction tracking data. | 11-06-2014 |
20140330722 | SYSTEM AND METHOD FOR USING AN ACCOUNT SEQUENCE IDENTIFIER - Embodiments of the invention provide for facilitating a transaction using a communication device associated with a user. Certain embodiments allow for provisioning a communication device for use with an enhanced primary account identifier. The enhanced primary account identifier includes a primary account identifier (PAI) and a primary account identifier sequence number (PSI). The PSI is unique to the communication device and may be de-provisioned if the communication device is lost or stolen. A replacement communication device may be provisioned for use with a newly gemerated unique PSI without having to generate a new PAI. | 11-06-2014 |
20140330723 | Credit Instrument And System Providing Multiple Services Including Access To Credit Services And Access To A Service Provider Club - An apparatus and methods for a card that allows a cardholder to set up auto-charge payment of dues and fees to a series of clubs, merchants or service providers. The card also may be used for other transactions that accept credit cards. The apparatus includes a database containing information of the associated clubs, merchants and service providers, so that applicants and cardholders can easily configure auto-charging for multiple business concerns in one sitting. The apparatus may process auto-charge transactions in an automated fashion without requiring a cardholder to submit payment authorization or the business concern to submit a charge for each payment. Inconvenience and administrative costs to the cardholder and the business concern are reduced. The system and method provide a competitive advantage to the associated business concerns to secure the initial account and then to maintain it. The system and method encourages card loyalty of both the card members and the business concerns to the card provider. | 11-06-2014 |
20140330724 | CREDIT CARD PROCESSING FOR A VEHICLE FLEET - Credit card transactions are processed and managed for a fleet of motor vehicles for hire. A plurality of simultaneous wireless communication connections is maintained between a respective plurality of vehicles in the fleet and a central control center. A plurality of messages is received at the central control center, each one of said messages including credit card transaction information. For each vehicle, the messages and said credit card transaction information are stored in the central control center in real-time or near real-time. A credit card transaction reconciliation report can be produced at any time, in response to a user request, for a motor vehicle identified in the user request. The credit card transaction reconciliation report utilizes the messages and credit card transaction information collected and stored in the central control center. | 11-06-2014 |
20140337215 | SYSTEM AND METHOD FOR UPDATING CARDHOLDER PERSONAL DATA WITH AVS SYNCHRONIZATION - A computer-implemented method of processing updated payment cardholder personal data. The method includes receiving, by a at least one processing device, updated personal data associated with the payment cardholder; obtaining, by the at least one processing device, data identifying at least one payment system entity with which the payment cardholder has a transaction history; and transmitting, by the at least one processing device, notification of the payment cardholder's personal data update to the identified at least one payment system entity. The receiving, obtaining, and transmitting by the at least one processing device are performed independent of administration by an issuing bank that issued a payment card to a payment cardholder. | 11-13-2014 |
20140337216 | FRAUD PREVENTION FOR TRANSACTIONS - Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, and include a method for fraud prevention. A method includes receiving registration information for a user, including identities of the user and an authenticating device and a payment source identifier, and storing the registration information. A payment authorization request relating to a transaction purported to be by the user and including the payment source identifier is received. Using the payment source identifier, the identity of the user and the authenticating device is retrieved. A communication is provided to the user including transaction information. The message is delivered to the user at the authenticating device. The method also includes receiving (and subsequently forwarding) either a payment authorization or a payment repudiation responsive to the communication from the user by way of the authenticating device. | 11-13-2014 |
20140337217 | CARD PRESENT FRAUD PREVENTION METHOD USING AIRLINE PASSENGER DETAIL - A system, method, and computer-readable storage medium configured to process cross-border transactions involving payment cards. | 11-13-2014 |
20140337218 | FRAUD PREVENTION FOR TRANSACTIONS - Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, and include a method for fraud prevention. A method includes receiving registration information for a user, including identities of the user and an authenticating device and a payment source identifier, and storing the registration information. A payment authorization request relating to a transaction purported to be by the user and including the payment source identifier is received. Using the payment source identifier, the identity of the user and the authenticating device is retrieved. A communication is provided to the user including transaction information. The message is delivered to the user at the authenticating device. The method also includes receiving (and subsequently forwarding) either a payment authorization or a payment repudiation responsive to the communication from the user by way of the authenticating device. | 11-13-2014 |
20140337219 | SECURE DATA STORAGE AND TRANSACTION SYSTEM - Embodiments of the invention are directed to a system, method, or computer program product for a transaction apparatus for secure data storage and consolidation of data for easy implementation and utilization during a transaction. The transaction apparatus may be configured, in various embodiments, for receiving, storing, encrypting, decrypting, encoding, decoding, accessing, transferring, writing, and/or presenting transaction data including, but not limited to, financial data, authentication data, identification data, health care data, access data, personal data, and/or other data associated with a user. As such, the transaction apparatus may receive data from a user and store the data. The user may then provide authorization to access the data. The user may then select the data to be copied to an output device associated with the apparatus. The output devices may include, but are not limited to, a writable transaction card, an E-ink display, the mobile device, and the like. | 11-13-2014 |
20140337220 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR THE RECEIPT OF TRANSACTION OFFERS - In general terms, embodiments of the present invention relate to apparatuses, methods, and computer program products for receiving transaction offers. For example, in some embodiments, a method is provided that includes (a) receiving information associated with a transaction; (b) storing, in a memory device, the information associated with a transaction; (c) receiving authentication information from a user to authenticate the user to enter into the transaction; and (d) enabling the user to enter into the transaction by using at least one of a magnetic swipe card writer, bar code display, or fingerprint reader. | 11-13-2014 |
20140337221 | SYSTEMS AND METHODS FOR BIOMETRIC AUTHENTICATION OF FINANCIAL TRANSACTIONS - Systems and methods are provided for authorizing a user in connection with a transaction at a transaction terminal. The systems and methods described herein enable a series of operations whereby a user using a mobile device can capture a code that uniquely identifies a transaction terminal. In addition the mobile device can also capture a user's biometrics, generate a biometric identifier and biometrically verify the user's identity by comparing the biometric identifier to a previously generated biometric identifier. If the user is biometrically authenticated the mobile device can generate a transaction request including, a user identifier, a mobile device identifier, and the transaction terminal code and transmit the transaction request to a system server. Based on the transaction request, the system server can further authenticate the user and/or approve the requested transaction. If the user is authenticated, the system server can instruct the terminal to advance the financial transaction. | 11-13-2014 |
20140337222 | DEVICES AND METHODS PROVIDING MOBILE AUTHENTICATION OPTIONS FOR BROKERED EXPEDITED CHECKOUT - Apparatuses and methods for brokered expedited checkout for e-shopping in telecommunication networks are provided. An apparatus is configured to facilitate checkout for a purchase by a user using user equipment from an e-shop in a telecommunication network. The apparatus has a processing unit configured to authorize the user, to access information related to the user, to respond to queries related to the user based on the information, and to mediate between a payment system and the e-shop in order to pay for the purchase. | 11-13-2014 |
20140337223 | MODULARITY IN A LEARNING SYSTEM - A system and a method are disclosed for managing the purchase and performance of a microlearning stack comprising a learning application and associated application services in a modular learning system by a learning user. Application services include access to tutoring services, learning facilities, learning tools, and other services associated with each learning application. Learning applications are stored in a modular learning system and include a variety of metadata used to determine compatibility to learning users and application services before purchase or performance of a microlearning stack. The modular learning system determines the purchase compatibility, performance compatibility and service availability of micro learning stacks before granting or denying purchase or performance of the learning application and associated application services in the requested stack. | 11-13-2014 |
20140337224 | Cardholder Changeable CVV2 - System and methods for countering credit card fraud comprising cardholder changeable card security code CVV2 (also known as CVC2/CID). It enables cardholder to optionally choose a CVV2 different from the one printed on the card, storing/recording it on card issuer database and from then on use it as a secret separate from the card, changing it as needed, for example on being notified of financial institution data breach, or after an online transaction that seemed risky or periodically as a security practice. Fraudulent authorization requests would be rejected when CVV2 submitted does not match cardholder changed value. This system may be implemented with no or modest change in existing credit cards; terminals, equipment, computer software and communication protocols used in transaction authorization. It may facilitate adoption by making cardholders active participants in fraud prevention with modest, optional, easy to comprehend change not tied to each transaction. | 11-13-2014 |
20140337225 | BIOMETRIC-BASED TRANSACTION FRAUD DETECTION - A method of identifying potentially fraudulent electronic transactions at an electronic transaction device may involve the transaction device receiving a transaction request for an electronic transaction. The transaction request may include a biometric credential sample and an authentication credential. Upon locating in the transaction history (i) no entry corresponding to the biometric credential sample or (ii) an entry comprising the biometric credential sample in association with the authentication credential, the electronic transaction device may insert into the transaction history a new entry comprising the biometric credential sample in association with the authentication credential and initiates completion of the electronic transaction. Otherwise, the transaction device may insert into the transaction history a new entry comprising the biometric credential sample in association with the authentication credential and generates an alarm signal identifying the electronic transaction as potentially fraudulent. | 11-13-2014 |
20140337226 | System and Method for Card Processing with Automated Payment of Club, Merchant, and Service Provider Fees - An apparatus and methods for a card that allows a cardholder to set up auto-charge payment of dues and fees to a series of clubs, merchants or service providers. The card also may be used for other transactions that accept credit cards. The apparatus includes a database containing information of the associated clubs, merchants and service providers, so that applicants and cardholders can easily configure auto-charging for multiple business concerns in one sitting. The apparatus may process auto-charge transactions in an automated fashion without requiring a cardholder to submit payment authorization or the business concern to submit a charge for each payment. Inconvenience and administrative costs to the cardholder and the business concern are reduced. The system and method provide a competitive advantage to the associated business concerns to secure the initial account and then to maintain it. The system and method encourages card loyalty of both the card members and the business concerns to the card provider. | 11-13-2014 |
20140337227 | SYSTEM AND METHOD OF SELECTING A VIRTUAL CARD APPLICATION - A novel system and methodology for conducting financial and other transactions using a wireless device. Credentials may be selectively issued by issuers such as credit card companies, banks, and merchants to consumers permitting the specific consumer to conduct a transaction according to the authorization given as reflected by the credential or set of credentials. The preferred mechanism for controlling and distributing credentials according to the present invention is through one or more publicly accessible networks such as the Internet wherein the system design and operating characteristics are in conformance with the standards and other specific requirements of the chosen network or set of networks. Credentials are ultimately supplied to a handheld device such as a mobile telephone via a wireless network. The user holding the credential may then use the handheld device to conduct the authorized transaction or set of transactions via, for example, a short range wireless link with a point-of-sale terminal. | 11-13-2014 |
20140337228 | System and Method for Facilitating On-Line Payment - The present invention relates to a system and method for facilitating on-line payment particularly for goods or services purchased via a merchant site on the Internet. The system enables payment from an existing customer account at a financial institution, but does not require the user to provide credit card details. The payment is implemented in real-time from the customer account to a merchant account via a financial institution application such as an Internet banking website. An interface is provided which is initiated via the merchant site and which then interfaces the customer computer to the financial application having access to the customer computer's account. The customer can then enter payment details directly with the financial institution to pay the merchant directly for the transaction. | 11-13-2014 |
20140337229 | ONLINE CHARGING SYSTEM - There is described an online charging system interacting with a telecommunication system for charging a service usage of an end-user and a related online charging method. In order to achieve a flexible rating logic it is suggested to execute a first rating session to determine a primary charge for a service according to a first rating logic and to execute a second rating session using at least part of session parameters from the first rating session to determine a secondary charge for the service according to a secondary rating logic. The secondary charge in stored in a secondary charging account which is associated with a primary charging account. | 11-13-2014 |
20140337230 | METHOD AND SYSTEM FOR SECURE MOBILE WALLET TRANSACTION - Provided is a system and method for reducing fraud related to payment using a mobile application. A method for a mobile transaction enables a server of a third party rather than a merchant and a consumer, to verify whether the consumer of the mobile transaction is valid or not in response to a verification request related to the mobile transaction. Accordingly, since the third party can verify whether the consumer of the mobile transaction and an application for purchasing are valid or not, verification reliability with respect to a mobile payment can be improved and thus damage caused by payment fraud can be remarkably reduced. | 11-13-2014 |
20140337231 | DEPILATION DEVICE - A method of pre-allocating amounts for payment transactions comprising: receiving by a payment service server a registration request to the service from a user's communication device, the registration request comprising information related to the user's payment means; allocating by the payment service a user ID to the user's communication device; receiving by the payment service server a request for allocating a sum of money from the user's communication device, the request comprising the user ID; checking by the payment service server if the sum may be allocated to the user; allocating by the payment service server the sum of money to the user; and sending by the payment service server a session ID to the user. | 11-13-2014 |
20140337232 | Transaction Validation by Location Based Services (LBS) - A commercial transaction is associated with a current location of a wireless device having location services enabled at the time of the transaction. The current location is compared to an entry in a database of associated merchants accepting transactions to the locations that they handle such transactions. If a match in location is found, the transaction may be validated. If the wireless device registered as the device of the person believed to be conducting the transaction is not at an expected or acceptable location at the time of the transaction, then the transaction may be flagged for possible fraudulent activity. At the time of the transaction, a software location based services (LBS) trigger is initiated to request validation of the transaction based on the wireless device's current location. | 11-13-2014 |
20140344150 | Real Time EFT Network-Based Person-to-Person Transactions - A system and method for processing person-to-person transactions using EFT (Electronic Funds Transfer) networks in real time is provided. The system may include an adaptive payment server including one or more processors configured to receive first identification information and second identification information from a sender communication device. The adaptive payment server may receive third identification information from a receiver communication device. The adaptive payment server may determine a sender account based on the first identification information. The adaptive payment server may determine a receiver account based on the third identification information. The adaptive payment server may process a person-to-person transaction based on the sender account and the receiver account via an EFT network. | 11-20-2014 |
20140344151 | System, Method and Article of Manufacture to Facilitate a Financial Transaction Without Unlocking a Mobile Device - A financial transaction is facilitated without unlocking a mobile device, where the lock screen wallpaper of a mobile device is dynamically set to an image having a scanning code (e.g., a QR code, a barcode, etc.) for use at a business location that the user is currently located. | 11-20-2014 |
20140344152 | METHOD OF PROVIDING SECURE PAYMENT AND TRANSACTION RECONCILIATION - A method of paying a merchant for a transaction associated with a program. The method including the steps of receiving a request from a merchant for a payment associated with a purchase, generating a payment identifier, generating a payment number having a predetermined limit amount and a predetermined expiration date, associating the payment identifier with the payment number and transmitting the payment number to the merchant for payment of the request. | 11-20-2014 |
20140344153 | MOBILE TOKENIZATION HUB - Embodiments of the present invention relate to systems and methods for implementing a mobile tokenization hub with a common tokenization capabilities (CTC) module that may provide tokenization for various entities in various contexts. For example, the CTC module can provide and store tokens for mobile payment transactions, transit transactions, digital wallet applications, merchant point of sale (POS) applications, personalization services, and the like. | 11-20-2014 |
20140344154 | CONTACTLESS MESSAGE TRANSMISSION - A system and method uses one or more repurposed data fields in a payment transaction message to pass the merchant consumable data from a mobile device to the merchant system using an existing channel. The merchant consumable data relate to loyalty or rewards. | 11-20-2014 |
20140344155 | OUT OF BAND AUTHENTICATION AND AUTHORIZATION PROCESSING - Methods and systems for providing data retrieved and analyzed as part of an authentication process for a user device to other entities of a transaction system are disclosed. This data can be used by other entities of the transaction system to enable more secure authorization processes for transactions. A risk score generated for a payment application server computer and the data used to generate the risk score can be leveraged to provide an issuer with more detailed data to ensure that the user engaging in a transaction is authenticated and that transactions being processed by the issuer are not fraudulent. | 11-20-2014 |
20140344156 | BUYER INITIATED PAYMENT - Transferring funds from a payment originator (or payor) to a payment beneficiary (or payee) pushes the funds directly to a beneficiary's bank. The beneficiary's bank is not required to actively pull funds into the beneficiary's account. An originator can use a publicly known beneficiary indicator to direct payment to the beneficiary. The publicly known beneficiary indicator can be publicly used without exposing a beneficiary account to unauthorized debits or fraud since it can only be used to make credits to the beneficiary account, e.g. a deposit-only account. A pre-settlement conversation is used between the two banks to verify and evaluate information about an upcoming transfer of funds to determine whether to accept the funds transfer. The messages in the pre-settlement conversation contain information about the transaction. | 11-20-2014 |
20140344157 | Method and device for carrying out cashless payment - In a method for carrying out cashless payments by means of mobile telecommunications terminals and at least one electronic payment processing center, wherein each telecommunications terminal has stored a subscriber identifier and the payment processing center has stored the subscriber identifiers of the participating telecommunication terminals and payment limits each assigned to the respective subscriber identifiers, the payment transaction is performed based on a transaction code generated by the payment processing center and transmitted to the mobile telecommunications terminal, from there to the cash register system of the payment recipient, and from there to the payment processing center along with the payment amount, where the transaction code is verified and the payment amount is matched with the respective payment limit. | 11-20-2014 |
20140344158 | SYSTEM AND METHOD FOR LINKED ACCOUNT HAVING SWEEP FEATURE - A computer-implemented method for facilitating electronic funds transactions is disclosed. According to one embodiment, the method may comprise the steps of: issuing a transaction card to a cardholder by associating the transaction card with a demand deposit account from which the cardholder is authorized to electronically disburse funds; receiving an authorization request for an attempted transaction between a merchant and the cardholder, the authorization request containing information associated with the transaction card and the attempted transaction; processing the authorization request based on one or more predetermined business rules; authorizing the transaction without immediately settling the transaction against the demand deposit account of the cardholder; and settling the transaction, at a time subsequent to the execution of the transaction, through automated clearing house (ACH) from funds retained within the demand deposit account of the cardholder. | 11-20-2014 |
20140351126 | SECURE SYNCHRONIZATION OF PAYMENT ACCOUNTS TO THIRD-PARTY APPLICATIONS OR WEBSITES - A two-factor approach for authenticating payment transactions between a third-party application and a consumer is facilitated by a transaction server via a consumer's mobile device. A first communication channel (e.g., the Internet) is used to request authorization, and a second independent communication channel is used for identity verification and authorization. The second channel is typically the user's mobile phone or other wireless communication device. In this way, authorization is de-linked from, but “synchronized” with, the communication channel used to purchase goods or services. | 11-27-2014 |
20140351127 | SYSTEM AND METHOD FOR PROCESSING FINANCIAL TRANSACTIONS FUNDED VIA LIMITED USE VIRTUAL PAYMENT NUMBERS - A method for processing a financial transaction funded via a virtual payment number includes: receiving, by an input device of a merchant, product details for at least one product to be purchased in a financial transaction; receiving, by the input device, a virtual payment number; receiving, by the input device, an indication of the virtual payment number as being a limited use number associated with a payment account, wherein said merchant can recognize said virtual payment number as a limited use number; generating, by a processing device, an authorization request for a financial transaction, wherein the authorization request includes at least transaction data, the virtual payment number, and a data element, wherein the data element indicates the virtual payment number as a limited use number; and transmitting, by a transmitting device, the authorization request to a payment network. | 11-27-2014 |
20140351128 | Multiple Payee Endorsement - A system or method may include steps of electronically maintaining a plurality of accounts for customers associated with a first financial entity and a second financial entity. Then electronically, receiving EDI data representative of a monetary fund amount, and an endorsement request associated with at least one account requiring multiple endorsements. Subsequently, electronically determining whether the endorsement request to the second financial entity is in accordance with a predetermined policy; and responsive to the endorsement request being approved, transmitting EDI data representative of the endorsement to the first financial entity. | 11-27-2014 |
20140351129 | CENTRALIZED VERSATILE TRANSACTION VERIFICATION - Example embodiments relate to centralized transaction verification. In example embodiments, a system may maintain a set of tracked attributes and a set of conditions, each condition to provide an indication of whether generally a transaction should be allowed based on at least one of the tracked attributes and an associated value. The system may receive transaction data packets from multiple heterogeneous transaction placement systems, each transaction data packet to relate to a particular transaction and to include any number attributes of any type and any formatting. The system may normalize each of the transaction data packets. The system may verify each of the transaction data packets by analyzing a subset of conditions where the conditions in the subset are related to the attributes associated with the particular transaction data packet. | 11-27-2014 |
20140351130 | Multi-User Funding Sources - A computer-implemented method includes receiving, from a processing network, a request to approve a transaction, with the request comprising identifying information of a first user who initiated the transaction and an amount of the transaction; determining, based on the identifying information of the first user, that the amount of the transaction is to be allocated among at least a first user account of the first user and a second user account of a second user; determining, based on the amount of the transaction, a first allocation amount that is allocated to the first user account and a second allocation amount that is allocated to the second user account; causing the first user account to be charged the first allocation amount and the second user account to be charged the second allocation amount; and transmitting, to the processing network, information indicative of approval of the transaction. | 11-27-2014 |
20140351131 | DELAYED PROCESSING WINDOW IN A PREPAID ARCHITECTURE - A method for maintaining a prepaid payment system comprises a user account that can be utilized to complete a purchase transaction with a merchant. A delayed processing window is introduced between a time when the merchant receives a payment approval notification from the payment system and a time when the payment system transmits a payment request to an issuer of a funding account associated with the user's payment system account. The payment system utilizes a user's stored value account maintained by the payment system to satisfy the requirements of a prepaid program, and therefore processes the payment request received from the merchant and transmits the payment approval notification without obtaining prior authorization from the issuer of the funding account. The payment system submits one or more payment requests for the funding transaction at a time after the completion of the purchase transaction between the user and the merchant. | 11-27-2014 |
20140351132 | RETURNS HANDLING IN A PREPAID ARCHITECTURE - A method for maintaining a prepaid payment system comprises a user account that can be utilized to complete a purchase transaction with a merchant. A delayed processing window is introduced between a time when the merchant receives a payment approval notification from the payment system and a time when the payment system transmits a payment request to an issuer of a funding account associated with the user's payment system account. The payment system utilizes a user's stored value account maintained by the payment system to satisfy the requirements of a prepaid program, and therefore processes the payment request received from the merchant and transmits the payment approval notification without obtaining prior authorization from the issuer of the funding account. The payment system submits one or more payment requests for the funding transaction at a time after the completion of the purchase transaction between the user and the merchant. | 11-27-2014 |
20140351133 | METHODS AND SYSTEMS FOR VALIDATING TRANSACTIONS - Methods and systems for validating transactions in an automated, secure, regulatory-compliant manner, in which a second party is presented with a graphic user interface that displays a multimedia presentation prepared by or on behalf of a first party, which provide the second party with an explanation of each document to be executed. The system includes a device for capturing the buyer's digital signature, and a recording device for capturing the actions and responses of the second party before the second party authorizes that the digital signature be associated with each document. In addition, the methods and systems according to the invention create and maintain digital files, which are available as a back up and for support in the unlikely event that there is a dispute regarding the transaction. | 11-27-2014 |
20140351134 | REGISTRATION PROCESS - A method, computer program product, and computing system for defining a domain name for purchase. A purchaser for the domain name is defined. A cell phone number for the purchaser is defined. The authenticity of the purchaser is confirmed based, at least in part, upon SMS messaging. An online presence is automatically generated at the domain name. | 11-27-2014 |
20140351135 | REGISTRATION PROCESS - A method, computer program product, and computing system for defining a domain name for purchase. A cell phone number is defined for a purchaser. A location of a device associated with the cell phone number is determined. The authenticity of the purchaser is confirmed based, at least in part, upon SMS messaging. An online presence is automatically generated at the domain name. | 11-27-2014 |
20140351136 | SYSTEM FOR AUTHORIZING ELECTRONIC TRANSACTIONS AND A METHOD THEREOF | 11-27-2014 |
20140351137 | METHODS AND SYSTEMS FOR PROVIDING A DECISION MAKING PLATFORM - A computer-implemented method of providing enriched transaction data for a transaction requiring an authorization is provided, the transaction performed using a computer system having a processor and a memory device. The method includes storing transaction data received from an input channel, the transaction data including a transaction identifier. An execution plan is retrieved based at least in part on the transaction identifier. The transaction data is processed across an enrichment processor based on the execution plan to generate at least one fraud score for the transaction. The transaction data is enriched to include at least one of the fraud score and an enriched data object. The enriched data is transmitted to an authorizing party for authorization. | 11-27-2014 |
20140351138 | Payment System for Vehicle Fueling - A secure wireless vehicle fueling payment system which provides a multi-factor authorization and identity scheme while encouraging vehicle occupants to remain in the vehicle while using a mobile device to initiate the payment transaction utilizing an mobile commerce site server to integrate with existing POS systems, fuel control networks, and fueling dispensers. | 11-27-2014 |
20140351139 | MULTI-TIER TRANSACTION PROCESSING METHOD AND PAYMENT SYSTEM IN M- AND E-COMMERCE - A server executes a protocol that automates transactions involving a customer and a merchant agreeing to trade money in the customer's account for goods or services available from the merchant. The protocol protects personal identifying information of the customer from disclosure to the merchant, and protects all parties from repudiation of the specific transaction. The protocol defines a pre-authenticated form of the specific transaction; obtains authorization from the customer and the merchant to commit on their behalf to the pre-authenticated transaction; and obtains authorization from the bank to commit resources for settlement with the merchant. After obtaining authorizations, a transaction clearance code is generated completing a record of the pre-authenticated transaction for non-repudiation, for proof of a right to receive settlement from the third party and for proof of a right to receive the goods or services from the merchant. | 11-27-2014 |
20140351140 | Authentication System and Method - Aspects of the invention relate to a customer authentication system for authenticating a customer making a request related to a customer account. The customer authentication system may include multiple application level data receiving and processing mechanisms for receiving customer requests and collecting customer data. The customer authentication system may additionally include a central authentication system for receiving the customer requests and customer data from the multiple application level data receiving and processing mechanisms, the central authentication system determining, based on authentication policy, whether the collected customer data is sufficient to authenticate each customer in order to fulfill the customer request. The central authentication system may return its conclusions and instructions to the multiple application level data receiving and processing mechanisms. The customer authentication system may additionally include a fraud policy system for centrally managing authentication policy implemented by the central authentication system. | 11-27-2014 |
20140351141 | Determining Status of Low-Cost Tags Used to Facilitate Mobile Transactions - Systems, methods and computer program products for facilitating payments using low-cost barcode or RFID tags are disclosed. Such tags can be attached or affixed to physical, real-world objects thus allowing the objects to be purchased using a customer mobile device, without the need for a dedicated, on-site point-of-sale system. The tags may be constructed from paper, metal, leather, plastic or some other low-cost material. The tag allows a unique visual identifier such as a tag code to be imprinted so that it can be read using a mobile camera or other sensor enabled telephone. | 11-27-2014 |
20140351142 | SYSTEMS AND METHODS FOR PROCESSING PAYMENT TRANSACTIONS - Embodiments of the disclosure can include systems and methods for processing transactions. In one embodiment, a computer-implemented method for processing proposed transactions can be provided. The method can include storing, by a service provider system comprising one or more computers, one or more issuer rules associated with the applicability of one or more payment accounts to proposed transaction; receiving, by the service provider system from a merchant computer, information associated with a proposed transaction, the information comprising one of an identification of a payment account or an identification of a consumer payment device; evaluating, by the service provider system utilizing the one or more issuer rules, the proposed transaction; and determining, by the service provider system based at least in part upon the evaluation, at least one of (i) a payment account to utilize in association with the proposed transaction or (ii) whether the proposed transaction will be approved or denied. | 11-27-2014 |
20140358778 | MULTI-LEVEL KNOW YOUR CUSTOMER (KYC) DATA COLLECTION AND VERIFICATION - Systems, devices, and methods for transaction processing are provided. A point-of-transaction device transmits a transaction request to a transaction information server. The transaction information server receives the transaction request, queries one or more storage records to confirm the identity of the customer to the transaction and to determine whether the customer is authorized to engage in the transaction. The transaction information server further establishes a record that ties the customer's identity to the transaction. If so, the transaction information server establishes a transaction identifier code and communicates the code to the point-of-transaction device. The point-of-transaction device communicates the transaction identifier code and at least a portion of the transaction request to a transaction authority. The transaction authority transmits a confirmation signal to the point-of-transaction device based on the transaction identifier code and the transaction request. | 12-04-2014 |
20140358779 | Method Of Conducting Financial Transactions Using A Phone Node In Communication With A Transactional Server - The present invention relates to a method of conducting financial transactions using a phone node in communication with a transactional server, wherein such method uses telephone numbers as identifiers to the financial values transacted. Each financial account is mapped to a plurality of value-related telephone numbers, wherein such numbers correspond to a payee. The payment transaction starts when a payer dials the value-related telephone number programmed with the financial value that corresponds to his financial account, then a telephony PBX node hangs up on the payer and the value is credited from the payer's financial account and is debited to the payee's financial account. In the method of the present invention, the payee maps the value-related phone number to the financial values, and stores said mapped data of the transactional server prior to conducting the financial transaction. The method of the present invention can be applied in person-to-person transactions, web payment transactions, merchant payments, or in vending machines. The present invention does not need any special infrastructure giving such invention an advantage. | 12-04-2014 |
20140358780 | ACCESS CONTROL SYSTEMS - Access control systems for computing devices retrieve an identifier (ID) of a physical key and determine whether the physical key has been paired. If the physical key has been paired, then the access control system generates an authorization signal equivalent to input of a valid password. If the physical key has not been paired, then the access control system determines whether the physical key is authentic and, if so, proceeds with a pairing process. In other embodiments, the physical key is used to redeem virtual credits exchangeable for value in an e-commerce interface. | 12-04-2014 |
20140358781 | SYSTEM AND METHOD FOR AUTHENTICATING AND SECURING ONLINE PURCHASES - The present invention relates to authenticating and securing online purchases. The present invention recognizes that an account holder may initiate a financial transaction from a home computer, cellular telephone, or some other electronic device or node which the account holder controls. Prior to initiating an online purchase, the present invention requires the account holder to upload or provide a unique identifier associated with the node to the financial institution associated with the financial account of the user. The financial account may thereafter check whether the request for an online transaction was initiated with the trusted node by comparing the unique identifier of the requesting node with the unique identifier on file for the user. If the unique identifiers match, the financial institution authenticates the financial transaction and allows it to proceed. If the unique identifiers do not match, the financial institution rejects the financial transaction. | 12-04-2014 |
20140358782 | TAP AND HOLD - When a user taps and holds a selection on a touchscreen display, such as a “buy” button, an action occurs. Subsequently, when the user releases the button (or performs some other action), another action initiates or occurs. The other action may depend on when the user releases the button, where the user moves a finger to on the display, information about the user, and/or the display or information on the device when the button is released. After the button is released, other selections or actions may be presented on the touchscreen sequentially such that the user can release the hold to choose the selection or on one screen such that the user can move to the desired selection for review and/or editing. | 12-04-2014 |
20140358783 | SYSTEMS AND METHODS OF GENERATING AND PROCESSING PAYMENT TRANSACTIONS USING ALTERNATE CHANNELS AND PAYMENT MODE - Systems and methods generate and process payment transactions using a virtual account for payment transaction which is generated and transmitted to a customer registered mobile device. The virtual account with a limited lifetime with single or multi use purpose is created for the associated bank account number and generated on-demand by the registered customer upon authentication which may be communicated using SMS, IVR, USSD, Mobile Apps, Smart Apps or NFC protocols to the registered mobile number for immediate use for payments which can be used for online purchasing, peer to peer payments, automatically read-out or to manually enter at a point of sale. The system also creates virtual point of sale (POS) to a substitute for hardware based POS payment devices during check out at a physical store to facilitate for accepting payments in different modes. | 12-04-2014 |
20140358784 | Method and System for Managing Derivative Work to Promote Voluntary Purchase of Lawful Work - A method and a system for managing a derivative work are provided, wherein a purchaser is authenticated as a lawful purchaser of a work or work voucher based on purchase information on the work or work voucher received by the system, and the authenticated purchaser is assigned a right to participate in the system for managing the derivative work, thereby essentially protecting a right of a right holder to the work. | 12-04-2014 |
20140358785 | SYSTEM AND METHOD FOR PAYING A MERCHANT BY A REGISTERED USER USING A CELLULAR TELEPHONE ACCOUNT - A system and method allows users to make purchases by charging or funding a prepaid debit card with their cell phone accounts by simulating a user roaming with their mobile device. | 12-04-2014 |
20140358786 | VIRTUAL CERTIFIED FINANCIAL INSTRUMENT SYSTEM - The disclosed embodiments include systems and methods for issuing a virtual certified financial instrument. The disclosed embodiments may be configured to receive a financial instrument request for a virtual certified financial instrument, generate a payor token and a payee token, generate a reference token from the payor token and the payee token using an algorithm rendering it computationally infeasible for the reference token to be derived from only one of the payor token and the payee token, and uniquely associate the reference token with the virtual certified financial instrument. The disclosed embodiments may also be configured to receive, from the payor device or the payee device, a financial instrument redemption request that includes a composite token, and redeem the virtual financial instrument in accordance with a confirmation that the composite token matches the reference token. | 12-04-2014 |
20140358787 | Commerce Card System And Method Of Using Same - A system and method for authorizing a transaction that includes a transaction device configured to send over a network information relating to a transaction and a commerce card and a transaction processing device configured to receive over the network the information sent by the transaction device and information sent from a mobile device associated with the commerce card. The transaction processing device is configured to authorize the transaction based on the information received from the transaction device and the information received from the mobile device. The transaction processing device can also authorize the transaction at last in part on criteria associated with the commerce card. | 12-04-2014 |
20140358788 | Method for Receiving an Electronic Receipt of an Electronic Payment Transaction Into a Mobile Device - According to one embodiment of the present disclosure, there is provided a method for receiving an electronic receipt of an electronic payment transaction into a mobile device, the method comprising: storing, into an installed application in the mobile device used to perform the electronic payment transaction, a unique transaction identity issued on the electronic payment transaction; generating, in a server, an electronic receipt issued on the electronic payment transaction; verifying that the electronic receipt matches against the unique transaction identity stored in the installed application; and receiving the electronic receipt into the mobile device in response to the verifying step determining that the electronic receipt matches against the unique transaction identity stored in the installed application. Also provided is a mobile device for receiving an electronic receipt of an electronic payment transaction and a system for receiving an electronic receipt of an electronic payment transaction into a mobile device. | 12-04-2014 |
20140358789 | ACQUIRER FACING FRAUD MANAGEMENT SYSTEM AND METHOD - Embodiments of the invention are directed to systems, apparatus, and methods for preventing merchant fraud by processing electronic payment transactions using acquirer rules. In some embodiments, a server computer can receive from an acquirer a rule to be applied to transactions conducted with a merchant. A plurality of authorization messages (e.g., request or response messages) can be received, each corresponding to a different transaction conducted with the merchant. An aggregate value can be calculated based on transaction data included in the authorization messages. It can be determined whether the aggregate value triggers the rule. If the rule is triggered, a transaction can be processed in accordance with a first protocol (e.g., by declining authorization or by withholding a settlement amount). If the rule is not triggered, the transaction can be processed in accordance with a second protocol (e.g., by proceeding with the transaction or releasing the full settlement amount). | 12-04-2014 |
20140358790 | METHOD AND SYSTEM FOR AUTHENTICATION AND PAYMENT BY USING PORTABLE TERMINAL - After a user and a dealer agree on business transaction, a password is inputted to a user mobile terminal ( | 12-04-2014 |
20140358791 | Systems and Methods for Providing Electronic Transaction Auditing and Accountability - Embodiments of the invention can provide systems and methods for electronic transaction auditing and accountability. In one embodiment, a method of providing electronic transaction auditing can be implemented. The method can include determining at least one unique identifier associated with a respective transaction. The method can also include communicating the at least one unique identifier to a destination server. In addition, the method can include receiving data associated with an electronic transaction and at least one unique identifier corresponding to the unique identifier previously communicated to the destination server and associated with the respective transaction. | 12-04-2014 |
20140365366 | SYSTEM AND DEVICE FOR RECEIVING AUTHENTICATION CREDENTIALS USING A SECURE REMOTE VERIFICATION TERMINAL - The present invention relates generally to a system and device for expanding the utility of remote payment technologies by way of a remote transaction card reader and keypad for the entry of an account PIN. More specifically, the device moves much of the functionality required for mobile payments away from a mobile card accepting appliance (e.g., a smartphone equipped with a card reader) to the disparate device. This arrangement isolates the processes of reading a transaction card a verifying an entered PIN into a secure tamper resistant device that communicates with a communication device (e.g., smartphone) by way of a secure channel on a wireless network. This arrangement provides for greater security and convenience for processing credit card and debit card based transactions, as the collection and processing of sensitive data is separated from the commercially available smartdevice, which inherently lacks sufficient security. | 12-11-2014 |
20140365367 | Peer-To-Peer Network For Master Purchase Agreements - A system, a method and a computer program product for peer-to-peer network for master purchase agreements are provided. A request sent by a user equipment associated with an entity to register with a network configured to enable sharing of a master agreement among a plurality of entities is received by a server. The server generates a notification representative of a master purchase agreement being available at the server for access by the plurality of entities and sends the generated notification to the plurality of entities registered with the network to notify that the master purchase agreement is available on the network. The server receives a message sent by the user equipment associated with the entity. The server then generates a response to the message request to enable the entity to perform viewing of the master purchase agreement or the authorization to make the purchase under the master purchase agreement. | 12-11-2014 |
20140365368 | SYSTEMS AND METHODS FOR BLOCKING CLOSED ACCOUNT TRANSACTIONS - A method for denying a payment transaction initiated by a user using a payment card associated with a blocked account is provided. The method may be implemented by a computing device coupled to a memory device. The method includes receiving by the computing device a request to block an account number from being used in connection with payment transactions, and storing the account number in the memory device as a blocked account number. The method also involves receiving by the computing device a request to verify that a new payment transaction as not being associated with a blocked account number, the verification request including a candidate account number. The method also comprises comparing the candidate account number with the blocked account number stored in the memory device, and denying verification of the new payment transaction when at least a portion of the candidate account number matches the blocked account number. | 12-11-2014 |
20140365369 | WEB-BASED ACCOUNT MANAGEMENT WITH ACCESS RESTRICTIONS - A payment account is administered with access restrictions using a payment system. Once the payment account is established, a consumer can request a payment of funds from the payment account to enter into a transaction. The transaction is identified, and account restrictions based on characteristics of the transaction are accessed. Payment is effected according to parameters of the transaction and subject to the account restrictions. The system and method have applications in casino gambling, use restrictions relating to Government subsidies, personal budgets and spending behavior, etc. | 12-11-2014 |
20140365370 | SYSTEM AND METHOD OF CONDUCTING AN AUTHENTICATION TRANSACTION - A system and method of conducting an authentication transaction; and a near field communication (NFC) enabled mobile device for conducting the authentication transaction. The method includes the steps of: storing data associated with one or more authentication certificates in a secure element of the NFC enabled mobile device; sending the data associated with the one or more authentication certificates from the NFC enabled mobile device to a server via a NFC enabled transceiver; verifying the authenticity of the one or more authentication certificates at the server; and upon successful authentication, sending transaction data from the server to the NFC enabled mobile device via the NFC enabled transceiver. | 12-11-2014 |
20140365371 | ELECTRONIC PAYMENT SYSTEM - A specially configured computer for transferring money to a merchant, company, or other individual. The computer may comprise a barcode receiver configured to receive a copy of a barcode generated by the merchant, a barcode decoder configured to decode the barcode information with an application, a data input configured to receive customer information in an application running on the customer computer, a payment interface configured to present an interface for transmitting a bank payment to the merchant, a transaction information transfer module configured to send the transaction information to a bank system, a bank payment initiator configured to send an instruction to the bank system to initiate payment using the bank system at a first time period; and send a confirmation to a payment service provider indicating payment was initiated; wherein the confirmation is sent within ten minutes of the first time period. | 12-11-2014 |
20140365372 | METHOD AND APPARATUS FOR MEDIATING COMMUNICATIONS - A method of mediating communications between a first computing device and a second computing device, by an intermediary computing device, comprising establishing a communications link to each of the first and second computing devices, receiving a first message from the first computing device, the content of the first message comprising information in a protected format, converting at least part of the information in the protected format to an unprotected format, and transmitting a second message to the second computing device, the content of the second message comprising at least part of the information in the unprotected format. | 12-11-2014 |
20140365373 | UNIFIED IDENTITY VERIFICATION - In some example embodiments, a system and method is shown that includes receiving a purchase request through an Electronic Payment Financial Network (EPFN), the purchase request including a token to identify a merchant server. The system and method further includes comparing the token against a merchant identifier value to determine that that token is assigned to the merchant server. Additionally, the system and method includes transmitting a purchase request authorization authorizing an online transaction, where the token and merchant identifier value are equivalent. | 12-11-2014 |
20140372301 | Payment Recipient Verification - Methods and systems are provided for sending payments electronically, wherein the user's certainty that the payments are being sent to the correct recipient are substantially enhanced. The user can request information from the recipient to verify the email address or phone number of the recipient. A communication can be sent to the recipient and the communication can request that the recipient send information that verifies the identity of the recipient to the user. For example, the communication can request that the recipient send a picture of the recipient, an audio voice file of the recipient, or a handwriting sample to the user. | 12-18-2014 |
20140372302 | PAYMENT GATEWAY WITH GATEWAY DATABASE - A merchant server includes a payment gateway and a gateway database. The payment gateway receives payment information from a payment page. The payment gateway adjusts an amount to be paid to produce an adjusted amount to be paid. The payment gateway forwards the adjusted amount to a payment processing entity for payment approval. The database includes end user data accessible by an end user identifier generated by the payment gateway using selected items within the payment information. The amount to be paid is adjusted by the payment gateway based on end user data accessed from the gateway database. | 12-18-2014 |
20140372303 | Online Authentication and Payment Service - System and methods of authentication and payment service, comprising an authentication server and a mobile device application. Using this service, a third-party website can utilize a secure and comfortable user sign-in and payment process. Once a user is registered to the service, he can use it to securely and comfortably sign-up, sign-in or make payments to any website which utilizes the service. | 12-18-2014 |
20140372304 | GEO-ENUMERATIVE DEVICEHOLDER AUTHENTICATION - A system, method, and software product are provided for fraud prevention in the field of payment instrument transactions without requiring registration. A computing device receives details of completed payment transactions. A number of recognition IDs are also received indicating locations of geolocation devices. A computing device then flags all received recognition IDs by deviceholder identification for a time period surrounding the completed payment transactions, and defines sets of flagged recognition IDs. The sets of flagged recognition IDs are then compared in generating candidate recognition IDs, which are associated with each payment instrument. Further iterations allow for limiting of the number of recognition IDs associated with each payment instrument. Other embodiments provide for faster matching by only considering recognition IDs from a certain geographic region or presenting time-limited offers to customers to purchase goods at specific merchants and then removing recognition IDs not associated with purchase at a merchant. | 12-18-2014 |
20140372305 | DETECTING UNAUTHORIZED CARD SKIMMERS - In an example embodiment, an automated banking machine that includes an anti-fraud arrangement that can deter effective operation of unauthorized devices attached to the machine. The arrangement allows for the machine's card slot bezel to be frequently exchanged for a differently configured card slot bezel, where the bezel configuration is displayed to a potential user. | 12-18-2014 |
20140372306 | APPARATUS AND METHOD FOR PROVIDING TRANSACTION SECURITY AND/OR ACCOUNT SECURITY - A transaction security apparatus associated with an account holder, including a memory device for storing information regarding a first account of the account holder which is capable of being used in performing a transaction with a counterparty, an input device, data entry device, or receiver, for inputting, entering, or receiving, data or information regarding the counterparty and information regarding an amount of the transaction, wherein the information regarding the counterparty includes information regarding a second account of or associated with the counterparty, a processing device for processing information regarding the transaction using information regarding the first account, information regarding the second account, and the information regarding the amount of the transaction, and further wherein the processing device generates a message containing information for requesting an authorization for the transaction, and a transmitter, wherein the transmitter transmits the message to a transaction authorization processing computer. | 12-18-2014 |
20140372307 | APPARATUS AND METHOD FOR PROVIDING TRANSACTION SECURITY AND/OR ACCOUNT SECURITY - A transaction security apparatus, including a receiver for receiving a first message containing information regarding a transaction involving an account associated with an account holder and information regarding a counterparty in the transaction, wherein the first message contains information regarding the first account, the counterparty, and a transaction amount, and the first message is transmitted from a first communication device associated with the account holder to the receiver via a communication network, a processing device for processing the information contained in the first message, determining whether the transaction is authorized or allowed or not authorized or not allowed, and generating a second message containing information regarding whether the transaction is authorized or allowed or not authorized or not allowed, wherein the second message does not contain information regarding the first account, and a transmitter which transmits the second message to a second communication device associated with the counterparty. | 12-18-2014 |
20140372308 | SYSTEM AND METHOD USING MERCHANT TOKEN - A merchant computer generates a token including a “pay-me” merchant account identifier and transaction data for a transaction conducted by a consumer. The merchant token can be obtained by a mobile communication device and transmitted to a payment processing network along with a device identifier for the mobile communication device and an authentication token provided by the consumer. The payment processing network can authenticate the device using the authentication token, retrieve a consumer account number based on the device identifier, and complete the transaction by pushing money into the merchant “pay-me” account from the consumer account. | 12-18-2014 |
20140372309 | SYSTEM AND APPARATUS FOR TRANSACTION DATA FORMAT AND FUNCTION VERIFICATION - A system for processing transaction data is provided. The system includes a transaction data format system receiving transaction data and generating transaction data format error data, such as when the transaction data is not in compliance with a transaction data format. The system also includes a transaction data rules system receiving the transaction data and generating transaction rule error data, such as when the transaction data is in the proper format but nevertheless violates a rule of one or more financial processing system. | 12-18-2014 |
20140372310 | METHOD AND APPARATUS FOR FACILITATING ONLINE PAYMENT TRANSACTIONS IN A NETWORK-BASED TRANSACTION FACILITY USING MULTIPLE PAYMENT INSTRUMENTS - A method and system for transferring value to a user of a transaction system including receiving from the user a request for value, evaluating the risk involved in providing the value by evaluating information accessible to the transaction system, selectively approving the request for value based on evaluating the risk involved, and distributing the value to the user. The information that is accessible to the transaction system may be stored at the transaction system or separated from the transaction system. The value may include funds, a line of credit, coupons, or gift certificates, and may be distributed over a period of time. The user may be a buyer or a seller. | 12-18-2014 |
20140372311 | APPARATUS AND METHOD FOR PROVIDING TRANSACTION SECURITY AND/OR ACCOUNT SECURITY - A transaction security apparatus, including a memory device for storing information regarding a first account of an account holder capable of being used in performing a transaction with a counterparty, an input or data entry device, or receiver, for inputting, entering, or receiving, data or information regarding the counterparty, an amount of the transaction, and for identifying or facilitating communication with, a counterparty communication device, wherein the information regarding the counterparty includes information regarding an account of the counterparty, a processing device for processing information regarding the transaction, wherein the processing device generates a first message containing information for requesting an authorization for the transaction, a transmitter, which transmits the first message to a transaction authorization processing computer, and a receiver which receives a second message transmitted from the transaction authorization processing computer. The second message contains information regarding whether the transaction is authorized or not authorized. | 12-18-2014 |
20140372312 | APPARATUS AND METHOD FOR PROVIDING TRANSACTION SECURITY AND/OR ACCOUNT SECURITY - An apparatus, including a receiver which receives a first message containing information regarding a transaction involving an account associated with an account holder and information regarding a counterparty involved in the transaction, wherein the first message contains information regarding the first account, the counterparty, and transaction amount, and is transmitted from a first communication device associated with the account holder to the receiver, a processing device or computer which processes the information contained in the first message, identifies or ascertains contact information for or regarding a second communication device associated with the counterparty, determines whether the transaction is authorized or allowed or not authorized or not allowed, and generates a second message containing information regarding whether the transaction is authorized, allowed, not authorized, or not allowed, and does not contain information regarding the first account, and a transmitter, which transmits the second message to the second communication device. | 12-18-2014 |
20140372313 | SYSTEMS AND METHODS FOR MOBILE TRANSACTIONS - In accordance with one or more embodiments of the present disclosure, systems and methods for facilitating financial transactions over a network include communicating with a user via a kiosk device and a mobile communication device over the network. In various implementations, the systems and methods include accessing at least one account related to the user, depositing funds into the account based on a cash deposit request received from the user at the kiosk device, and transferring funds from the account to one or more other accounts, related and/or unrelated to the user, based on a fund transfer request received from the user via the mobile communication device. | 12-18-2014 |
20140372314 | SYSTEM AND METHOD FOR PROCESSING CLOSED LOOP CARDS AT A MERCHANT POINT OF SALE - Disclosed herein are systems, methods, and computer-readable storage media for redeeming a closed loop card/code funded with an amount of money. The system receives, at a merchant, an indication from a consumer of a desire to sell a closed loop account not issued by the merchant and receives a confirmation, via a computing device, of an amount of money in the closed loop account. The system presents the consumer with an offer to buy the closed loop account and receives from the consumer an acceptance of the offer. The system processes the closed loop account to yield a processed closed loop account such as by transferring the account to one of the merchant and an entity and applies a benefit to the consumer based on the processed closed loop account. | 12-18-2014 |
20140372315 | METHOD AND SYSTEM FOR MANAGING DATA AND ENABLING PAYMENT TRANSACTIONS BETWEEN MULTIPLE ENTITIES - A system for conducting payment transaction includes a network-enabled server that communicates with one or more user devices, other network-enabled server computers, and a payment processing network server computer. The network-enabled server facilitates transactions between one or more merchants and users by a managing data flow and interactions between the merchants and the users, providing storage area for storing of all transaction related documents, and providing seamless integration with a payment processing network for payment processing. | 12-18-2014 |
20140379574 | SYSTEM AND METHOD FOR DETERMINING A COST IN ELECTRONIC COMMERCE TRANSACTIONS - A method for determining a cost in an electronic commerce transaction between a first user and a second user includes at least the steps of continuously or periodically assigning one or more values, based on a set of rules, to at least one entity selected from the group consisting of: first user, second user, and a transaction between the first user and second user, receiving a first user acceptance of a transaction identifying the second user and a first cost and a number of benefits if any, and calculating a second cost based on the first cost, the number of benefits if any, and one or more values corresponding to at least one entity selected from the group consisting of: the first user, the second user, and the transaction between the first user and second user. | 12-25-2014 |
20140379575 | CONTROLLING TRANSACTIONS USING NEAR FIELD COMMUNICATIONS DEVICE - Systems, methods, devices, and non-transitory media for controlling transactions using near field communications devices are described. A method includes accessing, in secure memory or a mobile communication device, data representing at least one transaction restriction associated with an authorized user of the mobile communication device; using the at least one accessed transaction restriction, determining whether a transaction data set representing terms of a proposed transaction is authorized; and if the transaction is authorized, transmitting to a networked payment processing resource data representing terms associated with the transaction data set and a payment request. | 12-25-2014 |
20140379576 | TRANSACTION APPROVAL FOR SHARED PAYMENT ACCOUNT - A primary user of a payment account may designate one or more secondary users who may access and utilize the primary user's payment account. When a secondary user is making a transaction using the payment account, the primary user may be notified in real time. The transaction may be delayed for a specified period of time until approval from the primary user is received. The transaction may be processed if approval from the primary user is received within the specified period of time. On the other hand, the transaction may be canceled or denied if the primary user disapproves the transaction or if the specified period of time has expired without receiving approval from the primary user. | 12-25-2014 |
20140379577 | METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA FOR PROVIDING FINANCIAL TRANSACTIONS - The present invention relates to computer-implemented methods, systems and computer-readable media for providing financial transactions. The method steps comprise initializing at least one transaction from a customer held device, wherein initializing comprises entering a network provider code, an acquiring institution number, a merchant identification number, a terminal identification number and sending a transaction request to an issuing institution. The method further comprises authenticating said transaction by said issuing institution, wherein authenticating comprises confirming said transaction by said issuing institution, sending said confirmation transaction to an acquiring institution and routing the confirmation to said terminal identification number by said acquiring institution and terminating said transaction at a merchant held device. | 12-25-2014 |
20140379578 | METHOD AND SYSTEM FOR CONDUCTING ON-BEHALF ELECTRONIC FINANCIAL TRANSACTION - A method of conducting an electronic financial transaction over a payment network on behalf of a customer is provided using a payment application stored in a mobile device of a facilitator, the method including: receiving transaction details of the electronic financial transaction in the payment application from the customer; generating a transaction request for the electronic financial transaction based on said the transaction details received; and forwarding the transaction request to a payment gateway for processing to carry out the electronic financial transaction over the payment network, the payment gateway having stored therein account details of a payment card linked to the facilitator from which funds are authorized to be deducted or to which funds are authorized to be credited based on the transaction request to pay for or receive funds from the electronic financial transaction on behalf of the customer in exchange for the facilitator receiving cash payment from or providing cash to the customer. There is also provided a system for conducting an electronic financial transaction on behalf of a customer, and a computer program product, embodied in a non-transitory computer-readable storage medium, including instructions executable by a computing processor to perform the above method. | 12-25-2014 |
20140379579 | SYSTEM AND METHOD FOR TRANSFERRING MONEY - A system to transfer money is disclosed. The system may have a voucher having a back facing, the back facing includes a removable covered area and a plurality of instructions, the removable covered area is scratched off and a plurality of personal identification numbers are disposed underneath the removable covered area and are exposed when the removable covered area is scratched off. The system also may have a money transfer non-transitory storage medium that generates a system payment screenshot and a payment options screenshot. The system also includes a method for transferring money from a first account to a second account. The system may have one or more unique PIN numbers processes payment to transfer or deposit a predetermined money amount or to pay one or more bills or products or services. | 12-25-2014 |
20140379580 | INTEGRATED ONLINE AND OFFLINE PURCHASE AUTHORIZATION - Method, systems, and apparatus for integrated online and offline purchase authorization. A card risk management system uses data of past transactions to expedite subsequent transactions. The data of past transactions can include records of past authorization, at a physical store, a purchase transaction by a buyer using a purchase card. The system records information on the purchase card and a user name, as provided by the user at the physical store, for authorizing the purchase transaction. A subsequent transaction can be an online transaction, by an online user having an online user account. The system can match the user name and the online user account in a unified authorization data store. If the match is successful, and upon determining that a purchase card used in the online transaction is the same as used in the physical store, the card risk management system can expedite authorization of the online purchase. | 12-25-2014 |
20140379581 | DYNAMIC PAIRING SYSTEM FOR SECURING A TRUSTED COMMUNICATION CHANNEL - A system, method, and computer-readable medium for securing a mobile financial transaction are provided. A table matches each one of a plurality of transaction risk levels to a corresponding one of a plurality of required user trust scores, correspondingly. A financial transaction risk level associated with a financial transaction is computed. A user trust score associated with the user is computed based on user identification data associated with the user. The financial transaction risk level is matched to a corresponding one of the plurality of transaction risk levels stored in the table. The one of the plurality of required trust scores that corresponds to the corresponding one of the plurality of transaction risk levels stored in the table is identified. If the user trust score is greater than or equal to the identified one of the plurality of required trust scores, then the financial transaction is authorized. | 12-25-2014 |
20140379582 | SYSTEM AND METHOD FOR PROCESSING FINANCIAL TRANSACTIONS USING A MOBILE DEVICE FOR PAYMENT - A method for processing a financial transaction includes: storing, in a database, a plurality of wallet data entries, wherein each wallet data entry includes at least a mobile device identifier and payment details associated with at least one payment account; receiving, by a receiving device, an authorization request for a financial transaction, wherein the authorization request includes at least a mobile device identifier and transaction data; transmitting, to a mobile computing device associated with the mobile device identifier, at least the transaction data; receiving, from the mobile computing device, an indication of a payment account for funding of the financial transaction; identifying, in the database, payment details associated with the indicated payment account in a wallet data entry including the mobile device identifier included in the authorization request; and transmitting, to an issuer associated with the indicated payment account, at least the payment details and the transaction data. | 12-25-2014 |
20150012430 | SYSTEMS AND METHODS FOR RISK BASED DECISIONING SERVICE INCORPORATING PAYMENT CARD TRANSACTIONS AND APPLICATION EVENTS - A method and system for evaluating a risk of fraud in a payment card transaction using a computer device coupled to a database are provided. The method includes receiving payment card transaction messages relating to a payment card account wherein the payment card transaction messages relate to interactions with a cardholder, an issuer of the payment card account, or an agent thereof. The method further includes receiving payment card account reputation messages that include historical data relating to the trustworthiness of the payment card account, comparing at least one data element in each payment card transaction messages to at least one data element in at least one of: the payment card reputation message and prior transaction history, and determining at least one of a risk of fraud of the transaction and a trustworthiness of the payment card account based on the comparison. | 01-08-2015 |
20150012431 | METHOD AND SYSTEM FOR PERFORMING TRANSACTIONS BETWEEN BUYERS AND SUPPLIERS - Method and system for performing transactions between buyers and suppliers, which by means of a transactions server centralise and supervise each one of the phases involved in the complete transactions, guarantying that an order made by a buyer to a supplier and a carrier is paid for and guarantying that the buyer does not pay the supplier and carrier until he has received the order under the agreed conditions. The process is completely automatic and establishes condition of sale and timeframes, which may be negotiated between the parties but which, once agreed, become binding for all parties concerned. The lender awards purchase credits to the buyers, so that once the agreed conditions and timeframes have been fulfilled, the corresponding payments may be made automatically. | 01-08-2015 |
20150012432 | SYSTEMS AND METHODS FOR MANAGING PERSONAL RECORDS ASSOCIATED WITH PAYMENT TRANSACTIONS - A method for processing a payment transaction and a personal record associated with the payment transaction is provided. The method includes receiving a request to authorize the payment transaction wherein the authorization request includes a cardholder ID and a payment transaction amount, and transmitting an authorization confirmation message to at least one of a cardholder computing device and a first service provider computing device. The method also includes receiving a request to process a personal record transaction associated with the payment transaction and a second service provider, and processing the personal record transaction including at least one of (i) storing the personal record in the memory, and (ii) transmitting the personal record to at least one of the cardholder and the second service provider. The second service provider may be the same as or different than the first service provider. | 01-08-2015 |
20150012433 | MOBILE IDENTITY - A user may have multiple online identities used to access multiple online services. The user may use the multiple online identities from a device. The system may detect that the multiple online identities connect from the device and determine that the multiple online identities are all associated with the user. Based on the common identification, various features may be enabled, including fraud detection and targeted advertising. | 01-08-2015 |
20150012434 | ONLINE AUTHENTICATION IN ACCESS TRANSACTIONS - Embodiments of the invention are directed to access transactions. A gate access device may interact with a payment card such as a credit card. The gate access device may generate and transmit a first authorization request message to a payment processing network computer. The first authorization request message does not include an amount for the transaction, but only contains identification information. A first authorization response message is transmitted back to the gate access device. At a later point in time, a second authorization request message containing the transaction amount is transmitted from the gate access device to the issuer, and a response is received from the issuer. | 01-08-2015 |
20150012435 | BANK ACCOUNT NUMBER VALIDATION - A method for validating payment information for an online transaction is provided. A payment server can receive two representations of the same payment information. The payment information can be validated if it is determined that the two representations match. If there is no match, or the payment information is otherwise invalid, the payment information can be repaired based on a trusted representation of the payment information, such as stored payment information or an image of an associated value token. Payment information can be received via one or more communication channels, and can be provided by one or more consumer devices. A merchant service provider can validate payment information and handle transaction processing on behalf of a merchant. | 01-08-2015 |
20150012436 | SYSTEM AND METHOD FOR FRAUD CONTROL - A system and method in accordance with exemplary embodiments may include systems and methods for providing fraud management, which may include, receiving account holder data, determining vertical spend patterns associated with merchants to define a merchant risk for each merchant, generating a transactional behavior patter for the account holder, and generating a fraud score and/or action set (e.g., refer/decline/queue for review) based on the transactional behavior pattern and merchant risk. Account holder data may include, for example, an account type, an account balance, account credits and debits, and transaction data including merchant name, location, and transaction details. | 01-08-2015 |
20150012437 | AUTHENTICATION SYSTEM AND METHOD USING MOBILE TERMINAL - Provided are an authentication system and method using a mobile terminal. The authentication method includes: includes: receiving a mobile terminal identifier and a card identifier from a user's mobile terminal, wherein the card identifier is obtained from a user's card by the user's mobile terminal via Near Field Communication (NFC); searching for a member identifier of the authentication system corresponding to the mobile terminal identifier; checking whether the card identifier received from the user's mobile terminal is included in a card identifier list registered with the authentication system along with the member identifier; and generating the result of user authentication based on the result of checking of whether the card identifier is included in the card identifier list. | 01-08-2015 |
20150012438 | METHOD AND SYSTEM TO CHARGE AN ACCOUNT - The present invention provides an account charging method used for charging a user account over a network, including: establishing an intermediary account; saving a second user's charging amount sent by a first user in the intermediary account; and if a confirmation message of receiving a payment is received from the first user, transferring the said charging amount to an account of the second user. The invention facilitates and expedites the charging process, and thereby improves the account charging efficiency, fully utilizes network resources, and greatly reduces the cost of account charging. The intermediary account of the invention can ensure the security and integrity of the account charging process, and thus eliminates the bottleneck of too few online banking users and low maximum payment limitation of the public edition of online banking, increases network usage efficiency, and takes full advantages of speed, convenience and low cost of online transactions. This enables mass users to charge their accounts without having to activate online banking and without any limitation to maximum amount of payment. | 01-08-2015 |
20150012439 | ELECTRONIC MONEY SERVER, ELECTRONIC MONEY SERVER PROGRAM PRODUCT, RECORDING MEDIUM, AND LOSS PROCESSING METHOD - The objective of the present invention is, with respect to a portable terminal which is provided with an electronic money function, to facilitate restoration of an original state if a terminal has been discovered, while preventing unauthorized usage of electronic money at a time of loss for a terminal which is provided with an electronic money function. If a terminal is lost, an electronic money server is accessed from a second terminal in order to perform a loss lock request. The electronic money server turns ON a loss lock flag corresponding to an electronic money ID in order to output a negative flag ON instruction for an electronic money function section at a point at which access has been made from the terminal. For the electronic money function section, by turning ON a negative flag, the electronic money function section is locked so that settlements and charges are disabled. | 01-08-2015 |
20150012440 | SECURE CREDIT CARD WITH NEAR FIELD COMMUNICATIONS - A near field communication device included in a secure transaction card provides an addition and/or transitional communication link for communicating secure transaction information. The near field communication device may be selectively engaged or disengaged and, when engaged, either active or passive modes of operation of the near field communication device can be selected. In the active mode, secure transaction information is transmitted upon establishment of a communication link with a complementary near field communication device. In the passive mode, secure transaction information is transmitted upon interrogation from a complementary near field communication device. Secure transaction information is generated and stored for transmission in a memory and at least a portion of the memory is erased or nulled upon transmission or upon expiration of a selected period of time. | 01-08-2015 |
20150012441 | PHYSICAL PRESENCE DIGITAL AUTHENTICATION SYSTEM - The interactive authentication system allows a consumer to interact with a base station, such as broadcast media (e.g., television and radio) or PC, to receive coupons, special sales offers, and other information with an electronic card. The electronic card can also be used to transmit a signal that can be received by the base station to perform a wide variety of tasks. These tasks can include launching an application, authenticating a user at a website, and completing a sales transaction at a website (e.g., by filling out a form automatically). The interaction between the base station and the electronic card is accomplished by using the conventional sound system in the base station so that a special reader hardware need not be installed to interact with the electronic card. The user is equipped with an electronic card that can receive and transmit data via sound waves. In the various embodiments, the sound waves can be audible or ultrasonic (which can be slightly audible to some groups of people). | 01-08-2015 |
20150019425 | METHODS AND DEVICES FOR FRAUD DETECTION DURING MOBILE PAYMENT - Methods, devices and servers for assisting a financial institution server in identifying a fraudulent financial transaction initiated via an electronic device are described. In one aspect, a method for verifying security information associated with an electronic device during a financial transaction between the electronic device and the financial institution server is described. The method is implemented by the financial institution server. The method includes: sending a request for security information associated with the electronic device to a wireless service provider server, the request including a phone number associated with the electronic device; receiving the security information from the wireless service provider server, the security information including at least a unique equipment identifier associated with the phone number or an operating state of the electronic device; and determining whether the financial transaction is authorized based on the received security information. | 01-15-2015 |
20150019426 | METHOD AND SYSTEM FOR APPLYING SPENDING LIMITS TO PAYMENT ACCOUNTS INVOLVING INSTALLMENT TRANSACTIONS - A method for identifying a spending budget for a payment account includes: storing, in an account database, a plurality of account data entries, each account data entry including at least an account identifier and a base monthly spending limit; storing, in an installment database, a plurality of installment data entries, each installment data entry including at least an account identifier and an installment amount; identifying, for a specific account data entry in the account database, at least one installment data entry where the included account identifier corresponds to the account identifier of the specific account data entry; calculating an effective monthly spending limit based on the base monthly spending limit and the installment amount included in each of the identified at least one installment data entry; and associating, in the account database, the calculated effective monthly spending limit with the specific account data entry. | 01-15-2015 |
20150019427 | SECURELY GENERATING TIME AND LOCATION BOUNDED VIRTUAL TRANSACTION CARDS USING MOBILE WALLETS WITHOUT INVOLVING THIRD PARTIES OR POINT OF SALE TERMINALS - Methods and systems may provide for generating a virtual transaction card based on a card value and one or more mobile usage constraints including a time bounded policy, wherein the virtual transaction card is invalid if the time bounded policy is not satisfied. Additionally, the virtual transaction card may be transmitted to a delegate mobile device. Other mobile usage constraints, such as location bounded policies and type of transaction policies may also be used. | 01-15-2015 |
20150019428 | SYSTEMS AND METHODS FOR DYNAMIC TRANSACTION-PAYMENT ROUTING - A mobile payment transaction aggregator designed to identify, on a per transaction basis, a payment processor from a plurality of available payment processors with the lowest processing fee for the given transaction. Additionally, the aggregator may bundle multiple payment transactions of a single consumer across multiple merchants for additional savings. | 01-15-2015 |
20150019429 | TRANSACTION PROCESSING WITH NON-INTERNET COMMUNICATION - Methods for purchasing of goods or services over the internet. A customer has a customer account set up at a bank with associated account information. The account information includes verification information for verification parameters, such as authorized computer identification, authorized delivery addresses, authorized user identification, authorized telephone caller identification, and/or other account information. An order is placed by a user via an ordering computer which provides order information. Such order information includes verification variables used by the bank. Verification and/or authentication using one or more variables of the customer account information is used by the bank to validate the order before assuring payment to the merchant. | 01-15-2015 |
20150019430 | TRANSACTION PROCESSING WITH PAYMENT AGENT - Methods for purchasing of goods or services over the internet. A customer has a customer account set up at a bank with associated account information. The account information includes verification information for verification parameters, such as authorized computer identification, authorized delivery addresses, authorized user identification, authorized telephone caller identification, and/or other account information. An order is placed by a user via an ordering computer which provides order information. Such order information includes verification variables used by the bank. Verification and/or authentication using one or more variables of the customer account information is used by the bank to validate the order before assuring payment to the merchant. | 01-15-2015 |
20150019431 | DIRECT DEBIT PROCEDURE - The invention describes a method of direct debiting a user by means of a mobile communication device comprising a secure element. The method comprises the steps of: receiving at least a part of an identifier provided by means of a backend system by means of the mobile communication device; storing the transmitted identifier in the secure element; initiating a data connection between the mobile communication device and/or the secure element and a reader device for preparing a transaction; transferring at least a part of the transmitted identifier to the reader device; verifying the identifier to be transferred to the reader device or transferred to the reader device in order to release a payment by means of a bank system. The invention further describes a mobile communication device and a system to perform the method in order to enable secure payment by means of a mobile communication device. | 01-15-2015 |
20150019432 | MOBILE PAYMENTS USING PROXIMITY-BASED PEER-TO-PEER COMMUNICATION AND AN INTENT-TO-PAY GESTURE - The disclosure generally relates to mobile payments using proximity-based peer-to-peer (P2P) communication and an intent-to-pay gesture. In particular, a mobile device may detect a distinctive intent-to-pay gesture from one or more signals generated with one or more sensors on the mobile device. For example, the signals may indicate that the mobile device was gestured against a passive target that may resonate to indicate that the intent-to-pay gesture was made. The mobile device may then receive transaction details over a proximal P2P connection in response to detecting the intent-to-pay gesture and send a message over the proximal P2P connection to complete the mobile payment in response to receiving an input confirming the transaction details. Furthermore, the passive target may be constructed to produce a distinct resonant response that can be used to identify the passive target (e.g., using a microphone on the mobile device). | 01-15-2015 |
20150019433 | METHOD FOR CARRYING OUT A TRANSACTION, CORRESPONDING TERMINAL AND COMPUTER PROGRAM - A method is provided for carrying out a financial transaction. The method is implemented within a terminal of a user wishing to carry out a transaction with a merchant. The method includes: receiving a merchant's identifier; receiving a piece of data representing a transaction amount; generating a transaction by using the user's terminal to the benefit of the merchant; and transmitting the transaction to a transaction management server. | 01-15-2015 |
20150019434 | MONEY TRANSFER TRANSACTIONS VIA PRE-PAID WIRELESS COMMUNICATION DEVICES - Systems and methods for performing money transfer transactions via a wireless communication device, such as a cellular phone, are provided. The wireless communication device may be associated with, or automatically linked to, at least one payment source account. The wireless communication device may be associated with at least one pre-paid payment source account. In one example, the wireless communication device is a pre-paid cellular phone and/or is associated with a pre-paid money transfer account. The wireless communication device may access a pre-directed phone number, e.g., *55, to access a money transfer service provider. Once connected to a money transfer service provider, a user may initiate a money transfer via the wireless device, which is optionally paid to a payee in-person at a money transfer service provider location. | 01-15-2015 |
20150019435 | SYSTEMS AND METHODS TO GENERATE A RECEIPT FOR A TRANSACTION - A system includes a transaction terminal that is configured to examine an authorization response for an indicator, which, when set, causes the transaction terminal to communicate with a portal to obtain content relevant to the receipt for the transaction approved by the authorization response. The content may identify the benefit of an offer applied to the transaction, which is not reflected in the authorization response. The content may direct the user to select an option regarding the delivery of the receipt. Options presented for selection include suppression of the printing of the paper receipt in favor of an electronic receipt transmitted to a communication reference of the user, printing a mini paper receipt in addition to transmitting an electronic receipt, and/or printing the full paper receipt at the transaction terminal. | 01-15-2015 |
20150026059 | Money Lending Via A Mobile Device - This disclosure provides a method that allows a person to request money be deposited into his or her account via a request from a mobile device. The method includes receiving a monetary request associated with a person, wherein the monetary request includes a specified amount of money. Additionally, the method includes debiting a first account associated with the customer. Further, the method includes crediting a second account associated with the customer. And in response to the crediting, the method includes transmitting a confirmation. In some embodiments, debiting the first account associated with the customer includes transmitting a premium message to a wireless device associated with the customer. Additional embodiments include debiting the first account associated with the customer by transmitting a debit request to a third-party. | 01-22-2015 |
20150026060 | Financial Alert Management System Having A Mobile Interface - A Financial Alert Management System (“FAMS”) for reducing the occurrence of a non-payment event of a negotiable instrument listing a monetary amount at a first financial institution (“1 | 01-22-2015 |
20150026061 | REAL TIME ANALYTICS SYSTEM - Improved real-time analytics systems are provided. An analytics system may be used to generate transaction scores for transactions. A method may comprise receiving a scoring request associated with a transaction, sending the scoring request to a plurality of scoring models including a production model, wherein each scoring model is operable to generate a transaction score in response to the scoring request, and wherein each scoring model may be implemented using a virtual machine, receiving a transaction score generated by the production model, and sending the transaction score to a server for approval or denial the transaction. | 01-22-2015 |
20150026062 | PAYMENT COLLECTION, AGGREGATION AND REALIZATION APPARATUSES, METHODS AND SYSTEMS - The payment collection, aggregation and realization apparatuses, methods and systems receive a communication message including a payment indication to transfer a payment amount to a payee; determine the communication message is originated from a user compute device before the user has registered with the payment system; obtain, from the communication message, a reference identifier referencing the user; generate a temporary profile including the reference identifier and information relating to the payment indication; receive, subsequent to receiving the communication message, payment account information of the user after registration of the user with the payment system; and automatically initiate a payment transaction for the payment indication from the temporary profile based on the payment account information. | 01-22-2015 |
20150026063 | TIME-VARYING SECURITY CODE FOR ENABLING AUTHORIZATIONS AND OTHER USES OF FINANCIAL ACCOUNTS - A portable device is provided that carries account data. The account data may include a security code having a value that is time-varying. The value of the security code may be programmatically varied based on at least one of an algorithm or event. Authorization and use of the account may be sought from an authorization agent using the account data provided on the portable device. | 01-22-2015 |
20150026064 | SYSTEM AND METHOD OF USING ELECTRONIC FUNDS TRANSFER TO COMPLETE PAYMENT FOR GOODS AND SERVICES - A system and method of using Electronic Funds Transfer (EFT) to complete payment for goods and services. An example method of operating a transaction terminal includes identifying items selected by a customer for purchase, determining a required payment amount for the items, obtaining identification information from the customer, obtaining contact information and payment information, including bank account information and bank routing number information, from a customer profile associated with the identification information, creating a check image, sending a request for payment message providing access to the check image and the payment information to a mobile communication device of the customer using the contact information in the customer profile, and receiving a reply message from the mobile communication device authorizing payment for the items via electronic funds transfer and including a | 01-22-2015 |
20150026065 | SYSTEM AND METHOD OF USING ELECTRONIC FUNDS TRANSFER TO COMPLETE PAYMENT FOR GOODS AND SERVICES - A system and method of using Electronic Funds Transfer (EFT) to complete payment for goods and services. An example method of operating a transaction terminal includes identifying items selected by a customer for purchase, determining a required payment amount for the items, obtaining identification information from the customer, obtaining contact information and payment information, including bank account information and bank routing number information, from a customer profile associated with the identification information, creating a check image, sending a request for payment message providing access to the check image and the payment information to a mobile communication device of the customer using the contact information in the customer profile, and receiving a reply message from the mobile communication device authorizing payment for the items via electronic funds transfer and including a 2D barcode containing the check image and the payment information. | 01-22-2015 |
20150026066 | User Terminal Location Based Credit Card Authorization Servers, Systems, Methods and Computer Program Products - Credit card transaction servers, systems, methods and computer program products receive information concerning a prospective credit card transaction with one of multiple credit card issuers and obtain location information from multiple wireless network providers for wireless terminal(s) that are associated with a user of the credit card for the prospective credit card transaction. The locations of the credit card transaction terminal(s) and the locations of the wireless terminal(s) are correlated, and authorization information for the prospective credit card transaction is generated based upon this location correlation. | 01-22-2015 |
20150026067 | Payment Card Terminal For Mobile Phones - Methods and apparatus, including computer program products, for payment card terminals for mobile phones. In general, data characterizing a payment card and a settlement amount for a transaction may be received, where the data is user-generated input and is received at a mobile phone associated with a mobile phone number. Wireless transmission of data characterizing a request to provide a payment card settlement service of a merchant account of a merchant account provider for the transaction may be initiated, where the wireless transmission is to be from the mobile phone over a carrier data network to an application server. Data characterizing authorization of settlement of the transaction with the payment card may be wirelessly received by the mobile phone from the application server. | 01-22-2015 |
20150026068 | FOCUS-BASED CHALLENGE-RESPONSE AUTHENTICATION - A method for authenticating an access attempt includes detecting an access attempt by a user device over a network. A challenge-response authentication is provided over the network to the user device. The challenge-response authentication includes an image having a plurality of image objects. The challenge-response authentication is operable to display the image such that at least one of the plurality of image objects is in focus and at least one of the plurality of image objects is not in focus. In response to providing the challenge-response authentication, an authentication response is received from the user device over the network, and it is determined whether the authentication response includes an indication of the at least one of the plurality of image objects that is in focus to determine whether to authenticate or deny the access attempt. | 01-22-2015 |
20150032617 | Secure Channel Payment Processing System and Method - The present invention relates to a method and system for performing fraud screening and choosing whether to accept or deny a transaction within any channel. The system may facilitate the fraud screening processing for the case where this channel is the offline card not present channel, which may be utilized for call center transactions. The system may include a server that receives a transaction request and performs a first fraud screening based on transaction information of the requested transaction. The server may further determine which operation to perform: whether to issue a final response right away (accept, reject) or whether to gather more information before issuing a final response. The information gathering may be an authentication method only usable in another channel (online channel or offline card present channel). The server may create an asynchronous payment, which secures the reservation of the good, while allowing performing the new channel authentication at a later time. Depending on the information gathering results, the server further determines which operation to perform: whether to issue a final response right away (accept, reject) or whether to gather information a second time before issuing a final response. This second information gathering may be a manual review. | 01-29-2015 |
20150032618 | Anti-fraud system and its method for on-line transaction with credit card - An anti-fraud system and its method for on-line transaction with credit card, comprising an on-line transaction anti-fraud system linked between at least an e-commerce client and at least a verification/authorization agency; said on-line transaction anti-fraud system and verification/authorization agency may implement corresponding verification or verification and authorization according to different trading levels of the credit card; said on-line transaction anti-fraud system consists of at least a multi-information verification module, at least a mobile phone real-time ID verification module, at least a database and at least a consumption behavior analysis module; said consumption behavior analysis module is used to analyze the historic consumption records of the credit card consumer in the database, judge the trading risk levels, and activate the multi-information verification module or the mobile phone real-time ID verification module specific to different verification mechanisms, so as to identify the risk of credit card on-line transaction. | 01-29-2015 |
20150032619 | COMMUNICATION NETWORK FOR COLLECTING DATA AND EXECUTING ELECTRONIC TRANSACTION SERVICES - In certain embodiments, a system for executing electronic transaction services comprises one or more interfaces operable to receive access credentials for a plurality of accounts held with a plurality of enterprises, wherein the plurality of accounts are associated with an entity and one or more processors communicatively coupled to at least one of the one or more interfaces, the one or more processors operable to access, account data from the plurality of accounts, monitor transactions in the plurality of accounts, determine one or more transaction patterns, determine one or more proposed transactions, wherein the one or more proposed transactions represent electronic transfers of funds involving one or more of the plurality of accounts, and determine one or more advantages to the entity associated with the one or more proposed transactions. | 01-29-2015 |
20150032620 | COMMUNICATION NETWORK FOR COLLECTING DATA AND EXECUTING ELECTRONIC TRANSACTION SERVICES - In certain embodiments, a system for executing electronic transaction services comprises one or more interfaces operable to receive service data related to a plurality of service requests, receive a first message identifying a user, an electronic transaction service, and a problem associated with the user and the electronic transaction service, communicate a second message to one or more service administrators identifying the user, the electronic transaction service, and the problem, receive, from at least one of the one or more service administrators, authorization credentials and a limit to the use of the electronic transaction service for the user, and one or more processors operable to determine whether the authorization credentials satisfy authorization criteria, and, if the authorization credentials satisfy the authorization criteria, apply the limit to a subsequent service request by the user. | 01-29-2015 |
20150032621 | METHOD AND SYSTEM FOR PROXIMITY FRAUD CONTROL - A method for authenticating a user in a payment transaction using a computing device includes: storing location data entries, each entry including a geographic location of a mobile device and a time; receiving an authorization request for a payment transaction, the request including an account identifier, location identifier, and authorization time; identifying a specific data entry where the included time is within a predetermined period of time of the authorization time; when the location included in the specific data entry is indicative of the mobile device being not present at the location of the location identifier, transmitting a request to a computing device associated with the account identifier for action by a user to prove their identity; receiving, data conveying the action taken by the user; and authenticating the user based on the received data and authentication information associated with a payment account corresponding to the account identifier. | 01-29-2015 |
20150032622 | ONLINE CREDIT RETURNS METHOD AND APPARATUS - A system, method, and computer-readable storage medium configured to enable an immediate online credit refund transaction. | 01-29-2015 |
20150032623 | SYSTEMS AND METHODS TO ENABLE PAYMENTS IN THE ABSENCE OF A POINT OF SALE DEVICE - A method and system for processing a transaction between a merchant and a consumer using a consumer mobile device wherein the consumer mobile device is in communication with a payment processing computing device having a memory are provided. The method includes receiving merchant data associated with the merchant, receiving a consumer alias associated with the consumer, receiving, a transaction request message from the consumer mobile device, the transaction request message including a merchant identifier, a transaction amount, a device identifier associated with the consumer mobile device, and consumer verification data, retrieving the account number based on the device identifier and the consumer verification data, retrieving the merchant data based on the merchant identifier, generating an authorization request message including the account number, the transaction amount, and the merchant data, and transmitting the authorization request message over a payment network to an issuer bank. | 01-29-2015 |
20150032624 | FRAUD DETECTION ENGINE AND METHOD OF USING THE SAME - A fraud detection system and method uses unique indicators for detecting fraud that extend beyond traditional transaction-based indicators. These unique indicators may include environmental information about a customer or a transaction. Such indicators may be used to identify fraud events based on computer-executable instructions that evaluate fraud risk. Further, an improved fraud detection system may include a learning component with a feedback loop. Also, authenticating and other information may be directed to the system for updating indicating data, fraud models, and risk assessments. | 01-29-2015 |
20150032625 | SYSTEMS AND METHODS FOR COMMUNICATING RISK USING TOKEN ASSURANCE DATA - Systems and methods for communicating risk using token assurance data are provided. A network token system provides a platform that can be leveraged by external entities (e.g., third party wallets, e-commerce merchants, payment enablers/payment service providers, etc.) or internal payment processing network systems that have the need to use the tokens to facilitate payment transactions. An authorization request message can include a token assurance level code that is indicative of a token assurance level associated with a generated token. External or internal entities may use the token assurance level to evaluate risk associated with a payment transaction that uses the token. | 01-29-2015 |
20150032626 | SYSTEMS AND METHODS FOR INTEROPERABLE NETWORK TOKEN PROCESSING - Systems and methods for interoperable network token processing are provided. A network token system provides a platform that can be leveraged by external entities (e.g., third party wallets, e-commerce merchants, payment enablers/payment service providers, etc.) or internal payment processing network systems that have the need to use the tokens to facilitate payment transactions. A token registry vault can provide interfaces for various token requestors (e.g., mobile device, issuers, merchants, mobile wallet providers, etc.), merchants, acquirers, issuers, and payment processing network systems to request generation, use and management of tokens. The network token system further provides services such as card registration, token generation, token issuance, token authentication and activation, token exchange, and token life-cycle management. | 01-29-2015 |
20150032627 | SYSTEMS AND METHODS FOR COMMUNICATING TOKEN ATTRIBUTES ASSOCIATED WITH A TOKEN VAULT - Systems and methods for interoperable network token processing are provided. A network token system provides a platform that can be leveraged by external entities (e.g., third party wallets, e-commerce merchants, payment enablers/payment service providers, etc.) or internal payment processing network systems that have the need to use the tokens to facilitate payment transactions. A token registry vault can provide interfaces for various token requestors (e.g., mobile device, issuers, merchants, mobile wallet providers, etc.), merchants, acquirers, issuers, and payment processing network systems to request generation, use and management of tokens. The network token system further provides services such as card registration, token generation, token issuance, token authentication and activation, token exchange, and token life-cycle management. | 01-29-2015 |
20150032628 | Payment Authorization System - A payment system determines a required level of authentication for a payment transaction by a candidate consumer, based on a correlation with transactions by other consumers related to the candidate consumer, identified for example from one or more social networks. The correlation may be based on geographical location, time and/or type of transaction. A high correlation may indicate a group activity which requires a lower level of authentication. | 01-29-2015 |
20150032629 | Systems and Methods for Appending Supplemental Payment Data to a Transaction Message - A managing platform for appending supplemental payment data to a transaction message receives a transaction message representative of a credit card transaction from a merchant or an associated financial institution. The managing platform uses the transaction data contained in the transaction message and other information to determine whether the transaction satisfies one or more payment rules previously established by the cardholder. If the transaction satisfies a payment rule, the managing platform appends supplemental payment data to the transaction message in a format specified by a financial institution associated with the cardholder. The supplemental payment data includes information identifying a secondary payment account associated with the satisfied payment rule. The managing platform subsequently transmits the appended transaction message to the financial institution associated with the cardholder. | 01-29-2015 |
20150039505 | DYNAMIC TRIAL SUBSCRIPTION MANAGEMENT - A network device receives a user's selection of a subscription to media content services that includes a designated trial period. The subscription includes access to both digital content and physical media content. The network device receives payment information, for the subscription, that includes a credit card number, a card security code, and a billing address. The network device grants, to a user account, a temporary entitlement for the digital content when the payment information is received and obtains verification of the payment information. The verification includes determining validity of the payment information and verifying that a minimum credit card balance is available on the credit card. The network device selects an updated trial period status from a group of options including terminating the temporary entitlement, extending the temporary entitlement for a first duration, extending the temporary entitlement for a second duration, and issuing credits for the physical media content. | 02-05-2015 |
20150039506 | METHODS AND SYSTEMS FOR PROVIDING 3-D SECURE SERVICE ON-BEHALF-OF MERCHANTS - Systems and methods for conducting 3-D Secure transactions on-behalf-of (OBO) merchants. In an embodiment, a payer authentication response (PARes) message indicating enrollment in the 3-D Secure OBO merchants authentication service is received from an access control server by a computer and stored. The computer later receives a purchase transaction authorization request message, determines that data of the purchase transaction authorization request message matches stored PARes message data, and then injects a UCAF into the purchase transaction authorization request message to generate an updated transaction authorization request message. The updated transaction request message is then transmitted to an issuer financial institution for 3-D Secure purchase transaction authorization processing. | 02-05-2015 |
20150039507 | Mobile device and authentication method for mobile payment system - A mobile device is utilized for a mobile payment system. The mobile device includes an identity module for storing an identity data; a communication module for communicating with a client and receiving a start signal to generate a notification signal; a processing module for executing an application program to obtain an authentication information according to the notification signal and determining whether the authentication information is legal according to a checking information to generate a switching signal; and a switching module for determining whether to connect the communication module and the identity module according to the switching signal; wherein the communication module reads the identity data stored in the identity module to obtain an identity result according to a conduction of the switching module, and transmits the identity result to the client. | 02-05-2015 |
20150039508 | EFFICIENT AUTHENTICATION OF A USER FOR CONDUCT OF A TRANSACTION INITIATED VIA MOBILE TELEPHONE - A method and system for authenticating a user for conduct of a transaction initiated by the user via a data-enabled telephone is presented. Efficient use is made of keystrokes on the data-enabled telephone. The data-enabled telephone is capable of initiating telephone calls over a telephone network and of engaging in two-way data communication with a data server in a network and the server enables conduct of the transaction. Caller identification information is received at the server. The information is associated with a telephone call request initiated by the user via the data-enabled telephone to a service number. The caller identification provides basis for authentication of the user and the caller identification information received at the service number is used to address a message to the user. Included in such a message is a logon key for use by the user in accomplishing the transaction. Thus the user can use the logon key to enter into data communication with the server for conduct of the transaction. | 02-05-2015 |
20150039509 | PORTABLE DEVICE FOR ELECTRONIC PAYMENTS - “Portable device for electronic payments” or “Electronic wallet calculator for cashless transactions” refers to a combined system of conversion, calculation and transmission of processed data for immediate and presencial payments and revenues, through portable or fixed devices of close but contactless communication, which, in most models, is similar to a wallet calculator or a mobile phone, in which the basic functions of arithmetic operations designed to be subtraction (debit) or addition (credit) are only performed, whenever two similar or compatible devices establish a link of connectivity and synchronization of the processed, encoded and encrypted data between themselves, in a secure and off-line way, using infrared, radio frequency of short distance, or other forms of “contactless” transmission. | 02-05-2015 |
20150039510 | SYSTEMS AND METHODS OF DIRECT BANK TRANSFER - A financial institution and a payment initiator may exchange public keys to enable the secure exchange of data. A business wishing to collect payment can provide its account information to the payment initiator. A customer wishing to pay can instruct the payment initiator to encrypt the business's account information along with details for a particular invoice and transmit the information to the financial institution. The financial institution can decrypt the information and initiate a transfer of money from the customer to the business. The financial institution may present the information about the transaction to the customer for modification or confirmation before initiating the transfer. The information may be sent from the payment initiator to the financial institution via the customer. After the payment has been initiated by the financial institution, a confirmation may be sent to the customer, the payment initiator, the business, or any suitable combination thereof. | 02-05-2015 |
20150039511 | MOBILE COMPUTING DEVICE, A METHOD FOR PERFORMING A TRANSACTION, AND A COMPUTER-READABLE STORAGE MEDIUM - Various embodiments provide a mobile computing device comprising: a communication interface configured in use to wirelessly transmit and receive data; and a controller configured in use to cause the communication interface to transmit payment information to an external device to perform a transaction, the payment information including account information received by the communication interface from a server device, the account information specifying an account for use in performing the transaction. | 02-05-2015 |
20150039512 | REAL-TIME CROSS-CHANNEL FRAUD PROTECTION - An artificial intelligence cross-channel fraud management system comprises a parallel arrangement of single-channel, fully trained fraud models that each integrate several artificial intelligence classifiers like neural networks, case based reasoning, decision trees, genetic algorithms, fuzzy logic, and rules and constraints. These are further integrated by the expert programmers and development system with smart agents and associated real-time profiling, recursive profiles, and long-term profiles. The trainable general payment fraud models are trained into channel specialists with channel-filtered supervised and unsupervised data to produce each channels payment fraud model. This then is applied by a commercial client to process real-time cross-channel transactions and authorization requests for fraud scores. A detection of fraud in one channel is used to immediately sensitize all the other fraud channel models to the involved accountholder. Low level, but broad spectrum fraud can be used to trigger all the accounts of a compromised accountholder or merchant data breach. | 02-05-2015 |
20150039513 | USER DEVICE PROFILING IN TRANSACTION AUTHENTICATIONS - A real-time fraud prevention system enables merchants and commercial organizations on-line to assess and protect themselves from high-risk users. A centralized database is configured to build and store dossiers of user devices and behaviors collected from subscriber websites in real-time. Real, low-risk users have webpage click navigation behaviors that are assumed to be very different than those of fraudsters. Individual user devices are distinguished from others by hundreds of points of user-device configuration data each independently maintains. A client agent provokes user devices to volunteer configuration data when a user visits respective webpages at independent websites. A collection of comprehensive dossiers of user devices is organized by their identifying information, and used calculating a fraud score in real-time. Each corresponding website is thereby assisted in deciding whether to allow a proposed transaction to be concluded with the particular user and their device. | 02-05-2015 |
20150039514 | Method and Apparatus for Identification Verification and Purchase Validation - A computer implemented method includes receiving a request for payment-related information at a wireless device. The method also includes communicating between the wireless device and a paired vehicle computing system (VCS) to verify the presence of a known vehicle. Further, the method includes transmitting requested payment-related information, responsive to the verification of the presence of the known vehicle. | 02-05-2015 |
20150046326 | DIGITAL CHECK SCANNER, SYSTEM AND METHOD FOR THE TRACEABILITY OF CHECKS - A digital check scanner ( | 02-12-2015 |
20150046327 | SERVER-BASED PAYMENT SYSTEM - A server based payment system for creating a transaction are provided, where a user can transfer electronic money to recipients selected from contact lists at one or more web based communication platforms. An access token is generated, which contains identity and privileges associated with a preexisting web-based user account. The system uses the received access token to retrieve a stored contact list for the user account. The contact list is processed to determine whether corresponding user accounts exist in the system. A processed contact with entries for which corresponding user accounts exist is sent to a user terminal. At the user terminal, a payment order is generated by selecting an entry from the list and indicating an amount to be transferred, and is transmitted to the system. A transaction is created that includes a data record with the amount to be paid, as well as initiator, and remittee. | 02-12-2015 |
20150046328 | SECURED POINT OF SALE TRANSACTION USING FINGERPRINT RECOGNITION - A method for operating a computerized system for processing cashless and cardless financial transactions, the method comprising the steps of: registering a user's fingerprint with an entity, by using the user's fingerprint to create a first image of the user's fingerprint and then storing the first image of the user's fingerprint in a digital database of the entity; associating the first image of the user's fingerprint, now registered, with at least one debit or credit account of the user; receiving, through a transaction device, a request to authorize a financial transaction, wherein said request comprises a second image of the user's fingerprint taken by the transaction device at the time the request to authorize the financial transaction is made; and, authenticating the request to authorize the financial transaction, by comparing in real time, through a computer network, the second image with the first image of the user's fingerprint. | 02-12-2015 |
20150046329 | NEAR SOUND COMMUNICATION (NSC) PAYMENT SYSTEM - Systems, methods, apparatuses, and computer-readable media for using near sound communication (NSC) functionalities to complete transactions are presented. According to one or more aspects, a payment server may receive a data message from a payor's telephone, and the data message may include a user-specified password. In response to validating the payor based on the user-specified password, a call may be initiated to the payor's telephone. Subsequently, a unique audio stream may be played over the call. The unique audio stream may be adapted to be captured by a merchant point-of-sale terminal for use in completing a transaction. In some arrangements, the unique audio stream may include encoded information identifying the payor and/or identifying an amount of funds to be paid. | 02-12-2015 |
20150046330 | TRANSACTION PROCESSING SYSTEM AND METHOD - A secure storage system securely stores customer information including, for a customer, payment account information, mobile communications device access information and customer verification information associated with mobile communications device identification information. Transactions can be conducted at a merchant system without the merchant system being provided with customer payment account details on presentation of the mobile communications device, payment being effected though the use of the secure storage system interacting with a merchant terminal device and an application on the mobile communications device. | 02-12-2015 |
20150046331 | MOBILE P2P - CROSS BORDER PAYMENTS - Systems and methods include receiving a request for a funds transfer to transfer funds from Sender to a Recipient, the request including a transfer amount and, as an identifier of the recipient, a destination mobile telephone number associated with the recipient; translating, based at least in part on a record of a mapping of the destination mobile telephone number to an account associated with the recipient, the destination mobile telephone number to a destination account number; and routing the funds transfer as a payment transaction using the destination account number. | 02-12-2015 |
20150046332 | BEHAVIOR TRACKING SMART AGENTS FOR ARTIFICIAL INTELLIGENCE FRAUD PROTECTION AND MANAGEMENT - An artificial intelligence fraud management solution comprises a development system to generate a population of virtual smart agents corresponding to every cardholder, merchant, and device ID that hinted at during modeling and training. Each smart agent is nothing more than a pigeonhole and summation of various aspects of every transaction in a real-time profile of less than ninety days and a long-term profile of transactions older than ninety days. Actors and entities are built of no more than the attributes the express in each transaction. In fact, smart agents themselves take no action on their own and are not capable of gesticulations. They are merely attributes, descriptors, what can be seen on the surface. | 02-12-2015 |
20150052053 | INTERNET SITE AUTHENTICATION WITH PAYMENTS AUTHORIZATION DATA - A system for identification by a payment cardholder of phishing and/or deceptive Websites is provided. The system includes an electronic storage device having a database of merchant or financial institution Website registration with a payment card network information stored therein. The system includes an access path for allowing access to the merchant or financial institution Website registration with a payment card network information. The system includes a processor for assembling the merchant or financial institution Website registration with a payment card network information in the database, and for communicating the assembled merchant or financial institution Website registration with a payment card network information to a payment cardholder that has been granted access to the database. | 02-19-2015 |
20150052054 | PURCHASING SERVICE PROVIDING METHOD, PURCHASING SERVICE PROVIDING APPARATUS, AND RECORDING MEDIUM - A purchasing service providing method includes transmitting, to a second computer, a request for payment delegation in which payment of a price of a product or a service to be purchased through a first computer is delegated to the second computer; receiving a payment request for the payment of the price from the first computer, the payment request including information of a name and the price of the product or the service; transmitting the payment request to the second computer, and conducting processing for the payment using funds when an instruction is received from the second computer, when a permission notification is received from the second computer and the price is more than a credit limit; and conducting the processing using the funds and updating the credit limit based on the price, when the permission notification is received and the price is less than or equal to the credit limit. | 02-19-2015 |
20150052055 | SYSTEM AND METHOD UTILIZING A ONE-TO-MANY PAYMENT BUTTON FOR COMPLETING A FINANCIAL TRANSACTION - A method implemented in an e-commerce system to facilitate transactions between a customer and a vendor is disclosed. The method comprising receiving a request for a bulk token for use in an advertising campaign. Generating a bulk token, wherein the bulk token includes at least a type field and amount field, and does not include an email field. Transmitting the bulk token to a vendor server. Receiving a reply email, wherein the reply email includes the bulk token. Decoding the bulk token. The e-commerce system may further perform a Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) validation and process the transaction, on a condition that the SPF and DKIM validations are approved. | 02-19-2015 |
20150052056 | METHOD FOR PERFORMING TRANSACTIONAL COMMUNICATION USING A UNIVERSAL TRANSACTION ACCOUNT IDENTIFIER ASSIGNED TO A CUSTOMER - A method for sending a transactional message assigns a universal transactional account (UTA) identifier to a customer, associates the assigned UTA identifier with a customer account corresponding to the customer, assigns an account network address corresponding to a service provider, stores, in a routing database, the UTA identifier in association with the account network address, creates, using a second terminal including a processor, the transactional message comprising the UTA identifier and a value, and sends the transactional message to the service provider, the sending the transactional message to the service provider including using the routing database to look up the account network address corresponding to the UTA identifier and transmitting the transactional message to the account network address. | 02-19-2015 |
20150058218 | Transaction Processing Method and Apparatus - The present disclosure relates to a transaction processing method and apparatus. The method comprises: reading a tag via a user device t obtain a provide identifier associated with a provider for a transaction; generating via the user device a user request containing the provider identifier and a user identifier associated with a user for the transaction; and transmitting the user request to a transaction server, wherein a provider request containing transaction information and the provider identifier has been sent to the transaction server and stored therein. | 02-26-2015 |
20150058219 | SYSTEM AND METHOD FOR WORKFLOW BEHAVIOR ALERTS - Embodiments of the invention are directed to systems, methods and computer program products for providing workflow behavior alerts. An exemplary apparatus is configured to monitor characteristics associated with user accounts, identify characteristics for further analysis that affect a value of the user accounts, detect an occurrence of a triggering event based at least partially on the analysis of the characteristics, where the triggering event is defined by one or more rules, initiate a first action in response to detecting the occurrence of the triggering event, wherein the first action comprises sending the user a notification that indicates the occurrence of the triggering event or processing at least one transaction associated with a user account, receive a request to reverse the at least one transaction processed, and reverse the at least one transaction processed in response to receiving the request. | 02-26-2015 |
20150058220 | PAYMENT PRE-AUTHORIZATION - A computing device may receive account information identifying a user account and may authenticate the computing device as authorized to configure pre-authorized transactions for the identified user account. The computing device may receive pre-authorization parameters specifying limitations on transactions to be performed using a payment card associated with the user account, the limitations being separate from limitations on use of the payment card specified in a cardholder agreement associated with the payment card, and may provide a pre-authorization request to a transaction authorization server authorizing transactions performed using the payment card, the pre-authorization request including the account information and the pre-authorization parameters. | 02-26-2015 |
20150058221 | TEXT-TO-PAY FOR REDEEMABLE CODES - A method and system of processing a sale of an article, a virtual article, a service or a functionality such as a game is described. A code is generated by a server. A charge request is transmitted to an account server to charge an account of a user for a value of the code. The code is transmitted to a user device. The code is then processed by redeeming the code, wherein redemption of the code includes receiving the code from a user device and in response allowing access to the user device to the article, virtual article, a service or a functionality. | 02-26-2015 |
20150058222 | Unified Identity Management for Mobile Web Payments - A method of facilitating a transaction is disclosed. The method includes generating a unique transaction identifier which is associated with a transaction to be per formed between a merchant and a user and which is embedded in a URL. The URL is displayed to a user wishing to perform a transaction via a mobile web browser. Using an application on the user's mobile device, the unique transaction identifier is extracted from the URL and transmitted to an information brokerage service. At the information brokerage service, transaction data is generated including payment information. The transaction data is transmitted to the user's mobile device or another computing device. The information brokerage service receives a transaction confirmation message from the user, and transmits payment details to a payment gateway or the merchant. A system for implementing the method is also disclosed. | 02-26-2015 |
20150058223 | AUTHORISING USE OF A COMPUTER PROGRAM - A method of authorising use of a computer program only able to be used when an authorised message is received from an authorising system includes providing an authorisation system, making a request to use a computer program, signalling the request to the authorisation system, the authorisation system recording the use of the computer program and providing the authorisation message to the computer program upon receipt of the authorisation message the computer program may be used. | 02-26-2015 |
20150058224 | Mechanism For Secure In-Vehicle Payment Transaction - Embodiments use a vehicle as a payment instrument to complete a payment transaction. A vehicle interface device (VID) coupled to the vehicle is used for transmitting payment account information to a merchant access device. The VID may be registered to the specific vehicle identification number (VIN) of the vehicle. Prior to transmitting the payment account information to the merchant access device, the VID may ensure that a mobile communication device is within the vehicle and/or that the VID is coupled to the correct vehicle. For example, the VID may compare the VIN of the vehicle to the VIN that is programmed to the VID. When the colocation of the VID with the mobile communication device and/or the correct vehicle is confirmed, the VID may forward payment account information to the merchant access device. | 02-26-2015 |
20150058225 | METHOD AND SYSTEM FOR AUTHORIZING CARD ACCOUNT TRANSACTIONS BY GEOGRAPHIC REIGON - A method and system for authorizing card account transactions by geographic region by providing data for a user interface displaying geographic regions and merchant locations each corresponding to the location of a merchant where a transaction using a card account may be initiated, receiving a user interface selection representing a request to authorize or restrict card account transactions, receiving authorization requests for desired transactions, and authorizing or restricting the transactions in accordance with the request. | 02-26-2015 |
20150066762 | AUTHENTICATION SYSTEM - Systems and methods for providing authentication include receiving an authentication passcode input through an input device of a user device from a first user. The first user is authenticated in response to the authentication passcode input matching at least one user authentication passcode in a database, and an authentication time period is associated with the authentication of the first user and allows the first user access to at least one application on the user device. A plurality of authentication factors are then detected using the user device, and plurality of authentication factors are not an authentication passcode input received through the input device. The plurality of authentication factors are then determined to match the at least one authentication profile in the database and, in response, the authentication time period is extended such that the first user is allowed continued access to the at least one application on the user device. | 03-05-2015 |
20150066763 | METHOD AND APPARATUS FOR CROSS CHANNEL MONITORING - Methods and apparatuses for detecting nefarious activity by providing to others false information and tracking the use of the false information to determine in what way unlawfully taken information is used across several banking channels are presented. An example system can be configured to introduce certain predetermined markers into account data when it is determined that a user's account has been compromised, for example, during an online banking session. In this way, when a party unlawfully takes the user's account information, that party will also copy the markers from the user's account data. Therefore, when the party attempts to use the user's account data, the party will also include the markers added to the user's account. The markers can be information that is added that does not affect the transaction so the transaction can be conducted, and the system can recognize that the transaction may be nefarious. | 03-05-2015 |
20150066764 | MULTI FACTOR AUTHENTICATION RULE-BASED INTELLIGENT BANK CARDS - System, method, and computer program product to implement four factor authentication rule-based intelligent bank cards, by receiving valid authentication information for a card associated with an account, verifying that a captured image of a person presenting the card matches an image of an authorized user of the account, analyzing the captured image to detect an emotion of the person, and performing a predefined operation to control access to the account upon determining that the detected emotion satisfies an emotion rule associated with the account. | 03-05-2015 |
20150066765 | PAYMENT APPARATUS AND METHOD - A method for performing a payment from a payer to a payee, wherein the method includes receiving a payment request for the payment, the payment request being generated in response to the payee requesting funds from the payer; generating a transaction code and payment details using the payment request, the transaction code being obtained by the payer; receiving the transaction code from the payer; and, in response to receiving the transaction code, providing at least some of the payment details to the payer including a payment amount and an indication of the payee, thereby allowing the payer to authorise the payment. | 03-05-2015 |
20150066766 | Secure Generation of a User Account in a Service Server - A method for providing user identification data in order to generate a user account containing user identification data in a service server that provides an electronic service, makes use of a user account. The user is registered in an intermediary agency and, on the basis of the registration of the user, the intermediary agency transmits to the service server, the user identification data as well as a request for the generation of the user account. This is done in such a way that the service server generates the user account, making use of the user identification data. The intermediary agency can serve as a trusted web platform for users and service providers, and can allow users to access services anonymously. The subject innovation also relates to an intermediary agency that is suitable to carry out the method, and it also relates to a computer program for carrying out the method. | 03-05-2015 |
20150066767 | METHOD AND APPARATUS FOR MANAGING SUBSCRIPTIONS - A subscription system allows a customer to establish a subscription to a product with one or more retailers (e.g., by establishing the subscription through a controller or central system). In one embodiment, a subscription may be established after receiving information that identifies a product. Terms of a subscription for the product are established, such as a frequency and a duration of the subscription. | 03-05-2015 |
20150066768 | METHODS AND SYSTEMS FOR VERIFYING CARDHOLDER AUTHENTICITY WHEN PROVISIONING A TOKEN - A computer-implemented method for verifying cardholder authenticity when provisioning a token is provided. The method uses an authentication server system having a processor and a memory. The method includes receiving, by the processor, a payment card account identifier provided by a payment requestor. The payment card account identifier for identifying a payment account associated with a cardholder. The method also includes determining a plurality of authentication data associated with the payment requestor, and performing an authentication process using the plurality of authentication data. The authentication process is configured to determine if the payment requestor is the cardholder. The method further includes determining an assurance level associated with the authentication process. The assurance level represents a level of confidence in the authentication process. Moreover, the method includes generating a token for the payment account, and storing the token with the payment card account identifier and the assurance level. | 03-05-2015 |
20150066769 | Method, Apparatus and System for Confirming Off-Line Customer Transactions - A method, apparatus or system confirms a customer transaction by using a computer having a processor, a memory and a communications interface. A transaction data generated by a point-of-sale device physically located at a merchant is received via the communications interface. The transaction data includes a merchant identifier, a first customer identifier, a transaction amount and a first date/time. A customer location data generated by a customer mobile device physically located at the merchant is received via the communications interface. The customer location data includes a second customer identifier, a location information and a second date/time. A customer transaction confirmation is generated whenever the transaction data matches the customer location data, and one or more actions are performed based on the customer transaction confirmation. | 03-05-2015 |
20150066770 | UNATTENDED RETAIL SYSTEMS, METHODS AND DEVICES FOR LINKING PAYMENTS, LOYALTY, AND REWARDS - Methods for generating a consumer profile. The method may include receiving a purchase authorization request including a card number from a consumer, generating, with a key module, a hash value of the card number and generating, at the server, a card identifier. The method may also include associating the generated card identifier with the generated hash value, storing, at a server database, the associated card identifier, and associating, with a processor, the card identifier with the consumer profile. | 03-05-2015 |
20150066771 | FAST ACCESS VECTORS IN REAL-TIME BEHAVIORAL PROFILING - An artificial intelligence fraud management system comprises real-time analytics process for analyzing the behavior of a user from the transaction events they generate over a network. An initial population of smart agent profiles is stored in a computer file system and more smart agent profiles are added as required as transaction data is input. Vectors are assigned to point to a run of profile data that all share the same atomic time interval. The vectors are rolled around to point to newer time intervals as they occur, retiring vectors to expired time intervals, and reassigning those vectors to point to the newer atomic time intervals. Vectors correspond to particular smart agent profiles (P) and are collected into lists stored in profile blocks with a meta-data header. Transactions that involve a particular entity are made quickly accessible and retrievable by such vectors. | 03-05-2015 |
20150066772 | INTEGRATED RISK ASSESSMENT AND MANAGEMENT SYSTEM - Embodiments of the present invention relate to systems, apparatus, methods and computer program products for integrated risk assessment and management. More specifically, embodiments of the present invention provide for a risk database that collects and/or receives transaction data. In other embodiments of the present invention, the risk database collects and/or receives asset data and liability data associated with multiple financial institutions. The data is accessed to monitor customers' risk and one or more risk management actions are initiated based on the monitored customer risk. | 03-05-2015 |
20150066773 | CLAIM RATE BLACK BOX - Apparatus for electronically modifying a rule-based relationship between bank and a merchant is provided. The apparatus may comprise a receiver configured to receive information relating to a plurality of merchant transactions and a plurality of claims associated with at least a portion of the merchant transactions. The apparatus may further comprise a processor configured to calculate a first value, the first value corresponding to a sum of the plurality of claims divided by a sum of the plurality of merchant transactions. The processor may be further configured to electronically divide the first value by an industry benchmark value. In the event that the resultant value is greater than a predetermined threshold value, the processor may be further configured to electronically modify a database storing data corresponding to rules defining the relationship between the bank and the merchant. | 03-05-2015 |
20150066774 | TRAVEL INFORMATION COMMUNICATION SYSTEM - Embodiments of the invention are directed to apparatus, methods, and computer program products for a travel flag communication system. In some embodiments, an apparatus is configured to: receive a first status associated with a user account; receive information from a user associated with the user account, wherein information comprises at least a start date of travel, an end date of travel, and at least one destination of travel; change status of the user account from the first status to a second status based on at least the start date of travel and the destination of travel; and revert status of the user account to the first status based on at least the end date of travel. | 03-05-2015 |
20150066775 | Transferring Funds Using Mobile Devices - Aspects of this disclosure relate to a method for transferring funds involved in a financial transaction of a customer by utilizing the mobile device of the customer, including determining device identification data for a mobile device, associating the device identification data to a financial account of a customer, receiving a fund transfer request that includes data identifying the mobile device and an amount of funds to transfer from the financial account of the customer to a financial account of the seller, verifying the fund transfer authorization based on the device identification data, and initiating the fund transfer between the customer's financial account and the financial account of the seller. | 03-05-2015 |
20150073985 | Selectively Using Degree Confidence for Image Validation to Authorize Transactions - An embodiment of the invention provides a method for selectively using degree confidence for image validation to authorize transactions, wherein a request to authorize a transaction is received, the request including a user's name, a photo of the user, and a transaction value. A database is queried with the user's name to identify one or more reference photos of the user; and, the received photo of the user is compared to the reference photo of the user with an analysis engine to generate a confidence value. An authorization threshold is determined with a processor based on the transaction value. The transaction is authorized when the confidence value is equal to and/or greater than the authorization threshold. | 03-12-2015 |
20150073986 | ELECTRONIC CHECK-BASED PAYMENT SYSTEM AND METHODS FOR ISSUING, TRANSFERRING, PAYING AND VERIFYING ELECTRONIC CHECKS - The invention relates to the sphere of information technologies, in particular, to electronic systems and monetary-fund circulation methods and can be used for solving problems of mutual settlements between participants of the electronic payment system in real-time mode. In doing so, the analogue of monetary funds in the invention presented are electronic bank bearer checks complying with bank regulations and the requirements of applicable legislation. The client application units are rendered as grouped into modules by categories corresponding to the user status determined by the unit of authorization of the client and server applications, with provision of the possibility of pre-setting a group of check circulation parameters for each category. The issue of checks is accompanied by the creation of legally-valid documents and reflection of transactions in the check register. | 03-12-2015 |
20150073987 | FRAUD DETECTION SYSTEM, METHOD, AND DEVICE - The present invention provides a method of authenticating a transaction, the method having: responsive to receiving a request for authenticating a transaction involving a first device and including first device information defining at least one first device characteristic of the first device, obtaining second device information defining at least one second device characteristic of a second device associated with the transaction; determining a level of correlation between the first device information and the second device information; and authenticating the transaction based on the level of correlation between the first device information and the second device information, wherein the transaction is authenticated when the level of correlation between the first device information and the second device information is above a pre-determined threshold. | 03-12-2015 |
20150073988 | Methods and Systems of Facilitating Payments on a Payment Card Network - Methods and systems are provided for processing a transaction requesting payment of a first amount to a recipient. An exemplary method is performed at a network node of the system and comprises: identifying at least one payment parameter associated with the transaction; determining, in accordance with the at least one payment parameter, a plurality of account numbers associated with the transaction; and for each of the determined account numbers: determining a respective payment amount and a respective payment provider associated with the account number; and transmitting, to the determined payment provider, a subsequent request for payment of the determined payment amount. | 03-12-2015 |
20150073989 | SYSTEMS AND METHODS TO TRANSMIT CONSUMER INFORMATION IN CONNECTION WITH PAYMENT TRANSACTIONS - A computing apparatus includes: a portal configured to provide a user interface to a user to specify a privacy policy of the user and to receive consumer data of the user; a data warehouse coupled with the portal to store the privacy policy in connection with account information identifying a payment account of the user; a payment processor of a payment processing network configured to process payment transactions made using payment accounts and store in the data warehouse transaction data recording the payment transactions processed by the payment processor; and a rule engine coupled with the payment processor and the data warehouse to determine, in response to a payment transaction made using the account information for a payment to a merchant on behalf of the user, whether or not to transmit the consumer data of the user to the merchant in accordance with the privacy policy of the user. | 03-12-2015 |
20150073990 | ELECTRONIC TRANSACTION METHOD - Disclosed herein is a method of transferring information in an electronic transaction between a first entity and a second entity. The method comprises: sending, by a first system | 03-12-2015 |
20150073991 | TRANSFERRING FUNDS BETWEEN FINANCIAL ACCOUNTS OF TWO ACCOUNTHOLDERS - A facility for initiating a funds transfer operation is described. The facility displays on a mobile device identity verification information for other people each associated with another mobile device within a maximum distance. For example, the displayed identity verification information may be a picture of the person. The user may select one of these in order to initiate a funds transfer operation to the selected person. | 03-12-2015 |
20150073992 | SYSTEM AND METHOD FOR SECURE TRANSACTION PROCESS VIA MOBILE DEVICE - A system providing enhanced security for device based transactions, constituted of:
| 03-12-2015 |
20150073993 | SAVINGS SWEEP PROGRAM - Embodiments of the invention provide systems, methods, and computer program products for distributing money between a first account, such as a checking account, and a second account, such as a savings account. Embodiments generally involve determining an upper limit and lower limit associated with the first account, and sweeping funds from the second account into the first account when funds in the first account equal or fall below the lower limit. Funds are swept from the second account into the first account until the funds in the first account are above the lower limit and below or equal to the upper limit. In one embodiment, a target balance is determined between the lower and upper limits, and sweeping funds from the second account into the first account comprises sweeping funds until the funds in the first account equal the target balance. The upper limit, lower limit, and target balance may be defined by the account owner. | 03-12-2015 |
20150081541 | METHOD AND SYSTEM FOR ENABLING TRANSACTION CARD SECURITY - Herein is disclosed a method of preventing a fraudulent payment transaction conducted via a payment network that includes a point of sale system and an issuer system. The method includes intercepting an authorization request as the authorization request traverses the payment network from the point of sale system to the issuer system. Next, it is determined whether a security method is associated with an account number associated with the authorization request. In the event that it is determined that there is a security method associated with the authorization request, the associated security method is applied. The authorization request is retransmitted through the payment network to the issuer system. | 03-19-2015 |
20150081542 | ANALYTICS DRIVEN ASSESSMENT OF TRANSACTIONAL RISK DAILY LIMITS - Embodiments relate to analytics driven assessment of transactional risk daily limits (TRDLs). Customer data that includes historical transaction data and customer profile data associated with a customer is accessed by a processor. Economic data from an external data source is accessed via a network. A TRDL assessment model is applied, by a processor, to the customer data and the economic data to generate a TRDL for the customer. | 03-19-2015 |
20150081543 | ANALYTICS DRIVEN ASSESSMENT OF TRANSACTIONAL RISK DAILY LIMIT EXCEPTIONS - Embodiments relate to analytics driven assessment of transactional risk daily limit (TRDL) exceptions. A transaction that includes a request to make a payment from an account associated with a customer is received and it is determined that processing the payment will result in exceeding a TRDL. Customer data including historical transaction data and customer profile data associated with the customer is accessed by a processor. Economic data from an external data source is accessed via a network from an external data source. A TRDL exception assessment model is applied, by the processor, to the transaction, the customer data, and the economic data to generate an approval recommendation for the request and a confidence level associated with the approval recommendation. | 03-19-2015 |
20150081544 | PHYSICAL INTERACTION DEPENDENT TRANSACTIONS - Systems and methods are provided according to one or more embodiments for conducting transactions based on actions or gestures such as physical interactions between users each having a user device. In that regard, gestures such as a handshake or other physical interactions between users may be detected to determine transaction details such as a payment amount or a value to be transferred from one user via a user device to a recipient via a recipient device. The amount or value may then be transferred based on one or more determinations including proximity between the user or the user device and the recipient or the recipient device, a specific action or gesture, voice commands, facial recognition, preset transfer instructions, a unique identifier, or other close-quarter determinations. | 03-19-2015 |
20150081545 | SECURE PAYMENT BY MOBILE PHONE - Some embodiments include a system and a method for making secure payments by mobile phone. Some embodiments identify and authorize payments without the need of any specialized payment transaction processing equipment other than a mobile phone for each of a consumer and a merchant engaged in the transaction. In some embodiments, a secure transaction payment authorization is performed by completing a set of voice biometrics operations to compare a unique voice print of the consumer to an existing voice print of the consumer. | 03-19-2015 |
20150081546 | SYSTEMS AND METHODS FOR AUTHENTICATION OF AN ENTITY - A method and system for remote authentication of a first entity by a second entity is provided. The method involves the second entity conveying at least a registration web link to the e-mail address of a first entity; processing a transaction amount on a payment card of the first entity using the payment card number of the first entity; and processing at least two (2) payment card refund transaction amounts on a payment card acceptance account of the first entity. The method also involves receiving information on the registration web link from the first entity, the information including the amounts of the at least two (2) payment card refund transactions obtained by the first entity from an acquiring bank of the first entity; and verifying that the amounts of the at least two (2) payment card refund transactions processed by the second entity match with the amounts of the at least two (2) payment card refund transactions obtained by the first entity from the acquiring bank of the first entity. | 03-19-2015 |
20150081547 | METHOD FOR PROTECTING ONLINE TRANSACTION SAFETY BETWEEN BUYERS AND SELLERS - The present invention is to provide a method for protecting online transaction safety between buyers and sellers, wherein, when a third-party server receives a good transaction information (including a first account information, a first good code and a selling price) from a first terminal device (seller), the third-party server sends the first good code to a verification unit to verify whether a good corresponding to the first good code has been used. If no, the first good code is locked. Then, the third-party server displays the good transaction information on a transaction platform and, when receiving a good purchasing message (including a second account information and the first good code) from a second terminal device (buyer) through the transaction platform, the third-party server deducts the selling price from the money corresponding to the second account information and adds the same to the money corresponding to the first account information accordingly. | 03-19-2015 |
20150081548 | METHODS AND SYSTEMS FOR MAKING MOBILE PAYMENTS - Systems and methods for mobile payments are provided. A customer may interact with the system via a voice interface. A customer may verbally communicate with a merchant to determine details of a transaction. The customer need not provide sensitive financial information for the transaction nor have stored payment information previously with the merchant. Information pertaining to the transaction may be processed and payment confirmation may occur through communication with a payment gateway. | 03-19-2015 |
20150081549 | METHODS AND SYSTEMS FOR SCREENING ELECTRONIC MONEY TRANSFER TRANSACTIONS - A computer-implemented method for processing a real-time money transfer with a screening payment network having a screening module communicatively coupled to a server computing device is provided. The method includes receiving a request to transfer funds from a payor account associated with an originating institution to a payee account associated with a receiving institution. The request includes money transfer data indicative of a payor's identifying information. The method also includes determining a sanction score based at least in part on the money transfer data, the sanction score indicative of the likelihood that the payor is on at least one sanctioned entity list. The method also includes transmitting the money transfer data and the sanction score to the receiving institution, and transmitting a response message to the originating institution, the response message indicating whether the receiving institution authorizes or denies the request to transfer the funds. | 03-19-2015 |
20150081550 | REMOTE TRANSACTION PROCESSING USING BIOMETRICS - In various embodiments, transactions among consumers, merchants, and transaction-processing entities are processed and authorized at least in part on the basis of biometric indicia obtained from the consumers. | 03-19-2015 |
20150081551 | METHODS AND SYSTEMS FOR MAKING SECURE PAYMENTS - A method and system for making secure payments are disclosed. A service terminal of a buyer's bank may implement the method for secure payment. The service terminal may receive a request for payment from a buyer, the request including a name of a seller and a payment amount; approve the request for payment; withhold the payment amount; and generate a proof of payment. Further, the service terminal of the buyer's bank may store the proof of payment, an expiration date of the proof of payment; send the proof of payment to the buyer; and receive a withdrawal request from a seller's bank. The withdrawal request includes the name of the seller and the payment amount. Finally, the service terminal of the buyer's bank may release the payment based on the withdrawal request. | 03-19-2015 |
20150081552 | SYSTEM FOR VERIFYING AN IDENTITY OF A CARD HOLDER - A system for verifying an identity of a card holder. The system is designed for obtaining a geographically remote biometric scan of a card holder's fingerprint, and optionally for obtaining other actions from the card holder, as one or more condition(s) for completing performance of a transaction, or for verification of a performance of a transaction, in association with the card. The transaction may involve performance of actions of a financial nature, and/or may involve performance of actions for verifying proximity and/or location of a card holder, and/or for providing physical access to a secure facility by a card holder. | 03-19-2015 |
20150081553 | Electronic Funds Transfer Consumer Authorization Verification System - An electronic funds transfer consumer authorization verification system for efficiently proving that a consumer authorized a financial transaction via an ACH network. The electronic funds transfer consumer authorization verification system generally includes accepting by a business an authorization from a consumer to debit and/or credit the consumer's financial account in a specified amount via an ACH network, communicating the ACH detailed record for the ACH transaction along with a transaction data file from the business to a third-party payment processor, and communicating to the business a transaction key associated with both the ACH detailed record and the transaction data file. The transaction data file is an image data file that may be comprised of an ACH authorization signature or statement by the consumer authorizing the ACH transaction, a copy of the identification documents for the consumer and/or state licensing information for the business. | 03-19-2015 |
20150081554 | Systems and Methods for Managing Mobile Account Holder Verification Methods - Embodiments of the invention are directed to methods, apparatuses, computer readable media and systems for coordinating account holder verification methods among secure entity applications and wallet applications from different issuers, wallet providers, etc. on mobile devices. A common payment management application may be provided in a trusted execution environment associated with a mobile device to support secure entity applications (e.g., provisioned payment application instances in the trusted execution environment) and mobile wallet applications (e.g., provisioned on a memory of the mobile device) to coordinate account holder verification methods. The common payment management application may be accessible by both mobile applications and the secure entity applications. | 03-19-2015 |
20150081555 | Method, Apparatus, and System for Processing Transactions - A method, apparatus, and system for processing transactions are disclosed in the field of Internet communication. The method includes: a first terminal device transmits a user ID of a first party and an account ID of a user account to a computer system; the computer system generates an authorization ID according to the account ID and the user ID, creates a corresponding relationship between the authorization ID and the account information of the user account, and transmits the authorization ID to the first terminal device; a second terminal device acquires the authorization ID from the first terminal device and transmits transaction information of a transaction and the authorization ID to the computer system; the computer system reduces the transaction value from a first value included in the user account of the first party and adds the transaction value to a second value included in the user account of the second party. | 03-19-2015 |
20150081556 | Mobile Device Payments - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for conducting cardless payment transactions. One of the methods includes receiving from a merchant computer an indication of a payment transaction by a user associated with a mobile phone number. A text message is provided to a device associated with the mobile phone number requesting approval for the payment transaction, wherein the message includes an approval code. A message is received from the device associated with the mobile phone number. If the text message from the device associated with the mobile phone number includes the provided approval code, account information associated with the mobile phone number is obtained, authorization for the payment transaction is obtained using the account information, and notification of authorization of the payment transaction is provided to a merchant conducting the payment transaction. | 03-19-2015 |
20150081557 | METHOD OF PROCESSING PAYMENT TRANSACTIONS - A method of processing a transaction associated with a transaction instrument includes providing a server, receiving an update message at the server which includes data to assign a transaction use case associated with the transaction instrument, the server identifying a device user, a device or both and the associated transaction instrument, the server updating the stored transaction use case state associated with the transaction instrument, receiving a transaction request against the transaction instrument from a transaction requestor, the server classifying the transaction use case to determine a classified transaction use case associated with respect to the transaction instrument, the server determining whether the stored state of the classified transaction use case is an allowed or disallowed state, and transmitting a message to the transaction management system containing data confirming the state of the classified transaction use case, providing a general response of allowed or disallowed, or both. | 03-19-2015 |
20150081558 | AUTHENTICATION METHOD AND SYSTEM - Provide herein is a method and system capable of authenticating transactions involving at least one service provider and one or more users who are each in electronic communication. This electronic communication can be, for example, SMS, MMS, e-mail, or online account messaging. It is an aspect of certain embodiments where the transaction is an authentication and/or verification of an entity. Examples of such entities are products, actions and users. | 03-19-2015 |
20150081559 | NEAR-FIELD COMMUNICATION (NFC) METHOD, APPARATUS, AND SYSTEM WITH BIOMETRIC AUTHENTICATION - An apparatus, system and methodology for conducting financial and other transactions using a wireless computing device are provided. The wireless device includes a display screen, a user input interface, one or more processors, and at least one memory device. The memory device has stored therein a wallet application for completing transactions based on wireless data communications between the computing device and an external electronic device. The memory device further stores at least one electronic credential. The wireless device permits transmission, via a near-field communication (NFC) module, of at least one electronic credential to an NFC reader of the external electronic device based on comparing a biometric characteristic of a user, detected by a biometric characteristic reader, with stored biometric information. | 03-19-2015 |
20150081560 | SYSTEM AND METHOD FOR WORKFLOW BEHAVIOR ALERTS - Embodiments of the invention are directed to systems, methods and computer program products for providing workflow behavior alerts. An exemplary apparatus is configured to monitor characteristics associated with user accounts, identify characteristics for further analysis that affect a value of the user accounts, detect an occurrence of a triggering event based at least partially on the analysis of the characteristics, where the triggering event is defined by one or more rules, initiate a first action in response to detecting the occurrence of the triggering event, wherein the first action comprises sending the user a notification that indicates the occurrence of the triggering event or processing at least one transaction associated with a user account, receive a request to reverse the at least one transaction processed, and reverse the at least one transaction processed in response to receiving the request. | 03-19-2015 |
20150081561 | MULTI-PARTY TRANSACTION PAYMENT NETWORK BRIDGE APPARATUS AND METHOD - A system, method, and computer-readable storage medium configured to enable commodity voucher transactions. | 03-19-2015 |
20150088741 | Spending Delegation - Methods and systems are provided for delegating spending from a user device, such as a parent's smart telephone, to another device, such as a child's smart telephone. In this manner, the owner of the other device, e.g., the child, can be allowed to purchase products. Restrictions can be placed upon the spending ability of the other device. For example, in order for the spending to be done, the other device can be required to be within a certain distance of the user device. Thus, purchases by the owner of the other device, e.g., the child, can be supervised. | 03-26-2015 |
20150088742 | APPARATUS AND METHOD FOR SECURED COMMERCIAL TRANSACTIONS - A transaction security code database and a method and apparatus for generating the transaction security code database. The transaction security code database is comprised of multiple transaction security codes, each transaction security code constituting a transaction code generated based upon a transaction initiated by a user, which is appended to or linked to a security code which is based upon a biometric sensor code generated by a biometric sensor from a biometric presentation of a biometric feature of the user. | 03-26-2015 |
20150088743 | SERVER, A TERMINAL APPARATUS, AND A METHOD FOR PROVIDING CARD INFORMATION TRANSMITTING SERVICE - Disclosed is a method for providing a card information transmitting service by a terminal apparatus. The method for providing a card information transmitting service includes: when a card transaction is performed in a merchant by using a card registered in a card information transmitting service, receiving location information of the merchant from a card information transmitting service providing server; detecting a notification providing mode set in a terminal apparatus in association with the card information transmitting service; and providing notification by using the location information of the merchant received according to the detected notification providing mode. | 03-26-2015 |
20150088744 | Transaction Authentication - Information is received that includes a request to authenticate a transaction. Based on the received information, a location associated with the transaction and a user associated with the transaction are identified. Location data is accessed that identifies one or more locations associated with the user. The location associated with the transaction and the one or more locations associated with the user are compared to determine whether the location associated with the transaction corresponds to a location associated with the user. A response to the request is provided based on determining whether the location associated with the transaction corresponds to the location associated with the user. | 03-26-2015 |
20150088745 | ACCOUNT IDENTIFICATION - A method of account identification is performed on suitably programmed computing apparatus. An account number comprising a plurality of numeric characters is assigned to an account. The characters of the account number are divided into a numeric identifier and a convertible string. The convertible string is compressed into a compressed convertible string using an expanded character set. There are fewer characters in the compressed convertible string than in the uncompressed convertible string. A compressed account number is provided comprising the numeric identifier and the compressed convertible string. This may then be used in transactions without compromising the original account number while retaining the identifier for use in identifying transactions. A method of performing a transaction is also described, as is suitable apparatus for carrying out the methods described. | 03-26-2015 |
20150088746 | METHOD AND SYSTEM FOR IMPLEMENTING FINANCIAL TRANSACTIONS - A method for implementing a financial transaction via a user device is disclosed. The method involves receiving financial transaction information used to generate an alphanumeric Secure Transaction Code that binds the received information to the financial transaction, receiving information from a user device that includes the Secure Transaction Code and a voice entry of the Secure Transaction Code, verifying that the voice entry of the Secure Transaction Code corresponds to a Voice Authentication Master (VAM) file of a registered user, verifying that the received Secure Transaction Code is a valid Secure Transaction Code and, if both are verified authorizing the financial transaction and sending an indication that the financial transaction has been authorized to the user device. In an embodiment the transaction is between a merchant and user of a mobile user device or can be a request for secure access. | 03-26-2015 |
20150088747 | SYSTEMS AND METHODS FOR MOBILE PAYMENTS - Systems and methods are provided for mobile payments. A financial institution may offer an electronic prepaid card of a merchant for sale to holders of Demand Deposit Accounts (DDA) and/or Line of Credit Account and/or Loan Account. If the DDA account holder and/or Line of Credit Account holder and/or Loan Account holder purchases the prepaid card through the financial institution, the account holder may be able to redeem the prepaid card at the merchant. The prepaid card may be provided in electronic form that may be scanned off the account holder's mobile device or by the account holder's mobile device. When the account holder purchases the prepaid card, the financial institution may perform a real-time check whether the account holder has sufficient funds for the purchase. If funds are sufficient, a transfer may be performed from the account holder's DDA account and/or Line of Credit Account and/or Loan Account to a holding account of another party at the same financial institution via ON-US transfer. The other party may settle the account with the merchant with ACH or ON-US transfer with or without a clearing account in a settlement (clearing) bank. The time to purchase the prepaid card prior to redemption can be shorten to seconds as if the purchase happened in the same time as the redemption (e.g., Instant Prepaid Card) at a physical point of sale. The time duration between prepaid card purchase and its redemption can be so short that the purchaser does not feel the prepay process behind the scene. This Instant Prepaid Card may be referred to as an AnyWhereMobile Debit Card if Demand Deposit Accounts are used as founding source and may be referred to as an AnyWhereMobile Credit Card if a Line of Credit Account or Loan Account is used as founding source. | 03-26-2015 |
20150088748 | Payment Action Page Queue for a Mobile Device - In an exemplary embodiment, a method includes identifying a plurality of initiated payments awaiting approval. An initiated payment is associated with a plurality of payment details describing the initiated payment. A queue comprising a plurality of payment action pages is generated. A payment action page comprises the plurality of payment details describing a corresponding initiated payment. The method further includes displaying on a mobile device a first payment action page of the plurality of payment action pages in the queue and displaying on the mobile device a second payment action page of the plurality of payment action pages in the queue in response to receiving a payment action associated with the first payment action page from the user of the mobile device. | 03-26-2015 |
20150088749 | SYSTEM AND METHOD FOR TRANSACTION SECURITY ENHANCEMENT - The present disclosure involves a system that includes a computer memory storage component configured to store computer programming instructions and a computer processor component operatively coupled to the computer memory storage component. The computer processor component is configured to run a secure operating system and a non-secure operating system in parallel. The secure and non-secure operating systems are isolated from each other. The computer processor component is configured to execute code to perform the following operations: receiving an authentication request from an application that is run by the non-secure operating system, wherein the authentication request contains credentials of the application; communicating with a secure applet that is run by the secure operating system, and wherein the communicating includes transferring the credentials of the application to the secure applet; and authenticating and vetting the application based on the credentials of the application. | 03-26-2015 |
20150088750 | METHOD, APPARATUS, AND SYSTEM FOR PERFORMING ONLINE TRANSACTIONS WITH BIOMETRIC AUTHENTICATION - An apparatus, system and method for conducting financial and other transactions using a wireless device are provided. A computing device includes a display screen, a user input interface, and one or more processors. A memory device has stored therein a wallet application for completing transactions based on wireless data communications between the computing device and a merchant system. The memory device further stores at least one electronic credential. The computing device is configured to wirelessly communicate with the merchant system via at least one of a network transceiver and a short-range RF transceiver, and to display information regarding one or more transactions with the merchant system on the display screen. At least one electronic credential is transmitted to the merchant system based on comparing the biometric characteristic of the user with stored biometric information to initiate the one or more transactions with the merchant system. | 03-26-2015 |
20150088751 | TRANSACTION VERIFICATION SYSTEM BASED ON USER LOCATION - Embodiments of the invention provide misappropriation protection with user location verification. The methods, apparatus and computer program products provide for approving a transaction based at least partially on a determining that a mobile device associated with an account holder associated with a transaction is located within a predetermined distance from the location associated with the transaction. In some example implementations where the mobile device is located outside the predetermined distance from the location associated with the transaction, information associated with previously approved transactions is received and the transaction approved based at least partially on a determination that previously approved transaction have occurred at the same location. | 03-26-2015 |
20150095227 | METHOD AND SYSTEM FOR DENYING PAYMENT AUTHORIZATION REQUESTS ASSOCIATED WITH FRAUD - A computer-implemented method for denying a payment authorization request associated with fraud is described. Additionally, a computing device for denying a payment authorization request associated with fraud is described. Additionally, a computer-readable storage medium having computer-executable instructions embodied thereon for denying a payment authorization request associated with fraud is described. | 04-02-2015 |
20150095228 | CAPTURING IMAGES FOR FINANCIAL TRANSACTIONS - Systems and methods for facilitating financial transactions by using images from a real-world environment are described. By obtaining the image and information associated with the image, a user may supplement the user's view of the real-world in real-time. For example, the images can be used to determine the status of shoppers, to buy products from television or the Internet, make payments to others, shop at a physical store, or check-in a user. A user's view of the real-world can be supplemented with information associated with the image. | 04-02-2015 |
20150095229 | METHOD, APPARATUS AND SYSTEM FOR AUTOMATED NOTIFICATION OF FUNDING REQUEST AND/OR APPROVAL - Embodiments herein provide for performing notification function relating to an automated transaction. A request for funding is received. A request processing is performed in response to the request. The request processing comprises routing the request to an approval unit, determining by the approval unit that the funding is authorized, and determining that sufficient amount of funds are available for providing the funding. The funding is either approved or denied the funding based upon the request processing. | 04-02-2015 |
20150095230 | METHOD, APPARATUS, AND SYSTEM FOR AUTOMATED FUNDING, INCLUDING AUTOMATED REALLOCATION OF FUNDS - Embodiments provided herein provide methods, apparatuses, and systems for automated funding transactions. A method, apparatus, and system are provided for an automated transfer or reallocation of funds based upon a second request and/or completion of a funding transaction. | 04-02-2015 |
20150095231 | METHOD, APPARATUS AND SYSTEM FOR AUTOMATICALLY TRIGGERING A TRANSACTION - Embodiments herein provide for a method, system, and apparatus for automatically triggering a funding transaction. Data associated with an activity relating to a user of an account is received. A determination is made as to whether the activity relates to funding of the account. In response to determining that the activity relates to funding of the account, a determination is made as to whether the funding is approved. In response to determining that the funding is approved, automatically triggering a funding transaction for providing funding into the account. The funding transaction is performed in response to the triggering. | 04-02-2015 |
20150095232 | TRANSACTION SYSTEMS AND ASSOCIATED METHODS FOR ENHANCED ACCOUNT BALANCE AND STATUS MANAGEMENT - A computer implemented method of performing a transaction using a payment account, typically handled by a payment account manager (PAM), comprises the steps of: receiving a first message from a top up terminal indicating that funds have been transferred to the payment account; setting or adjusting a funds limit of the payment account based on information in the first message; receiving an authorisation or pre-authorisation request from a first terminal and commencing a funds aggregation; receiving a second message indicating a pre-defined amount of funds which may be used in the transaction; blocking an amount of the funds limit of the payment account equivalent to the pre-defined amount; and sending an authorisation response to the first terminal. As a result, the PAM can send data to indicate that a card associated with the payment account is not fit for travel. In one aspect of the invention, a transit authority is able to write bypassing data to the card so as to bypass a deny list that would otherwise have blocked the card from being used for a transit journey. | 04-02-2015 |
20150095233 | FACILITATING ACCESS TO AN ELECTRIC VEHICLE CHARGING NETWORK - A system and method for facilitating access to an electric vehicle charging network is described. In some embodiments, the system provides an interface via which an electric vehicle may access and/or be authorized to one of multiple, disparate charging networks. | 04-02-2015 |
20150095234 | MOBILE BARCODE GENERATION AND PAYMENT - An application on user's mobile device (having a display screen) generates a transaction-specific barcode on the display, where the barcode contains a plurality of funding sources for the transaction and/or merchant loyalty, reward, or membership numbers. The barcode can be scanned to make purchases at a point of sale (POS). | 04-02-2015 |
20150095235 | METHOD, APPARATUS, AND SYSTEM FOR PERFORMING WIRELESS TRANSACTIONS WITH BIOMETRIC AUTHENTICATION - An apparatus, system and methodology for conducting financial and other transactions using a wireless device are provided. A computing device includes a memory device that has stored therein a wallet application for completing transactions based on wireless data communications between the computing device and an external electronic device. The memory device further stores an electronic credential. The computing device includes a wireless transceiver configured to wirelessly communicate with the external electronic device. The computing device further includes a biometric characteristic reader for reading a biometric characteristic of a user. The computing device wirelessly transmits the electronic credential to the external electronic device based on comparing the biometric characteristic of the user with stored biometric information to initiate a transaction with the external electronic device | 04-02-2015 |
20150095236 | BROKER-MEDIATED PAYMENT SYSTEMS AND METHODS - In certain embodiments of systems and methods for conducting payment transactions between a payer and a payee, the payer selects one or more payment sources from various funding sources and accounts available to the payer, and instructs a payment broker's server to perform payment authorization and/or payment routing and clearing services on the payer's behalf. The payment broker's server notifies the payer and/or the payee of the payment authorization status and, if approved, instructs the funding source to send the payment to or for the payee without divulging the payer-selected funding source or account to the payee. | 04-02-2015 |
20150100490 | COMPUTER-BASED METHOD FOR LINKING USER ACCOUNT INFORMATION FROM A MOBILE COMPUTING DEVICE - A computer-based method for linking user account information for making future payments. The method may comprise the steps of: providing an application and a server application; displaying the application through a display screen and prompting the user to input a phone number of a mobile computing device into the application via an input device; receiving the phone number from the user and sending the phone number to the server application; generating and transmitting a text message with a uniform resource locator (URL) link from the server application to the mobile computing device based on the phone number; prompting the user to open the URL link; opening a webpage in a web browser in the mobile computing device when the user opens the URL link; prompting the user to input user account information into the webpage; receiving the user account information from the user; and saving the user account information in the server. | 04-09-2015 |
20150100491 | BROKER-MEDIATED PAYMENT SYSTEMS AND METHODS - In certain embodiments of systems and methods for conducting payment transactions between a payer and a payee, the payer selects one or more payment sources from various funding sources and accounts available to the payer, and instructs a payment broker's server to perform payment authorization and/or payment making, causing to be made, routing and/or clearing services on the payer's behalf. The payment broker's server notifies the payer and/or the payee of the payment authorization status and, if approved, instructs the funding source's server to make or cause the payment to be made to payer-selected or approved real account(s) of the payee, or otherwise to the payee, without divulging the payer-selected funding source(s) and/or account(s) to the payee. | 04-09-2015 |
20150100492 | Wireless Payment with a Portable Device - A portable device receives an account information request signal from a merchant machine. The portable device transmits a response message to the merchant machine. The response message comprises the account information for a purchase. The portable device transmits a first message to an account server. The first message comprises a request to get information comprising the purchase amount. The portable device receives a second message comprising the information from the account server. The portable device sends the purchase amount to a display. | 04-09-2015 |
20150106263 | METHODS AND SYSTEMS FOR DYNAMICALLY PROCESSING CARD PAYMENT AUTHORIZATION REQUESTS - Exemplary methods and systems for dynamically processing payment authorization requests for gift card purchases. An exemplary method includes maintaining information associated with a gift card, receiving a payment authorization request for the gift card from a particular merchant, detecting a trigger associated with the received payment authorization request, and sending, based on the detected trigger, a response to the payment authorization request. Corresponding methods and systems are also disclosed. | 04-16-2015 |
20150106264 | CONTROLLING DEBIT CARD TRANSACTIONS - Methods and systems for controlling debit card transactions are presented. In some embodiments, a computer system may receive authentication information associated with a debit card. Subsequently, the computer system may determine, based on boundary information, whether the transaction terminal device is authorized to perform one or more transactions on at least one financial account linked to the debit card. Based on determining that the transaction terminal device is authorized to perform one or more transactions on the at least one financial account, the computer system may allow the transaction terminal device to perform at least one transaction on the at least one financial account. Alternatively, based on determining that the transaction terminal device is not authorized to perform one or more transactions on the at least one financial account, the computer system may prevent the transaction terminal device from performing any transactions on the at least one financial account. | 04-16-2015 |
20150106265 | SYSTEM AND METHODS FOR PROCESSING A COMMUNICATION NUMBER FOR FRAUD PREVENTION - A communication number processing system and methods for processing communication numbers or identifiers of various types to prevent fraud in transactions associated with the communication numbers are disclosed. The communication number processing system, in an example embodiment, verifies a communication number by retrieving characteristics data including network-derived characteristics data and/or other attributes relating to the communication number and processing the characteristics data and/or the attributes based on one or more rules. The communication number processing system further generates a fraud score for the communication number. A client system can then use the fraud score to assess a risk associated with engaging in a transaction with a user associated with the communication number. | 04-16-2015 |
20150106266 | PLACE INFORMATION MANAGEMENT SERVER, SYSTEM, AND METHOD - Provided are a place information management server, system, and method. The place information management system includes a user terminal configured to, when a card approval message is received, extract a card approval place name included in the card approval message, and generate card approval information that includes position information and time information of when the card approval message is received and the card approval place name, and a place information management server configured to, when the card approval information is received, determine whether the card approval place name matches a place that a user of the user terminal visits, and generate and store visiting place information. | 04-16-2015 |
20150106267 | ACCOUNT NOTIFICATIONS FOR REQUIRED INFORMATION TO COMPLETE A FINANCIAL TRANSACTION - There is provided systems and method for account notifications for required information to complete a financial transaction. A user may establish a user account with a payment provider, where the user account allows the user to receive and transfer funds with other users. The payment provider may require additional information from the user to validate and maintain the user account or to complete monetary transfers. Thus, the payment provider may prepare notifications for the user and transmit the notifications to a user device of the user. The user may provide user input through the user device to complete the notification, where in some cases the user input corresponds to an image from the user. The payment provider may transmit an edit tool to redact information from the image if necessary. The user may request a hold on funds in the user account, or may authorize transactions. | 04-16-2015 |
20150106268 | METHOD FOR AUTHENTICATING A TRANSACTION - A method of authenticating a transaction comprises receiving from a user's mobile device user location information and associated network data in response to a change of location or network of the mobile device, storing the location information and (optionally) the network data in a database in a record associated with the user, receiving a request for authentication of a transaction purportedly by the user, the request including transaction location information, comparing the transaction location information and (optionally) the network data to the stored user location information associated with the user, and generating authentication data in response to the result of the comparison. | 04-16-2015 |
20150106269 | METHOD OF PAYMENT BETWEEN PLURALITY OF USERS IN DISTRIBUTED NETWORK SYSTEM USING TOKENS - Embodiments of the present disclosure relate to method and a system for payment between plurality of users using tokens in a distributed networking system. The method involves configuring a token account for each transacting user of the distributed networking system. In a transaction between users, the consumer obtaining service from the provider should provide predefined number of tokens for the obtained service. The predefined number of tokens is transferred from the token account of the consumer to the token account of the provider. If there is non-availability of the predefined number of tokens to perform the transaction in the token account of the consumer, the transaction server in the distributed networking system allows the transaction only if the consumer account is still within the defined credit limit after paying the predefined number of tokens from the consumer account. | 04-16-2015 |
20150106270 | Providing Identification Information to Mobile Commerce Applications - Aspects and examples are disclosed for facilitating mobile commerce. In one example, a processing device receives a data network identifier or other identifier from a commerce application. The data network identifier or other identifier can be associated with a mobile device conducting a transaction with the commerce application. The processing device can also obtain a credential associated with the mobile device using the data network identifier. The processing device can additionally retrieve identification information from a credit file associated with the credential. The identification information can be useable for completing the transaction. The processing device can further transmit the identification information to a computing device executing the commerce application. | 04-16-2015 |
20150106271 | SURCHARGE VIOLATION REGISTRY - Apparatus and methods for auditing a transaction record are provided. The transaction record may correspond to a credit card transaction. The auditing may include identifying a surcharge violation. The surcharge violation may be an unlawful surcharge. The auditing may identify patterns of double surcharging. Transaction-level auditing may include ensuring that a surcharge is returned upon a product return. A mobile wallet application may allow consumers to access and/or report merchant surcharge compliance activity. Functionality may include surcharge receipt scanning for use in crosschecking authenticity of a consumer report. Additional crosscheck functionality provided by geographic location support. Embodiments may include a registry for merchants that certify their surcharge calculations. | 04-16-2015 |
20150112861 | METHOD FOR COMPUTERIZING A RECEIPT - A method for computerizing a receipt is applied to an electronic device with a touch screen, and the method includes retrieving a plurality of trading data of a trade, computing a characteristic code according to the trading data, and displaying a signature-field pattern with the computed characteristic code on the touch screen. | 04-23-2015 |
20150112862 | PEER-TO-PEER PAYMENT REGISTRATION AND ACTIVATION - A user is registered for an electronic peer-to-peer payment system by authenticating the user at an automated teller machine (ATM), receiving the user's mobile number and addressing a verification code to the user's mobile number, which the user must enter in order to be registered. | 04-23-2015 |
20150112863 | METHOD AND SYSTEM FOR CONDUCTING A MONEY TRANSFER AND/OR PAYMENT TRANSACTION - The invention provides a method of conducting a money transfer transaction. The method comprises obtaining identification data from a customer at a point-of-sale terminal; verifying the obtained identification data by matching the identification data with customer data maintained in computer memory; obtaining transaction details from the customer, the transaction details including a transaction value and a recipient international mobile subscriber identity (IMSI) associated with a mobile device; displaying a summary of the proposed money transfer transaction on a display device in communication with the point-of-sale terminal; obtaining confirmation of the money transfer transaction from the customer; obtaining payment from the customer representing the transaction value; and associating the transaction value with the recipient IMSI. Also provided are methods of conducting a payment transaction and related money transfer and payment transaction systems. | 04-23-2015 |
20150112864 | TRANSACTION COMPLETION USING IDENTITY AGGREGATOR - A transaction processing server acts as an identity aggregator and enables transactions between a user computing device and plurality of merchant servers. The transaction processing server receives a request from the user computing device to conduct the financial transaction with a merchant server. The transaction processing server determines a plurality of user identifiers identifying a user account associated with the user computing device at each of a plurality of online systems, where a first identifier is a transaction processing server identifier identifying a user account at the transaction processing server and a second identifier is a merchant identifier identifying a user account at the merchant server. Financial information is retrieved using the plurality of user identifiers. The transaction processing server transmits the merchant identifier and the financial information of the user to the merchant server, which conducts the transaction with the user computing device using the financial information. | 04-23-2015 |
20150112865 | QUICK RESPONSE (QR) SECURE SHAKE - In one embodiment, a computing device of a social-networking system may receive from a computing device of a first user of the social-networking system information acquired by the computing device of the first user from a tag associated with a second user of the social-networking system. The tag may encode a time stamp, a signature, and a social action on the social-networking system. The computing device of the social-networking system may verify the signature and, if the signature is verified, then initiate the social action. | 04-23-2015 |
20150112866 | SYSTEM AND METHOD FOR TRANSFERRING FUNDS - A method for facilitating real time transfer of funds from a sender to a recipient includes receiving an expedited funds transfer request from the sender having a first account at a first financial institution, the recipient having a second account at a second financial institution, the first and second financial institutions being members of a computer-implemented payment network including a plurality of member financial institutions; and sending a message to the second financial institution to deposit funds into the second account, wherein the second financial institution deposits funds into the second account, and wherein the first financial institution settles with the second financial institution after the second financial institution deposits funds into the second account. | 04-23-2015 |
20150120544 | Rapid credit card fraudulent use detection system and method - A method and system provided for rapid detection of credit card transactions by a merchant and reporting the transaction to the credit card holder for confirming or denying the accuracy of said transaction and reporting such information or denial directly to the merchant. | 04-30-2015 |
20150120545 | NON-COMPLIANT PAYMENT CAPTURE SYSTEMS AND METHODS - Embodiments of the present invention are generally directed to detection of non-compliant payment requests or payment orders. In particular, the invention detects non-compliance with travel rules put in place by multiple countries throughout the world. The systems and methods for capturing non-compliant payments may be adapted for various funds transfer channels or systems, including but not limited to Society for Worldwide Interbank Financial Telecommunication (SWIFT), Federal Reserve Wire Network or FedWire, Clearing House Interbank Payments System (CHIPS), or other public or proprietary funds transfer or payment systems. | 04-30-2015 |
20150120546 | ACCOUNT LOCKING USING TRANSACTION CODES - Described herein are systems and computer-implemented methods for configuring a payment account in an account hierarchy using transaction codes that carry transaction information. The transaction codes carry sufficient information to help inform a decision of whether to lock the payment account so as to prevent an initiated transaction from completing. The decision can be fully-automated based on rules and/or intelligent machine analysis. The systems and methods can also seek, in real-time, authorization from an account administrator. The systems and methods can also allow the administrator to create a locking rule for the payment account. The administrator can be identified using the account hierarchy. | 04-30-2015 |
20150120547 | SYSTEMS AND METHODS FOR TOKENLESS AUTHENTICATION OF CONSUMERS DURING PAYMENT TRANSACTIONS - A computer-implemented method for tokenless authentication of a paying consumer during a payment transaction uses a computing device having a processor and a memory. The method includes receiving a plurality of biometric data sets for a plurality of consumers. Each biometric data set includes at least a biometric image of a consumer and an associated payment account identifier. The method also includes receiving, from a first biometric input device communicatively coupled to the processor, a first biometric image of the paying consumer including an iris image. The method further includes determining a payment account associated with the paying consumer based on at least the first biometric image and the plurality of biometric data sets. The method also includes authenticating use of the payment account by the paying consumer for a payment transaction at the retail location by comparing the first biometric image to the plurality of biometric data sets. | 04-30-2015 |
20150120548 | DATA LIFTING FOR STOP PAYMENT REQUESTS - Embodiments of the invention include systems, methods, and computer-program products for lifting metadata from financial documents to allow for automated financial document stop payment requests. As such, allowing for automated determining of an appropriate financial document to stop payment on based on user information comparison to stored metadata for financial documents. As such, the user may provide information about the requested stop payment, such as a payee, date, amount, or the like associated with a payment. The system may then utilize the user provided information and compare that information to the metadata lifted from the financial documents. As such, identifying the financial document associated with the stop payment request. Once identified, the system will stop the payment associated with that financial document. | 04-30-2015 |
20150120549 | MOBILE AUTHENTICATION FOR WEB PAYMENTS USING SINGLE SIGN ON CREDENTIALS - Systems and methods for mobile authentication for web payments are disclosed. In some implementations, a proxy server receives, from a computing device different from a mobile device, a request from a user to process a web payment via a payment account associated with the mobile device, the web payment being associated with an online merchant. The proxy server verifies that the mobile device is associated with the user. The proxy server transmits, to a commerce server of the online merchant, payment information for the web payment in response to verifying that the mobile device is associated with the user. | 04-30-2015 |
20150120550 | GUARANTY PROVISIONING VIA WIRELESS SERVICE PURVEYANCE - Disclosed herein are example embodiments for guaranty provisioning via wireless service purveyance. For certain example embodiments, at least one device, such as a server device of a wireless service provider: (i) may detect at least one proffered guaranty transaction that is associated with at least one product transaction; or (ii) may proffer at least one guaranty based at least partially on at least one wireless service data stream. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 04-30-2015 |
20150120551 | MOBILE DEVICE-FACILITATED GUARANTY PROVISIONING - Disclosed herein are example embodiments for mobile device-facilitated guaranty provisioning. For certain example embodiments, at least one device, such as a mobile device of a user or customer: (i) may obtain one or more transaction characteristics of at least one product transaction that relates to at least one customer; or (ii) may communicate one or more messages to support a provisioning of at least one guaranty corresponding to at least one product transaction. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 04-30-2015 |
20150120552 | METHOD, DEVICE AND SYSTEM FOR INFORMATION VERIFICATION - The present application discloses methods, devices and systems for information verification, and in particular for multi-user verification for transactions such as online payment transactions. An online account, such as a payment account, can be registered as a multi-user verification account, which requires at least two users to verify a transaction. After receiving a verification request from a first user, a server verifies first verification information (e.g. voiceprint information) from the first user and second verification information (e.g. voiceprint information) from the second user, so that the server may approve or deny the pending transaction in accordance with a comparison of the first and second verification information against respective verification information stored in association with the multi-user verification account. | 04-30-2015 |
20150120553 | METHOD AND SYSTEM FOR MAKING MOBILE PAYMENTS BASED ON USER GESTURE DETECTION - The present application relates to a method for making payments using a mobile terminal having one or more processors, memory storing program modules to be executed by the one or more processors, and one or more movement sensors for detecting user gestures of moving the mobile terminal. The mobile terminal receives a payment request from a remote server. In response to the payment request, the mobile terminal detects a gesture motion of the mobile terminal using at least one of the movement sensors and compares the gesture motion with a plurality of predefined gesture motions. If the gesture motion satisfies a predefined mobile payment gesture motion, the mobile terminal then sends an authorization instruction to the remote server. The remote server then arranges a payment to a payee associated with the payment request in accordance with authorization instruction. | 04-30-2015 |
20150120554 | METHOD AND DEVICE FOR CONFIRMING AND EXECUTING PAYMENT OPERATIONS - A method and device for providing one-step payment approval and confirmation are disclosed. The device concurrently displays a data entry region and a confirmation region in a user interface of the device, where the data entry region is to accept user entry of payment data associated with a payment operation and the confirmation region is to require a sliding input to cause execution of the payment operation. While displaying the data entry region containing payment data received from a user, the device detects a user input in the confirmation region of the user interface. The device determines, in accordance with a predetermined criterion, whether the detected user input qualifies as a sliding input that follows a predefined motion path. Upon determining that the detected user input qualifies as the required sliding input, the electronic device executes the payment operation in accordance with the received payment data. | 04-30-2015 |
20150120555 | EXCHANGE AUTHORIZATION ANALYSIS INFUSED WITH NETWORK-ACQUIRED DATA STREAM INFORMATION - Disclosed herein are example embodiments for exchange authorization analysis infused with network-acquired data stream information. For certain example embodiments, at least one device, such as a server device of a combined financier and guarantor: (i) may discover at least one authorization request corresponding to at least one product transaction; or (ii) may communicate at least one authorization answer based at least partially on at least one corroborating indicium obtained via at least one data stream corresponding to at least one user device. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 04-30-2015 |
20150120556 | SECURING PAYMENT TRANSACTIONS WITH ROTATING APPLICATION TRANSACTION COUNTERS - An account management system creates a bundle of private application transaction counters (ATCs) and a bundle of corresponding public ATCs, and transmits them to a user device. The device receives a request for payment information from a merchant and processes the request without accessing a secure element processor on the device. The device calculates a security code using one of the bundle of private ATCs and a transaction number received from the merchant. The device transmits proxy account information, the calculated security code, and the corresponding public ATCs to the merchant. The merchant transmits a payment request to the account management system as the issuer of the proxy account information. The account management system retrieves the private ATC using the public ATC, and determines the validity of the security code by recomputing it. The account management system retrieves the financial account information and requests authorization from the issuer. | 04-30-2015 |
20150120557 | FINGERPRINT PAYMENT METHOD AND RELATED DEVICE AND SYSTEM - Method and device of processing a transaction are disclosed. The method includes: receiving a transaction request from a first transaction device, wherein the transaction request specifies a transaction account associated with a user and a transaction awaiting execution; in accordance with the received transaction request, identifying a second transaction device associated with the transaction account; acquiring first physiological biometric verification data from the first transaction device; acquiring second physiological biometric verification data from the second transaction device; verifying the acquired first and second physiological biometric verification data against stored physiological biometric information associated with the transaction account; and approving the requested transaction upon successful verification of the received first and second physiological biometric verification data. | 04-30-2015 |
20150120558 | FARE COLLECTION USING WIRELESS BEACONS - Systems and techniques are presented for processing a user through a paid entry gate using a mobile device. The mobile device receives a beacon packet from a first wireless beacon and wakes up an application. The application wakes up by transitioning to an active or background execution state. The application transmits validation data to a computer server system and the computer server system validates an account of the user. The mobile device receives a beacon packet including a gate identifier that is a unique identification of the paid entry gate from a second wireless beacon and transmits the gate identifier to the computer server system. The computer server system receives the gate identifier, debits the account of the user, and transmits a signal to a gate entry device associated with the gate identifier to grant the user passage through the paid entry gate. | 04-30-2015 |
20150120559 | ENHANCEMENTS TO TRANSACTION PROCESSING IN A SECURE ENVIRONMENT - Embodiments of the present invention are directed to methods, systems, and apparatuses for performing a secure authentication process to authenticate a payment device used in a transaction between a merchant and a user. The secure authentication process may receive an authentication request message including user data, user computing device data and transaction data to verify that an account is enrolled in the secure authentication process and perform a risk analysis to determine whether the transaction should be authenticated. | 04-30-2015 |
20150120560 | ENHANCEMENTS TO TRANSACTION PROCESSING IN A SECURE ENVIRONMENT USING A MERCHANT COMPUTER - Embodiments of the present invention are directed to methods, systems, and apparatuses for performing a secure authentication process to authenticate a payment device used in a transaction between a merchant and a user. The secure authentication process may receive an authentication request message including user data, user computing device data and transaction data to verify that an account is enrolled in the secure authentication process and perform a risk analysis to determine whether the transaction should be authenticated. | 04-30-2015 |
20150120561 | Healthcare Transaction Facilitation Platform Apparatuses, Methods and Systems - The Healthcare Transaction Facilitation Platform Apparatuses, Methods and Systems (“HTFP”) transforms payment file and EOP data inputs via HTFP components into ACH request, card generation request, card payment request, ACH CCD+ request, and EOP file outputs. A card generation request associated with a payment to a provider may be obtained via the card generating component via a network. A payment amount and a re-association trace number may be determined by parsing the card generation request. A card for the payment may be generated and the card may be associated with the payment amount and the re-association trace number. A card payment processing request associated with the card may be sent. The card payment processing request may be obtained via the card payment processing component. A Level 3 card payment request that includes the payment amount and the re-association trace number may be generated. A payment request route associated with the card may be determined and the Level 3 card payment request may be pushed via the payment request route. | 04-30-2015 |
20150120562 | METHOD, APPARATUS, AND SYSTEM FOR SECURE PAYMENT - Secure payment methods, apparatus, and systems are disclosed herein. A payment server receives a payment request submitted by a transaction client terminal, the payment request containing transaction ordering information and facial image information of a payer. The payment server obtains user identification information of the payer according to a recognition of the facial image information of the payer. The payment server obtains location information of the payer according to the user identification information of the payer. The payment server determines whether the payer is located within a transaction region of the transaction client terminal. The payment server processes a payment transaction, when the payer is determined to be located within the transaction region. The disclosed method solves problems including that the personal identity code is hard to be memorized and/or vulnerable to be stolen. Payment safety and transaction efficiency are therefore significantly improved. | 04-30-2015 |
20150127534 | ELECTRONIC REFUND REDEMPTION - A system for electronic refund redemption includes an interface operable to receive an electronic communication identifying a product purchased by a user from a vendor, an amount of value added tax (“VAT”) included for the purchased product, and VAT refund criteria associated with the VAT jurisdiction in which the products were purchased, wherein the VAT refund criteria identifies products subject to a VAT refund in the VAT jurisdiction, and a processor, communicatively coupled to the interface, operable to determine, based on the VAT refund criteria, that the purchased product qualifies for a VAT refund and a VAT refund amount for the purchased product. | 05-07-2015 |
20150127535 | POSTING REAL-TIME PAYMENT CARD AUTHORIZATION PROCESS DATA TO SOCIAL MEDIA SITE - A social media location posting system a payment card transaction authorization processor and a location posting service processor. The payment card transaction authorization processor is configured to receive over a network a payment card transaction authorization request for a cardholder and store in a computer storage file associated with the cardholder payment card transaction data included in the authorization request. The location service processor is configured to post over the network at least a portion the payment card transaction data stored in the file associated with the cardholder to a social media site associated with the cardholder. | 05-07-2015 |
20150127536 | METHOD AND SYSTEM OF UTILIZING MOBILE PHONE AS LOCATOR TO MANAGE CARD ACCEPTANCE - A financial transaction method that includes receiving at a geolocation authentication module, a request from a managing computer system storing data associating identification information of individual mobile devices with individual payment card accounts, the request originating from a merchant and includes data identifying the geographic origin of the request for authorization against the payment card account of the customer; identifying a mobile device associated with the payment card account against which the request for authorization has been received; requesting data identifying a current geographic location of the at least one mobile device associated with the payment card account from a mobile device service provider, the mobile device service provider storing data identifying the current geographic location of the mobile device associated with the payment card account; and receiving, from the mobile device service provider, the data identifying the geographic location of the mobile device associated with the payment card account. | 05-07-2015 |
20150127537 | IC Chip for Preventing Identification Key Leak and Authorization Method Thereof - Disclosed are an IC chip for preventing identification key leak and an authorization method thereof. An IC chip capable of performing a financial function includes: a PIN supply unit for supplying a PIN used for authorization when performing a financial function using the IC chip; and a blocking unit for physically blocking the gap between the PIN supply unit and an input-output interface when the PIN is supplied to the outside through the input-output interface at an initial access of the IC chip. | 05-07-2015 |
20150127538 | SIGNAL DETECTION AND BLOCKING FOR VOICE PROCESSING EQUIPMENT - A telephone call processor for processing telephone calls comprising voice signals and data signals, the call processor comprising a first telephone interface and a second telephone interface, the call processor being operable in a first mode and in a second mode. In the first mode, the call processor is adapted to receive voice signals and data signals at the first telephone interface and to transmit voice signals and data signals via the second telephone interface. In the second mode, the call processor is adapted to receive voice signals and data signals at the first telephone interface, to block data signals from being transmitted via the second telephone interface and optionally to transmit voice signals via the second telephone interface. | 05-07-2015 |
20150127539 | SYSTEM AND METHOD FOR AUTHENTICATING, ASSOCIATING AND STORING SECURE INFORMATION - The present application discloses a method for authorizing mobile payment from a mobile application installed on a mobile device. After a user logs into a user account at the mobile application, the mobile device receives user information, and obtains payment card information retrieved from a first image of a payment card captured by the mobile device. Then, a request is sent to a server for authorizing the user to make mobile payment using the mobile application. The server is configured to authenticate the request by communicating with a financial institution using the user information and the payment card information. The mobile device receives a confirmation message after the authentication of the user information and the payment card information by the financial institution, and displays the confirmation message to the user of the mobile device such that the user can make mobile payment via the user account at the mobile application. | 05-07-2015 |
20150127540 | Transit Agency As An Issuer And/Or Program Manager Of Prepaid Products - Described is processing for requested user access, starting with receiving transaction data from a portable consumer device presented by the user at a gate access device of an access agency for the requested access. The transaction data from the gate access device is processed and a fee amount for the requested access is determined. The processing next involves determining an account balance in accordance with the determined fee amount and a prior balance amount associated with the portable consumer device, and reconciling the determined account balance and account data associated with the portable consumer device at a processing computer of the access agency such that the access request is indicated as either approved or declined. | 05-07-2015 |
20150127541 | WEARABLE TRANSACTION DEVICES - The disclosed embodiments include wearable transaction devices. A wearable transaction device may client device for executing a transaction. The client device may include interface hardware for communicating transaction information, a memory device for storing the transaction information, and sensor hardware configured to sense an action performed by a user. The client device may also include one or more hardware processors configured to access the transaction information, and identify an operation based on at least the transaction information. The one or more hardware processors may be further configured to determine that the operation is authorized by the user, and transmit a notification to a server based on the determination that the operation is authorized by the user, the notification including at least an indication of the identified operation. | 05-07-2015 |
20150127542 | SYSTEM AND METHOD FOR VERBAL AUTHORIZATION FOR FULFILLMENT OF A SERVICE - In some embodiments, a verbal authorization system comprises a financial services repository operable to store information identifying one or more financial services provided by a financial enterprise. The financial enterprise provides a financial service of the one or more financial services in response to a written authorization from a client. An eligibility engine is operable to determine whether the client is eligible to apply for verbal authorization status such that the client may provide verbal authorization during a telephone call to a fulfillment representative of the financial enterprise in lieu of the written authorization. A verbal authorization repository is operable to store client authorization information. The client authorization information identifies the client and whether the client has achieved the verbal authorization status. | 05-07-2015 |
20150127543 | ELECTRONIC TRANSACTION SYSTEM AND A TRANSACTION TERMINAL ADAPTED FOR SUCH A SYSTEM - A system for performing electronic transaction includes: a payment terminal including a human interface module, a first processor, and an internal bus for connecting these elements; a host terminal connectable to the human interface module through a connection; and a security module. The human interface module includes a keyboard, a display, a card reader for reading and authenticating a bank card or credit card. The host terminal includes a second processor, a memory, and a power supply. A transaction terminal task manager is included in the first security module, the first security module being hosted in the host terminal. The human interface module executes transaction phases under control of the security module, and executes security treatments, totally autonomously from the host terminal. The security treatments include presentation of a PIN code to the bank card or credit card. | 05-07-2015 |
20150127544 | METHOD AND APPARATUS FOR RECONCILING A TRANSACTION - A method and apparatus that improves treasury management functionality for a cash positioning and reporting system is provided. Several portions of the payment process may be improved. The approval process may be streamlined by providing supplemental contact information at each stage of the approval process. Confirmation of payments made via a wire transfer may be sent to a payee. A reference number from the wire transfer may be included in the confirmation. The reference number may permit tracking of the payment by the payee. Likewise, supplemental wire transfer information may be provided to the general ledger system to improve reconciliation of payments and invoices. | 05-07-2015 |
20150134522 | ENHANCED AUTHORIZATION MESSAGE METHOD AND APPARATUS - A system, apparatus, and computer-readable storage medium configured to indicate an elevated status of a customer via an enhanced authorization message. | 05-14-2015 |
20150134523 | TELEPHONE ORDER PAYMENTS AUTHENTICATION USING PHONE NUMBER RECOGNITION - Presented are a method, system, and software product for transaction authentication via identification of a received telephone call. A telephone call is received from a potential payor requesting payment instrument transaction authorization. A determination is made via the telephone company of whether the telephone number was engaged in a call mode when the telephone call was received. If so, the transaction is allowed to proceed. Also presented are a method, system, and software product for authorization of transactions made via telephone. A payment instrument organization receives a request for transaction authorization containing a unique customer identifier of a customer attempting to complete a transaction via telephone. The associated telephone company is then contacted to determine whether the customer telephone number was engaged in an outbound call at the time the request for authorization of the transaction was received. If so, the transaction is approved. | 05-14-2015 |
20150134524 | Real-Time External Financial Account Verification - Methods and systems for providing real-time external account validation during the opening of a new financial account include receiving external account information and validation information for use in validating that an account owner corresponding to the new financial account is associated with an external financial account provided by an external institution. The received information may be electronically transmitted to the external institution, and the external institution may respond with an electronic indication of an affirmative validation. Upon reception of the affirmative validation, an electronic funds transfer from the external account to new financial account may be initiated. The real-time external account validation may be performed in real-time, e.g., during a single business day or during a single session established with a computer of the institution providing the new financial account. | 05-14-2015 |
20150134525 | Method for Preventing Misappropriation of Plastic Money and Plastic Money - A method for preventing misappropriation of plastic money includes transmitting a first verification data from plastic money to an accompanied card through a wireless signal; comparing the first verification data with a second verification data stored in the accompanied card; if the comparison result is that the first verification data is identical to the second verification data, transmitting a verification success message from the accompanied card to the plastic money through the wireless signal; transmitting a first short message or E-mail including intended payment information from the plastic money to a cell phone number or an E-mail address of a cardholder of the plastic money through the wireless signal to inquire whether the cardholder of the plastic money agrees to pay or not; clicking a particular hyperlink in the first E-mail with a mobile device or pressing a particular button or icon of the mobile device by the cardholder of the plastic money to agree to pay and transmitting an approved payment message back to the plastic money through the wireless signal. | 05-14-2015 |
20150134526 | METHOD AND SYSTEM FOR SECURE USER IDENTIFICATION - There is disclosed a method and system for verifying an identity of a user to a computer system. The user is assigned a user access code in the form of an invariant string of integers from 0 to 9, with length no greater than ten. The user access code is stored in the computer system; the computer system generates a ten-digit random or pseudo-random non-repeating string of the integers 0 to 9, the string having 1st to 10th positions each with a unique integer and having respective positional values 1 to 10; and the computer system performs a predetermined algorithm to combine the user access code and the random or pseudo-random string, thereby to determine a one-time verification code in the form of a string of the same length as the user access code. The computer system also generates 1st to 10th cells, the cells having respective locational values 1 to 10; populates the cells with the integers of the non-repeating string such that the locational value of each cell corresponds to the integer it contains combined with the random or pseudo-random string using the same predetermined algorithm as used previously; and displays the cells on a display. A user uses an input device of the computer system to select, in order, the cells on the display that contain the integers constituting the user access code. Each act of selection returns the locational value of the selected cell, thereby to generate a one-time transaction code comprising a string of integers from 0 to 9 having the same length as the user access code. The computer system then compares the verification code with the one-time transaction code and makes a successful identity verification if the verification code matches the one-time transaction code. | 05-14-2015 |
20150134527 | BIOMETRIC BASED AUTHORIZATION SYSTEMS FOR ELECTRONIC FUND TRANSFERS - A money transfer authorization method that includes the step of providing transferor biometric information to a party verification processor that verifies an identity of the transferor by comparing the transferor biometric information with previously registered biometric information from the transferor, where the transferor provides transfer identity information to receive the money. The method also includes confirming that the verified transferor has sufficient funds or credit for the money transfer, and providing transferee biometric identification to the party verification processor that verifies the transferee by comparing the transferee biometric information with previously registered biometric information from the transferee. The transferee has to provide transfer identity information before the money is given to the transferee. | 05-14-2015 |
20150134528 | SYSTEMS AND METHODS TO FACILITATE THE REDEMPTION OF OFFER BENEFITS IN A FORM OF THIRD PARTY STATEMENT CREDITS - A system and method configured to provide a mechanism allowing a third party, not involved in a payment transaction made between a merchant and a payment account, to provide a credit to the payment account as an offer benefit redeemed in view of the payment transaction. The mechanism includes a transaction handler of a payment processing network configured to provide transaction information relevant to the offer to the third party. If the third party determines that a qualifying transaction in the payment account is entitled to the benefit, the third party communicates a request, via an application programming interface (API), to a portal of the transaction handler for a credit to the payment account for the payment transaction; the transaction handler confirms the validity and permissibility of the request based on a set of business rules; if the request is approved, in response, the transaction handler generates a credit transaction for the payment account using a funding source of the third party and store data associating the credit transaction with the qualifying transaction. | 05-14-2015 |
20150134529 | CONTROLLED METHOD AND SYSTEM FOR SECURE INFORMATION SHARING - A method between an end-point networked device of a sending user (SU) and an end-point networked device of a receiving user (RU) is provided that includes registering the end-point device of the SU in the networked database by issuance of a Unique ID (UID) for the end-point device of the SU. The SU enters information into the end-point device of the SU and supplies the UID to the RU. The RU enters the UID into the end-point device of the RU, a web browser, or another end-point device database interface to generate a query requesting the information from the end-point device of the SU. The information is transmitted to the end-point device of the RU, the web browser or the other end-point device database interface. A material or other request is completed based on the information. A system is also provided that facilitates the aforementioned methods. | 05-14-2015 |
20150134530 | METHOD, TERMINAL, AND SYSTEM FOR PAYMENT VERIFICATION - Methods, terminals, and systems for payment verification are provided. Payment information associated with a payment operation is obtained, in response to a user entry performed in a data entry region on a user interface unit of a payment terminal and after the payment operation is detected. A prompt notification prompted for inputting a fingerprint can be outputted. At least two fingerprints are inputted and scanned to obtain at least two-fingerprint information. Based on the payment information and the at least two-fingerprint information, a payment request containing a payment account number and verification information of the payment account number is sent to a server for the server to process the payment request after the at least two-fingerprint information and the verification information are verified by the server. | 05-14-2015 |
20150134531 | METHOD, APPARATUS, AND SYSTEM FOR INFORMATION TRANSMISSION - Methods, apparatus, and systems for information transmission are disclosed herein. The receiving terminal generates an RF signal including payment information corresponding to a payment amount to be paid. The payment terminal receives the RF signal from the receiving terminal, parses the RF signal to obtain the payment information, and sends the payment request to the bank server according to the payment information. The payment request can includes the payment account number and the verification information of the payment account number. The bank server processes the payment request and sends a process result after processing to the payment terminal and the receiving terminal. Since the payment information is obtained through RF signal, compared with obtaining the payment information through internet in current technology, the present disclosure improves the security of the payment process, as well as the smartness of the information transmission systems. | 05-14-2015 |
20150142653 | WIRELESS POWER SUPPLY TO ENABLE PAYMENT TRANSACTION - A method for completing a transaction at a terminal between a terminal and a mobile device including: initiating a transaction at the terminal; initiating communication with the mobile device; determining that the mobile device is without power; transmitting a wireless power signal to power the mobile device; sending a transaction authentication request message to the mobile device after transmitting the wireless power signal; receiving an authentication message from the mobile device; and completing the transaction after receiving the authentication message from the mobile device. | 05-21-2015 |
20150142654 | FACILITATING PAYMENT TRANSACTION VIA TRUSTED DEVICES - When a mobile communication device attempts to conduct an electronic payment transaction in a remote area where wireless signals for internet connection are not available, the mobile communication device may relay the request for payment transaction via one or more trusted devices using Near Field Communication to reach a trusted device that has access to the internet. In particular, the request for payment transaction may be relayed, e.g., daisy-chained, through one or more trusted devices until the request for payment transaction reaches a trusted device that has access to the internet. The trusted device that has access to the internet may send the request for payment transaction to a payment service provider via the internet to process the payment transaction. | 05-21-2015 |
20150142655 | METHODS, SYSTEMS AND COMPUTER READABLE MEDIA FOR APPORTIONING A PAYMENT CARD AUTHORIZATION REQUEST AMONG A PLURALITY OF ISSUER ENTITIES - Methods, systems, and computer readable media for apportioning a payment card authorization request among a plurality of issuer entities are disclosed. In one example, the method includes the method includes receiving a payment card authorization request associated with a master access card account for a specified monetary amount and apportioning the specified monetary amount into a plurality of monetary amounts in accordance with predefined allocation data associated with the master access card account. The method also includes sending a plurality of authorization requests containing the plurality of monetary amounts to a respective plurality of issuer entities. | 05-21-2015 |
20150142656 | SYSTEMS AND METHODS FOR INTEGRATING AN ENVIRONMENTAL IMPACT OFFSET WITH A PAYMENT CARD USAGE PROGRAM - A computer-implemented method for generating environmental impact offsets for payment card transactions is described. The method implemented using a computing device in communication with a memory. The method includes storing, in the memory, a plurality of offset factors associated with a plurality of merchants, receiving a first authorization request message for a payment transaction originating from an originating merchant for a cardholder that includes a transaction amount, determining the offset factor associated with the originating merchant, calculating, by the computing device, an offset amount based on the transaction amount and the offset factor, outputting the offset amount. | 05-21-2015 |
20150142657 | LINKING PHYSICAL CARD TO VIRTUAL CARD ACCOUNT METHOD AND APPARATUS - A system, method, and computer-readable storage medium configured to enable a cardholder to perform a financial transaction with virtual payment card when presenting a linked physical payment card. | 05-21-2015 |
20150142658 | PAYMENT BINDING MANAGEMENT METHOD, PAYMENT SERVER, CLIENT, AND SYSTEM - A computer server receives a payment binding change request submitted by a client application from a requesting terminal, where the payment binding change request carries a payment account and terminal identification information of a target payment-bound terminal. If the target payment-bound terminal is registered as a secondary payment-bound terminal of the payment account, the computer server sends verification information to the target payment-bound terminal and returns prompt information to the client application. The prompt information is used to prompt a user of the client application to input and return the verification information sent to the target payment-bound terminal. If the verification information returned by the client application matches the verification information sent to the target payment-bound terminal, the computer server sets the target payment-bound terminal as a primary payment-bound terminal of the payment account. | 05-21-2015 |
20150142659 | METHOD, APPARATUS AND SYSTEM FOR MOBILE PAYMENT - A mobile payment method is provided. The method includes a mobile terminal obtaining a user identifier stored in a portable terminal which establishes a communication connection with the mobile terminal and sending the user identifier to a payment platform server. The method also includes the mobile terminal receiving prompt information sent from the payment platform server, where the prompt information is used to prompt the mobile terminal to report payment information after the payment platform server authenticates successfully the user identifier sent from the mobile terminal. Further, the method includes the mobile terminal receiving the payment information inputted by a user in response to the prompt information and sending the payment information to the payment platform server to cause the payment platform server to perform a payment operation based on the payment information, where the payment information includes a payment account, a payment amount and a beneficiary account. | 05-21-2015 |
20150142660 | CENTRALIZED FINANCIAL ACCOUNT MIGRATION SYSTEM - Systems and methods for migration of financial account settings are disclosed. One system includes a migration server. The migration server includes a third-party interface directory, including notification data associated with notifying one or more third parties of an account migration. The migration server further includes a transaction analysis module configured to parse transaction histories associated with an existing financial account to identify a third party that has initiated at least one transaction with the existing financial account. The migration server also includes a notification module configured to generate a notification for the identified third party based on notification data associated with the identified third party stored in the third-party interface directory and information associated with a target financial account. | 05-21-2015 |
20150142661 | SHARED EXPENSE MANAGEMENT - Systems and methods are provided for managing shared expenses. The systems and methods may include a financial service provider identifying shared expenses in a customer's transaction history with software application executed on a server or personal computing device. The financial service provider may identify other individuals with whom the customer shares the expense, and send requests for reimbursement on the customer's behalf. The financial service provider may monitor the status of reimbursement payments, and send reminders as necessary until the shared expense has been reimbursed. | 05-21-2015 |
20150142662 | SYSTEMS AND METHODS FOR IDENTIFICATION VERIFICATION USING ELECTRONIC IMAGES - Systems and methods are provided for identification verification using electronic images. For instance, a method may include receiving, by a computer from a service provider computer, a notification indicating that a user has failed electronic verification. The method may also include receiving, by the computer from the service provider computer, instructions to transmit identification data associated with the user. Additionally, the method may include generating an electronic image of an identification document associated with the user and transmitting the electronic image to the service provider computer for verification of the user | 05-21-2015 |
20150142663 | SYSTEMS AND METHODS FOR OPTIMIZING FINANCIAL TRANSACTIONS - Systems, methods and computer-readable media for optimizing financial transactions are disclosed. Candidate source and target financial accounts may be respectively identified based on source and target identifiers. Respective candidate source payment networks configured to access each candidate source financial account and respective candidate target payment networks configured to access each candidate target financial account may be identified. Based at least in part on an analysis of one or more rules, a set of transaction options may be generated. Each transaction option may be associated with a particular combination of source and target financial accounts and payment networks and may further be associated with one or more transaction characteristics. Respective transaction options information associated with one or more of the transaction options may be transmitted and potentially presented to a financial transaction requestor. The requestor may be provided with a capability to indicate a selection of a transaction option for processing of a financial transaction. In other scenarios, an analysis of a set of transaction options may be performed based on a complete financial transaction request that includes a transaction amount. An indication of whether the financial transaction is executable may be transmitted, potentially for presentation to a financial transaction requestor. | 05-21-2015 |
20150149355 | SYSTEM AND METHOD FOR STAGING VOUCHER TRANSFERS - Various embodiments concern methods of operating a server to facilitate transfer of a voucher to a receiver. Such methods include receiving a request at a server from a sender, the request indicating an identity of a receiver and a value designation, and receiving a selection of one or more vendors at the server. The methods further include sending a reference number to the sender from the server and receiving the reference number at the server from the receiver. The reference number is communicated from the sender to the receiver independently of the server. The methods further include authorizing release of a voucher to the receiver based on the reception of the reference number at the server and authentication of the identity of the receiver, the voucher redeemable only for goods and services with the selected one or more vendors. | 05-28-2015 |
20150149356 | METHOD AND SYSTEM FOR AUTHENTICATING CROSS-BORDER FINANCIAL CARD TRANSACTIONS - A method for scoring a cross-border transaction includes: storing a consumer profile, the consumer profile including data related to a consumer including an account identifier corresponding to a payment account associated with the related consumer and a device identifier corresponding to a computing device associated with a first country; receiving a data file originating from the computing device, the data file including the device identifier and an indication of the computing device being located in a second country; receiving an authorization request for a cross-border payment transaction, the authorization request originating from the second country and including the account identifier; identifying a fraud score based on at least one fraud rule and based on at least the received indication of the computing device being located in the second country; and transmitting the authorization request and the identified fraud score for approval or denial of the cross-border payment transaction. | 05-28-2015 |
20150149357 | MOBILE PAYMENT HOTSPOT - Exemplary methods, apparatuses, and systems determine that a geolocation of a first mobile device is within a threshold distance from a geolocation of a second mobile device. In response, a list of one or more mobile devices within the threshold distance from the geolocation of the second mobile device, including the first mobile device, are transmitted to the second mobile device. A selection of the first mobile device from the list is received from the second mobile device. A request from the second mobile device to transmit a payment from an account associated with the second mobile device to an account associated with the first mobile device is received from the second mobile device. A confirmation of the requested payment is transmitted to the second mobile device. | 05-28-2015 |
20150149358 | LINKED USER ACCOUNTS - Separate user accounts can be linked into a group of linked user accounts so that content items assigned to each of the user accounts can be accessed by each user account in the group. Linking user accounts in this way allows the individual user accounts to share content items while also retaining their individual properties such as username, password, preference data, etc. Linking user accounts allows each user account to retain the content items assigned to the user account when the user account is unlinked from the group. Linking user accounts can be restricted according to linking rules that dictate how many user accounts can be included in a group, when a user account can be added or removed from a group, etc. A master user account can set parameters restricting content items accessible to the user accounts in the group, as well as money spent be each user account. | 05-28-2015 |
20150149359 | Out-Of-Band Device Verification of Transactions - Concepts and technologies are disclosed herein for out-of-band device verification of transactions. A processor can execute a verification service. The verification service can receive a verification request with data relating to a transaction between a computing device and an application. The verification service can identify an out-of-band device associated with the computing device and obtain verification data from the out-of-band device. The verification service can compare the verification data to data relating to the transaction to determine if the transaction is to be verified. Based upon the determination, the verification service can approve or block the transaction. | 05-28-2015 |
20150149360 | METHOD FOR VALIDATING AN ELECTRONIC TRANSACTION, AND SYSTEM THEREOF - A method for validating an electronic transaction, including a step | 05-28-2015 |
20150149361 | ELECTRONIC DEVICE FOR CONTACTLESS PAYMENT - An electronic device and an authentication method thereof are disclosed herein. The electronic device includes a sensor module, a network module, at least one processor and a non-transitory computer-readable medium. The non-transitory computer-readable medium stores a first prestored biometric signature and computer-executable instructions to be executed by the at least one processor for performing the authentication method, in which the first prestored biometric signature is verified and issued by a first payment service. The authentication method includes the following steps: detecting a first biometric signature by the sensor module; determining whether the first biometric signature matches the first prestored biometric signature; authenticating the first payment service if the first biometric signature is determined to match the first prestored biometric signature; and transmitting or receiving data corresponding to the first payment service by the network module. | 05-28-2015 |
20150293705 | FORMATTING AND CAPACITY EXPANSION IN A DATA STORAGE DEVICE - Methods, systems, and devices are described for a data storage device, such as a hard disk drive or solid state drive, that may be initially formatted to an initial capacity. The data storage device may continue to be formatted to add additional capacity to the device. In some examples, a data storage device may be shipped from a factory having an initial capacity, with formatting completed in the field. According to certain examples, the additional capacity may be provided to a user of the data storage device upon satisfaction of one or more conditions. For example, a user may purchase additional capacity, upon which the data storage device may be instructed to provide the additional capacity for use by the user. | 10-15-2015 |
20150294304 | SECURE PAYMENT METHODS, SYSTEM, AND DEVICES - Methods, systems, and devices for securely processing transactions using payment cards are disclosed. A transaction may be initiated using an identification value corresponding to a mobile device. The mobile device may then be contacted by remote servers to obtain payment card information. The mobile device may obtain the payment card information directly from a payment card that is present at the mobile device during the transaction. | 10-15-2015 |
20150294310 | TRANSACTION SYSTEM AND TRANSACTION METHOD - Provided are a transaction system and a transaction method. The transaction system comprises: a first electronic signature tool for making a first signature on transaction data and sending the transaction data subjected to the first signature to a network bank server; the network bank server for receiving the transaction data sent by the first electronic signature tool having been subjected to the first signature and performing authentication thereon, and sending the transaction data to at least one second electronic signature tool after the authentication has passed; and the at least one second electronic signature tool for receiving the transaction data sent by the network bank server, performing verification on the transaction data, receiving confirmation information input by a user after the verification has passed, and making a second signature on the transaction data and sending the transaction data having been subjected to the second signature to the network bank server. The present invention ensures the security of a transaction process, realizes remote transaction in the case that a transaction initiation party and a transaction confirmation party are not present simultaneously, and is convenient to use and strong in security. | 10-15-2015 |
20150294311 | EFFICIENT SERVICE AUTHORIZATION AND CHARGING IN A COMMUNICATION SYSTEM - An approach is disclosed for service authorization and service charging in a communication network relying on executing a real time service authorization for a requested service by determining an upper estimate of a service charge for the requested service, comparing the upper estimate with a balance value of an account used for charging the requested service and when affirmative authorizing the requested service. Then follows a calculation of an accurate service charge for the requested service in a batch mode without real time requirements after the real time service authorization. | 10-15-2015 |
20150294312 | SYSTEMS AND METHODS FOR INITIATING AND AUTHORIZING TRANSACTIONS USING A DETECTABLE DEVICE - A system for initiating and authorizing a transaction including one or more memory devices storing instructions and one or more processors configured to execute the instructions to associate a detectable device with at least one financial account. The one or more processors may be further configured to receive a notification indicating that the detectable device is involved in a potential transaction initiated by a sensor device detecting the detectable device in an initiating action. The one or more processors may be further configured to receive transaction information associated with the potential transaction. The one or more processors may be further configured to identify a customer profile associated with the detectable device, and determine whether the potential transaction is authorized by a customer based on the transaction information and at least one profile customization parameter associated with the customer profile. | 10-15-2015 |
20150294313 | SYSTEMS, APPARATUS AND METHODS FOR IMPROVED AUTHENTICATION - Multi-factor authentication techniques are described that use secure push authentication technology for transactions. An embodiment includes receiving, by an assurance platform operating as an authentication service platform, a user authentication request and transaction data from an access control server (ACS), determining an authentication rule, generating a user validation request message, transmitting the user validation request message to a user mobile device, and receiving user authentication data. The assurance platform then validates the user authentication data, transmits a device authentication request, receives a device authentication response signed with a private key of the user, and authenticates the user based on the device authentication response and private key. | 10-15-2015 |
20150294314 | SYSTEM AND METHOD OF PROVIDING MULTINATIONAL CARD PROGRAMS - A method for facilitating a transaction includes: storing card association data entries, each including at least a card association number (ICA), a country associated with the ICA, and a plurality of bank identification numbers (BINs) associated with the ICA; receiving a number request originating from a first country and identifying a second country; identifying a specific data entry where the included country corresponds to the second country; identifying a subset of BINs of the plurality associated with the ICA in the specific data entry; transmitting the identified subset of BINs; receiving an authorization request for a financial transaction originating from the second country and including at least a payment card number, the number being associated with a BIN included in the subset of BINs; processing the financial transaction as a local transaction and not a cross-border transaction; and transmitting an authorization response indicating approval or denial of the financial transaction. | 10-15-2015 |
20150294317 | SYSTEM AND METHOD FOR SECURELY TRANSMITTING DATA USING VIDEO VALIDATION - A system and method is disclosed for secure transmission of electronic information between two parties. A first data communication session between a first computing device and a second computing device, wherein the first data communication session is via a first communication protocol. Further, the first computing device transmits first information via the first communication protocol that is received by the second computing device via the first communication protocol. During the first communication session, a second data communication session is provided between the first computing device and the second computing device. The second communication session is via a second communication protocol, which is more secure than the first communication protocol. The first computing device transmits second information via the second communication protocol that is received by the second computing device the second information via the second communication protocol. The second information relates at least partially to the first information. Moreover, the second communication session appears to a user of the first computing device to be the first communication session. | 10-15-2015 |
20150294405 | VIRTUAL BANKING CENTER - Systems, apparatus, methods, and computer program products are provided for a virtual banking experience using a wearable computing device. Embodiments of the invention involve a memory device; and a processing device operatively coupled to a memory; a computing processor; and a module configured to cause the one or more computing processors to receive an indication that the customer desires to initiate a virtual banking session using the OHMD; receive from the customer a selection of a real agent or a virtual agent for conducting the virtual banking session; configure a virtual banking environment comprising one or more virtual objects for facilitating the virtual banking session, wherein the virtual banking environment comprises one or more virtual objects associated with one or more financial institution products and/or services; and implement, via the OHMD, the virtual banking session involving the customer and the customer-selected real agent or the customer-selected virtual agent. | 10-15-2015 |
20150302370 | SYSTEM AND METHOD FOR REAL TIME TRANSFERS BETWEEN ACCOUNTS - A system and method for real-time funds transfer that includes a financial institution server system that maintains an agent account for real-time transfers, an input/output module of the financial institution server system that receives a request for a real-time funds transfer, wherein the request for the real-time funds transfer includes destination account data, funds transfer amount, and source financial institution preference data, a destination agent module of the financial institution server system that processes the received request and determines whether the agent account can facilitate the real-time funds transfer based on the destination account data, funds transfer amount, and source financial preference data, and a destination account module of the financial institution server system that receives, in real-time from the agent account, the funds transfer amount if the destination agent module determines that the agent account can facilitate the real-time funds transfer. | 10-22-2015 |
20150302382 | SYSTEM FOR MANAGING MULTI-PARTY TRANSACTIONS - A system and method for processing multiparty transactions, involving multiple payees, are disclosed. A transaction processor receives a first set of order information corresponding to an agreement between a customer and a first payee. The transaction processor further receives a second set of order information corresponding to an agreement between the first payee and a second payee. The transaction processor then receives payment from the customer. A first payout authorization is detected from the customer and the first payee. A second payout authorization is detected from the first payee and the second payee. Upon detecting the first and second payout authorizations, the transaction processor disburses at least a portion of the payment to the first payee and to the second payee based, at least in part, on the first set of order information and the second set of order information, respectively. | 10-22-2015 |
20150302392 | SYSTEM AND METHOD FOR PROCESSING FUNDS TRANSFER BETWEEN ENTITIES BASED ON RECEIVED OPTICAL MACHINE READABLE IMAGE INFORMATION - A system and method for coordinating processing of a funds transfer transaction between a transaction requestor and a transaction responder over a communications network. The transaction system comprises receiving a funds amount, requestor identification information, and responder identification information, such that at least one of the funds amount, the requestor identification information, or the responder identification information is encoded in symbology information embodied in a barcode. The system also decodes the symbology information into unencoded information using a coding scheme of the barcode and generates a funds transfer request for the funds transfer transaction, such that the funds transfer request has content including the unencoded information decoded from the symbology information. The system also sends the funds transfer request to a transaction processing system for subsequent settlement, as well as receives transaction confirmation messages. | 10-22-2015 |
20150302404 | SECURE ELECTRONIC PAYMENT SYSTEM - A novel method of allowing secure payments from a purchaser to a seller through the utilization of a combined server platform/vault server system. Such a system entails the generation of a subscription service that allows for authentication of a consumer's credit card in terms of pre-approved identification for future transactions. Such a system initiates a tokenization procedure through transfer of credit card information to the server platform through the vault program and to issuing banks/card providers. Upon acceptance thereof, the vault server generates a token that correlates to a specific credit card of a specific user that is then stored on the server platform. Upon request from a subscribing merchant for acceptance of a tokenized card for payments, the user merely needs to provide an identifying code to access the card for such a purpose. | 10-22-2015 |
20150302405 | METHOD AND SYSTEM FOR VALIDATION OF MERCHANT AGGREGATION - A method and system that involve retrieving, from one or more databases, a first set of information including merchant aggregated payment card transaction data for a defined time period, and retrieving, from one or more databases, a second set of information including merchant reported sales data for the defined time period. The method and system further involve analyzing the first set of information and the second set of information to generate a correlation coefficient for the defined time period, and assessing the merchant aggregated payment card transaction data based on the correlation coefficient. The method and system enable validation or verification of merchant aggregation, e.g., determining if merchant aggregation is optimal or above a predetermined threshold value. The method and system leverage consumer payment transaction data and merchant sales information in a way so as to enable validation or verification of merchant aggregation. | 10-22-2015 |
20150302406 | METHODS AND SYSTEMS FOR IMPROVING ACCURANCY OF MERCHANT AGGREGATION - A method and a system that involve retrieving, from one or more databases, a first set of information including merchant aggregated payment card transaction data, and retrieving, from one or more databases, a second set of information including merchant hierarchical organizational structure. The method and the system further involve analyzing the first set of information and the second set of information to identify one or more associations between the merchant aggregated payment card transaction data and the merchant hierarchical organizational structure, and updating the merchant aggregated payment card transaction data based on the one or more associations. The method and the system provide up-to-date merchant identification information to enable accurate merchant aggregation. The method and the system leverage consumer payment transaction data and up-to-date merchant organizational structure information in a way that enables accurate merchant aggregation. | 10-22-2015 |
20150302409 | SYSTEM AND METHOD FOR LOCATION-BASED FINANCIAL TRANSACTION AUTHENTICATION - There is provided apparatus, systems and methods that secure payment systems and other financial transaction systems by integrating the location of the transaction into transaction (e.g. payment) authentication processing. One or more methods, apparatus and systems are provided for authenticating a financial transaction made by a payer using a financial transaction processing system such as a payment system. The location of the payer and at least a portion of the financial transaction processing system (e.g. a location of the point of transaction) are verified by an authentication system and confirmed by the payer using a payer communication device. | 10-22-2015 |
20150302410 | Systems and Methods for Use in Inhibiting Theft of Payment Cards - Exemplary systems and methods for inhibiting payment card theft are disclosed. One exemplary method includes receiving a non-activation attempt for a payment card. The payment card has a primary account number (PAN). The non-activation attempt includes the PAN. When the non-activation attempt precedes an activation attempt for the payment card, the exemplary method includes appending the payment card to a do-not-activate list stored in memory. The exemplary method further includes receiving the activation attempt from the merchant, via a payment network. The activation attempt includes an identifier associated with the payment card. The identifier is different than the PAN. And, in response to an activation attempt, the method includes declining activation of the payment card when the payment card is included in the do-not-activate list. | 10-22-2015 |
20150302412 | ONLINE BANK TRANSFER TRANSACTIONS - A user establishes an account with a payment processing system and enters financial account information and credit account information. The user initiates a transaction with a merchant system for a payment amount and selects to pay with the financial account. The payment processing system requests and receives a credit authorization for the payment amount from an issuer system associated with the credit account and initiates a bank transfer, requesting funds from the user's financial account equal to the payment amount or the payment amount minus a minimal amount. The payment processing system credits an account associated with the merchant system and transmits a transaction approval to the merchant system. The payment processing system receives the bank transfer and transmits a request to the issuer system to cancel the credit authorization, waits for the credit authorization to expire, or charges the minimal amount on the user credit account. | 10-22-2015 |
20150302413 | APPARTUS AND METHOD TO PERFORM POINT OF SALE TRANSACTIONS USING NEAR-FIELD COMMUNICATION (NFC) AND BIOMETRIC AUTHENTICATION - An apparatus and method to conduct financial and other transactions using a wireless computing device. The wireless device includes an input display part, one or more processors, and at least one memory device. The memory device has stored therein a wallet application for completing transactions based on wireless data communications between the computing device and an external electronic device. The memory device further stores at least one electronic credential. The wireless device permits transmission, via a near-field communication (NFC) module, of at least one electronic credential to an NFC reader of the external electronic device based on comparing a biometric characteristic of a user, detected by a biometric characteristic reader, with stored biometric information. | 10-22-2015 |
20150304323 | Use of a Biometric Image for Authorization - A second user can authorize a first user to take or complete an online action by submitting one or more biometric images. For example, the second user can authorize a purchase by the first user on an online store. The second user can submit the one or more biometric images on the electronic device being used by the first user, or the second user can submit the biometric image or images remotely using another electronic device. | 10-22-2015 |
20150310421 | Electronic payment transactions without POS terminals - Techniques for completing a financial transaction without deploying merchant POS are described. According to one aspect of the present invention, a user or buyer uses his/her smartphone to complete a monetary transaction with a seller, where the seller does not have a POS device instead receives a conformation from a designated party that a payment from the buyer has been received. A platform is described to support such transactions. | 10-29-2015 |
20150310423 | MULTI-DOMAIN MOBILE ECOSYSTEM TOKENIZED TRANSACTION WRAPPER - Tokenizing a wrapper in a secure personalized transaction conducted within a multi-domain ecosystem involves mapping a portion of a plurality of information fields of an electronic transaction message received by a networked device of the multi-domain ecosystem to common format message fields that are then configured into a common format message. The configured common format message is wrapped in a protocol abstraction content wrapper, which is tokenized. The token and/or the wrapper is transmitted to a second networked device in the ecosystem for authentication of a transaction identifiable in the electronic transaction message. | 10-29-2015 |
20150310430 | MOBILE PAYMENT SYSTEM AND METHOD - A merchant web site automatically detects whether a customer device has a registered payment application; if so, the web site generates a custom protocol message that is triggered on checkout to initiate payment via the payment application. Details of the transaction are passed to the payment application via a payment server so that the user can authorise the transaction within the payment application. | 10-29-2015 |
20150310434 | SYSTEMS AND METHODS FOR IMPLEMENTING AUTHENTICATION BASED ON LOCATION HISTORY - A system and/or method may be provided to authenticate a user based on the user's location history. In particular, the user's past locations and movements may be detected at the user's mobile device. Information with regard to the user's movements and location may be collected and analyzed to determine certain routines, such as locations frequently visited or routes frequently taken. When a payment request is made from the user's mobile device, the mobile device's recent location history may be compared with the routines of the user. A confidence score may be generated based on the user's recent location history. The confidence score may be used to authenticate the user for the payment request. In an embodiment, the confidence score may be used to determine the transaction fee for using a certain funding source, such as a credit card. | 10-29-2015 |
20150310435 | A SYSTEM AND A METHOD FOR PROCESSING A USER REQUEST USING AT LEAST ONE OF A PLURALITY OF USER INSTRUMENTS TO CONDUCT A PECUNIARY COMMUNICATION - A system and a method for processing a user request using one of a plurality of user instruments to conduct a pecuniary communication at a server with a merchant over a communications network. The system comprising a server including a content management unit configured for receiving the user request, the user request includes an OTP, a user instrument details, a merchant ID, and the pecuniary particulars. The system further comprises an authentication unit included in the content management unit for authenticating the user to conduct the pecuniary communication with the merchant by verifying the user based on the received OTP and the user instrument details and a verification unit included in the content management unit for verifying the merchant, verifying account information of the user stored at the server based on the pecuniary particulars. | 10-29-2015 |
20150310437 | AVOIDING TRANSACTION ROLLBACK - A method and apparatus for avoiding a transaction rollback is provided. The method includes, at a predetermined checkpoint in a currently executing business process, determining the current service, and determining at least one service in subsequent processes of the checkpoint. The status of at least one unavailable service in the at least one service included in the subsequent processes of the checkpoint is queried. Whether the transaction can be fulfilled is determined, based on the at least one unavailable service. The execution of the transaction is stopped in response to a judgment that the transaction cannot be fulfilled. | 10-29-2015 |
20150310438 | SMS AND SOCIAL MEDIA DUAL AUTHORIZATION, MANAGEMENT OVERSIGHT, AND NON-PASSWORD SECURITY IN EMAIL BASED E-COMMERCE - An email-based e-commerce system is disclosed with additional features for added security. The system may include security features for email based e-commerce providing added assurance to customers of a higher level of protection than generally required. These security features enhance the password reset function without requiring a password, generate confirmations on outside messaging systems and implement an oversight management tool for authorizing transactions. The methods and apparatus described herein may enhance security by designing a system that can confirm payments through a separate non-email based media. The e-commerce system may send alerts or requests for confirmation in a variety of media to ensure a secure payment process. The methods and apparatus described herein may expand the list of individuals that may request or approve payments based on a single account registered by a single credit card holder. A single user may receive requests from registered sub-customers for payments by email. | 10-29-2015 |
20150310439 | METHOD FOR GENERATING AND UPDATING ALTERNATE SECURITY CODES FOR PAYMENT CARDS - An auxiliary security code called a CVC2a is generated to replace a CVC2 value that is presented on a payment card for verifying card-not-present (CNP) transactions without necessarily generating a replacement card. An enhanced card table/file is maintained by a payment network operator to facilitate transitional scenarios in which the payment cards are reissued or replaced. | 10-29-2015 |
20150310440 | Methods and Systems for Verifying Individuals Prior to Benefits Distribution - Systems and methods for verifying individuals prior to distribution of one or more benefits are disclosed. One exemplary method includes receiving, at a server, a proof-of-life validation from a payment service provider. The proof-of-life validation is based on receipt of a valid biometric from the individual at a payment device associated with the individual, and a transaction using said payment device. The method further includes distributing the benefit to a benefit account associated with the individual, when the proof-of-life validation is received within a time interval of the benefit distribution date. | 10-29-2015 |
20150310442 | METHODS, SYSTEMS AND COMPUTER READABLE MEDIA FOR DETERMINING CRIMINAL PROPENSITIES IN A GEOGRAPHIC LOCATION BASED ON PURCHASE CARD TRANSACTION DATA - Methods, systems, and computer readable media for determining criminal propensities in a geographic location based on customer card transaction data are disclosed. In one example, the method includes utilizing purchase card transaction data associated with purchase card transactions conducted during a designated time period to determine a plurality of first normalized regional expenditure indices corresponding to a plurality of industry categories for a first geographic location. The method further includes generating an algorithmic model based on correlations between each of the first normalized regional expenditure indices and a plurality of criminal offense types committed during the designated time period and applying the algorithmic model to each of a plurality of second normalized regional expenditure indices corresponding to the plurality of industry categories associated with a second geographic location in order to determine a criminal propensity indicator in the second geographic location for each of the plurality of criminal offense types. | 10-29-2015 |
20150310443 | SECURE MANAGEMENT OF A PROVISION OF SERVICE TRANSACTION - Method of managing a transaction relating to a provision of service between a requester and a service provider, characterized in that it includes the following steps:
| 10-29-2015 |
20150310444 | ADAPTIVE BIOMETRIC AND ENVIRONMENTAL AUTHENTICATION SYSTEM - An adaptive biometric authentication system may include a user identity reference module that is configured to maintain user identification items stored in a secure memory. The system may include a passive data aggregator that is configured to receive and aggregate data items that are passively collected by a device that is in proximity to a user. The system may include a user identity confidence level generator that is configured to generate a user identity confidence level that indicates a confidence that the user in proximity to the device is the reference user based at least in part on a comparison between the passively collected data items and the user identification items, and to update the user identity confidence level as additional passively collected data items are received. The system may include an authentication module that facilitates user authentication based at least in part on the user identity confidence level. | 10-29-2015 |
20150317613 | SYSTEMS AND METHODS FOR PROVIDING ANONYMIZED TRANSACTION DATA TO THIRD-PARTIES - A computer-implemented method for authorizing access to transaction data to a third-party computer system is implemented by a payment processor computer system coupled to a memory. The method includes receiving a request for access to transaction data associated with a cardholder account, requesting a set of authentication information associated with the cardholder account, authenticating the set of authentication information upon receiving the set of authentication information, and authorizing the third-party computer system to receive transaction data associated with the cardholder account. Upon validation, the payment processor computer system generates an authorization token and provides the authorization token to the third-party computer system. The third-party computer system uses the authorization token and a secure identifier to retrieve transaction data associated with the cardholder account. | 11-05-2015 |
20150317615 | METHODS AND SYSTEMS FOR PROCESSING ELECTRONIC TRANSACTIONS AND MANAGING VEHICLE COSTS - A computer-implemented method for performing an electronic transaction using a payment computer coupled to a database is provided. The transaction includes an item purchased in association with a vehicle and initiated by a cardholder with a merchant. The method includes receiving, at the payment computer, an authorization request message from the merchant, the authorization request message including first transaction data, wherein the first transaction data includes a vehicle identifier for identifying the vehicle, an account data associated with the cardholder, and purchase data associated with a first purchased item; transmitting an authorization response message from the payment computer to the merchant, the authorization response message including an approval of the electronic transaction by an issuer bank; storing, within the database, the first transaction data including the vehicle identifier; storing, within the database, other transaction data associated with other purchased items for the vehicle, wherein the first transaction data and the other transaction data define a total transaction data associated with the vehicle; and tracking, by the vehicle identifier, the total transaction data for access by the cardholder. | 11-05-2015 |
20150317621 | Working Mode Negotiating Method, Device, and System - A working mode negotiating method including receiving, by a first device, a negotiation message that a second device sends after detecting the first device; activating, by the first device, a P2P mode when determining that information about a commodity for which a prepayment has been made successfully needs to be acquired from the second device; or activating a card emulation mode when information about a commodity for which a prepayment has been made successfully does not need to be acquired from the second device; sending, by the first device, an activated working mode to the second device, so that the second device activates a working mode that is the same as the activated working mode; and performing communication according to the activated working mode when the first device and the second device perform communication using an NFC technology. | 11-05-2015 |
20150317622 | MOBILE PAYMENTS - A method and system for processing payment transaction at a computing device is provided. The method includes receiving a payment request at the computing device from a purchaser terminal, the payment request including purchaser information, determining whether payment information associated with the purchaser information exists at the computing device, and processing payment transaction using the payment information if it is determined that the payment information associated with the purchaser information exists at the computing device. | 11-05-2015 |
20150317623 | TECHNIQUE TO AUTHENTICATE IN A MOBILE APPLICATION USING NEAR-FIELD COMMUNICATION - A method for operating a mobile communication appliance enabled for Near Field Communication (NFC) has steps for (a) positioning the communication appliance and an article associated with a person, the article enabled for NFC and storing a unique identifier, within a near-field threshold; (b) acquiring by the communication appliance through NFC the unique digital identifier from the article; and (c) using the identifier to select and initiate a particular functionality of the communication appliance. | 11-05-2015 |
20150317629 | SYSTEMS AND METHODS FOR AUTHORIZING A PURCHASE TRANSACTION USING NET WORTH ESTIMATE - Systems and methods for permitting a consumer to consummate a purchase transaction when the purchase transaction amount exceeds an available credit limit and that consumer has assets to cover the overage amount. Thus, in some embodiments a net worth confirmation platform receives transaction information, transmits the transaction information to an Issuer financial institution (FI), receives an indication from the Issuer FI that the that the transaction is unauthorized, and determines that at least one business rule applies to the transaction and an overage amount. The net worth confirmation platform also determines a net worth estimate of the consumer based on at least one asset of the consumer, and transmits a transaction authorization message to the merchant when the business rule(s) is or are satisfied. | 11-05-2015 |
20150317630 | METHOD AND SYSTEM FOR AUTHENTICATION TOKEN GENERATION - Methods, media, and systems to receive a request for an authentication value for a transaction in an application programming interface (API) call from a software application; determine the request for the authentication value includes an indication of a first transaction type; generate, in response to the determination that the request for the authentication value includes an indication of the first transaction type, an authentication value for the transaction; and as an indication of a verified authentication send, to the software application, an API response including the generated authentication value for the transaction. | 11-05-2015 |
20150317631 | MATCHING PERSONAL PHOTO IMAGES WITH PURCHASE HISTORY - At a photo server, a payment card account number is obtained from a cardholder. At the photo server, access is obtained to a database of payment card transaction information, using the payment card account number. At least one digital photo is putatively matched to a location of at least one transaction for the payment card account number in the database of transaction information, based on at least one of time stamp and geolocation, to obtain a first putative match. An indication of the first putative match is provided to the cardholder. | 11-05-2015 |
20150317633 | ANALYTICS RULES ENGINE FOR PAYMENT PROCESSING SYSTEM - According to some embodiments, a payment system authorization platform may receive an authorization message from an acquirer platform. The payment system authorization platform may determine that the authorization request meets a pre-determined condition and transmit information about the authorization message to an analytics rules engine, such as by transmitting the authorization message. The analytics rules engine may analyze the information about the authorization message in accordance with at least one rule to generate a result and transmit information about the authorization message to the payment system authorization platform, such as by transmitting a supplemented authorization message or an authorization approval decision, including an indication that the authorization message is assigned to a segmentation dimension category. | 11-05-2015 |
20150317634 | SECURE TEXT INITIATED PAYMENT PROCESSING SYSTEM - To process a secure payment transaction, a payment processing system receives a request for an authorization code for an authorized payment amount from a payor's electronic device, verifies the payor's identity, generates an authorization code for a payment transaction, stores the authorization code in association with the authorized payment amount, and sends the authorization code to a mobile device associated with the payor. When the system receives, from a third party payee, a request for payment comprising a requested payment amount and a verification code, the system determines whether the verification code and the requested payment match the authorization code and the authorized amount. The system transmits an instruction to proceed with the payment in the authorized payment amount to the third party payee only if the verification code and the requested payment match the authorization code and the authorized amount. | 11-05-2015 |
20150317635 | ELECTRONIC GESTURE-BASED SIGNATURES - In various embodiments, facilitation of transactions using electronic gesture-based signatures is described. A party participating in a transaction may provide an electronic signature using a mobile device. The mobile device may be configured to record electronic signature data made through physical manipulation of the mobile device, such as by recording data from one or more instruments of the mobile device. The mobile device may then send the electronic signature data to a gesture-based signature confirmation system (“GSC”), which may confirm an identity of the party and/or confirm an intent of the party to participate in the transaction. The GSC may send an indication to another party to the transaction that the identity has been confirmed, and/or that the first party intends to participate in the transaction, and may generate a record of the signature. Other embodiments are described and claimed. | 11-05-2015 |
20150317636 | ELECTRONIC TRANSACTION VERIFICATION SYSTEM WITH BIOMETRIC AUTHENTICATION - An electronic transaction verification system for use with transaction tokens such as checks, credit cards, debit cards, and smart cards that gathers and transmits information about the transaction token and biometric data. Customers can be enrolled in the system by receiving customer information that includes at least a biometric datum, associating the received customer information with a transaction instrument issued to the customers and storing the received customer information and the issued transaction instrument information in a database for future reference. | 11-05-2015 |
20150317638 | Methods, Devices and Systems for Transaction Initiation - Methods, devices and a system for transaction initiation are disclosed. Biometric information is obtained from a user, and the obtained biometric information is compared with a plurality of stored account identifiers, to identify an account having an account identifier corresponding to the obtained biometric information. Access is permitted for the user to the identified transaction account to initiate the transaction. To enable this initiation, biometric user information is obtained and associated with an account identifier for the user, and the account identifier is stored for a user account, for permitting access to the user account to the user on provision of the biometric user information. | 11-05-2015 |
20150324767 | SYSTEM AND METHOD FOR RECOVERING REFUNDABLE TAXES - A method for processing a transaction relating to a purchase and refunding a tax paid on the purchase. The method comprises receiving, over a network from a merchant apparatus, payment transaction data relating to a payment transaction associated with an electronic payment card; analyzing the payment transaction data to determine whether the payment transaction is eligible for a tax refund; determining a tax refund value corresponding to the payment transaction; determining that the payment transaction is authorised for a tax refund, and coordinating with at least an issuer associated with the electronic payment card in order to credit an account associated with the electronic payment card with the tax refund value. The invention is also expressed as a computing platform configured to perform the method steps previously described, and also to a system. | 11-12-2015 |
20150324777 | PAYMENT SYSTEM AND METHOD - Disclosed is a payment system and method. In one example, a method involves: (i) a mobile device capturing a code disposed on a medium, wherein the code encodes an identifier; (ii) the mobile device decoding the captured code to recover the identifier; (iii) the mobile device transmitting to a server via a communication network ( | 11-12-2015 |
20150324778 | PHONE-NUMBER-BASED PAYMENT FUNDING CONFIRMATION - Methods, apparatuses, and computer-readable media directed to phone-number-based payment authorization are described. A phone-number-based payment authorization system (PBA) may be configured to authorize payments from a payer party to a payee party based on a phone number of a payer party. The PBA may be configured to receive a payment authorization request, which may include a payment amount as well as a phone number for the payer party. In response to receipt of the payment authorization request, the PBA may make a determination of whether the payer is capable of making a payment of the requested amount. The determination may include determination of payment capabilities from various payment servicers. The PBA may also make an authorization request from a third-party authorizing entity based on identifying and/or financial information known to the PBA. Other embodiments may be described and/or claimed. | 11-12-2015 |
20150324790 | MESSAGING-BASED PAYMENTS - Embodiments for messaging-based payments are described. A messaging-based payment system (MBP) may be configured to facilitate payments between parties based via a messaging protocol, such as a text messaging protocol. The MBP may be configured to receive a request via the messaging protocol for a payment to be made from a first party to a second party. The request may include a payment amount as well as identifying information for the party making payment. In response to receipt of the request, the MBP may request an authorization of the payment from the first party. The request for authorization may be performed via the messaging protocol. After receiving authorization for the payment, the MBP may facilitate the requested payment from the first party to the second party. Payment may be made to an account of the second party or through a payment facilitator. Other embodiments may be described and claimed. | 11-12-2015 |
20150324795 | SYSTEMS AND METHODS FOR COMMUNICATING LIABILITY ACCEPTANCE WITH PAYMENT CARD TRANSACTIONS - A computer-based method for communicating liability acceptance for payment card transactions is provided. The method uses a computer device including a processor and a memory. The method includes receiving, by the processor, a transaction authorization request message for a payment card transaction having a default-liable party. The transaction authorization request message includes a shifted-liability acceptance indicator identifying a different party to the transaction that accepts liability for the payment card transaction. The method also includes authorizing the payment card transaction based at least in part on the shifted-liability acceptance indicator. The shifted-liability acceptance indicator changes the liability for the payment card transaction from the default-liable party to the different party accepting liability. | 11-12-2015 |
20150324796 | DEVICE-BASED PAYMENT AUTHORIZATION - Embodiments of device-based payment authorization are described. A device-based authorization system (“DBA”) may interoperate with a device of a payer party, such as a mobile device of the payer, to facilitate authorization of a payment by the payer. The DBA may respond to a payment request, such as by a vendor, which may include a payment account number and identifying information about the payer. In response, the DBA may request authorization from the payer on a device of the payer, such as a mobile device. The DBA may send an authorization request that includes an authorization token. A payment authorization application (“PAA”) on the device may facilitate the payer in performing an authorization, such as by performing a signature. The PAA may return an authorization record, including the authorization token. The DBA may then facilitate payment from the payer to the payee. Other embodiments, may be described and claimed. | 11-12-2015 |
20150324797 | PHONE-NUMBER-BASED PAYMENTS - Methods, apparatuses, and computer-readable media directed to phone-number-based payments are described. A phone-number-based payment system (PBP) may be configured to facilitate payments between parties based on a phone number for a payer party. The PBP may be configured to receive a payment request for a payment to be made from the payer party to a payee party. The request may include a payment amount and the payer's phone number. The payment request may include a payment amount and a phone number for the customer. In response the payment request, the PBP may verify that the payee has an account with the PBP. The PBP may also request an authorization of the payment from the payer. After receiving authorization for the payment, the PBP may facilitate the requested payment from the payer to the payee. Other embodiments may be described and claimed. | 11-12-2015 |
20150324799 | SYSTEMS AND METHODS FOR RANDOMIZED MOBILE PAYMENT - Systems and methods for improving security in mobile payment systems are described. A user device may be operated to request temporary account data for an account. No actual account number may be stored on the device. A remote system may correlate temporary account data to actual account data and transmit temporary account data to the user device, which use the data to make a purchase or generate a temporary account number than may be used to make a purchase. Temporary account data may be automatically erased or expire. A purchase authorization request may be sent by a merchant with temporary account data to a provider of temporary account data. The provider may transmit a request for purchase authorization using actual account data to a payment processor, sending a response to the merchant that does not include actual account data based on a response from the payment processor. | 11-12-2015 |
20150324802 | TRANSACTION ASSESSMENT AND/OR AUTHENTICATION - Systems and methods for assessing and authenticating transactions are disclosed. Some exemplary embodiments may authenticate transactions based at least in part on a comparison of a newly obtained electronic signature associated with a user with a previously obtained electronic signature associated with the user, where a payment instrument presented for use in the transaction is also associated with the user. Exemplary electronic signatures may comprise any information which may identify the user, such as browser fingerprints, computer fingerprints, IP addresses, geographic IP location information, information associated with a payment, and/or a typing patterns. | 11-12-2015 |
20150332234 | SYSTEM FOR CARD PAYMENT IN THE ELECTRONIC COMMERCE AND METHOD THEREOF - Provided is a card payment system and method in an electronic transaction, which can effectively solve authentication and security problems that are caused by Active-X programs that are indiscriminately installed, by performing a card payment in a complex hybrid authentication scheme using order information, delivery information, and payment information without an Active-X that is needed to pay for a purchased product by card in an existing electronic transaction. | 11-19-2015 |
20150332246 | MULTI-ACCOUNT CARD - A system for conducting a transaction is disclosed. The system may include one or more memory devices storing instructions and one or more processors configured to execute the instructions to receive information associated with a transaction initiated using a multi-account card. The one or more processors may be further configured to select and employ one of a plurality of transaction accounts to complete the transaction. | 11-19-2015 |
20150332249 | TRANSACTION DEVICE AND METHOD FOR SECURING A TRANSACTION BETWEEN THE TRANSACTION DEVICE AND AN EXTERNAL DEVICE - A transaction device for securing a transaction includes an NFC controller, a communication interface, an application processor, a display and a user input device. The NFC controller is configured to receive, via a contactiess NFC interface, data related to the transaction from an external device. The communication interface is configured to receive an application program for the transaction device. The application processor is coupled to the NFC controller and configured to process the application program. The display is coupled to the application processor and configured to display transaction information. The user input device is linked to the NFC controller and configured to receive a user acknowledgement of the transaction. The NFC controller is further configured to transmit, via the contactless NFC interface, a transaction agreement of the transaction to the external device in response to the user acknowledgement from the user input device, without the user acknowledgement and the transaction agreement being routed through the application processor. | 11-19-2015 |
20150332251 | Methods and Systems for Managing Payments Between Payor and Payee - A method of managing payments between a payor and a payee includes receiving by the payee a virtual prepaid card, wherein a predetermined amount of money is held by the virtual prepaid card as a payment to the payee. The method includes receiving by the payee a letter containing a uniform resource locator (URL) of a web page. The webpage is configured to create an online account responsive to transaction data from the payee. The transaction data includes verification information for verifying and associating the payee to the payor and includes the payee's bank account information. The payee can receive the payment via an electronic fund transfer or by processing the virtual prepaid card through a merchant terminal. The virtual prepaid card may be imprinted on the letter. | 11-19-2015 |
20150332260 | ELECTRONIC TRANSACTION SECURITY SYSTEM AND METHOD - A system and method for generating a limited use login credential associated with an account maintained by an institution, where the credential facilitates secure access to the account. | 11-19-2015 |
20150332264 | TOKENIZATION OF USER ACCOUNTS FOR DIRECT PAYMENT AUTHORIZATION CHANNEL - Embodiments of the present invention disclose a financial institution system maintained by a financial institution and for tokenization of user accounts for using a direct payment authorization channel, whereby a third party payment authorization network is avoided. Embodiments establish a direct channel of communication between the system and a merchant or a merchant network in communication with the merchant; wherein the direct channel of communication comprises a network communication channel without a third party payment authorization system; receive a token issued by the financial institution and associated with a user account associated with a customer of the financial institution; receive transaction data comprising an amount associated with a transaction between the customer of the financial institution and the merchant; and determine whether to authorize the transaction based on the received token and the received transaction data. | 11-19-2015 |
20150332265 | AUTOMATED CONTACTLESS ACCESS DEVICE LOCATION SYSTEM AND METHOD - A method is disclosed. The method includes receiving transaction data in an authorization request message from an access device, where the transaction data is associated with a merchant and a transaction location. The method also includes analyzing the transaction data to determine if a location database comprises location data corresponding to the merchant associated with the transaction data, and adding the transaction location and information regarding the access device to the location database. | 11-19-2015 |
20150332267 | SYSTEM AND METHOD FOR FACILITATING ELECTRONIC COMMERCE WITH CONTROLLED SPENDING OVER A NETWORK - In accordance with embodiments of the present disclosure, systems and methods for facilitating electronic commerce over a network include receiving a transaction request from a merchant on behalf of a client, accessing a client account associated with the client based on information passed with the transaction request, reviewing spending parameters stored as part of the client account, the spending parameters indicating acceptable merchant category codes for client approved merchants, comparing a merchant category code for the merchant with the acceptable merchant category codes of the spending parameters, approving the transaction request between the merchant and the client if the merchant category code for the merchant is determined to be an acceptable merchant category code of the spending parameters, and denying the transaction request between the merchant and the client if the merchant category code for the merchant is determined to be an unacceptable merchant category code of the spending parameters. | 11-19-2015 |
20150332268 | Method and Apparatus for Simplifying the Handling of Complex Payment Transactions - A predetermined amount, which may, in general, be zero, less than, the same as, or greater than a (yet-to-be-determined) final transaction amount, is charged upon first presentation of a payment device to a merchant. A final transaction amount is calculated, preferably at a central server, subsequent to the first presentation. A variable adjustment value is calculated, preferably at the central server, by comparing the predetermined amount already charged with the final transaction amount. A new predetermined amount charged, upon a subsequent presentation of the payment device, is modified by the variable adjustment value. | 11-19-2015 |
20150332269 | SYSTEMS AND METHODS FOR DEBIT CARD ACCOUNT CONFIRMATION - Systems and methods that receive one or more information associated with a debit card account and receive verification of the information associated with the debit card. Upon the verification, a proxy associated with the information may be generated and stored in association with the information. The proxy may further be provided to other entities that may use the proxy as an indicator of the verification of the debit card account and for initiating transactions using the verified debit card account. | 11-19-2015 |
20150332270 | SYSTEM AND METHOD OF A PASSPHRASE ACCOUNT IDENTIFIER FOR USE IN A NETWORK ENVIRONMENT - A system and method for facilitating a financial transaction over a network including use of a passphrase account identifier is described herein. In one embodiment, a system for facilitating a financial transaction over a network comprises a communication interface; and a payment provider system configured to receive via the communication interface a passphrase account identifier from a merchant system, match the passphrase account identifier to a corresponding funding instrument number of a corresponding funding instrument, communicate the corresponding funding instrument number to an issuer system, receive from the issuer system a notification indication of one of acceptance of the funding instrument or decline of the funding instrument, and communicate back to the merchant system the notification indication. | 11-19-2015 |
20150332271 | PASSIVE CARDHOLDER VERIFICATION METHOD IN MOBILE DEVICE - In a payment-enabled smartphone, a customer verification method (CVM) may be performed without prompting the user to provide any input. An outcome of the resulting passive CVM process may be an input to a risk based decision process performed by the smartphone, by a point of sale terminal and/or by an issuer of a payment card account accessed via the payment-enabled smartphone. The risk based decision process may determine whether a payment transaction is approved or declined. | 11-19-2015 |
20150332272 | UNIVERSAL POSITIVE PAY MATCH, AUTHENTICATION, AUTHORIZATION, SETTLEMENT AND CLEARING SYSTEM AND METHOD - A Universal Positive Pay Database (UPPD) method, system, and/or computer useable medium to reduce financial transaction fraud. A UPPD database is configured to store thereon transaction records associated with financial transactions corresponding to customers of the UPPD database. A particular financial transaction is initiated between a payer and a payee by providing parameters associated with the financial transaction to the UPPD database. An Issue File is provided to the UPPD database that includes parameters associated with the particular financial transaction. A correspondence determination is made between the financial transaction parameters from the Issue File and the financial transaction parameters provided to the UPPD database at every point along the financial transaction clearing process. The customer, payer, payee, payee bank, drawee bank, and banking institutions intermediate the payee bank and the drawee bank are able to access the correspondence determination at every point along the financial transaction clearing process. | 11-19-2015 |
20150332273 | AUTHENTICATION VIA BIOMETRIC PASSPHRASE - A system, method and computer program product for granting access and/or an authorization are disclosed. For instance, a computer-implemented method may include receiving a first sequence of plurality of biometric data elements. The sequence of plurality of biometric data elements may comprise a biometric passphrase. The method may include registering the biometric passphrase to a known user and/or a transaction account. The method may include receiving a transaction request comprising a second sequence of plurality of biometric data elements. The method may include comparing the second sequence of plurality of biometric data elements to the biometric passphrase to resulting in a confidence factor of the comparison. The comparison may include comparing the sequencing of the second sequence of plurality of biometric data elements and the characteristics of each biometric data element of the second sequence of plurality of biometric data elements to the biometric passphrase. | 11-19-2015 |
20150332276 | DATA SHARING PLATFORM - A data sharing platform can be used to implement a method for allowing at least one entity which makes payments with a payment network to share transaction data. A database containing the transaction data from the at least one entity which makes payments with the payment network is maintained. A user interface is provided, which presents the at least one entity which makes payments with the payment network with at least one selection providing consent to sharing of at least a portion of the transaction data with at least one third party. The consent from the at least one entity which makes payments with the payment network is obtained, via the at least one selection. Interfacing takes place with the at least one third party to share the at least portion of the transaction data. | 11-19-2015 |
20150339656 | VERIFIED PURCHASING BY PUSH NOTIFICATION - Disclosed are a system and a method for purchasing items from a merchant system using a single verification action. A user initiates a purchase transaction from a user interface of the merchant system by submitting a communication identifier in lieu of payment information or login credentials. The merchant system then generates a payment request including the communication identifier and sends the request to a payment service system. The payment service system uses the communication identifier to identify a verification device and send a push notification to the verification device to request the user to confirm or cancel the purchase transaction. Upon receiving confirmation from the user, the payment service system initiates a transfer of a payment amount associated with the purchase transaction from a financial account associated communication identifier to a financial account associated with the merchant system to pay for the purchase transaction. | 11-26-2015 |
20150339657 | Anti-fraud computer implemented method for financial card transaction - A computer implemented method for a financial transaction via a financial card which by default is in blocked state is described. The method comprises receiving a request in form of a message to unblock the financial card for a predetermined duration. The request is received from an electronic communicating device (ECD) by a financial institution server (FIS). The electronic communicating device has a number wherein the number is registered with the financial card. On receiving the request, the financial institution server verifies the request and genuineness of the user and after verification authorizes the request and the financial card gets unblocked for the predetermined duration. | 11-26-2015 |
20150339658 | METHOD OF AUTHENTICATION BETWEEN A MOBILE TERMINAL AND A PROCESSING TERMINAL - A method is provided for authentication between a mobile terminal, located less than a predefined distance from the body of a user, and a processing terminal. The mobile terminal includes an antenna constituting a radio interface suitable for transmitting and receiving radio signals through the body of the user, and the processing terminal is suitable for transmitting and receiving radio signals through the body of the user. The method includes: approaching a user interface of the processing terminal with a portion of the body, triggering an activation of the processing terminal and establishing communication between the processing terminal and the mobile terminal; requesting the entering of a piece of personal authentication data; memorizing the authentication data entered; sending the authentication data through the body; receiving a result of a check of the authentication data carried out by the terminal; and checking the result. | 11-26-2015 |
20150339666 | VERIFIED PURCHASING BY EMAIL - Disclosed are system and methods for purchasing items on a website or a mobile application using a single verification action. The disclosed technique allows a user to initiate a purchase transaction with a merchant via a mobile application on a mobile device and select a mobile payment application associated with a payment service system as a payment method. The mobile application then passes at least a transaction amount and a merchant identifier to the mobile payment application to handover processing of the purchase transaction to the mobile payment application. The mobile payment application, based on preference settings, if any, and otherwise default settings, determines whether to request a confirmation from the user to proceed with the purchase transaction. Once a decision to proceed with the purchase transaction is made, the mobile payment application sends a request to the payment service system to complete the purchase transaction by paying the merchant. | 11-26-2015 |
20150339670 | SYSTEM AND METHOD FOR AUTHENTICATING A TRANSACTION OVER A DATA NETWORK - A method for authenticating a transaction between an initiator device and a transactor device over a data network, according to which a transaction request is submitted to the transactor device over the data network and an initiator determined one time parameter (OTP) is generated, based on parameters that are associated with the transaction request and with initiator activity. The initiator determined OTP is compared with a non-initiator determined OTP, both generated by means of an identical OTP engine. The transaction is denied if the initiator determined OTP and the non-initiator determined OTP are found to be different. The initiator activity is interfacing with a puzzle that is randomly selected and displayed on the initiator device, where the OTP engine generates an OTP as a function of parameters of the transaction request and of a puzzle result associated with the puzzle transmitted to the initiator device. | 11-26-2015 |
20150339671 | DYNAMIC FRAUD ALERT SYSTEM - A Dynamic Fraud Alert System (“DFAS”) for producing a fraud alert based on a received request to investigate (“RTI”) a potential customer, where the RTI is received from a requesting entity, and where the RTI includes potential customer information provided by the potential customer is described. | 11-26-2015 |
20150339672 | AUTOMATION TOOL DEVELOPMENT METHOD FOR BUILDING COMPUTER FRAUD MANAGEMENT APPLICATIONS - A method of fraud management follows several steps that each require the involvement and support of financial networks, secure servers, and proprietary databases. A selected variety of fraud classification algorithms are assembled together into a “jury” that includes neural networks, case based reasoning, decision trees, genetic algorithms, fuzzy logic, and rules and constraints. Operating parameters that matter specifically to each are extracted in parallel from the same records of historical transaction data, and that then is used to initialize a general payment fraud model. This is then converted into computer-program executable form for later execution on a third party computer system. These are further integrated by expert programmers and development system with smart agents and associated real-time profiling, recursive profiles, and long-term profiles. The trainable general payment fraud product is applied by a payments-processing client to screen real-time transactions and authorization requests for fraud. | 11-26-2015 |
20150339674 | GENERATION SYSTEMS AND METHODS FOR TRANSACTION IDENTIFIERS HAVING BIOMETRIC KEYS ASSOCIATED THEREWITH - A system for generating transaction settlement identifiers includes an arrangement configured to receive a biometric sample from a customer and an arrangement configured to use the biometric sample to select the transaction settlement identifier from a pool of predetermined transaction settlements. A mapping arrangement configured to map the selected financial transaction settlement identifier to an identifier of the customer also may be included. | 11-26-2015 |
20150347989 | Payment Gateway Interface - Techniques and apparatus are described that enable electronic payment transactions over a network, such as the Internet. A technique, in a web re-direction embodiment, includes receiving a generic payment request from an electronic commerce web application, the generic payment request including at least an indication of a type of payment to be completed, preparing a payment gateway-specific web request that is supportive of the type of payment to be completed, passing the payment gateway-specific web request to the electronic commerce web application for delivery to a payment gateway for which the payment gateway-specific web request was prepared, receiving a payment gateway-specific web response from the payment gateway via the electronic commerce web application, processing the payment gateway-specific web response, and returning, to the electronic web application, a generic payment response including, at least, an Internet Protocol (IP) address of the payment gateway. | 12-03-2015 |
20150347993 | Electronic Funds Transaction System And Method - An electronic funds transfer system comprising: at least one user account, each of which is associated with a user of the system; at least one partner organisation account, each of which is associated with a partner organisation of the system; a system administrator adapted to receive notification from said partner organisation of funds to be transferred to said user account; and a provider fund containing funds for financing transactions between said partner organisation and said user, wherein said system administrator, on receiving an electronic funds transfer notification from a partner organisation, is adapted to directly or indirectly facilitate transfer of an allocated fund notified by said partner organisation to an allocated user account in real time in anticipation of receipt of the allocated fund by said provider fund from a partner organisation funds manager after clearance of the allocated fund from said partner organisation funds manager. | 12-03-2015 |
20150347996 | SHARED PURCHASES - One or more user accounts can be linked together to form a group of linked user accounts to access content items assigned to the other user accounts in the group of linked user accounts. Prior to completing a purchase for a content item, a requesting user can be alerted that a member of the group of linked user accounts has access to the content item. Content items assigned to a member of a group of linked user accounts can be downloaded by one or more other members of the group of linked user accounts along with a Digital Rights Management (DRM) key that enables use of the content item. The DRM key can represent the group relationship between the downloading user account and the content owner's user account to which the content item is assigned. | 12-03-2015 |
20150348001 | USER INTERFACE FOR PAYMENTS - The present disclosure relates to making payments with a mobile device. In one example process, the mobile device receives and stores information for one or more payment accounts on the mobile device. The mobile device is used to make payments using the payment accounts. In some examples, authorization to proceed with a payment is performed before each purchase made by the user. The authorization process can include receiving a verification of the user, such as a fingerprint scan or passcode. In some examples, a payment account is selected from among available payment accounts. In some examples, an indication is displayed of a digital item associated with a purchased item. In some examples, a payment transaction is initiated with participants of an ongoing communication. In some examples, an application of a retailer is invoked based on the availability of the application. In some examples, a purchase recommendation is provided. | 12-03-2015 |
20150348002 | USER INTERFACE FOR PAYMENTS - The present disclosure relates to making payments with a mobile device. In one example process, the mobile device receives and stores information for one or more payment accounts on the mobile device. The mobile device is used to make payments using the payment accounts. In some examples, authorization to proceed with a payment is performed before each purchase made by the user. The authorization process can include receiving a verification of the user, such as a fingerprint scan or passcode. In some examples, a payment account is selected from among available payment accounts. In some examples, an indication is displayed of a digital item associated with a purchased item. In some examples, a payment transaction is initiated with participants of an ongoing communication. In some examples, an application of a retailer is invoked based on the availability of the application. In some examples, a purchase recommendation is provided. | 12-03-2015 |
20150348005 | SYSTEM FOR WIRELESSLY TRANSMITTING TRANSACTION DATA TO A MOBILE COMPUTING DEVICE OF A USER - A system includes a server, a local positioning system of a store, and a mobile computing device of a user. The server stores transaction data of a transaction carried out by a user at the store, first additional information associated with the store, and second additional information. The mobile computing device is configured to determine whether or not the mobile computing device is within the store based on one or more local positioning signals from the local positioning system and transmit position information of the mobile computing device including the determination result to the server. The server is configured to transmit, to the computing device, the transaction data and the first additional information when the position information indicates that the mobile computing device is within the store, and the transaction data and the second additional information when the position information indicates that the mobile computing device is outside the store. | 12-03-2015 |
20150348007 | Apparatuses and Methods for Operating a Portable Electronic Device to Conduct Mobile Payment Transactions - Methods for operating a portable electronic device to conduct a mobile payment transaction at a merchant terminal are provided. The electronic device may verify that the current user of the device is indeed the authorized owner by requiring the current user to enter a passcode. If the user is able to provide the correct passcode, the device is only partly ready to conduct a mobile payment. In order for the user to fully activate the payment function, the user may have to supply a predetermined payment activation input such as a double button press that notifies the device that the user intends to perform a financial transaction in the immediate future. The device may subsequently activate a payment applet for a predetermined period of time during which the user may hold the device within a field of the merchant terminal to complete a near field communications based mobile payment transaction. | 12-03-2015 |
20150348008 | Apparatuses and Methods for Managing Payment Applets on a Secure Element to Conduct Mobile Payment Transactions - A system for provisioning credentials onto an electronic device is provided. The user device may include a secure element and a corresponding trusted processor. A contactless registry service (CRS) applet running on the secure element may be used to manage the activation of one or more associated payment applets during a mobile payment transaction. The CRS applet may include at least a user input received flag and an authorization received flag. The user input received flag may be asserted in response to detecting a required user input for initiating payment. The authorization received flag may be asserted when the trusted processor sends an activation request to the secure element. A payment applet should only be activated when at least one of the user input received flag and the authorization received flag has been asserted. | 12-03-2015 |
20150348019 | Image Analysis for Account Authorization - Payment devices have physical characteristics and these physical characteristic may change in predictable ways. Further, backgrounds may also have physical characteristics which may change in predictable ways. By examining digital images for physical characteristics, some of which cannot even be seen, a better decision on whether a transaction is fraudulent may be made. | 12-03-2015 |
20150348021 | SECURE SMART CARD OPERATIONS - The present disclosure is directed to facilitating cashless digital transactions. In one embodiment, a gaming machine includes: (1) a memory storing a first credit balance representing an amount of credit available for wagering; (2) a communication interface configured to communicate with a portable electronic device storing a second credit balance representing a second amount of credit available on the portable electronic device; and (3) a secure transaction device configured to: (a) transmit to the portable electronic device a request to update the second credit balance, the request including security authorization information, (b) receive from the portable electronic device an indication that the second amount of credit has been updated in accordance with the request when it is determined that the security authorization information complies with one or more security authorization requirements, and (c) update the first credit balance stored in the first memory device in accordance with the request. | 12-03-2015 |
20150348023 | METHODS AND SYSTEMS FOR PERFORMING AUTHENTICATION IN CONSUMER TRANSACTIONS - The method for authenticating a mail order or telephone order transaction according to the present invention includes receiving authentication information from a cardholder, providing authentication information to an issuer, and determining whether the authentication information is valid. If the authentication information is valid, the issuer informs the merchant that the transaction is valid. In an embodiment, the issuer may not supply a personal assurance message and/or other confidential cardholder information previously supplied by the cardholder in response to the authentication information. | 12-03-2015 |
20150348027 | SECURE IDENTITY VERIFICATION - Embodiments of the present application relate to a method, apparatus, and system for verifying an identity of a user. The method includes receiving a preset key that is associated with a key carrier that is a physical object, storing the preset key in a database storing mappings between a plurality of preset keys and a plurality of users, receiving a verification key in connection with an identity verification of a user, retrieving the preset key associated with the user from the database, determining whether the verification key matches the preset key associated with the user, and causing a determination of whether the key carrier is authentic. | 12-03-2015 |
20150348028 | SYSTEMS AND METHODS FOR MANDATED SERVICES VERIFICATION - A method and system for verifying cardholder compliance or non-compliance with a mandated services requirement by a third party using a payment card payment card network coupled to a database are provided. The method includes receiving sets of predetermined parameters that each define a transaction for one or more mandated services, receiving, by the computer device, transaction data for a plurality of transactions, determining, by the computer device, transactions for one or more mandated services from the plurality of received transactions using the received sets of parameters, summarizing the transaction data from the determined transactions, and transmitting the summarized transaction data to the third party, the summarized transaction data demonstrating cardholder compliance or noncompliance with the mandated services requirement. | 12-03-2015 |
20150348029 | USER INTERFACE FOR PAYMENTS - The present disclosure relates to making payments with a mobile device. In one example process, the mobile device receives and stores information for one or more payment accounts on the mobile device. The mobile device is used to make payments using the payment accounts. In some examples, authorization to proceed with a payment is performed before each purchase made by the user. The authorization process can include receiving a verification of the user, such as a fingerprint scan or passcode. In some examples, a payment account is selected from among available payment accounts. In some examples, an indication is displayed of a digital item associated with a purchased item. In some examples, a payment transaction is initiated with participants of an ongoing communication. In some examples, an application of a retailer is invoked based on the availability of the application. In some examples, a purchase recommendation is provided. | 12-03-2015 |
20150348030 | SYSTEM AND METHOD FOR ELECTRONIC PAYMENT - A system for processing a payment transaction, comprises a first entity configured to initiate a payment transaction with a merchant, a second entity configured to issue an account number in respect of the payment transaction, and a transaction processor configured to route the payment transaction between the merchant and the second entity in order to obtain authorization for the payment transaction from the second entity. The system is provided with an escrow account facility configured to hold an advanced fund associated with the payment transaction, the escrow facility being controlled by the transaction processor. The invention is also expressed in a method for processing a payment transaction. | 12-03-2015 |
20150348032 | REAL TIME APPROVAL OF DIGITAL STORE PURCHASES FOR A SHARED CONTENT STORAGE ACCOUNT - A computing device provides methods and workflow for setting up a shared family account on a content storage system, including the creation of accounts for child family members. A computing device supports the creation of a family account using an account on the content storage system associated with an adult family member acting as a family organizer. The family organizer can designate a specific account as a purchase account for allowing other family member to purchase content from content servers associated with the content storage system. The family organizer can invite other adult family members to join the shared family account. The family organizer can create new accounts on the content storage system for child family members, and can designate access and purchase restrictions for such child family members. Family members have access to shared storage content, as well as services such as family calendar, group messaging, and device location. | 12-03-2015 |
20150348034 | SETTLEMENT MANAGEMENT APPARATUS, INFORMATION PROCESSING APPARATUS, SETTLEMENT MANAGEMENT METHOD, AND SETTLEMENT MANAGEMENT SYSTEM - Provided is a settlement management apparatus that performs a process related to settlement using an electronic value associated with a virtual money collection container in which a plurality of managers related to the settlement are set. | 12-03-2015 |
20150348038 | Method and Apparatus for Money Transfer to an Account - A method includes receiving, by a processor, a request to initiate a money transfer transaction between a sending party and a receiving party. The request may include information identifying an account associated with the receiving party. The method includes initiating, by the processor, validation of the account associated with the receiving party. The method includes initiating, by the processor, the money transfer transaction between the sending party and the receiving party in response to a determination that the account associated with the receiving party is valid. Initiation of the money transfer transaction causes funds to be deposited into the account associated with the receiving party. | 12-03-2015 |
20150348039 | SYSTEMS AND METHODS FOR FRAUD LIABILITY SHIFTING - A method comprising creating, by a computer-based system for shifting financial responsibility for a transaction from a merchant to a transaction account issuer, a digital wallet associated with a transaction account holder, wherein the digital wallet comprises one or more attributes associated with the transaction account holder, confirming, by the computer-based system, the attribute in response to a transaction request, and/or determining, by the computer-based system, whether to shift financial responsibility for the transaction from the merchant to the transaction account issuer. | 12-03-2015 |
20150348041 | FRAUD SCORING METHOD AND SYSTEM FOR USE WITH PAYMENT PROCESSING - A method and payment processing system are presented for verifying a requested action for payment processing. Before executing the requested action, the system sends a request for a fraud score and determines an interface mode of the requested action. The system processes the requested action according to the determined interface mode and, if received, a fraud score. | 12-03-2015 |
20150348042 | SYSTEMS AND METHODS FOR PROVIDING MERCHANT FRAUD ALERTS - Mobile communications devices, systems and methods are provided for identifying a risk of fraudulent activity associated with a merchant before a user executes a transaction with the merchant. In an embodiment, a mobile communications device obtains first information identifying prior instances of fraudulent activity associated with a merchant. The mobile communications device may determine a level of risk of fraudulent activity associated with the merchant based on the obtained first information, and may identify, based on the determined risk level, one or more payment instruments and associated incentives appropriate for financial services transactions involving the merchant. The mobile communications device may present, to a user, a notification including the identified payment instruments and associated incentives prior to execution of a transaction between the user and the merchant. | 12-03-2015 |
20150348043 | METHOD OF IDENTIFICATION, CORRESPONDING DEVICE AND PROGRAM - A method and device are provided for method for identifying a user for access to an article or a service. The method includes: presentation to a terminal, by the user to be identified, of a payment card; execution, by the terminal, of a payment transaction, the amount of which is zero; and when said payment transaction is executed without error, issuing an assertion of identification leading to access to the article or service. | 12-03-2015 |
20150348045 | SYSTEMS AND METHODS FOR IMPLEMENTING TRANSACTIONS BASED ON FACIAL RECOGNITION - A system or method is provided to facilitate a payment transaction by utilizing facial recognition to identify the payee of the payment transaction. In particular, the system may remember a particular list of individuals to which a user has been or are frequently making payments. The facial profiles of the individuals in the particular list may be stored and referenced for identification. When the user is ready to transfer money to any of the frequent payees, the user may use any of the payee's pictures locally, anywhere on social platforms, or just by clicking the person. After the image is selected for payment, the system may analyze the image to match the image with existing face profiles of respective frequent payees. Once the payee is identified, the system may process the payment to the identified payee. | 12-03-2015 |
20150348046 | Systems and Methods for Performing Secure Commercial Transactions - Systems, apparatuses, and methods are provided for performing secure commercial transactions. The commercial transactions may be, for example, pre-pay pickup transactions, direct pay transactions, and transfer transactions. An identity of a user that initiates a commercial transaction may be verified based on biometric data. The biometric data may, for example, be representative of an image of at least a portion of a face of an individual, an image of an iris of an individual, at least a portion of a fingerprint of an individual, a temperature signature of an individual, a heartbeat signature of an individual, an odor characteristic of an individual, or a voice characteristic of an individual. The application can be utilized in commercial environments, getting rid of the traditional way to do transactions providing direct interaction between the merchant and the issuer of funds as well as allow an individual to engage as a buyer or seller position within a single profile, representative of an individual or business profile within a marketplace social community. | 12-03-2015 |
20150348047 | TRUSTED USER INTERFACE AND TOUCHSCREEN - A method for preventing a user from being lured into an electronic transaction that is different than one they intended to launch uses a transaction processor to encrypt a payment instruction message for private display and viewing by a user mobile electronics device. The mobile electronics device is configured to forward an encrypted payment instruction from the transaction processor to decoding and display circuitry secure from other access and reserved to the display of decoded payment instructions on a private display. The user is signaled when the private display is presenting a payment instruction from the transaction processor. The user is able to signal back to the transaction processor that the payment instruction is approved. Electronic transactions can only be completed if the user has signaled back to the transaction processor that the payment instruction is approved. | 12-03-2015 |
20150350221 | SHARED DATA WITHIN A FAMILY - One or more user accounts can be linked together to form a group of linked user accounts. A shared calendar can be assigned to a group of linked user accounts. A shared calendar can be a unique calendar assigned to the group of linked user accounts that can be accessed by each member of the group of linked user accounts to schedule appointments, reminders, etc. A shared task list can be assigned to a group of linked user accounts and accessed by each member of the group of linked user accounts. Members of the group of linked user accounts can add tasks to the shared task list that can then be viewed by the other members of the group of linked user accounts. This can allow a family to add tasks to the shared task list that can then be completed by other members of the family. | 12-03-2015 |
20150356546 | Networked Authentication Systems and Methods - Networked authentication systems and methods are described including using a mobile network operator (MNO) agent in communication with an authentication system, a data storage, and a wireless handset via a network, the MNO agent configured to, receive a request for validated data denominations from the wireless handset via the network, generate data denomination corresponding to the requested denomination, retrieve, from the data storage, numbers of validator strings corresponding to the requested data denomination, wherein the validators are received from the authentication system prior to and/or after receiving the request, and append the corresponding number of validator strings to the requested data denominations. | 12-10-2015 |
20150356553 | SYSTEM FOR VERIFYING THE AUTHENTICITY OF A PAYMENT CARD HOLDER - The invention relates to the art of acquiring and can be used by an acquirer during the provision of merchant acquiring services in the event of an attempt to make a payment using a payment card without physical presence of the cardholder. The system makes it possible to establish authenticity of the cardholder in real time prior to execution of the payment by transmitting a testing signal to the cardholder through the issuer within the framework of a request for an operation to block a small amount of funds on the card. The signal is an alphanumeric code designating the merchant in whose favor the funds on the card are being blocked. This makes it possible to reduce the risk of fraud and avoid a subsequent dispute. The system is based on the obligation of all Issuers to follow a common standard for the exchange of data with payment systems in the course of operations using an international payment card, and the obligation of all Issuers to observe the confidentiality of operations carried out by cardholders and disclose payment information to cardholders alone with preliminary authentication of the latter. | 12-10-2015 |
20150356557 | PAYMENT AUTHORIZATION MESSAGE FOR USE WITH TRANSACTIONS OF ELECTRICAL ENERGY FOR ELECTRICALLY-POWERED VEHICLES - In one aspect of the subject disclosure, a payment authorization message is provided which is formatted to be transmitted over a payment network, the payment authorization message including data elements representing units of electrical power sent to, or transmitted from, an electrically-powered vehicle. | 12-10-2015 |
20150356562 | INTEGRATION OF SECURE PROTOCOLS INTO A FRAUD DETECTION SYSTEM - Embodiments of the present invention are directed to methods and systems for performing a secure authentication process by leveraging the historical transaction data associated with an issuer. The historical transaction data stored at a fraud detection system may include the types of frequency of past authentication processes performed by the issuer, allowing for a determination of the likelihood of an authentication challenge process being applied to a current transaction. A merchant may define merchant rules that define what authentication process, if any, should then be applied to the current transaction based on the likelihood of an authentication challenge process being applied to the current transaction. | 12-10-2015 |
20150356563 | SYSTEMS AND METHODS FOR IMPLEMENTING AUTOMATIC PAYER AUTHENTICATION - A system or method may be provided to facilitate automatic user authentication for electronic transactions. In particular, the system or method may automatically authenticate a customer such that the customer may make complete hands free payments without the intervention of the customer or the merchant. The automatic authentication may include a check-in process and a payment authentication process. When a customer enters a designated area of a merchant, a BLE beacon device of the merchant may automatically check the customer in at the designated area of the merchant. After the customer is checked in at the merchant's designated area, the merchant may identify the customer who is about to make a payment from a plurality of other customers who also are checked in at the merchant via Bluetooth proximity and facial recognition in parallel. Thus, the customer may automatically be authenticated to make payments by facial recognition or Bluetooth proximity. | 12-10-2015 |
20150356566 | SYSTEM AND METHOD FOR THE STORAGE OF DATA IN ASSOCIATION WITH FINANCIAL ACCOUNTS - Systems and methods are established for data that is obtained auxiliary to but concurrent with a given transaction to be coordinated and stored in association with the transaction account data to which the transaction pertains. In one embodiment, the stored auxiliary data is provided to the user at the time the user views his/her account transactions. In another embodiment, the auxiliary information is provided to the user at the time of the transaction for authorization purposes. In a still further embodiment, the obtained auxiliary data is matched against prestored data to resolve questionable transactions. The provided data can be delivered via a phone call, email or over an Internet connection to the user. | 12-10-2015 |
20150356567 | METHODS AND SYSTEMS FOR PROCESSING CHECK BASED TRANSACTIONS USING ONE TIME CODE - Some embodiments are directed to systems and methods for processing a check that is issued to an account holder by a bank. The method includes scanning, by a client device, at least one pre-defined machine-readable cypher that is present on the check, the check further defines at least one pattern; sending, by the client device, a service request including the scanned pre-defined machine-readable cypher to a server device; receiving, at the client device, a code that is tailored to the check based on an authentication of the service request from the server device, the code is machine-readable and includes at alphabet(s), a numeral(s), and/or a symbol(s); and changing the appearance, by the account holder, of the pattern on the check based on the received code. | 12-10-2015 |
20150358319 | APPLICATIONS LOGIN USING A MECHANISM RELATING SUB-TOKENS TO THE QUALITY OF A MASTER TOKEN - Methods and systems allow a user to log in to a device so that a number of apps become accessible on the device without the user repeatedly logging in to each different app as the user launches multiple apps. A mechanism of providing a master token with a quality score and providing sub-tokens for each app that can use the sub-token and the score quality to evaluate the level of security provided by the initial login allows each app to skip its own login process and provides a level of enhanced efficiency and convenience for the user. A method includes authenticating a user; creating a master token on the user device; creating a sub-token of the master token for an app launched on the device; the app skipping the login process of the app in response to the sub-token so that the app proceeds directly to validating a transaction. | 12-10-2015 |
20150363765 | METHOD AND SYSTEM FOR MANAGING A DEVICE WITH A SECURE ELEMENT USED AS A PAYMENT TERMINAL - The present disclosure relates to a method and a terminal management system for managing a device used as a payment terminal and comprising a secure element. The method comprises generating a profile of the payment terminal on the terminal management system, based on a specific execution environment of the payment terminal. The method also comprises uploading a payment acceptance applet on the secure element of the device. The method further comprises transmitting data of the profile from the terminal management system to the secure element of the device and configuring the uploaded payment acceptance applet on the secure element with the transmitted data. The payment acceptance applet may be selected among a plurality of payment acceptance applets based on the specific execution environment of the payment terminal. | 12-17-2015 |
20150363776 | System and Method for Managing a Payment Transaction - An improved system and method for managing payment transactions whereby a paying entity and payment receiving entity perform the payment transaction using a transaction server of a payment management service provider that receives a keyword and performs a sequence of steps corresponding to a transaction scenario of a plurality of transaction scenarios corresponding to the keyword. As part of the sequence of steps the transaction server calls a phone of the paying entity to receive payment information that is provided using a keypad or voice commands. The transaction server provides the payment information to a payment processing service provider to authorize the transaction and provides transaction authorization information received from the payment processing service provider to the paying entity and payment receiving entity. | 12-17-2015 |
20150363779 | SYSTEMS AND METHODS FOR TRANSMITTING MESSAGES THROUGH PERSONAL COMMUNICATION NETWORKS - A method and system for purchase transactions using a personal communication network are provided. The method includes receiving registration data for a seller to use a payment platform, receiving item information relating to an item for sale, and receiving a selection of at least one of one or more messaging accounts associated with the seller and one or more of a plurality of personal communication network accounts associated with the seller. The method also includes generating an address of a hosted website configured to display item information and transmitting the generated address to the one or more of the personal communication network accounts. The method further includes receiving an authorization to pay the seller from a consumer account and transferring value from a consumer account to a seller account within the payment platform. | 12-17-2015 |
20150363780 | CREDIT CARD IMAGING FOR MOBILE PAYMENT AND OTHER APPLICATIONS - A mobile payment device includes a contactless payment module, a processing module, and a display module. The contactless payment module is coupled to execute a credit payment transaction. The processing module is coupled to detect the executing of the credit payment transaction and retrieve credit image data based on the detecting. The display module is coupled to process the credit image data into a displayed credit image. | 12-17-2015 |
20150363781 | METHODS AND SYSTEMS FOR PROVIDING PAYMENT CREDENTIALS - The invention provides systems and methods for providing payment credentials usable in a transaction. A method conducted at a token processor, the token processor receives a request for single-use payment credentials from a communication device of a consumer. In response, the token processor obtains or generates single-use payment credentials and obtains or generates a loyalty identifier which is uniquely associated with the consumer. The token processor then transmits the single-use payment credentials and the loyalty identifier to the communication device as a combined single-use payment token capable of being presented using the communication device. In some embodiments, the loyalty identifier is the same for all requests by the consumer for single-use payment credentials, such that the loyalty identifier is usable by a merchant in updating a record of the consumer. | 12-17-2015 |
20150363784 | Systems and Methods for Authenticating and Providing Payment to A Supplier - An authentication and payment system for paying a supplier via a network may include a non-transitory computer readable storage medium having program logic stored thereon having a code for an authentication and payment application executable by a processor of a computing device. The code may be programmed to perform a step of receiving a first set of specific data elements from a payer regarding an authorized purchase by the payer from the supplier. The code may be further programmed to receive a second set of specific data elements from the supplier. If the first set of specific data elements matches at least a portion of second set of specific data elements, the code may be programmed to generate and send a single-use number to the supplier. The single-use number may be usable as a credit card number for only one purchase. | 12-17-2015 |
20150363785 | SYSTEMS AND METHODS FOR CONSUMER AUTHENTICATION USING BEHAVIORAL BIOMETRICS - A computer-based method for consumer authentication of payment card transactions using behavioral biometrics uses a computer device including a processor and a memory. The method includes identifying behavioral biometric profile data of an approved cardholder that is approved to use a payment card issued by an issuer. The method also includes receiving behavioral biometric sample data of a suspect consumer collected during a payment card transaction in which the suspect consumer presents the payment card for use. The method further includes comparing the behavioral biometric sample data of the suspect consumer to the behavioral biometric profile data of the approved cardholder. The method also includes computing an authentication value based at least in part on the comparing. The method further includes authenticating the suspect consumer as the approved cardholder based at least in part on the authentication value. | 12-17-2015 |
20150363786 | METHODS, SYSTEMS, AND ARTICLES OF MANUFACTURE FOR FINGERPRINTING SIGNATURES AND ENHANCED SIGNATURE CAPTURING FOR CHARGE CARD TRANSACTIONS ON MOBILE COMMUNICATION DEVICES - A method and a system for fingerprinting signatures and enhanced signature capturing for charge card transactions on mobile communication devices identify and transform a signature into a normalized representation such as a bytestream including coordinate data and combine the normalized representation with some transaction information into combined data. The combined data is further transformed into fixed length data stored for further analyses or uses. Upon the receipt of a dispute, the stored representation(s) of the signature and some of the stored transaction information of the transaction in dispute may be transformed into a first fixed length data. The first fixed length data may be further compared with the stored fixed length data obtained at the time of the transaction to resolve the dispute. The representations of signatures of multiple transactions may be used to determine whether these multiple transactions belong to the same category or to different categories. | 12-17-2015 |
20150371209 | N TO N MONEY TRANSFERS - Various methods, systems, and devices are described for performing money transfers to one or more payees from one or more payors using a money transfer system. A party, such as a payor, a payee, or a third party may create a set of payee rules. The same or a different party may also create a set of payor rules. The payee rules may comprise conditions which, when satisfied, permit a payee to receive funds from a funds pool. The payor rules may comprise conditions which, when satisfied, permit a payor to provide funds to the funds pool. The money transfer system may determine whether requests from a payor and a payee comply with the payor rules and the payee rules, respectively. Based on the determination, the payor and/or payee may be permitted to complete their requested transaction, or their transaction may be denied. | 12-24-2015 |
20150371212 | INTEGRATED TRANSACTION AND ACCOUNT SYSTEM - A method of transferring electronic funds from a user may include displaying a user code and entering user code on the user's mobile computing device or on a payer's terminal. The payer's terminal is identified and the payee may be determined. The terminal and payer may be matched, and a transaction amount may be received from the payer's terminal. The transaction amount may be displayed to the user for confirmation purposes. A confirmation of the transaction amount is received from the user's mobile computing device. If confirmation is received, the transaction may be completed by debiting the payee's account the transaction amount. | 12-24-2015 |
20150371214 | METHOD FOR AUTHENTICATING A USER TO A MACHINE - The disclosure relates to a method for authenticating a user to a machine: generating a challenge by the machine, generating a first pattern, in which the challenge is coded, by the machine, displaying the first pattern on a display device of the machine, optically recording the first pattern by a user device, decoding the first pattern to receive the challenge by the user device, generating a response to the challenge by the user device, generating a second pattern, in which the response is coded, by the user device, displaying the second pattern on a display device of the user device, optically recording the second pattern by the machine, decoding the second pattern to receive the response by the machine, checking the correctness of the response by the machine, and, on the condition that the response is correct, fulfilling a function by the machine. | 12-24-2015 |
20150371227 | Registering a Mobile User - Method and system of registering a user of a mobile device comprising: obtaining data identifying a user. Obtaining account data. Retrieving data uniquely identifying a mobile device. Authenticating the user with the mobile device. Validating the user with the account using the data identifying the user and the account data. | 12-24-2015 |
20150371229 | MODIFIED CONFIRMATION ELEMENT DATA FOR TRANSACTION CONFIRMATION - A transaction is conducted by a user. Confirmation element data and a corresponding confirmation element identifier are generated for the transaction. The confirmation element data and an authorization response message for the transaction are then associated by the confirmation element identifier. The confirmation element data and the confirmation element identifier are sent to a mobile device of the user. The user enters a user personal identifier at the mobile device, which generates modified confirmation element data comprising the user personal identifier. The modified confirmation element data is sent with the authorization response message to a processing entity. | 12-24-2015 |
20150371230 | METHODS OF PROCESSING TRANSACTIONS AND RELATED SYSTEMS AND COMPUTER PROGRAM PRODUCTS - A method of operating an authentication node is disclosed. Transaction information for a transaction is received from a merchant node. The transaction information includes an identification for a credit/debit account, a name on the credit/debit account, and a transaction amount for the transaction. Responsive to receiving the transaction information, a complete account number for the credit/debit account is determined using the identification for the credit/debit account and the name on the credit/debit account. The identification for the credit/debit account is different than the complete account number for the credit/debit account. In addition, account information may be transmitted to an acquirer node, and the account information may include the complete account number for the credit/debit account, the name on the credit/debit account, and the transaction amount. Related methods of operating merchant nodes, related computer program products, and related computer systems are also disclosed. | 12-24-2015 |
20150371231 | METHOD AND SYSTEM FOR TEMPORARY REPLACEMENT OF REAL ACCOUNT NUMBERS - A method for processing an account corresponding to a reported absent payment card includes: storing, in an account database, an account profile, wherein the account profile includes data related to a payment account and includes at least an account identifier; receiving, by a receiving device, a reporting of an absent payment card, wherein the reporting includes at least the account identifier associated with the absent payment card; identifying, by a processing device, a limited-use controlled payment number; mapping, in the account profile, the identified limited-use controlled payment number to the account identifier; storing, in the account profile, an indication of the included account identifier as being reported as being absent; and transmitting, by a transmitting device, the identified limited-use controlled payment number as a response to the received reporting. | 12-24-2015 |
20150371232 | PREEMPTIVE CREDIT AND DEBIT CARD FRAUD PROTECTION SYSTEM - A system for preventing credit or debit card fraud can include at least one receiver configured to receive a location of usage of a card at a time of usage of the card and the location of an authentication device, a comparison module configured to compare the location of usage of the card to the location of the authentication device and determine if the location of usage of the card is within a threshold range of the location of the authentication device, and an activation module configured to allow the card to function at the location of usage if the location of usage is within the threshold range of the location of the authentication device. | 12-24-2015 |
20150371233 | MERCHANT IDENTIFICATION OF PAYER VIA PAYMENT PATH - Novel features to be used in a proxy card payment system include a real-time request to override a declined transaction or to select a different financial account and the insertion of user identification information into the transaction approval message sent to the merchant. A payment request is forwarded to the payment system, which maintains the proxy card account and determines whether the transaction violates a user-defined rule. If the transaction is declined by the issuer that maintains the financial account, or the payment system for violation of a user-defined rule, the payment system sends a real-time message to the user. The user is prompted to override the rule causing the transaction to be declined or to select a new account to process the transaction. Once the payment system receives authorization for the transaction, it inserts the user identification information in an approval message before transmitting the approval to the merchant. | 12-24-2015 |
20150371234 | METHODS, DEVICES, AND SYSTEMS FOR SECURE PROVISIONING, TRANSMISSION, AND AUTHENTICATION OF PAYMENT DATA - Devices, systems, and methods for securely converting a user's existing static payment card data into dynamic card data that can be authenticated by card issuers or by a stand-in service provider, such as a payment network or processor without requiring the card issuers to make infrastructure changes. The dynamic data can be provisioned onto a magnetic secure transmission device (MST) either directly from a card issuer or using a swiper type device. Devices, systems, and methods are also disclosed for securely provisioning a dynamic card onto the MST by the card issuer. These dynamic cards may be used to transmit modified one-time-use card track data from the MST to a point of sale using a dynamic-CVV methodology to provide higher levels of security during a transaction. | 12-24-2015 |
20150379483 | DYNAMIC CURRENCY CONVERSION TRANSACTION SYSTEM - The invention disclosed is a computer implemented method of performing a payment device transaction between a payment device holder and a merchant. The steps include, obtaining a transaction amount of the transaction in a merchant's currency, and then obtaining an issuer currency from data present on the payment device, using several direct or indirect techniques. If an issuer currency is found and is not the same as the merchant currency then the transaction amount is converted to the issuer currency using an exchange rate source. If no data can be extracted from the payment device, then equivalent amounts in a range of currencies to the transaction amount are obtained and displayed for the user to choose from. Against each currency displayed is a graphic that uniquely identifies each currency. A transaction currency can then be chosen and the transaction completed. | 12-31-2015 |
20150379501 | EXECUTING TRANSACTIONS SECURED USER CREDENTIALS - In some implementations, a method includes interfacing a mobile device including a GUI. User credentials used to execute transactions with contactless devices are securely stored and associated with one or more enterprises. The secure memory includes master credentials and a master security framework that enables enterprises to store or update user credentials and associated security frameworks. Displays associated with the user credentials are dynamically generated and presented through the GUI of the mobile device. Wireless transactions are executed with contactless devices using the selectable user credentials. | 12-31-2015 |
20150379506 | AUTOMATIC PAYMENT CODE DISPLAY SYSTEM - Automatic payment code display systems and methods include a user device detecting a beacon system at a physical merchant location. The user device establishes a background communication process with the beacon system that occurs without user intervention subsequent to detecting the beacon system. The user device then provides the user account authentication token to the beacon system as part of the background communication process. The user device then receives a payment code from the beacon system as part of the background communication process. The user device then causes the payment code to be displayed, and the displayed payment code is configured to be utilized by a payment processing device at the physical merchant location in a payment transaction. The payment code may be caused to be displayed on a lock screen in a background display process that occurs without user intervention. | 12-31-2015 |
20150379508 | CONTROLLING USAGE OF ACQUIRER TOKENS STORED WITHIN A MERCHANT SYSTEM - A method for controlling usage of one or more acquirer tokens stored within a merchant system. The method comprises receiving a payment request to make a payment corresponding to a user account having associated therewith an acquirer token that enables payment to be made by communication of the acquirer token to an acquirer system, determining whether to allow the payment to be made by communicating the acquirer token to the acquirer system based on whether a payment channel via which the payment request is received is authorised for use of the acquirer token, and communicating the acquirer token to the acquirer system upon a positive determination to allow the payment. | 12-31-2015 |
20150379512 | COMMUNICATION DURING PAYMENT PROCEDURE - Apparatus and method are provided. The solution includes obtaining ( | 12-31-2015 |
20150379513 | SECURE ELEMENTS BROKER (SEB) FOR APPLICATION COMMUNICATION CHANNEL SELECTOR OPTIMIZATION - Systems and methods for managing concurrent secure elements on a mobile device to coordinate with an application or “app” running on the mobile device and an appropriate communications protocol for conducting transactions using the mobile device include: | 12-31-2015 |
20150379514 | SYSTEMS AND METHODS FOR TRANSACTION PRE AUTHENTICATION - Systems, methods, and computer-readable media are provided for mobile-based transaction pre-authorization. One example method comprises receiving, from a device (such as a mobile device), a pre-authorization request including at least selection of a payment method, and generating a pre-authorization for a purchase based on the selected payment method. The method further comprises receiving a transaction request, determining whether the received transaction request is associated with the pre-authorization, and processing the transaction request based on the determination. Systems and computer-readable media implementing the above method are also provided. User interfaces are also provided for enabling the use of such methods, systems, and computer-readable media on, for example, mobile devices. | 12-31-2015 |
20150379516 | Method and Apparatus for Performing Authentication Services - A method of authenticating information associated with a consumer in connection with a third party transaction is disclosed and includes receiving transaction information descriptive of a transaction initiated between a consumer and a third party. The method may include determining a type verification to be performed based on the transaction information, and receiving an input associated with authentication of information associated with the consumer. The authentication may be performed based on the type of verification indicated in the transaction information. The method may include generating verification information based on the input associated with the authentication of information associated with the consumer. The verification information may facilitate completion of the transaction | 12-31-2015 |
20150379517 | SYSTEM AND METHOD FOR ENHANCED DETECTION OF FRAUDULENT ELECTRONICTRANSACTIONS - Systems and methods for enhanced detection of fraudulent electronic transactions are disclosed. In one embodiment, a system uses the ongoing stream of transactions to construct and maintain a dynamically evolving merchant relationship graph. When a proposed transaction is submitted to the system, the system computes a predicted likelihood that the given account would make a transaction with these characteristics with the given merchant. The graph is used to compute transitive relatedness between merchants which may be indirectly associated with one another, as well as to compute aggregate relatedness, when there are multiple avenues of relationship between two merchants. | 12-31-2015 |
20150379518 | SYSTEM FOR EVALUATING RISK IN PROVIDING VALUE TO THE USER OF A TRANSACTION SYSTEM USING INFORMATION ACCESSIBLE TO THE TRANSACTION SYSTEM - A system receives a request for value from a user. The risk involved in providing the value to the user is evaluated using information accessible to the transaction system, the information includes contact information associated with the user. The request is selectively approved based on evaluating the risk involved and value is distributed to the user via a network. The contact information may comprise address information associated with the user, such as a residential street address of the user, a city of residence of the user, a state of residence of the user, a zip code of residence of the user, a telephone number associated with the user, and checking account information. | 12-31-2015 |
20150379630 | METHOD AND SYSTEM FOR GENERATING DATA PACKET WITH SERIAL NUMBER - The present disclosure provides a method and a system for generating a data packet with a serial number, the method includes: receiving a data packet with application messages; generating a payment promise information data packet, and returning a serial number applying message to a network terminal; and generating serial number information by the network terminal. The solution of the disclosure realizes a promised paying information data packet with a user-defined serial number of a user characteristic and application scenario, thus facilitating the visual recognition of a user. | 12-31-2015 |
20160005016 | Metering System For Software Licenses - A software distribution service provides time-based licensing of software. Third-party software is augmented with functionality to enable tracking based on usage, and is downloaded through a network to a user's workstation. A user logs into an account over the network to verify account details and a sufficient balance with an authentication server. If verified, the augmented software is activated, and the time of usage is tracked. During use, the augmented software periodically communicates with the authentication server to deduct a metered-usage fee from the user's pre-paid account balance. | 01-07-2016 |
20160005021 | SYSTEM FOR ACCEPTING A FIRST ACCOUNT FOR MAKING PAYMENT FOR A TRANSACTION AND PAYING FOR THE TRANSACTION WITH FUNDS FROM A SECOND ACCOUNT - An online payment service receives from a consumer the identity of a first account for making a payment for a transaction. The payment service accepts the first account for making the payment. The payment is permitted to be made from a second account maintained for the consumer by the online payment service, where the payment may include coupons. The second account may be internal to the online payment system, and the first account may be external to the online payment service. A third party may participate in the transaction. | 01-07-2016 |
20160005026 | METHOD AND DEVICE FOR SECURE IDENTIFICATION OF A USER OF A SERVICE - A method for secure identification of a user of a service comprises the steps of:
| 01-07-2016 |
20160005029 | Systems and Methods for Dynamically Detecting and Preventing Consumer Fraud - Systems and methods discussed herein relate to a system for detecting and preventing fraudulent transactions through collecting requests for website access, stored-card trades and sales, and transactions using physical or electronically issued credit, debit, stored-value, and other cards. The fraud detection system not only flags individual transactions, but is also configured to dynamically track and update banned/watch lists associated with request artifacts and cards in order to catch and prevent individual actors as well as BOTs, at least by adjusting the thresholds used to evaluate risk scores and what is placed on the banned/watch lists based upon requests received as well as information from financial institutions, merchants, government agencies, and watchdog groups. The system is also configured to provide information to those groups. | 01-07-2016 |
20160005037 | TRANSACTION SYSTEM - The present invention relates to a transaction system wherein the system tracks geographical movements of customers relative to geographical positions of shops or retail outlets or service providers etc., wherein a transaction between a specific customer and a specific shop or retail outlet or service providers etc. is provided via a transaction system established by the system based on the tracked relative geographical movements of the customer relative to the geographical position of shops or retail outlets or service providers and similar enterprises. | 01-07-2016 |
20160005038 | ENHANCED USER AUTHENTICATION PLATFORM - Systems and methods for multi-factor user authentication techniques usable in transactions. In some embodiments, an authentication platform receives a request to authenticate a user in conjunction with an online transaction and determines an authentication rule. The authentication platform then transmits an authentication request to the user's mobile device, receives authentication response data from the user mobile device, and authenticates the user in conjunction with the transaction when the authentication response data matches stored user authentication data. An authentication message is then transmitted to the user's mobile device. In some embodiments, the authentication response data is biometric data of the user obtained from at least one authenticator of the user's mobile device. | 01-07-2016 |
20160005039 | SECURE IDENTITY BINDING (SIB) - A system includes a tag having a machine readable tag identifier (Tag ID) configured to be read by a reader; and a device to be identified by the tag, in which: the device is configured to communicate with the reader; the device has access to a secure Tag ID; and the device communicates a verification to the reader if the machine readable Tag ID communicated to the device from the reader matches the secure Tag ID. A method includes: reading a Tag ID from a tag attached to a device; communicating the Tag ID read from the tag to the device; comparing a secure Tag ID of the device to the Tag ID read from the tag; and responding with a “match” or “no-match” message from the device, according to which the device is either trusted or not trusted as being identified by the Tag ID. A method of verifying a trusted agent (TA) on a device includes: storing a digital signature of the TA in a secure vault of the device; and verifying the TA by verifying the digital signature of the TA each time the TA is used. | 01-07-2016 |
20160005043 | APPARATUS AND METHOD FOR PURCHASING A PRODUCT USING AN ELECTRONIC DEVICE - The present disclosure relates to a method and apparatus for purchasing a product from a merchant by a consumer using an electronic device. An association between a transaction identifier and transaction information is stored in a database, the transaction information comprising a merchant identifier, which is associated with merchant information, and a transaction amount. The consumer may purchase the product by having the transaction identifier provided to an application on an electronic device and transmitting the transaction identifier from the application to a transaction processing server. The merchant information and the transaction amount associated with the transaction identifier is transmitted from the transaction processing server to the application and the transaction completed using the application on the basis of the transaction information on the database. | 01-07-2016 |
20160005044 | FRAUD DETECTION - Systems and methods of fraud prevention are discussed. One such method can include the acts of monitoring one or more events associated with at least one account at a financial institution; analyzing characteristics associated with a first event of the one or more events; determining whether to designate the first event as risky; and implementing one or more measures in response to the designation of the first event as risky. | 01-07-2016 |
20160005045 | SYSTEM TO ACCEPT AN ITEM OF VALUE - A system comprising a classification module and a scoring module is described herein. The classification module is configured to configured to classify at least one item of value into at least one class in response to a user activity; and the scoring module configured to determine an acceptance score based at least on transactional data and associate an action with the user activity corresponding to the acceptance score. | 01-07-2016 |
20160005108 | Fraud-Resistant Electronic Processing of a Rent-to-Own Lease Transaction - A system, method, apparatus, and computer program product for fraud-resistant electronic processing of a rent-to-own lease transaction are disclosed. A method may include receiving a lease application including customer information and an indication of an item to be purchased in a brick and mortar store. The method may further include determining, based on the customer information and the indication of the item, a lease amount for which the customer is eligible. The method may additionally include providing a lease offer generated based on the lease amount to a mobile communication device associated with the customer. The method may also include receiving an electronic acceptance of the lease offer. The method may further include generating a virtual payment card for at least a portion of the lease amount that is usable for purchase of the item in the store and providing the virtual payment card to the mobile communication device. | 01-07-2016 |
20160006699 | SECURE ELEMENTS BROKER (SEB) FOR APPLICATION COMMUNICATION CHANNEL SELECTOR OPTIMIZATION - Systems and methods for managing concurrent secure elements on a mobile device to coordinate with an application or “app” running on the mobile device and an appropriate communications protocol for conducting transactions using the mobile device include: informing, by the processor, the reader device of a preferred app and a communication protocol usable by the preferred app; receiving, by the processor, information about which apps and communication protocols are supported by a reader for processing a transaction; locating, by the processor, a secure element supporting an app and a communication protocol supported by the reader; channeling the communication protocol for the specific configuration of the app and the supporting secure element; activating the secure element that supports the app; and processing, with the activated secure element, using the supported app and communication channel, the transaction with the reader. | 01-07-2016 |
20160012398 | Systems and Methods for Aggregating Consumer-Specific Transactions Associated With a Social Venture | 01-14-2016 |
20160012402 | SYSTEMS AND METHODS FOR AUTOMATICALLY COLLECTING PAYMENT | 01-14-2016 |
20160012403 | SYSTEMS AND METHODS FOR TRANSACTION PRE-FETCHING, PROCESSING AND PROVISIONING THROUGH SMART VEHICLE ELECTRONIC SYSTEM AND BACK-END CLOUD INFRASTRUCTURE | 01-14-2016 |
20160012407 | Wireless Payment Method and Systems | 01-14-2016 |
20160012412 | User Authentication | 01-14-2016 |
20160012413 | HANDS-FREE TRANSACTIONS VERIFIED BY LOCATION | 01-14-2016 |
20160012417 | SYSTEM AND METHOD FOR LOADING AND RELOADING PREPAID PAYMENT CARDS FROM MOBILE DEVICES | 01-14-2016 |
20160012426 | HANDS-FREE TRANSACTIONS WITH A CHALLENGE AND RESPONSE | 01-14-2016 |
20160012427 | SYSTEMS AND METHODS FOR AUTHENTICATING USERS OF NETWORKED COMPUTER SYSTEMS BASED ON NON-CREDENTIALED INFORMATION | 01-14-2016 |
20160012430 | HANDS-FREE OFFLINE COMMUNICATIONS | 01-14-2016 |
20160012431 | EXCHANGING IDENTIFIERS BETWEEN WIRELESS COMMUNICATION TO DETERMINE FURTHER INFORMATION TO BE EXCHANGED OR FURTHER SERVICES TO BE PROVIDED | 01-14-2016 |
20160012432 | UNIVERSAL ELECTRONIC PAYMENT CREDENTIAL PROCESSING | 01-14-2016 |
20160012441 | METHOD AND SYSTEM FOR OPTIMIZING AUTHENTICIATION PROCESSES IN PAYMENT TRANSACTIONS | 01-14-2016 |
20160012445 | Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true-personal identity verification), methods and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without nfc component and system, with cellular/satellite phone/internet/multi-media functions | 01-14-2016 |
20160019521 | CONTENT ITEM DELIVERY FOR PAYMENT - Various embodiments of the present technology involve the delivery of digital content via a synchronized content management system (CMS) in return for a payment. For example, a first user could send a share link containing a content item to a second user. Upon attempting to open the content item, the second user could be prompted to input payment information. In response to providing the payment information, the second user could select the share link enabling the second user to download the content item. | 01-21-2016 |
20160019527 | Device and Process for Purchasing Electronic Content Using Multimedia Messaging Service Messaging - Using multimedia messaging service (“MMS”) messaging to facilitate a transaction for purchasing electronic content on a wireless device is disclosed. Initially, an indication that a user of the wireless device has selected to purchase the electronic content from among a plurality of electronic content available for purchase is received from a wireless device over a wireless network. An MMS message including payment information for the purchase of the selected electronic content is then received from the wireless device. The purchase of the selected electronic content is authorized based on the payment information included in the MMS message and the wireless device is then enabled to download the selected electronic content in response to the authorization of the purchase of the selected electronic content. | 01-21-2016 |
20160019528 | SYSTEM AND METHOD FOR PAYMENT AND SETTLEMENT USING BARCODE - A system and method for payment and settlement for an electronic transaction in which a user may generate a one-time barcode representing an intention to pay the amount of money that the user may spend on an electronic transaction, and may perform settlement online and offline by using the barcode within the amount of money of the barcode. When a user intends to purchase goods online and offline, the user generates a barcode, representing an intention to pay the amount of money corresponding to the price of the goods, in a smart device prior to purchasing the goods, and then the user can perform settlement using only the barcode, within the amount of money encoded in the barcode at the time of generating the barcode, at online and offline affiliated stores that can read the barcode in the smart device. | 01-21-2016 |
20160019538 | Transaction Authorization Employing Drag-And-Drop of a Security-Token-Encoded Image - In one embodiment, a computer-implemented electronic commerce transaction method. The computer receives original image data from a user device, associates a security token with the user, embeds the security token into the original image data to generate modified image data, and provides the modified image data to the user device. To authorize a financial transaction that uses personal data of the user, the computer subsequently receives the modified image data from the user device, extracts the security token from the modified image data, and validates the user and/or the user device. | 01-21-2016 |
20160019543 | Two-Factor Authentication with Push Notification for a Security Code - Disclosed is a technology for password-free account authentication. The technology includes utilizing a mobile device running an application (“App”) associated with a payment service (PS) system. Using the App, a user can enter an addressable handle, which is transmitted to the PS system. The PS system identifies an account state, based on the receipt of the addressable handle, for example, whether the addressable handle corresponds to a user's system account and device. A first authentication factor is based on the knowledge that the user is in possession of and has access to a device that corresponds to the user and the addressable handle. The PS system pushes a notification to the corresponding device, based on the account state, prompting entry of a security code. Receipt of a security code that corresponds to a payment card linked to the user's system account serves as a second authentication factor. | 01-21-2016 |
20160019544 | SYSTEMS AND METHODS FOR AUGMENTING TRANSACTIONS USING DIGITAL IDENTITY AND RELATIONSHIP MAPS - An information and product exchange system includes a controller and a memory coupled to the controller, wherein the memory is configured to store program instructions executable by the controller. In response to executing the program instructions, the controller is configured to provide an application programing interface (API) configured to receive an online identifier and an action request from a first user, wherein each of the online identifier and the action request relates to a second user. In response to receiving the online identifier and the action request, the controller accesses a data storage system that stores an association between the online identifier and one or more offline identifiers related to the second user and further stores one or more permission settings. | 01-21-2016 |
20160019545 | METHOD AND SYSTEM FOR A UNIFIED PLATFORM AND DATA INTEGRATION IN A GROUP OF RELATED COMPANIES - A method for data integration in a unified platform includes a processing server that is configured to store account profiles for unified transaction and membership accounts, receive authentication requests from multiple entities, receive a transaction message for a payment transaction from another entity, identify an account profile associated with the authentication requests and payment transaction, process the payment transaction, perform authentication for each of the authentication requests, and electronically transmit results of the transaction processing and authentication to the appropriate entities, such that the processing server provides for a unified platform where data is integrated and used at a plurality of different merchants for a plurality of different services for consumer and merchant convenience. | 01-21-2016 |
20160019546 | SYSTEMS AND METHODS OF GLOBAL IDENTIFICATION - The invention provides one or more consortia of networks that identify and share information about users and/or user devices interacting with the consortia. User devices may be identified, at least in part, by a delta of time parameter between a user device used and a reference time. Other parameters may be analyzed to identify a computer user and/or device and noteworthy transactions. The invention may be used for identity-based applications such as network security, the detection of fraudulent transactions, identity theft, ratings-based communities and law enforcement. User may be permitted to register user devices in order to control access for performing transactions. | 01-21-2016 |
20160019547 | SECURE FINANCIAL PAYMENT - To improve security for processing of financial transactions on a customer's account, particularly for users of mobile devices, the examples authenticate the customer or user in an effective manner and/or transfer funds upon successful authentication, using intelligence of the customers' mobile devices. The present approach uses an identifier of the mobile device or user at the mobile device. The user is authenticated for a particular desired transaction based on some number of authentication factors, one or more of which is a biometric input. The user authentication technique, e.g. factors used and/or precision of matching of received user authentication factors to reference factors, can be varied based on a variety of parameters, such as transaction amount, time, device location, history of prior transactions or history of other aspects of device usage. The processing avoids storage of sensitive customer data, e.g. account number at a merchant and/or at the customer's mobile device. | 01-21-2016 |
20160026991 | MOBILE ACCOUNT MANAGEMENT - In a wireless communications network, a system is provided for securely executing the transfer of rights between holders of accounts. The secure transfer of messages may represent the exchange of title to monetary assets. Each title holder is provided with a SIM card containing a transaction application that can interpret menu messages, accept user inputs and generate transaction messages for processing by the system. Each of the menu and transaction messages is delivered as a short messaging service message. The holder inserts his SIM into a mobile handset, and (after authentication with the system) is permitted to interact with the system to conduct rights transfer transactions. Since the transactions are in the form of simple text messages, the mobile handset need not conform to a high specification (i.e. may not support GPRS). | 01-28-2016 |
20160026992 | MOBILE PAYMENT PROCESSING SYSTEM AND METHOD THEREFOR - Provided is a mobile payment processing system and method. When making a payment request, an affiliated store terminal directly generates transaction identification (T-ID) information and provides the generated T-ID information to a mobile terminal, and a user of the mobile terminal can use a rapid mobile payment service since the payment can be processed without waiting a response signal of a payment processing server receiving a payment request signal. Further, since user datagram protocol (UDP) communication is performed between the affiliated store terminal and a payment processing result notification server while a mobile payment is performed, the payment processing result notification server and the affiliated store terminal are provided so as to directly inquire a transaction state in the affiliated store terminal when the payment is completed by the mobile terminal. | 01-28-2016 |
20160026995 | Time Lmited Code - A method including authenticating a voucher which has a time limited validity period. The method comprises: a user requesting issuance of a token to a customer in a machine readable form; and issuing one or more modified versions of the token to the user, each modified version of the token being associated with a different time period of validity of the token; scanning the ticket on a scanning device connected to a terminal operated by the user; the scanning device modifying the token according to a current time period; and the terminal operated by the user comparing the modified token provided by the scanner with the modified tokens issued by the central server to validate the scanned token. A further method is provided for performing a transaction, between a customer and a vendor, using a customer's mobile phone as an authorisation device. The further method comprises: a requesting a payment authorisation and receiving a single use authorisation code from the financial service provider which displays on the customer's mobile phone as an optically readable image; and the customer scanning the optically readable image on an optical scanning device to authorise the transaction. | 01-28-2016 |
20160026996 | SELECTIVELY SWITCHING ANTENNAS OF TRANSACTION CARDS - The present disclosure is directed to a system and method for selectively switching antennas of transaction cards. In some implementations, a method includes physically interfacing a card with a mobile host device including a Graphical User Interface (GUI). The card executes wireless financial transactions independent of the mobile host device. User credentials used to execute financial transactions with retail terminals are stored. Information is presented through the GUI of the mobile host device. An antenna of the card is selectively switched between an activate state and an inactive state in response to at least an event. | 01-28-2016 |
20160026999 | TRACKING CARD USAGE USING DIGITAL WALLET - Embodiments of the present invention are directed to systems, apparatuses, methods, and computer program products for tracking card usage when using a digital wallet. The present invention is configured to enable a user to execute a transaction via a payment vehicle (e.g., a digital bank card, a digital card number, or the like) associated with a digital wallet application. Upon execution of the transaction, the present invention receives information associated with the transaction from a plurality of sources, such as a financial institution, a merchant, a third party payment processing entity, a third party software application, or the like. The present invention then processes the received transaction information and exports the transaction information to a budgeting application, which may or may not be integrated with the digital wallet application. | 01-28-2016 |
20160027008 | Fraud Deterrence for Electronic Transactions - Systems and methods are described for providing fraud deterrents during e-commerce, e-transactions, and digital rights management and access. One or more fraud deterrents may be automatically selected by a client, seller, bank, or other third-party and may be implemented or presented to the client as a potential fraud deterrent option that may be chosen. Fraud deterrent options may be provided which are associated with particular aspects of the transaction including a client's profile, the value of an item, or the preferences of the seller. The fraud deterrent features can be provided as part of a digital shopping cart and may be highly customized by the client including allowing the client to customize conceptual passwords which are presented during subsequent transactions. | 01-28-2016 |
20160027012 | TRANSACTION PROCESSING USING A GLOBAL UNIQUE IDENTIFIER - A Globally Unique IDentifier (GUID) is used to match an authorization request with an authorization response for a transaction between a merchant and a consumer upon an account within a payment processing system where the payment amount is unknown until after the merchant receives the authorization response that includes the GUID. After receiving the authorization response and when the payment amount is known, the merchant forms a transmission that has information for delivery to an issuer of the account. This information is sufficient for the issuer to forward the payment amount from the account to pay the merchant for the transaction. While including the GUID and the payment amount, the information does not include an identifier of the account. | 01-28-2016 |
20160027014 | Business Transactions over Portable Electronic Devices with Social Media Filters - System and methods for conducting wireless mobile business transactions on electronic hand-held device are disclosed. The electronic hand-held device comprises a dedicated communication component, a social media filter, and at least one functional identifier. The dedicated communication component communicates with at least one transceiver when the electronic hand-held device is located within a predetermined proximity of the at least one transceiver. The social media filter filters good or service offerings based on a user's desire. The at least one functional identifier is activatable for at least one good or service by a user when the communication is established between the electronic hand-held device and the at least one transceiver and a business transaction for the at least one good or service is initiated on the application server in a secure, user-authorized manner. The business transaction for the at least one good or service is authenticated by a social media provider. | 01-28-2016 |
20160034884 | METHOD AND SYSTEM FOR CHARGEBACK OF COUNTERFEIT GOODS - A method for processing a chargeback of counterfeit goods includes: storing a plurality of transaction data entries, each entry including data related to a processed payment transaction including transaction data and a merchant identifier; receiving a chargeback request, the request including identification data associated with a plurality of payment transactions and an indication of each of the plurality of payment transactions involving the sale of counterfeit goods; identifying a subset of transaction data entries based on the transaction data in each entry in the subset and the identification data in the chargeback request; initiating a chargeback for the processed payment transaction related to each transaction data entry in the subset; and initiating a payment transaction for an amount based on a number of transaction data entries in the subset, wherein the initiated payment transaction involves an entity associated with the chargeback request. | 02-04-2016 |
20160034891 | METHOD AND SYSTEM FOR ACTIVATING CREDENTIALS - Method and apparatus for activating credentials for transmission to a transaction processing system via a data communications network, the credentials being arranged in sets and a set including a unique identifier and verification data elements. Credentials are activated and are then available for use in at least one subsequent transaction. In the transaction, in response to receiving authorization from a user, the unique identifier and verification data elements from a set are transmitted to the transaction processing system on behalf of the user. Responsive to the user successfully authenticating, a plurality of options are transmitted to the user. This plurality of options corresponds to different set of credentials derived at least in part from data received via data communications from one or more trusted data processing systems remote from the user. The user selects one or more of the options resulting in one or more sets of credentials are activated. | 02-04-2016 |
20160034892 | METHOD AND SYSTEM FOR TRANSMITTING CREDENTIALS - Method and apparatus for transmitting credentials to a transaction processing system, the credentials arranged in sets and a set including a unique identifier and verification data elements. Credentials are activated and are then available for use in at least one subsequent transaction. In the transaction, in response to receiving authorization from a user, the unique identifier and verification data elements from a set are transmitted to the transaction processing system for the user. The credentials are activated using an activation mode selected from at least a first activation mode and a second activation mode. In the first activation mode, additional user input for the verification data elements associated with the unique identifier is received from the user. In the second activation mode, the user is authenticated, and verification data elements are received via a data communications network are received from a trusted data processing system remote from the user. | 02-04-2016 |
20160034894 | PERSONALIZED BUDGETS FOR FINANCIAL SERVICES - An illustrative embodiment of a computer-implemented process for personalized financial budget tracking receives a request for a user purchase transaction, wherein the user purchase transaction is one of a purchase transaction and a payment transaction and responsive to a determination of a payment method, determines whether the user purchase transaction is authorized. Responsive to a determination the user purchase transaction is authorized, the computer-implemented process determines whether personalized expense categories are activated and responsive to a determination the personalized expense categories are activated, prompts for a category code. Responsive to receiving the category code, the computer-implemented process tracks expenses using a personalization category code received, wherein the personalization category code received is associated with the user purchase transaction. | 02-04-2016 |
20160034895 | PERSONALIZED BUDGETS FOR FINANCIAL SERVICES - An illustrative embodiment of a computer-implemented process for personalized financial budget tracking receives a request for a user purchase transaction, wherein the user purchase transaction is one of a purchase transaction and a payment transaction and responsive to a determination of a payment method, determines whether the user purchase transaction is authorized. Responsive to a determination the user purchase transaction is authorized, the computer-implemented process determines whether personalized expense categories are activated and responsive to a determination the personalized expense categories are activated, prompts for a category code. Responsive to receiving the category code, the computer-implemented process tracks expenses using a personalization category code received, wherein the personalization category code received is associated with the user purchase transaction. | 02-04-2016 |
20160034897 | AUTOMATED FRAUD DETECTION - Transaction information for a card transaction is automatically and selectively rendered to a screen of a display presented to a user. The user can edit zero or more operators and selected values provided in the screen and save any such edits. When saved, the transaction information and any edited operators and/or selected values are used to generate a rule for a fraud detection system for immediate application. Subsequent card transactions are evaluated in view of the generated rule to automatically detect any fraudulent transactions present in the card transactions. | 02-04-2016 |
20160034899 | Fuel Dispenser Anti-Skimming Input Device - Systems and methods for detecting fraud. One method includes providing an input device, the input device having processing circuitry, a memory, and at least one information receiving module for receiving information associated with a user of the input device. The method also includes providing a sensor in electronic communication with the processing circuitry. The sensor has a sensor coil, and the sensor coil is disposed proximate the at least one information receiving module. Further, the method includes flowing alternating electrical current through the sensor coil to generate a magnetic field, measuring at least one electrical characteristic of the sensor, and providing first information representative of the at least one electrical characteristic to the processing circuitry. Finally, the method includes storing in the memory second information representative of at least one predetermined value of the at least one electrical characteristic and comparing the first information with the second information. | 02-04-2016 |
20160034900 | AUTHENTICATION SYSTEM WITH MESSAGE CONVERSION - A server computing device receives authentication request messages formatted according to a first message format from a party via a computing device of a user involved in a transaction, translates the messages into modified authentication request messages formatted according to a second message format, and transmits the modified authentication request messages to an authorization computer. The server computing device may augment the modified authentication request messages by including data gathered from the received authentication request messages describing the user, user's computing device, and/or network path between the server computing device and user's computing device, as well as risk scores generated based upon the received authentication request message. Additionally, the server computing device receives messages formatted according to the second message format from the authorization computer and translates them into messages formatted according to the first message format to be sent to the user's computing device. | 02-04-2016 |
20160034901 | CONTROLLED ACCESS TO FUNCTIONALITY OF A WIRELESS DEVICE - Various embodiments of the invention may be used to verify that a person being authorized by biometric techniques to use a device is a living person and not some form of recording intended to spoof the system. Some embodiments may try to cause a change in a measured biometric feature, and compare images taken before and after the change to verify the change occurred. In some embodiments, multiple stages of verification may be used, either to increase the difficulty of spoofing the security system, or to provide different levels of security for different levels of access to the device's functionality. | 02-04-2016 |
20160042328 | SYSTEMS AND METHODS FOR FACILITATING SHARING OF EXPENSES OVER A NETWORK - In accordance with one or more embodiments of the present disclosure, systems and methods for facilitating sharing of expenses over a network utilize a first component adapted to communicate with members of a user group via a client device over the network and a merchant via a merchant device over the network. The systems and methods for facilitating sharing of expenses over a network further utilize a second component adapted to receive a group transaction request from the user group, divide a payment for the group transaction request into a plurality of portions according to a number of members in the user group, separately debit the portions of the payment from one or more accounts related to each member of the user group, and provide payment to the merchant via the merchant device based on information passed with the group transaction request. | 02-11-2016 |
20160042341 | QUICK PAYMENT USING MOBILE DEVICE BINDING - Methods and systems are provided for secure device binding that provides user convenience through avoiding repetitive logging in when changing apps or moving from website to website. A mobile device undergoes binding to an account so that customers do not always have to enter their password when going through a financial transaction process, on a known (e.g., registered) mobile device. A device may be bound during an initial login, and once logged in, the user can select an option to be “remembered” so that the user need not re-login on the same device for future visits with an app or to a website that shares the service provider library. | 02-11-2016 |
20160042346 | SYSTEMS AND METHODS FOR PERFORMING PAYMENT CARD TRANSACTIONS USING A WEARABLE COMPUTING DEVICE - A computer-based method for authenticating a suspect consumer as an authorized cardholder during a payment card transaction is provided. The method includes registering the authorized cardholder within a portable computer device by receiving a reference sample of the authorized cardholder. The portable computer device includes a processor, a memory, and a camera. The method also includes storing, in the memory, the reference sample of the authorized cardholder and associated payment card information. The method further includes using the camera to capture a transaction sample of the suspect consumer during the payment card transaction using the camera. The method also includes comparing, by the processor, the transaction sample to the reference sample stored in the memory. The method further includes authenticating the suspect consumer as the authorized cardholder based at least in part on the comparison. | 02-11-2016 |
20160042348 | INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING SYSTEM - In a settlement system, a credit card determination unit collates an input card number with negative data of an acquirer or a settlement processor which is accumulated in a negative data table of an acquirer or a settlement processor and store's internal negative data accumulated in a store's internal negative data table, and determines whether or not the settlement process is executable by using the input card number based on the collation result. In a case where a negative data updating unit updates the store's internal negative data by itself, a communication unit distributes the updated store's internal negative data to other settlement terminal devices. In addition, the communication unit receives the updated store's internal negative data from the other settlement terminal devices. | 02-11-2016 |
20160042349 | SPEAKER RECOGNITION AND DENIAL OF A TRANSACTION BASED ON MATCHING A KNOWN VOICE PRINT - One-to-many comparisons of callers' voice prints with known voice prints to identify any matches between them. When a customer communicates with a particular entity, such as a customer service center, the system makes a recording of the real-time call including both the customer's and agent's voices. The system segments the recording to extract at least a portion of the customer's voice to create a customer voice print, and it formats the segmented voice print for network transmission to a server. The server compares the customer's voice print with multiple known voice prints to determine any matches, meaning that the customer's voice print and one of the known voice prints are likely from the same person. The identification of any matches can be used for a variety of purposes, such as determining whether to authorize a transaction requested by the customer. | 02-11-2016 |
20160042350 | METHOD AND APPARATUS FOR RECOVERY DURING AUTHENTICATION - Techniques for recovery during authentication include initiating sending a HyperText Transfer Protocol (HTTP) authentication message from user equipment of a user to a merchant node of a merchant. If the user is not authenticated in response to the HTTP authentication message, then sending a Short Message Service (SMS) message from the user equipment to the merchant node is initiated. The SMS message indicates a transaction between the user and the merchant. In some embodiments, techniques include changing an access point to a network until an access point utilized is on a list of acceptable access points, in response to a buy response message that indicates a transaction between a merchant and a user. A hypertext transfer protocol authentication message is sent through the access point that is on the list of acceptable access points | 02-11-2016 |
20160042353 | PREDICTIVE FRAUD SCREENING - Methods, systems, and computer program products for screening transactions. Transactions stored in a transaction database may provide a statistical basis for determining a probability of fraud for a pending transaction. The cost of fraud may be determined for each of a plurality of possible actions based on the probability of fraud, and the action that provides the lowest cost of fraud chosen. A cumulative cost of fraud may be determined for a set of transactions in the database. If taking the action with the lowest cost of fraud for the transaction would result in a higher cumulative cost of fraud, an action having the higher cost of fraud for the transaction may be chosen. The transaction may be added to the database, and the probability of fraud adjusted based on an amount of time since acceptance of the transaction. The statistical basis may be optimized based on a cost error. | 02-11-2016 |
20160042354 | PREDICTIVE FRAUD SCREENING - Methods, systems, and computer program products for screening transactions. A probability function provides an estimated probability of fraud for a pending transaction based on one or more parameters of the transaction. The estimated probability of fraud is used to determine an estimated cost of fraud for several possible actions that may be taken with regard to the transaction, and the action that provides the lowest expected cost of fraud chosen. To reduce prediction error, the function is adjusted to minimize a “cost error”, which is determined by applying the function to historical transactions stored in a transaction database. The cost error may be determined by comparing estimated probabilities of fraud for accepted transactions to a known probability of fraud based on whether a chargeback was received for the transaction in question. Parameters of the function may be adjusted to minimize a collective cost error across a set of historical transactions. | 02-11-2016 |
20160048824 | TRANSACTION PROCESSING METHOD, APPARATUS AND SYSTEM - The present invention relates to a transaction processing and method. A device associated with a payer, which may be a suitably adapted mobile telephone is involved in the payment transaction process. The transaction processing is information, such as goods to be purchased and amount, is provided from the payer electronic device to a transaction processing system. A transaction processing system then advises a payee (e.g. merchant) that goods have been ordered from the payee and provides the payee with the information on the ordered goods, and also confirms that payment has been made. The merchant subsequently provides the goods to the payer. | 02-18-2016 |
20160048831 | VERIFYING USER ACCOUNTS BASED ON INFORMATION RECEIVED IN A PREDETERMINED MANNER - A plurality of user accounts can be stored in a memory resource accessible by a computing device. A request for an on-demand service can be received at the computing device from a service application operating on a user device. The user device is associated with a first user account of the plurality of user accounts. The computing device can determine that the first user account is associated with a potentially fraudulent user. In response to determining that the first user account is associated with a potentially fraudulent user, the computing device can cause the service application to display a prompt instructing a user operating the user device to scan or capture an image of a payment card using a camera of the user device. | 02-18-2016 |
20160048834 | TOOL FOR CREATING A SYSTEM HARDWARE SIGNATURE FOR PAYMENT AUTHENTICATION - Embodiments of the invention provide a method a authenticating a transaction at the point of transaction. In some embodiments of the invention, a unique signature is created based at least in part on a hardware profile of the system. In some embodiments, a request is received from a user to perform a transaction using the system. In some embodiments, in response to receiving the request a key is created based on the unique signature and displayed to the user. In some embodiments, user input entered in response to the user viewing the key is received and it is determined whether to proceed with transaction payment authentication based at least on whether the received user input matches the created key. | 02-18-2016 |
20160048835 | SYSTEMS AND METHODS FOR PROCESSING PAYMENT TRANSACTIONS AT FUEL DISPENSING STATIONS - The methods and systems described herein provide for processing electronic payments at a retail location. Secure payment information for use in processing future payment transactions initiated by a mobile device may be stored at a secure location remote from retail locations. A mobile device of a user may be detected and location determined based at least in part on the strength of a signal via a wireless antennas at the retail location. A determination is made that the mobile device is associated with a user who previously provided payment information for use in processing payment transactions. The mobile device may receive incentives based at least in part on the determined location. A user may complete a payment transaction at the retail location without providing the secure payment information at the retail location. | 02-18-2016 |
20160048839 | SYSTEM AND METHOD FOR EXCLUSION-BASED IMPOSTER SCREENING - A method for exclusion-based imposter screening is provided. The method includes obtaining a plurality of biometrics related to a payment card owner, wherein the payment card owners owns a payment card. The method also includes, during at least one transaction offer involving the payment card at a point of sale terminal of a seller, obtaining a plurality of biometrics related to a customer entering into the at least one transaction offer. The method also includes comparing the plurality of biometrics related to the payment card owner to the plurality of biometrics related to the customer. The method also includes excluding the customer from the at least one transaction offer if it is determined that the plurality of biometrics related to the customer and the plurality of biometrics related to the payment card owner cannot be from a single person. | 02-18-2016 |
20160050076 | BUNDLING OVER-THE-TOP SERVICES WITH THIRD PARTY SERVICES - A device may receive a request to access a bundling service that manages access to an over-the-top service provided by an over-the-top service provider. The device may receive information that identifies a third party service provider and a user credential associated with the third party service provider. The third party service provider may be different from the over-the-top service provider, and the third party service provider may not provide the over-the-top service. The device may provide an authentication request, including the user credential, to a third party device associated with the third party service provider. The device may receive an authentication response from the third party device. The authentication response may indicate whether the third party device successfully authenticated the user credential. The device may selectively provide access to the bundling service based on receiving the authentication response. | 02-18-2016 |
20160055462 | BRAND-SPONSORED CUSTOMER PAYMENT CARD - A method to operating a deposit account for a customer is provided. The method comprises maintaining a deposit account for a customer on a third party server, said deposit account comprising a customer deposits component, and a brand deposits component, wherein the customer deposits component comprises cash received from the customer, and the brand deposits component comprises brand deposits received from at least one brand owner; enabling the customer to make a payment request to at least partially pay for an item with funds from the deposit account during a check out process at a retailer; enabling said retailer to initiate a payment authorization request to the third party server in respect of the payment request; processing the payment authorization request by the third party server, comprising generating a payment authorization response to said retailer; wherein said payment authorization response includes an authorization message selectively generated to authorize the retailer to accept payment via the deposit account. | 02-25-2016 |
20160055476 | LOCATION-BASED SERVICE PAYMENT AND SETUP - Payments are made to service providers for services rendered at a specific user location when the user is detected at that location. This may be when the user's mobile device is detected at a house or business that the user is responsible for service payments. The user may be asked, through the mobile device, whether to make a payment. The request may only be sent when a payment is due. In another embodiment, services are set up for the user when a new address is detected for the user. Specific services may be set up depending on the location and/or user information, such as services utilized by the user at a previous location. | 02-25-2016 |
20160055487 | DETERMINING USER AUTHENTICATION BASED ON USER PATTERNS WITHIN APPLICATION - Embodiments are directed to systems, methods and computer program products for providing user authentication based on historical user patterns. Embodiments receive from a user, a request to execute a user action associated with an application, wherein execution of the user action requires validation of authentication credentials; collect a set of data comprising information related to user patterns associated with the apparatus of the user; determine a user pattern score associated with the user; determine a level of authentication; determine which authentication types are associated with the level of authentication; request authentication credentials corresponding to the authentication types; receive authentication credentials from the user; validate the authentication credentials, thereby resulting in a successful validation of the authentication credentials; and in response to the successful validation, execute the user action. | 02-25-2016 |
20160063435 | SYSTEMS AND METHODS FOR FACILITATING SECURE ORDERING, PAYMENT AND DELIVERY OF GOODS OR SERVICES - Various embodiments are described that generally to a system and method for facilitating the secure order, payment and delivery of goods and/or services between various parties. The method may include receiving an order for goods or services at a management server; creating a waypoint for each address in the order; generating an identifier for each waypoint; transmitting the identifiers to a party associated with the waypoints; locating a courier to deliver the order; receiving identifier responses from the courier device at the waypoints, and matching the identifiers with the corresponding identifier responses to verify at least one of task completion and payment at the waypoints. | 03-03-2016 |
20160063463 | PAYMENT AUTHORIZATION SYSTEM - Systems and methods for providing a payment authorization system include a payment authorization device that receives, through communication over a network with at least one of a user device and a payment provider device, a request to authenticate a merchant virtual storefront. The request may be received in association with a merchant virtual storefront transaction request. The payment authorization device also retrieves identifying information associated with the merchant virtual storefront. Additionally, the payment authorization device may retrieve, from a database located in a non-transitory memory, baseline identifying information for comparison to the retrieved identifying information. The payment authorization device determines an authenticity of the merchant virtual storefront based on the retrieved identifying information and subsequently authorizes the merchant virtual storefront transaction request. In some cases, prior to authorizing the merchant virtual storefront transaction request, the payment authorization device requests approval from a third-party approver. | 03-03-2016 |
20160063476 | SYSTEM AND METHOD FOR PROVIDING A BLUETOOTH LOW ENERGY MOBILE PAYMENT SYSTEM - A BLUETOOTH low energy mobile payments system may comprise a BLE beacon that is deployed at a merchant location. The BLE beacon may be associated with a specific merchant terminal. The BLE beacon may be configured to broadcast a unique beacon ID that is detectable by a user device. The user device may be configured to communicate the beacon ID to a payment system. In response to receiving the beacon ID, the user device may initiate a payment between a user and a merchant, via a user device and a merchant terminal. | 03-03-2016 |
20160063479 | TRANSFER INFORMATION PROCESSING METHOD AND DEVICE - A transfer information processing method and device includes a first terminal device that sends a transfer request to a payment server, where the transfer request includes a first session identifier used to identify first account information with which login is performed at the first terminal device. The first terminal device receives second account information sent according to the transfer request by the payment server, where the second account information is account information that is determined by the payment server according to the second session identifier after the payment server receives a payee account prompt message sent by a second terminal device and that includes a second session identifier. The first terminal device sends a transfer confirmation request to the payment server according to the second account information. | 03-03-2016 |
20160063482 | SYSTEMS AND METHODS FOR FAST MOBILE PAYMENT - A method of completing transactions using a device includes displaying a pictogram including transaction details associated therewith by a merchant. The mobile device acquires the pictogram. The mobile device or a remote server decodes the transaction details. The mobile device displays for a user the decoded transaction details. If the decided transaction details are acceptable to the user, the user accepts, via the mobile device, the decoded transaction details. The mobile device transmits a confirmation of acceptance by the user to a remote server. The remote server transmits a payment request for the payment amount reflected in the transaction details to a payment gateway. The payment gateway validates the payment request. The merchant and the device receive a payment confirmation. | 03-03-2016 |
20160063493 | SYSTEM AND METHOD FOR PERFORMING PAYMENT AUTHORIZATION VERIFICATION USING GEOLOCATION DATA - A computer implemented system and method for estimating and verifying a characteristic of a billing address of a payment card including receiving mobile phone and payment card number data from a cardholder. Geolocation data associated with the mobile phone is collected at a predetermined time after cardholder permission to access such data has been granted. Once received, a characteristic of an address associated with the geolocation data is estimated and submitted along with the payment card number to an address verification system for verifying the validity of the characteristic of the address. | 03-03-2016 |
20160063495 | Method for Issuing an Assertion of Location - A method provides a location assertion for a transaction device that has requested, from a server and via a communication network, acceptance of a financial transaction involving the use of banking information. The method includes: receiving a transaction request from the transaction device, including at least one user identifier with which the banking information is associated; a obtaining an IP address associated with the transaction device; determining a current location associated with the IP address; comparing the current location to at least one authorized location on the basis of the identifier of the user; and providing a location assertion to an entity when the comparison step yields a positive result. | 03-03-2016 |
20160063497 | PREPAID EXPENSE CARD MANAGEMENT PLATFORM - A method and system for issuing and managing sponsor funded stored value cards, where a sponsor company funds an account associated with a stored value card. The stored value card is issued to a cardholder, who can withdraw funds from the account constrained through flexible spend rules. Sponsor funded stored value cards may reduce expenses and difficulties associated with written checks, provide the cardholder with usage flexibility, reduce risks associated with cardholder funds usage, and the like, especially when the cardholder is in a remote location. | 03-03-2016 |
20160063498 | Payment Implementation Method, Relevant Apparatus, and System - A computer server receives a payment request including a payment order sent by a first mobile client device. In response, the computer server allocates a first payment identifier to the payment order and returns a response including the first payment identifier to the first mobile client device. The first mobile client device generates an audio signal associated with the response and broadcasts the audio signal including the first payment identifier. The computer server receives a collection request including a second payment identifier and payee information from a second mobile client device. The collection request was generated by the second device in response to a detection of the audio signal broadcasted by the first mobile client device. If the second payment identifier corresponds to the first payment identifier, the computer server then processes the payment order using the payee information and sends a payment completion message to the first device. | 03-03-2016 |
20160063500 | ENHANCED AUTOMATED ACCEPTANCE OF PAYMENT TRANSACTIONS THAT HAVE BEEN FLAGGED FOR HUMAN REVIEW BY AN ANTI-FRAUD SYSTEM - An authentication system for electronic transactions occurring over a computerized network is provided that includes: (a) a transaction authentication system interface operatively coupled to the computerized network for receiving proposed transactions information over the computerized network; and (b) a transaction authentication tool, operatively coupled to the transaction authentication system interface, where the tool includes: an automated anti-fraud analysis component for analyzing transactions information from a plurality of proposed transactions and automatically rejecting a first subset of proposed transactions according to automatic rejection criteria and automatically assigning a second subset of transactions for additional review; and an automated acceptance component for analyzing the second subset of transactions and accepting a third subset of transactions from the second subset based upon automatic accepting criteria. | 03-03-2016 |
20160063502 | METHOD FOR IMPROVING OPERATING PROFITS WITH BETTER AUTOMATED DECISION MAKING WITH ARTIFICIAL INTELLIGENCE - A business method to reverse an authorization request denial made according to general guidelines if the particular customer and the particular transaction pass various threshold tests. Alternatively, each customer is assigned different and independent personal thresholds for transaction types, amounts, times, locations, and context. These thresholds are then applied if an instant payment transaction request is about to be declined. | 03-03-2016 |
20160063619 | DEVICE-ENABLED SERVICE HANDOFF AND COLLABORATION - Various embodiments herein each include at least one of systems, devices, methods, and software for device-enabled service handoff and collaboration. One embodiment is a method that includes presenting, on a first device, data with regard to a transaction session initiated on a second device, the first device collaborating in performance of the transaction session via a network. The method further includes transmitting, from the first device, a request for a third device to collaboratively join the transaction session in response to command input received by the first device. | 03-03-2016 |
20160071083 | Database driven, dynamically configurable payment routing and responses based on payment types - A transaction router includes an interface to a routing rules database and logic to analyze a transaction to determine a predetermined transaction type. The router selects a payment provider network from among a plurality of payment provider networks, the selection based on the transaction type and routing rules for the transaction type received from the routing rules database. | 03-10-2016 |
20160071084 | SELF-AUTHENTICATING PEER TO PEER TRANSACTION - A system and method of transaction processing is provided. The system includes a central server, which, after receiving transaction and recipient information from an initiator, sends a verification code to the initiator. The server also sends instructions for the initiator to send the code to a recipient via an outside communication channel. The server receives the verification code from the recipient, and verifies the transaction. In this manner, security may be maintained. | 03-10-2016 |
20160071085 | SYSTEMS AND METHODS FOR INITIATING PAYMENT FROM A CLIENT DEVICE - The disclosed embodiments include a mobile client device for automatically performing a mobile financial service function, including a memory storing software instructions, the software instructions including a mobile financial service application configured to perform financial service processes. The system may also include and one or more processors configured to execute the software instructions to detect a physical action performed on the mobile client device, and determine a first financial service function to perform based on the detected physical action, wherein the first financial service function is a function provided by the mobile financial service application. The one or more processors may also determine whether verification of a user is required, verify the user if verification of the user is required, and automatically initiate the first financial service function. | 03-10-2016 |
20160071087 | SYSTEM AND METHOD OF ELECTRONIC PAYMENT USING PAYEE PROVIDED TRANSACTION IDENTIFICATION CODES - Computerized payment method using short, temporary, transaction ID (TID) symbols for secure payer (customer) financial transactions. Payees (e.g. merchants) register their unique ID telecommunications devices (e.g. Smartphone and phone number), and financial institution a payment server. When a payee (merchant) and wish to do a financial transaction, the payee requests a TID from the server for that amount. The server sends a TID to the payee, which the payee then communicates to the payer. The payer in turn relays this TID to the server, which validates the transaction using the payer device. The server then releases funds to the payee. The server preserves records for auditing, but security is enhanced because the merchant never directly accesses the customer's financial account. Use of GPS coordinates and/or payer provided Group IDs may also be used to reduce the number of symbols used in the TID while continuing to ensure uniqueness. | 03-10-2016 |
20160071092 | Systems and Methods for Transferring Value to Payment Accounts - Systems and methods are provided for transferring value from a voucher to a payment account associated with a consumer. One exemplary method includes receiving, at a computing device, a load request to transfer value from a voucher to a payment account associated with a consumer. The load request includes a selection, at the computing device, of a provider associated with the voucher, from multiple different available voucher providers. A transaction request is then communicated, by the computing device, to transfer the value from the voucher to the payment account. The transaction request includes an identification number for the voucher and an account number for the payment account. When a transfer authorization is received at the computing device in response to the transaction request, a confirmation is generated, by the computing device, indicating that the value from the voucher has been transferred to the payment account. | 03-10-2016 |
20160071099 | PAYMENT SYSTEM THAT REDUCES OR ELIMINATES THE NEED TO EXCHANGE PERSONAL INFORMATION - A payment system that securely identifies transactions using a transaction identifier that may be set by the parties to the transaction, such that the parties may interact regarding the transaction with one another and with the payment system using that identifier rather than personal identification information. In embodiments, funds may be transferred between individuals that are anonymous to one another, or transferred with limited exchange of personal identification information. When a first individual (the “payer”) seeks to pay a second individual, the first may obtain from the second (the “payee”) an identifier for the transaction. The payer may register the transaction with the payment system, including by providing this transaction identifier. The second individual may subsequently “claim” the transaction by providing that transaction identifier to the system and thereby demonstrating that he/she is the payee of the transaction, after which the system may transfer funds to the second individual. | 03-10-2016 |
20160071103 | SYSTEMS AND METHODS FOR CLIENT SCREENING IN THE FINANCIAL SERVICES INDUSTRY - Systems, methods, and interfaces for screening clients for security compliance with a Customer Identification Program are disclosed. An illustrative system for screening clients can include a client screening engine adapted to filter client account data based on one or more filtering criteria, a database adapted to store client account information and verification status information, and a graphical user interface adapted to selectively display client account information and verification status information for one or more selected clients on a screen. The system can be used to submit identity verification requests to Customer Identification Program vendors for only those clients whose identity have not been verified. | 03-10-2016 |
20160071105 | SYSTEMS AND METHODS FOR USING SOCIAL NETWORK DATA TO DETERMINE PAYMENT FRAUD - A computer-implemented method for analyzing potentially fraudulent e-commerce payment transactions utilizing social media data is provided. The method uses a fraud monitoring device in communication with a memory. The method includes receiving a request to assess the fraud risk of an online transaction initiated by a cardholder using a payment card and accessing a social media account associated with the cardholder. The social media account includes a circle of friends, where each friend in the circle of friends is associated with a social media account. The method also includes determining one or more historical transactions associated with at least one friend in the circle of friends, calculating a social risk score for the cardholder based in part on the determined one or more historical transactions, and transmitting a consolidated risk assessment of the online transaction based in part on the social risk score. | 03-10-2016 |
20160071106 | SYSTEM AND METHOD FOR INVESTIGATING FRAUDULENT ACTIVITY - According to one embodiment, an apparatus comprising a memory and a processor is provided. The memory is operable to store information associated with a user account. The processor can receive a message indicating that a transaction associated with a card has occurred and receive a first input indicating that the transaction is fraudulent. The processor can receive a second input indicating that a report should be filed and present, on a display, a plurality of questions to determine whether the card has been stolen. The processor can receive a third input indicating an answer to each of the plurality of questions and present, on the display, an affidavit. The processor can receive a fourth input indicating the affidavit has been electronically signed and present, on the display, a confirmation message indicating that the report has been filed. | 03-10-2016 |
20160071107 | METHOD OF PROCESSING A TRANSACTION REQUEST - A processing system comprises a transaction handler arranged to receive a transaction request from a device over a communications network, an identification obtainer arranged to obtain first identification data of the device from which the transaction request is received and store said first identification data, a verification message sender arranged to send a verification message from the processing system to a nominated user e-mail address, the verification message including a hyperlink specific to the transaction request for verifying the transaction request, and a verification handler arranged to receive an attempt from a device to verify the transaction request based on the hyperlink, the identification obtainer arranged to obtain second identification data from the device attempting to verify the transaction request. The processing system arranged to approve the transaction request upon determining that the second identification data is consistent with the first identification data, and reject the transaction request upon determining that the second identification data is inconsistent with the first identification data. | 03-10-2016 |
20160071109 | PAYMENT SYSTEM THAT REDUCES OR ELIMINATES THE NEED TO EXCHANGE PERSONAL INFORMATION - A payment system that securely identifies transactions using a transaction identifier that may be set by the parties to the transaction, such that the parties may interact regarding the transaction with one another and with the payment system using that identifier rather than personal identification information. In embodiments, funds may be transferred between individuals that are anonymous to one another, or transferred with limited exchange of personal identification information. When a first individual (the “payer”) seeks to pay a second individual, the first may obtain from the second (the “payee”) an identifier for the transaction. The payer may register the transaction with the payment system, including by providing this transaction identifier. The second individual may subsequently “claim” the transaction by providing that transaction identifier to the system and thereby demonstrating that he/she is the payee of the transaction, after which the system may transfer funds to the second individual. | 03-10-2016 |
20160071110 | PAYMENT SYSTEM THAT REDUCES OR ELIMINATES THE NEED TO EXCHANGE PERSONAL INFORMATION - A payment system that securely identifies transactions using a transaction identifier that may be set by the parties to the transaction, such that the parties may interact regarding the transaction with one another and with the payment system using that identifier rather than personal identification information. In embodiments, funds may be transferred between individuals that are anonymous to one another, or transferred with limited exchange of personal identification information. When a first individual (the “payer”) seeks to pay a second individual, the first may obtain from the second (the “payee”) an identifier for the transaction. The payer may register the transaction with the payment system, including by providing this transaction identifier. The second individual may subsequently “claim” the transaction by providing that transaction identifier to the system and thereby demonstrating that he/she is the payee of the transaction, after which the system may transfer funds to the second individual. | 03-10-2016 |
20160071111 | IMAGE ANALYSIS FOR USER AUTHENTICATION - A transaction is authorized using an authentication process that prompts the user to perform an action in view of a camera or sensor. The process identifies the user and verifies that the user requesting the transaction is a living human being. The user is identified using image information which is processed utilizing facial recognition. The device verifies that the image information corresponds to a living human using one or more human-verification processes. The device prompts the user to perform an action to confirm the transaction, and causes the transaction to be performed after verifying performance of the action by the identified user. | 03-10-2016 |
20160078436 | SYSTEMS AND METHODS FOR PROVIDING RISK BASED DECISIONING SERVICE TO A MERCHANT - A computing device for providing risk-based decisioning to a merchant during payment card transactions is provided herein. The computing device is programmed to receive, from the merchant, transaction data associated with a payment card transaction. The computing device is further programmed to compute a risk score for the payment card transaction based at least in part on the transaction data and infrastructure data associated with the payment card transaction. The computing device is also programmed transmit an indication of acceptable risk to the merchant if the risk score satisfies a first pre-defined threshold. The computing device is still further programmed to initiate an authentication challenge of the suspect consumer if the risk score satisfies a second pre-defined threshold. | 03-17-2016 |
20160078438 | SECURE IN-LINE PAYMENTS FOR RICH INTERNET APPLICATIONS - Methods and systems are provided for making secure financial transactions, such as purchase payments, using rich Internet applications (RIA) running an RIA runtime (also referred to as a platform or framework) on the user's smart phone or other mobile device. Embodiments differ from the usual way of re-directing a user from a third-party application and authenticating the user by providing secure in-line payments from a rich Internet application running on an RIA runtime. A system includes: a mobile device executing a rich Internet application running on an RIA runtime; a payment library communicating with the RIA runtime and a service provider, for which the payment library communicates with the service provider to authenticate the rich Internet application; and in response to authentication by the service provider, facilitates secure financial transactions via the rich Internet application. | 03-17-2016 |
20160078439 | Method and an Arrangement for Exception Management in a Transaction Network - The invention concerns a computer executable method for a computer executable method for managing an exception of a transaction in a transaction transmission network. The method is characterized in that it comprises computer executable steps for validating the transaction using at least one rule selected according to at least one stakeholder of the transaction, detecting the exception, creating an object comprising data of the exception, identifying at least one service adapted for immediate resolution of the exception, and identifying at least one service provider capable of altering the functionality of the source of the transaction to produce transactions that are compliant with the at least one rule. An arrangement and a computer storage medium are also disclosed. | 03-17-2016 |
20160078444 | SYSTEMS AND METHODS FOR PROVIDING FRAUD INDICATOR DATA WITHIN AN AUTHENTICATION PROTOCOL - A computing device for providing fraud indicator data within an authentication system including an authentication protocol is provided herein. The computing device includes a processor communicatively coupled to a memory. The computing device is programmed to identify fraud feature data associated with a payment card transaction. The transaction includes a suspect consumer presenting a payment card from a digital wallet of a privileged cardholder. The computing device is further programmed to compute a first risk score for the transaction based at least in part on the fraud feature data. The computing device is also programmed to generate a message in the authentication protocol, the message including at least one extension field. The first risk score is included within the extension field. The computing device is still further programmed to transmit the message with the first risk score to a party associated with the transaction for use during authentication of the transaction. | 03-17-2016 |
20160080346 | IDENTITY CERTIFICATION BADGE - Systems and methods for identity certification using an identity badge are disclosed herein. A method of providing an identity badge to a member is performed by an authentication system. The system receives a request for an identity badge, the request including some information about the member. The authentication system verifies the identity of the member and generates one or more reports about the member. The system then generates an identity badge for display on a third party user interface. A user viewing the member's profile can view the identity badge and may request access to the one or more reports via the identity badge. Upon receiving a request for access to the one or more reports, the system may respond by requesting more information or requesting authorization from the member. | 03-17-2016 |
20160085988 | Management Method and Computer System Thereof - A management method for a cloud server system is disclosed. The management method includes accepting registering of a first administer account and a preserved account; and permitting uploading or editing at least one individual information via the first administer account for the cloud server system while a user corresponding to the preserved account does not comply with a predetermined principle, or authorizing the user corresponding to the preserved account to upload or edit the at least one individual information for the cloud server system while the user corresponding to the preserved account complies with the predetermined principle; wherein the predetermined principle is a children online privacy limitation, a user corresponding to the first administer account is a legal guardian for the user corresponding to the preserved account, and the at least one individual information represents a personal identification for the user corresponding to the preserved account. | 03-24-2016 |
20160086157 | PROCESS FOR PAYMENT BY CELL PHONE BY PICTURE AND GPS LOCATION - The invention these specifications refer to is for a process of a payment system using a cell phone, assisted by a photograph taken and a geo-location system known as “GPS positioning protocol”, all managed by the body which created the “GeoPay online system” (GOS) process, and which validates the data of both user and business and links the banks of both to complete the financial transaction. | 03-24-2016 |
20160086158 | PAYMENT VERIFICATION METHOD, APPARATUS AND SYSTEM - Methods, apparatuses and systems of payment verification are disclosed. A method includes receiving a request for connecting to a receiver access point (AP) from a terminal of a payer to be verified and geographical location information of the receiver AP, verifying whether account information included in the request matches with pre-stored payment account information; returning a verification result to the receiver AP; receiving a payer terminal geographical location information verification request from a payment server if the verification result indicates a match; verifying geographical location information of the terminal of the payer to be verified based on the geographical location information of the receiver AP; and returning a verification result of the payer terminal geographical location information verification request to the payment server. The method increases the security of a payment process and prevents a legitimate user from suffering financial losses and unnecessary troubles. | 03-24-2016 |
20160086161 | SYSTEMS AND METHODS FOR MOBILE APPLICATION, WEARABLE APPLICATION, TRANSACTIONAL MESSAGING, CALLING, DIGITAL MULTIMEDIA CAPTURE AND PAYMENT TRANSACTIONS - Systems and methods for multimedia capture and payment transactions are provided. A system comprises a payment and multimedia capture means and a cloud-based application. The payment and multimedia capture means is configured to communicate with an external device, transmit key data from the payment and multimedia capture means to the external device. The cloud-based application is configured to receive the key data from the external device, provide a payment and multimedia capture interface on a display of the external device, receive haptic input via the haptic control, analyze the haptic input to determine a duration of the haptic input, select an operation based on the duration, and perform the selected operation. The operation include a payment operation and a multimedia capture operation. | 03-24-2016 |
20160086162 | AUTOMATIC NOTIFICATION OF TRANSACTION BY BANK CARD TO CUSTOMER DEVICE - A bank customer's electronic debit or credit card (“e-card”) automatically reports to the customer's CE device the receipt of transaction interrogations the e-card receives from a point of sale (POS) apparatus. The e-card may simply report to the CE device and respond to the interrogation, or it may await a signal from the CE device prior to responding to the interrogation. | 03-24-2016 |
20160086171 | Indication of Recurring Transaction for Payment Devices and Credit Cards - A credit card has either a display screen capable of showing either a fully generated transactional credit card number or a partially generated number. In use, a user generates a dynamic “transactional” credit card number associated with his underlying account credit card number. To complete a secure transaction that cannot be copied and used at a later date, the credit card does not display the base credit card number, but instead uses on-card encryption to generate and/or display a transactional cc number that may be may include a portion of the base number or only digits that are generated into the transactional credit card number. The transactional cc number and not the base credit card number are provided to a vendor to complete a transaction. The credit card processing server uses decryption or a reverse lookup table to convert the transactional cc number back to the base cc number. | 03-24-2016 |
20160086176 | METHOD FOR MULTI-FACTOR TRANSACTION AUTHENTICATION USING WEARABLE DEVICES - The present invention relates to a method ( | 03-24-2016 |
20160086178 | METHODS FOR PERFORMING INTERNET PROCESSES USING GLOBAL POSITIONING AND OTHER MEANS - Methods for purchasing of goods or services over the internet. A customer has a customer account set up at a bank with associated account information. The account information includes verification information for verification parameters, such as authorized computer identification, authorized delivery addresses, authorized global positioning satellite or other secure location information, authorized user identification, authorized telephone caller identification, and/or other account information. An order is placed by a user via an ordering computer which provides order information. Such order information includes verification variables used by the bank. Verification and/or authentication using one or more variables of the customer account information is used by the bank to validate the order before assuring payment to the merchant. | 03-24-2016 |
20160086179 | Shared Electronic Wallet With Permissions - A payment system and method for processing purchases made by a dependent recipient and funded by a payor are provided. The payment system stores conditions set by a payor, and the conditions govern use of the payor's money by the recipient. Purchase transactions within the payment system are initiated by the recipient and approved or rejected by the administrator of the payment system prior to merchant involvement in the process. The administrator approves the purchase request only when the conditions set by the payor have been satisfied, and the merchant is notified of the purchase and paid in response to approval of the purchase request. The administrator rejects the purchase request if the payor conditions are not met, and the administrator notifies the recipient if the purchase request is rejected. | 03-24-2016 |
20160086180 | USING BIOMETRICS TO RECOVER PASSWORD IN CUSTOMER MOBILE DEVICE - A bank customer's CE device is used to authorize transactions using the customer's electronic debit or credit card (“e-card”). Biometric input is used to recover the password of the customer device if lost. | 03-24-2016 |
20160086182 | System, Method and Apparatus to Detect Fraud in Travel Transactions - A system, method, and computer-readable storage medium to detect payment card fraud in travel transactions. | 03-24-2016 |
20160086184 | Secure Mobile Device Credential Provisioning Using Risk Decision Non-Overrides - Embodiments are directed to optimizing the secure provisioning of credentials to mobile devices through use of risk decision non-overrides. In some embodiments, a service provider receives a request from a wallet provider to provision a credential associated with an account to a mobile device. The request includes a first risk level associated with the provisioning. The service provider receives a second risk level associated with the provisioning request from an issuer of the account. Based upon determining that a non-override condition exists, the service provider uses the first risk level from the wallet provider and accordingly causes a user authentication to occur. A non-override condition may be determined based upon scenario indicators received within the provisioning request. In some embodiments, the non-override condition may be ignored when the first risk level indicates medium risk and the second risk level indicates high risk. | 03-24-2016 |
20160086185 | METHOD OF ALERTING ALL FINANCIAL CHANNELS ABOUT RISK IN REAL-TIME - A method of reducing financial fraud by operating artificial intelligence machines organized into parallel sets of predictive models with each set specially trained with supervised and unsupervised training data filtered for a particular financial channel. Each set integrates several artificial intelligence classifiers like neural networks, case based reasoning, decision trees, genetic algorithms, fuzzy logic, business rules and constraints, smart agents and associated real-time profiling, recursive profiles, and long-term profiles. Suspicious and abnormal activities in any channel communicate across predictive models for all the financial channels through real-time memory storage updates to the smart agent profiles they all share. | 03-24-2016 |
20160086186 | RECEIVING FINGERPRINTS THROUGH TOUCH SCREEN OF CE DEVICE - Fingerprints for transaction authentication are received through the touch screen of a bank customer's CE device for purposes of approving or denying transactions with the customer's electronic debit or credit card (“e-card”). | 03-24-2016 |
20160086187 | APPARATUS AND METHOD FOR PROVIDING TRANSACTION SECURITY AND/OR ACCOUNT SECURITY - An communication apparatus, including a memory which stores information regarding a first account of an individual account holder, a barcode, or QR code, reader which reads or obtains information regarding a merchant involved in a transaction involving the first account, wherein the merchant information is input into the apparatus; a camera which obtains a picture or photograph of a party involved in the transaction; a processor which generates an authorization request containing information read or obtained by the barcode, or QR code, reader and information regarding the first account, wherein the processor or the apparatus initiates and establishes a communication link with a transaction authorization computer associated with an issuer or servicer of the first; and a transmitter which transmits the authorization request message and the picture or photograph to the transaction authorization computer after the communication link is established. The apparatus is associated with the individual account holder. | 03-24-2016 |
20160086188 | MESSAGING CUSTOMER MOBILE DEVICE WHEN ELECTRONIC BANK CARD USED - A bank customer's CE device is texted by a bank computer when the customer's electronic debit or credit card (“e-card”) is sought to be used so that the customer is alerted to possibly fraudulent “fishing” of the e-card data by a nearby thief device. | 03-24-2016 |
20160092654 | SYSTEMS AND METHODS FOR FITNESS REPORTING USING PAYMENT CARDS - A computer-implemented method for tracking fitness data of a cardholder by using a fitness payment card and a fitness tracking computing device is provided. The method includes storing registration data, wherein the registration data includes an account identifier associated with the fitness payment card and the cardholder. The method also includes receiving, by the fitness tracking computing device, a fitness data transfer message that includes the registration data and fitness data of the cardholder, wherein the fitness data is collected by the fitness payment card. The method further includes determining that the fitness payment card is registered in a fitness tracking program based on the registration data. The method also includes electronically generating a fitness report including at least the fitness data of the cardholder and providing the fitness report to the cardholder. | 03-31-2016 |
20160092859 | SYSTEM AND METHOD FOR FACILITATING A PURCHASE TRANSACTION USING BEACON EQUIPPED DEVICES - In a purchase transaction between a merchant and a customer, a merchant device sends transaction information to a payment gateway and sends a beacon signal containing a transaction identifier to a customer mobile device. The customer mobile device sends the transaction identifier and payment information corresponding to a customer payment account to the payment gateway. The payment gateway applies the transaction identifier to access the transaction information received from the merchant device and sends purchase information based on the transaction information to the customer mobile device. The customer mobile device displays the purchase information to the customer, obtains an indication of customer assent to pay for the item and sends a confirmation of customer assent to the payment gateway. Upon receiving the confirmation of customer assent from the customer mobile device, the payment gateway processes the purchase transaction based on the payment account information. | 03-31-2016 |
20160092871 | METHODS AND SYSTEMS FOR ASSET OBFUSCATION - Techniques for obfuscating and deploying digital assets (e.g., mobile applications) are provided to mitigate the risk of unauthorized disclosure. An asset can be received that is to be deployed to a plurality of mobile devices, each of the mobile devices associated with a corresponding account having account attributes. A deployment group of one or more mobile devices for deploying the asset can be identified based on a set of one or more obfuscation parameters, comprising account attributes shared among the one or more mobile devices within the deployment group. A customized obfuscation scheme to be applied to the asset can be determined based at least in part on the set of obfuscation parameters. The customized obfuscation scheme can be applied to the asset to generate an obfuscated asset. The obfuscated asset can be transmitted and/or updated over a network to the one or more mobile devices within the deployment group. | 03-31-2016 |
20160092873 | SYSTEMS AND METHODS FOR PROCESSING AND MONITORING REBATES - A computer-based method for processing and monitoring rebates associated with a cardholder is provided. The method includes storing data including a plurality of cardholder profiles each associated with a cardholder enrolled in a rebate monitoring service and a plurality of payment card identifiers each associated with one of the cardholders. The method also includes receiving a first authorization request message for a first payment transaction initiated by a first cardholder. The first authorization request message includes a first payment card identifier. The method further includes determining a first cardholder profile associated with the first cardholder for the rebate monitoring service based in part on the first payment card identifier and the stored data, determining at least a first rebate associated with the first payment transaction, generating a completed rebate form based in part on the first cardholder profile and the first payment transaction, and transmitting the completed rebate form. | 03-31-2016 |
20160092874 | METHOD AND SYSTEM FOR CONDUCTING PRE-AUTHORIZED FINANCIAL TRANSACTIONS - A method and system for conducting a pre-authorized financial transaction is disclosed. A security gateway receives a pre-authorization token and a consumer alias from a merchant or an acquirer of the merchant. The token identifies a pre-authorized financial transaction and the token and alias have previously been provided to the merchant by a consumer. The alias is matched with a stored alias to identify an electronic device of the consumer. An authorization request is transmitted to the electronic device. A confirmation message or a denial message is received by the security gateway in response to the authorization request. Upon receiving a confirmation message, payment credentials associated with a selected payment instrument of the consumer and required for conducting the pre-authorized transaction are transmitted to the merchant or the acquirer of the merchant for use in completing the transaction. | 03-31-2016 |
20160092875 | PRODUCT AUTHENTICATION OVER A PAYMENT NETWORK - Systems and methods are provided for authenticating a product over a payment network. A product identifier associated with a product to be authenticated may be included or appended to a conventional authorization request message or clearing message during processing of a payment transaction. The product identifier can be verified at a verification entity to determine whether the product is real or counterfeit. Authorization or settlement of the payment transaction can be approved/processed if the product is determined to be real. Authorization or settlement of the payment transaction can be declined/withheld if the product is determined to be counterfeit. | 03-31-2016 |
20160092876 | ON-DEVICE SHARED CARDHOLDER VERIFICATION - A payment device includes an application storage device for storing a plurality of payment applications and a capture module for capturing user verification information. The payment device also includes a verification module. The verification module is interfaced to the capture module. The verification module is for receiving and verifying the captured user verification information and for outputting a user verification result. The payment device further includes a shared cardholder verification method (CVM) module, which is interfaced to the verification module. The shared CVM module receives the user verification result and also receives a reference to one of the payment applications. The shared CVM module responds to the verification result by outputting an application credential to the payment application to which it was referred. | 03-31-2016 |
20160098699 | USER-FRIENDLY MOBILE PAYMENTS SYSTEM - A method includes receiving a transaction request, which includes merchant data that identifies a merchant. The merchant data is translated into an account number for the merchant. The merchant data and/or the merchant's account number is used to identify a financial institution that acts as a transaction acquirer for the merchant. A payment system transaction authorization request is routed to the identified financial institution. | 04-07-2016 |
20160098702 | FRAUD PREVENTION USING PRE-PURCHASE MOBILE APPLICATION CHECK-IN - The current location of a consumer can be determined and compared to the location of a merchant requesting approval of a credit card or debit card transaction. If the consumer is not at same location as the merchant, the payment can be declined. If the consumer is at the same location, the payment can be approved or declined according to normal rules. The current location of the consumer can be determined by having the consumer check in upon arrival at a store or shopping center by using an application running on the user's phone, tablet, or other mobile device. The location of the merchant can be determined based on information associated with the payment request. If the two locations match, the payment request is likely to come from the consumer. | 04-07-2016 |
20160098710 | INTELLIGENT AUTHENTICATION - Systems, methods, and other embodiments associated with intelligent authentication. According to one embodiment, a system includes a transaction logic configured to receive transaction metadata associated with an attempted transaction. The transaction logic is also configured to identify a user attempting the attempted transaction. The system further includes an activity logic configured to access an activity log associated with the user. The activity log includes values corresponding to previous transactions made by the user and any additional information provided by 3 | 04-07-2016 |
20160098711 | SYSTEMS AND METHODS FOR INTERACTING WITH UNATTENDED MACHINES USING DETECTABLE TRIGGER CONDITIONS AND LIMITED-SCOPE AUTHORIZATION GRANTS - System and methods are disclosed for interactions with unattended retail machines (“URMs”) using detectable trigger conditions and limited-scope authorization grants. An exemplary method is performed at a mobile device and includes: receiving, via a communications unit, a broadcasted signal from an electronic payment device coupled with an URM. The broadcasted signal includes a request to authorize funds that are associated with a user of the mobile device for use at the URM. The method further includes: (i) sending the request to a server via the communications unit, (ii) receiving, from the server, an authorization grant (e.g., the grant expires if predetermined criteria are satisfied), and (iii) detecting a trigger condition to initiate a cashless transaction with the URM. In accordance with a determination that the predetermined criteria haven't been satisfied, the method includes: initiating the cashless transaction with the URM by sending the authorization grant to the electronic payment device. | 04-07-2016 |
20160098712 | ONLINE TRANSACTION VERIFICATION SYSTEM - According to one embodiment, an online transaction verification system includes one or more processors configured to receive an indication that a card user is attempting to perform an online transaction using payment card information. The processors are also configured to transmit a challenge code configured to interrogate a card user identification device for a first verification code, and to receive the first verification code. The first verification code is selected, by the card user identification device, from a plurality of verification codes, and according to a predefined manner. The processors are further configured to select a first comparison code according to the predefined manner, and compare the first comparison code to the first verification code. The processors are further configured to, following a determination that the first comparison code matches the first verification code, transmit a verification signal configured to indicate that the online transaction has been verified. | 04-07-2016 |
20160098715 | TRANSACTION VERIFICATION SYSTEM - According to one embodiment, a transaction verification system includes one or more processors configured to receive an indication that a card user is attempting to perform a transaction with a payment card. The processors are also configured to transmit a challenge code for reception by a card user device, and receive a first verification code from the card user device. The first verification code is selected, by the card user device, from a plurality of verification codes stored by the card user device, and according to a predefined manner. The processors are further configured to select a first comparison code according to the predefined manner, and compare the first comparison code to the first verification code. The processors are further configured to, following a determination that the first comparison code matches the first verification code, transmit a verification signal configured to indicate that the transaction has been verified. | 04-07-2016 |
20160098717 | DYNAMIC CARD VALIDATION USING RANDOMLY DETERMINED CELL IDENTIFIERS - A card validation system receives a request to validate a card. The system receives a set of cell identifiers from a merchant, where the set of cell identifiers determined by the merchant. The system further receives a set of received cell values corresponding to the set of cell identifiers of a card validation matrix. The system determines a set of stored cell values corresponding to the set of cell identifiers of the card validation matrix. The system compares the set of received cell values to the set of stored cell values. Based at least in part upon the comparison, the system determines whether the card is validated. | 04-07-2016 |
20160098718 | DYNAMIC CARD VALIDATION USING PERIODICALLY COMMUNICATED CELL IDENTIFIERS - A card validation system determines a first set of cell identifiers of a card validation matrix to associate with a first merchant and a user and transmits the first set of cell identifiers to a first merchant. The system receives a request to validate a card and receives, from the first merchant, a first set of received cell values corresponding to the first set of cell identifiers of a card validation matrix. The system determines a first set of stored cell values corresponding to the first set of cell identifiers of the card validation matrix. The system compares the first set of received cell values to the first set of stored cell values. Based at least in part upon the comparison, the system determines whether the card is validated. | 04-07-2016 |
20160098719 | REVOCATION OF APPLICATION ACCESS BASED ON NON-CO-LOCATED - Embodiments of the invention relate to an invention for accessing a remotely located mobile device of a user based on certain events is provided. The system, method, and computer program product are configured to: (a) monitor one or more transaction involving a transaction vehicle of a user; (b) determine a physical location of a transaction vehicle based at least partially on the one or more transactions; (c) determine a geographic location of a mobile device of the user, wherein the mobile device is associated with the transaction vehicle; (d) determine whether or not the transaction vehicle of the user and the mobile device of the user are co-located; and (e) reconfigure one or more applications accessible to the mobile device or one or more functional features of the mobile device based at least partially on determining that the mobile device and the transaction vehicle of the user are not co-located. | 04-07-2016 |
20160098721 | CONFIRMING LOCAL MARKETPLACE TRANSACTION CONSUMMATION FOR ONLINE PAYMENT CONSUMMATION - Exemplary embodiment of the present invention would provide systems, including Internet-based systems, and computer-implemented methods, for providing online Buyers and Sellers who physically transact an exchange of an item at a local meeting place, indicia of confirmation of the exchange on which to base a background online payment. In particular, exemplary embodiments of the present invention would provide a way for Buyers and/or Sellers to input an identifier for online authentication to confirm that a physical exchange of an item sold had been transacted and that would accordingly provide an online system with a basis to charge the relevant Buyers account for a sale amount and pay the Seller for the item sold. | 04-07-2016 |
20160098722 | SYSTEM AND METHOD OF IDENTITY VERIFICATION - A system and method of verifying the identity of a user or registrant. The user or registrant provides identification information and registration information. The identification information may be a visual representation of an identifying item associated with location information. In some embodiments, the identification information may be a visual representation of a government issued identity. An identification module verifies the identification information and compares the verified identification information to the registration information. | 04-07-2016 |
20160098726 | TELEPHONE TRANSACTION VERIFICATION SYSTEM - According to one embodiment, a telephone transaction verification system includes one or more processors configured to receive an indication that a card user is attempting to perform a telephone transaction using payment card information. The processors are further configured to transmit a challenge code configured to interrogate a card user identification device for a first verification code, and to receive the first verification code. The first verification code is selected, by the card user identification device, from a plurality of verification codes, and according to a predefined manner. The processors are further configured to select a first comparison code according to the predefined manner, and compare the first comparison code to the first verification code. The processors are further configured to, following a determination that the first comparison code matches the first verification code, transmit a verification signal configured to indicate that the telephone transaction has been verified. | 04-07-2016 |
20160098809 | SYSTEM AND METHOD FOR CHECKLESS CASH ADVANCE SETTLEMENT - Methods, devices, and systems for conducting a checkless cash access settlement are provided. In one embodiment, a cash advance method includes the following: a customer initiates a cash access transaction via a cash access system; the customer receives authorization or denial; the customer provides identification and the financial card to a cashier or attendant; the cashier or attendant validates the customer's identity, retrieves the transaction information, and completes the cash advance application; the application prints a non-negotiable instrument, such as a transaction receipt; the customer signs the receipt confirming the transaction with a physical receipt or electronic capture. | 04-07-2016 |
20160104134 | Money Transfers by Residents of a Controlled Facility - In an aspect, a method includes receiving authorization information from a controlled facility, and receiving a request to initiate a financial transaction at an agent device. At least one party to the financial transaction may be a resident of the controlled facility. The method includes determining whether the resident is authorized to participate in the financial transaction based on the authorization information. Determining whether the resident is authorized to participate in the financial transaction may include determining, based on the authorization information, whether a party that is to receive funds from or provide funds to the resident in connection with the financial transaction corresponds to an entity that the resident of the controlled facility is authorized to receive funds from or provide funds to. The method includes initiating the financial transaction in response to a determination that the resident is authorized to participate in the financial transaction. | 04-14-2016 |
20160104146 | METHOD AND SYSTEM FOR DIRECT CARRIER BILLING - A method for processing a transaction, comprising: receiving, by an aggregator from a merchant, a transaction data signal electronically transmitted via a communication network; transmitting, by the aggregator to a mobile network operator (MNO), an authorization message; receiving, by the aggregator from the MNO, an approval transaction data signal; transmitting, by the aggregator to a payment network, a request message configured to indicate a virtual card number (VCN) request associated with the MNO's transaction account for the transaction amount; receiving, by the aggregator from the payment network, a VCN transaction data signal; and transmitting, to the payment network, a VCN message indicating the VCN initiation of a payment transaction. | 04-14-2016 |
20160104152 | METHODS AND SYSTEMS FOR SECURE ONLINE PAYMENT - A secure online payment system in which, upon initiation by a card holder of a payment operation to an online merchant, the card holder is directed to a wallet-hosting website which stores at least one digital wallet associated with the card holder. Each digital wallet is associated with at least one payment card associated with the card holder, and the website has access to database storing payment card data relating to the payment card. At the website, a card holder authentication process is performed. Upon successful authentication, payment card data is extracted from the database, and a successful authentication indicator message is generated and returned to the merchant. The successful authentication indicator message includes the payment card data, code indicating that the card holder has been successfully identified, and code indicative of the fact that the payment card is registered in the wallet. | 04-14-2016 |
20160104156 | SYSTEMS AND METHODS FOR CONVERTING ACCOUNT PORTFOLIOS FROM ONE PROCESSING NETWORK TO ANOTHER - Methods and systems for translating account data from a converted account portfolio during a transaction initiated by a cardholder using a payment card are provided. The method may be implemented using a translation service computing device. The method includes storing first account data in a memory along with a corresponding translation identifier, the first account data associated with a first payment processing network (PPN), and receiving, at the TS computing device, an authorization request message. The authorization request message includes transaction data associated with the transaction and second account data, including the translation identifier, associated with the payment card and a second PPN. The method includes translating the second account data to the first account data by performing a lookup using the translation identifier, generating a translated authorization request message including the transaction data and the first account data, and transmitting the translated authorization request message to an issuer bank. | 04-14-2016 |
20160104157 | METHOD FOR PRODUCING A TRANSACTION SIGNAL - A method for generating a transaction signal using a first device and a second device includes generating first information dependent on a user-selected amount, transmitting the first information to a verification device and generating therefrom a signal, generating based on the first information with the verification device first verification information, transmitting the signal from the verification device to the first device where the signal is converted into a two-dimensional representation for display on the first device, recording the two-dimensional representation on the display of the first device with a camera of a second device and generating a recording signal, transmitting with the second device the recording signal, or other information dependent on the recording signal, to the verification device for generating second verification information, and generating the transaction signal when a comparison between the first verification information and the second verification information produces a predetermined result. | 04-14-2016 |
20160104159 | OBTAINING RECIPIENT INFORMATION DURING AN ELECTRONIC REMITTANCE TRANSACTION - One or more embodiments described herein include methods and systems for remitting funds via a social networking system. More specifically, systems and methods described herein provide users the ability to remit funds to co-users utilizing social network profiles and notifications. Additionally, systems and methods described herein determine one or more risk levels for a remittance request based on a variety of social network factors. | 04-14-2016 |
20160104160 | SECURE ELEMENTS BROKER (SEB) FOR APPLICATION COMMUNICATION CHANNEL SELECTOR OPTIMIZATION - Systems and methods for managing concurrent secure elements on a mobile device to coordinate with an application or “app” running on the mobile device and an appropriate communications protocol for conducting transactions using the mobile device include: informing, by the processor, the reader device of a preferred app and a communication protocol usable by the preferred app; receiving, by the processor, information about which apps and communication protocols are supported by a reader for processing a transaction; locating, by the processor, a secure element supporting an app and a communication protocol supported by the reader; channeling the communication protocol for the specific configuration of the app and the supporting secure element; activating the secure element that supports the app; and processing, with the activated secure element, using the supported app and communication channel, the transaction with the reader. | 04-14-2016 |
20160104161 | Smart Credit Card with Enhanced Security Features - A smart credit card. The credit card includes a power source, a memory, a processor, a logic, a magnetically readable strip, an identity sensor comprising at least one fingerprint reader on the front and rear of the card, and a capacitive display screen. The user stores identity information on the memory. The credit card is activated via the identity sensor. The identity sensor receives user identification information and the credit card activates after the logic confirms an identity match with the stored identity information. Upon activation, the user may use the credit card to initiate a transaction. The same credit card then enables the user to approve or cancel the transaction. The user approves the transaction by inputting a PIN or signing his or her name on the capacitive display screen. The credit card completes the transaction after authenticating the PIN or the user's signature through a security check. | 04-14-2016 |
20160104162 | DYNAMIC CARD VALIDATION - A card validation system comprises an interface and one or more processors. The interface receives a request to validate a card and a set of cell identifiers of a card validation matrix from a user. The set of cell identifiers are determined by the user. The interface further receives one or more received cell values corresponding to the set of cell identifiers of the card validation matrix. The one or more processors determines a set of stored cell values corresponding to the set of cell identifiers of the card validation matrix and compares the set of received cell values to the set of stored cell values. Based at least in part upon the comparison, the one or more processors determine whether the card is validated. | 04-14-2016 |
20160104163 | ldentifying Potentially Risky Transactions - In certain embodiments, a computer-implemented method includes determining, by a processor, characteristics of a new transaction and processing, by the processor, the characteristics of the new transaction using a risk assessment model. The risk assessment model is generated using an iterative training process that processes, over time, historical transactions to train the risk assessment model based on characteristics of historical transactions and associated risk assessment analysis of the historical transactions. The method includes generating, by the processor, a risk assessment indicator for the new transaction based on processing the characteristics of the new transaction using the risk assessment model. The risk assessment indicator indicates a degree of risk of the new transaction. | 04-14-2016 |
20160104165 | BIOMETRIC CHAIN OF PROVENANCE - The present disclosure is directed towards methods and systems for ensuring integrity of biometric data for one or more transactions. A mobile biometric device may acquire biometric information of an individual. A ranging module of a transaction device may determine that a distance between the mobile biometric device and a physical location of a first transaction with the individual is within a predefined value. The transaction device may link, responsive to the determination, the acquired biometric information to the first transaction if the biometric information is acquired within a specific time limit from the distance determination. The transaction device may link the acquired biometric information to a universal biometric record of the individual. A biometric integrity engine may compare information from the first transaction and a second transaction for inconsistency or fraud. | 04-14-2016 |
20160110705 | PAYMENT METHOD AND SYSTEM - A method and system for purchasing items from a payment device is provided. The method and system includes utilizing near field communications technology to purchase items on a per-item basis. The method and system further includes utilizing barcode technology to purchase items on a per-item basis. The method and system additionally includes utilizing beacon technology to purchase items on a per-item basis. More specifically, the method includes approaching an item desired to be purchased and opening a payment application on the payment device; transmitting purchasing data to the payment device, the purchasing data comprising item details and payment information corresponding to the item desired to be purchased; processing through the payment application the purchasing data, the processing including contacting a payment gateway to authorize a financial transaction for purchasing the item; and indicating on the payment application a successful or failed financial transaction. | 04-21-2016 |
20160110706 | MOBILE PHONE SUBSCRIBER IDENTITY CARD BASED ON MULTICHANNEL DIGITAL AUTHENTICATION OF MOBILE PAYMENT - The invention discloses a mobile phone subscriber identity card on multichannel digital authentication of mobile payment, including a card body and an in-card circuit integrated in the card body. The in-card circuit includes an MCU security chip; one or more digital authentication certificates are stored in the MCU security chip, and a digital certificate authentication processing module for authentication of the digital authentication certificate is provided; the in-card circuit includes a data link for transmitting data of the digital authentication process; the digital certificate authentication processing module is connected to the mobile phone terminal through the data link, and to a third-party authentication institution through a network resource of the mobile phone terminal online, to conduct digital certificate authentication. The mobile payment is not confined by telecommunication operators and financial banks, but is operated by the subscriber, thereby achieving mobile payment securely, quickly and conveniently. | 04-21-2016 |
20160110710 | GLOBAL RECEIPT CARD SYSTEM AND METHOD - A system and method for collecting global purchase details using a consumer identifier are provided. During a business transaction, the details of the transaction are associated with the consumer identifier. The consumer identifier, located on an affinity card or a mobile device, allows for the collection of information on an external storage device from business transactions from a plurality of different, related and/or unrelated merchants. The consumer can subsequently access and download the information from the transaction onto a personal computer. Through a merchant identifier, the data/information may also be accessed and re-read by the merchant for future related transactions. Consequently, the transaction process may provide the consumer an affinity relationship with multiple, related or unrelated merchants through a single unique consumer identifier that eliminates the necessity of paper receipts with those merchants. | 04-21-2016 |
20160110718 | SYSTEMS AND METHODS FOR FACILITATING OFFLINE PAYMENTS - Systems and methods are provided for secure offline transactions using a mobile device. The mobile device may include an encrypted data store in which encrypted payment processing data is stored, a risk assessment engine configured to retrieve the encrypted payment processing data and determine, based on the encrypted payment processing data, whether an offline payment is authorized, and a transaction pool configured to store the offline payment after the offline payment has been provided to a recipient. The mobile device may provide the offline payment that has been performed to a payment provider server for completion and/or funding when the mobile device obtains a network connection to the payment provider server following the offline payment. | 04-21-2016 |
20160110719 | Authentication and Interaction Tracking System and Method - Aspects of the invention relate to a central authentication and interaction tracking system for authenticating an entity making a request related to a financial account. The system facilitates authentication of an entity engaging in an interaction with a financial institution, the authentication based on a record of interactions initiated by the entity. The system includes an application interface receiving interaction requests over a network, the interaction requests originating from multiple entities and including a plurality of authentication factors. The system further includes a computer processor and computer memory capable of building, from each interaction request, an entity print record for each of the multiple entities, wherein each entity print record includes indicators of the authentication factors from each initiated transaction request. The system further facilitates deriving, from the entity print record, an entity print and storing the entity print in at least one computer memory, comparing received authentication factors for a requested interaction with the entity print, and making an authentication determination based on the comparison. | 04-21-2016 |
20160117648 | SECURE ELEMENT AUTHENTICATION FOR REMOTE DEPOSIT OF CHECK IMAGES RECEIVED FROM PAYORS - A check image generator application generates a remote deposit capture RDC compatible check image. The RDC compatible check image is sent from a sender mobile device to a recipient mobile device. The RDC compatible check image may pass through a server and may be encrypted. The recipient mobile device receives the RDC compatible check image and forwards it to a financial institution for deposit. | 04-28-2016 |
20160117650 | PAYMENT SYSTEM - The payment system disclosed herein provides for receiving a request from a first user for funds from an account related to an organization, determining an organizational level of the user in the organization, determining the fund access privilege of the first user based on the organizational level of the user; and associating a set of fund use privileges for the first user, the set of fund use privileges including an amount of funds available to the user, a type of transactions allowed using the funds and a time period for use of the funds. | 04-28-2016 |
20160117675 | SYSTEMS AND METHODS TO SET UP AN OPERATION AT A COMPUTER SYSTEM CONNECTED WITH A PLURALITY OF COMPUTER SYSTEMS VIA A COMPUTER NETWORK USING A ROUND TRIP COMMUNICATION OF AN IDENTIFIER OF THE OPERATION - Systems and methods to activate the processing of an allocated resource in operations with a processing system by the use of a round trip communication of the identifier of the resource, in which the resource identifier is communicated from a portal of the processing system to a first website, which passes the resource identifier to a second website during forwarding or redirecting a web browser from the first website to the second website, where the second website provides the resource identifier back to the processing system in communications with the processing system for operations required for the activation of the resource. Upon activation, the resource is processed during a communication session between the first website and the portal (or the processing system). | 04-28-2016 |
20160117678 | PAYMENT SYSTEM - The payment system disclosed herein provides for receiving a request from a first user for funds from an account related to an organization, determining an organizational level of the user in the organization, determining the fund access privilege of the first user based on the organizational level of the user; and associating a set of fund use privileges for the first user, the set of fund use privileges including an amount of funds available to the user, a type of transactions allowed using the funds and a time period for use of the funds. | 04-28-2016 |
20160117680 | PAYMENT PROCESSING - Payment processing as disclosed includes maintaining registration data and masked payment data so that it is accessible to a computing device. The registration data represents a registration of the computing device with a remote payment processing system. The masked payment data indirectly, but not directly, identifies payment data associated with a user. An application programming interface for receiving a payment request from a merchant application is exposed. In response to receiving the payment request for an amount via the interface, the user is prompted for authorization data. Only upon verification of the authorization data, the registration data, the masked payment data, and the amount are communicated to the payment processing system. | 04-28-2016 |
20160117681 | ELECTRONIC TRADING METHOD AND SYSTEM, AND PAYMENT PLATFORM SYSTEM - Disclosed are an electronic trading method and system, and a payment platform system. The electronic trading system comprises a merchant trading system used by a merchant, a trading gateway, a bank system, a payment gateway and a payment platform system. The merchant trading system comprises a terminal used by a user and a merchant trading server. The payment platform system communicates with the merchant trading system via the trading gateway and communicates with the bank system via the payment gateway. The payment platform system is configured to receive an agreement deduction request sent from the merchant trading system, to verify the agreement deduction request, and to communicate with the bank system so as to perform a deduction according to the agreement deduction request and a predetermined payment deduction agreement after the agreement deduction request passes verification. | 04-28-2016 |
20160117682 | SECURE SEAMLESS PAYMENTS - Methods and systems for facilitating payment are described. A user creates a user profile with a service provider, and the user profile is stored locally on a user device. When the user wants to make a payment from the user device, software running in the background of the device determines that a user profile is stored on the user device. If a user profile is detected, the software automatically presents the user with an option to make a payment with one or more funding sources. User credentials in the user profile are used to authenticate the user and authorize payment. | 04-28-2016 |
20160117683 | APPARATUS AND METHOD FOR PAYMENT USING A SECURE MODULE - An apparatus and method of registering and using financial information are provided. The method includes acquiring user information related to a user of the electronic device; authenticating the user based on the acquired user information; transmitting, to a second external device, a request to allow a first external device to receive an access right for accessing a security module included in the electronic device, based on the authentication of the user; and receiving financial information for the user from the first external device, based on the access right being granted from the second external device to the first external device. | 04-28-2016 |
20160125368 | MONEY TRANSFER IN A FORUM USING A PAYMENT PROXY - Described is a technology for executing financial transactions, e.g., payment transfers, by enabling a sender to trigger a money transfer by specifying, in any communication message, a payment proxy having a particular syntax, the syntax including a currency indicator preceding one or more alphanumeric characters. The payment proxy having the syntax indicates an intent of the sender to transfer money to a recipient associated with that payment proxy. The technology can include systems and methods of transferring money by use of a payment proxy within the context of a forum (e.g., social networking platform, microblog, blog, application, etc.). Messages of users in the forum can be monitored to detect for any user's intent to transfer money to a recipient. For example, forum messages can be parsed to identify the syntax carried by a user input in a forum message. | 05-05-2016 |
20160125369 | MONEY TRANSFER BY USE OF A PAYMENT PROXY - Described is a technology for facilitating money transfer between a sender and a recipient by use of a payment proxy associated with the recipient. The technology enables a sender, who desires to send cash to a recipient, using an application (e.g., a payment service application, a messaging application, etc.), to specify the recipient by inputting, in a message being created using the application, one or more alphanumeric characters and a monetary currency indicator prefixing the alphanumeric characters (e.g., $alex). The monetary currency indicator operates as a tagging mechanism that indicates to a computer system, receiving the message, to treat the input(s) as a request from the sender to transfer cash, wherein detection of a specified syntax, which includes the alphanumeric character tagged by a monetary currency indicator, triggers a transfer of cash. | 05-05-2016 |
20160125371 | MONEY TRANSFER USING CANONICAL URL - Described is a technology for executing financial transactions, e.g., payment transfers, by enabling a sender to trigger a money transfer by specifying a payment proxy having a particular syntax, the syntax including a monetary indicator preceding one or more alphanumeric characters. The payment proxy having the syntax indicates an intent of the sender to transfer money to a recipient associated with that payment proxy. The payment proxy can be used to transfer money within the context of a landing page. For example, a landing page in the form of a webpage can be generated to enable a recipient (e.g., “Alex”) to receive money. The webpage can have a canonical URL that includes a payment proxy of the recipient (e.g., www. . . . com/$alex). The canonical URL can direct any sender (e.g., “Bob”), who wishes to send money to the recipient, to the webpage to initiate a money transfer to the recipient. | 05-05-2016 |
20160125382 | DATA PROCESSING METHOD, APPARATUS AND SYSTEM - A method, system, and apparatus for facilitating a payment transaction is disclosed. A server receives an event-setup request from an event organizer to set up an event-based payment session to obtain payments for one or more attendees of a subsequent event. In response to receiving the event set-up request: the server sets up the event-based payment session in accordance with the event-setup request; and provides a payment invitation corresponding to the payment session to each of one or more invitees of the subsequent event in accordance with the event-setup request. The server then receives from at least a first invitee of the one or more invitees, a conditional acceptance to the payment invitation, the acceptance being conditioned on one or more predefined criteria. | 05-05-2016 |
20160125384 | SYSTEMS AND METHODS TO COORDINATE PROCESSING OF SEPARATE COMPUTING SYSTEMS CONNECTED VIA A COMMUNICATION NETWORK AND HAVING LOCALE DEPENDENT ATTRIBUTES - A computing apparatus including: a processing system to process a predetermined type of operations using a predetermined communication protocol on a first network connecting a terminal in a first geographical region and a resource controller in a second geographical region; a communication portal to communicate using a second network; and a data store coupled with the processing system. The communication portal communicates via the second network with the mobile device to establish, in the data store, a resource correlation record associating a first resource controlled by the resource controller in the second geographical region with a second resource. The resource correlation record includes locale dependent parameters. In response to a communication initiated in the terminal for an operation of the predetermined type using the first resource, the processing system applies the second resource to the operation in accordance with the resource correlation record using at least the locale dependent parameters. | 05-05-2016 |
20160125385 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, PROGRAM, AND INFORMATION PROCESSING SYSTEM - There is provided an information processing apparatus including: a specification unit, in a case where information related to a purchase has been acquired from a purchase processing apparatus, which specifies indirect identification information associated with communication identification information corresponding to communication with the purchase processing apparatus by using association information in which the communication identification information identifying communication and the indirect identification information indirectly showing a user are associated; and a processing unit which causes first information including the specified indirect identification information to be transmitted to a service provision apparatus providing a service in a virtual space. In a case where second information corresponding to a process for the transmitted first information has been acquired from the service provision apparatus, the processing unit causes the second information to be transmitted to the purchase processing apparatus. | 05-05-2016 |
20160125387 | BACKGROUND OCR DURING CARD DATA ENTRY - Financial transaction card data can be entered by providing a picture of the card to a server programmed with a text recognition algorithm. The server can perform text recognition on the image at the same time that a consumer enters additional required data, such as a zip code. The server can perform as much text recognition processing as possible in the time the consumer is entering the additional data. Once the additional data is received, a signal can be provided to the server indicating that the user is now waiting for results of the text recognition process, meaning the server should provide them as quickly as possible. Once text recognition results are received, a consumer can make a selection to identify a character which the text recognition algorithm did not sufficiently identify. Based on known account number constraints, the user selection can cause multiple characters to be identified. | 05-05-2016 |
20160125393 | VIRTUAL CARD - A method includes providing a virtual card in a memory of a mobile device, wherein the virtual card comprises user information, establishing a data connection between the mobile device and a terminal device, authenticating a user of the virtual card, and transferring a result of the authentication to the terminal device in order to activate commands of the terminal device. | 05-05-2016 |
20160125400 | SYSTEMS AND METHODS FOR GEO COMPONENT FRAUD DETECTION FOR CARD-PRESENT TRANSACTIONS - A method and system for evaluating a card-present payment card transaction for fraud using a computer device coupled to a database are provided. The method includes determining a home activity region for a cardholder using payment card transaction data for the cardholder, receiving a payment card transaction authorization request, and determining a payment card activity location of the received payment card transaction authorization request. The method also includes comparing the determined payment card activity location to the determined home activity region, determining if the determined payment card activity location is within the determined home activity region using a at least one of a selectable threshold and a determined threshold, and outputting a score for the received payment card transaction authorization request based on the determination of whether the payment card activity location is within the determined home activity region. | 05-05-2016 |
20160125405 | System and Method for Updating Account Information - Embodiments transmit user account updates to a transacting party within an authorization response message without receiving or requesting an inquiry from the transacting party. Both the old account information and the new account information may be included in the authorization response message sent to the transacting party. Accordingly, the updated account information is provided to the transacting party as a part of the transaction processing. The user account update may include a new account identifier assigned to the account, changes to the user information (e.g. name, address, etc.), changes to the information (e.g. expiration date, security code, etc.) associated with the account. | 05-05-2016 |
20160125409 | System and Method for Authorizing Direct Debit Transactions - A system and method for authorizing a direct debit transaction is provided. A remotely accessible server receives a request from a clearing entity to conduct a direct debit transaction against a financial account of a consumer on behalf of a merchant, and checks whether the consumer has previously approved a debit against the account on behalf of the merchant. If the consumer has previously approved a debit on behalf of the merchant, an authorization message is generated and transmitted to the clearing entity. If the consumer has not previously approved a debit on behalf of the merchant, an electronic prompt is generated to an electronic device of the consumer requesting the consumer to approve or deny the debit. In response to the consumer indicating approval, a debit authorization message is generated and transmitted to the clearing entity, and a database is updated to indicate approval by the consumer. | 05-05-2016 |
20160125412 | METHOD AND SYSTEM FOR PREVENTING IDENTITY THEFT AND INCREASING SECURITY ON ALL SYSTEMS - The present invention provides a method and system for preventing identity theft and increasing security on systems. Some embodiments include receiving, into a computer system, a request to perform an electronic transaction for an identified human user at a remote location; accessing, by the system, a set of authentication criteria of the identified user; retrieving, into the system, a plurality of real-time authentication parameters relevant to the user and to the transaction; and comparing, by the system, the plurality authentication criteria to the accessed set of authentication parameters of the user and either authorizing an action to complete the electronic transaction or not. Some embodiments include displaying, on a first personal electronic device of the user, an indication of the real-time alert of the request to perform the electronic transaction; and eliciting and receiving a real-time authorization indication from the user using the first personal electronic device of the user. | 05-05-2016 |
20160125413 | Image Recognition-Based Payment Requests - The present disclosure involves systems, software, and computer implemented methods for sending payment requests to one or more persons or entities based on images in which the persons or entities appear. In one example, the process may include identifying an image associated with a payment request, the identified image containing at least one recipient associated with the payment request, and wherein the payment request includes a value, analyzing the identified image to identify the at least one potential recipient of the payment request, identifying contact information associated with the at least one identified recipient of the payment request, and sending the payment request to the at least one identified recipient of the payment request via a destination associated with the identified contact information. | 05-05-2016 |
20160125415 | BIOMETRIC AUTHENTICATION OF MOBILE FINANCIAL TRANSACTIONS BY TRUSTED SERVICE MANAGERS - In one embodiment, a method comprises storing a biometric trait of a user in a data communication device of the user, comparing a biometric trait input into the device with the biometric trait stored in the device, generating a certificate authenticating the user within the device if the biometric trait input into the device matches the biometric trait stored in the device, and facilitating a financial transaction of the user using the certificate. | 05-05-2016 |
20160132741 | Negotiable Instrument with Dual-Sided Variable Printing - An article for use as a negotiable instrument includes a substrate having a front side and reverse side; first machine-printed information on the substrate's front side including an account number associated with the negotiable instrument, and a unique identifier associated with the negotiable instrument, the first machine-printed information uniquely identifying the negotiable instrument; and second machine-printed information on the substrate's reverse side that corresponds to the first machine-printed information such that comparison of respective images of the substrate's front and reverse sides indicates that the images correspond to the same negotiable instrument. | 05-12-2016 |
20160132862 | ENHANCED NEAR FIELD COMMUNICATIONS ATTACHMENT - A secure fob that enables a user to pay for an item or items without needing to present a mobile device. A secure fob may include a proximity capability to ensure that a mobile device is within a particular range, thereby eliminating the risk of fraudulent charges on a stolen fob. In such an embodiment, a fob may be disabled if the fob is not paired with the mobile device by virtue of being disconnected and/or physically separated from the mobile device. The secure fob also may include enhanced features to authorize transactions and locate the mobile device and/or the secure fob. | 05-12-2016 |
20160132875 | ENHANCEMENT OF MOBILE DEVICE INITIATED TRANSACTIONS - An account management system receives a payment authorization request from a merchant system for a transaction involving a user. The account management system identifies one or more user accounts associated with the transaction and processes the transaction after sending a payment authorization request to the issuer(s) of the user's financial account(s) and receiving an approval. After receiving a payment request, or shortly thereafter, the user device logs additional transaction data to transmit to the account management system, which uses the data to find a single transaction that correlates with financial transaction data. The account management system creates an enhanced receipt to transmit to the user device by augmenting the financial transaction data and may adjust the merchant information based on location data received from the user device or the payment amount based on an identified merchant type. The account management system updates the enhanced receipt if new information is received. | 05-12-2016 |
20160132876 | AUTOMATIC CLOSED LOOP PAYMENT REDEMPTION - Redeeming closed loop payment instruments in wallet account transactions comprises a payment system server configured to associate financial accounts with a payment account of a user, comprising at least one closed loop account. The server receives, from a card network, a first payment authorization request originating from a merchant, comprising the payment account identifier and a request to fund a transaction. The server communicates, to a closed loop account issuer computing system, a redemption request to redeem funds from the closed loop account. The server receives a redemption of funds from the closed loop account. The server deducts the redeemed funds redeemed from a total amount of funds requested in the first payment authorization request. Upon receiving the funds, the server communicates to the merchant computing system a second authorization for the total amount of funds requested in the first authorization request based on the redemption of funds. | 05-12-2016 |
20160132879 | SYSTEM AND METHOD FOR ENFORCING DIFFERENTIAL PRICING - Systems and methods are provided for enforcing differential pricing and other pricing structures using a payment network. One embodiment of the payment network includes a server, a processor, and a memory module that includes stored computer program code. The memory module, the stored computer program code, and the processor are configured to cause the server to parse a request message associated with a payment transaction to obtain an item identifier and payment mechanism information. The item identifier is associated with an item to be purchased as part of the payment transaction. The payment mechanism information is associated with a payment mechanism. The memory module, the stored computer program code, and the processor are further configured to cause the server to obtain a determination of whether, based on the payment mechanism information, the payment mechanism complies with a set of pricing control rules associated with the item. Additionally, the memory module, the stored computer program code, and the processor are further configured to cause the server to transmit a response message approving the payment transaction request, upon a determination that the payment mechanism complies with the set of pricing control rules, and to transmit a response message declining the payment transaction request, upon a determination that the payment mechanism does not comply with the set of differential rules. | 05-12-2016 |
20160132880 | Authorizing Transactions Using Mobile Device Based Rules - Rules relating to the authorization of contactless payment transactions may be stored on a mobile device. After provision of contactless payment credentials to a merchant, the mobile device receives a query relating to the authorization of the transaction. The transaction details contained in the query are compared to the rules stored on the mobile device. Depending on the relevant rule applicable, the transaction may either be approved or rejected automatically, or may require user authorization. Depending on input received from the user in response to a prompt therefore, the transaction will be authorized or rejected. | 05-12-2016 |
20160132881 | APPARATUS AND METHOD FOR PAYMENT - An electronic device and a method for transmitting authentication information in a mobile payment environment are provided. The electronic device includes a first communication module and a second communication module, the method can include obtaining at least one of first authentication information and second authentication information stored in the electronic device, when the obtained authentication information comprises the first authentication information, transmitting the first authentication information to a first external receiving device of the electronic device through the first communication module, and when the obtained authentication information comprises the second authentication information, transmitting the second authentication information to a second external receiving device through the second communication module. | 05-12-2016 |
20160132882 | SYSTEM AND METHOD FOR INVESTIGATING FRAUDULENT ACTIVITY - An apparatus comprises a memory and a processor. The memory is operable to store information associated with a user account. The processor can receive a message indicating that a transaction associated with a card has occurred and receive a first input indicating that the transaction is fraudulent. The processor can receive a second input indicating that a report should be filed and present, on a display, a plurality of questions to determine whether the card has been stolen. The processor can receive a third input indicating an answer to each of the plurality of questions and present, on the display, an affidavit. The processor can receive a fourth input indicating the affidavit has been electronically signed and present, on the display, a confirmation message indicating that the report has been filed. | 05-12-2016 |
20160132883 | System and Method for Verification, Authentication, and Notification of Transactions - A system and method are provided for verifying, authenticating, and providing notification of a transaction such as a commercial or financial transaction, with and/or to at least one party identified as engaging in the transaction and/or identified as having a potential interest in the transaction or type of transaction. | 05-12-2016 |
20160132886 | FRAUD DETECTION SYSTEMS AND METHODS - Systems and methods disclosed herein related to a fraud detection system that receives data from multiple sources and normalizes the data to create transaction data using overlapping data from the multiple sources. Fraud analysis is performed using a probabilistic approach to alert generation, wherein alerts are only sent to customers when the probability of fraud exceeds a threshold. As a result, false positives are avoided. | 05-12-2016 |
20160132888 | SYSTEM AND METHOD FOR INVESTIGATING FRAUDULENT ACTIVITY - An apparatus comprises a memory and a processor. The memory is operable to store information associated with a user account. The processor can receive a message indicating that a transaction associated with a card has occurred and receive a first input indicating that the transaction is fraudulent. The processor can receive a second input indicating that a report should be filed and present, on a display, a plurality of questions to determine whether the card has been stolen. The processor can receive a third input indicating an answer to each of the plurality of questions and present, on the display, an affidavit. The processor can receive a fourth input indicating the affidavit has been electronically signed and present, on the display, a confirmation message indicating that the report has been filed. | 05-12-2016 |
20160132889 | SYSTEM AND METHOD FOR PAYER CONTROLLED PAYMENT PROCESSING SYSTEM - Methods, systems, and computer programs for processing payment request for a payment instrument. The method includes setting issuer attributes for the payment instrument and setting payer attribute for the payment instrument. A request for payment approval is received. The request is verified against payer set attributes. The request is also verified against issuer set attributes. An approval message is generated when payment request matches both payer set attributes and issuer set attributes. | 05-12-2016 |
20160132890 | POINT OF TRANSACTION DEVICE WITH MULTI-FACTOR AUTHENTICATION - Systems, devices, and methods for multi-factor authentication for transaction processing are provided. A point-of-transaction device captures customer information, biometric data, and images of identification documents and transmits the information to a transaction information server which receives the transaction request, queries one or more storage records to confirm the identity of the customer to the transaction and to determine whether the customer is authorized to engage in the transaction. The point-of-transaction device communicates a transaction identifier code and at least a portion of the transaction request to a transaction authority. The transaction authority transmits a confirmation signal to the point-of-transaction device based on the transaction identifier code and the transaction request. | 05-12-2016 |
20160132891 | SYSTEM AND METHOD FOR FACILITATING SECURE SELF PAYMENT TRANSACTIONS OF RETAIL GOODS - Disclosed herein are various embodiments for systems and methods for self payment and verification of the purchase of retail goods and services. According to an embodiment of the invention, a method for verifying the purchase using a mobile electronic device in wireless communication with a payment verification system and a code generating system is provided, the method comprising the steps of: receiving from a consumer information identifying an item for purchase; receiving from a consumer information identifying payment means for purchasing the item for purchase; processing the information identifying the item for purchase and information identifying payment means and generating a unique QR code indicating a purchase of the item; sending the unique QR code to a mobile device for display by a consumer to the vendor of the item for purchase. | 05-12-2016 |
20160140520 | REAL TIME FUNDING SOLUTION FOR MISCELLANEOUS INCOME - Systems and processes for real-time instant funding solutions for miscellaneous income are disclosed. The method of funding miscellaneous income includes securely transmitting a funding information file or a real time funding transaction request with miscellaneous funding information to a funding card processing system using real-time web services APIs which are externally accessible by an external computing system, e.g., point of sale, time and labor or payroll system. The method further includes processing the funding information file with the funding card processing system, which includes at least identifying client information and a user receiving miscellaneous income contained within the miscellaneous funding information. The method further includes funding a payroll card of the identified user with the miscellaneous income received with the miscellaneous funding information of the funding information file. | 05-19-2016 |
20160140537 | SYSTEMS AND METHODS FOR ADAPTIVE ROUTING FOR MULTIPLE SECURE ELEMENTS - A method for wireless communication is described. The method includes using a routing table for multiple secure elements. The routing table assigns a preferred secure element for a transaction type. The method also includes selecting a first secure element for a transaction based on the routing table. The method further includes updating the routing table based on a received command to use a second secure element to complete the transaction. | 05-19-2016 |
20160140551 | MOBILE DEVICE INCREMENTAL BEHAVIORAL PROFILE UPDATES - A system, method and a device for offline authentication of transactions using mobile device, based on, analytic engine such as behavioral pattern detection provided. The behavioral pattern can be for a specific person, for group of people with similar characteristics, or a combination of the two. The invention has the advantage over the prior art centralized authentication and fraud detection systems in that it is more precise in identifying and preventing fraud in real time. The precision is better for both customer and merchant frauds. The present invention also requires fewer investments in infrastructure and uses less communication traffic when compared to the prior art. | 05-19-2016 |
20160140553 | AUTHENTICATION AND TRANSACTIONS IN A THREE-DIMENSIONAL IMAGE ENHANCING DISPLAY DEVICE - A computerized method for facilitating a purchase transaction for a user in a first reality environment. The method includes receiving at least one level of authentication data of the user from a three-dimensional image enhancing device. The at least one level of authentication data is transmitted to a central computing device for comparing the at least one level of authentication data to a set of known authentication data of the user stored in a memory. In response to receiving a confirmation from the central computing device, an object is provided to the user for purchase in the first reality environment via the three-dimensional image enhancing device. An interaction of the user to interact with the object in the first reality environment is identified. The method completes the purchase transaction if it is determined that the interaction is to complete the purchase transaction of the object. | 05-19-2016 |
20160140554 | METHOD AND SYSTEM FOR CONDUCTING RESOURCE TRANSFER USING A SOCIAL NETWORKING APPLICATION - A computer server receives a structured message from a first user terminal, the structured message including an event title, one or more recipient user accounts and respective resources requested from the recipient user accounts, and a requesting user account. For each recipient user account, the computer server sends a structured request to a respective user terminal associated with the recipient user account and receives a structured response from the respective user terminal, the structured response including the event title, the requesting user account, and an authorization of transferring a predefined amount of resource to the requesting user account. The computer server then performs a resource transfer operation between the recipient user account and the requesting user account in accordance with the predefined amount and sends structured messages to the respective user terminals, the structured messages indicating a completion of the resource transfer. | 05-19-2016 |
20160140556 | METHOD AND SYSTEM FOR DETERMINING AFFILIATION OF FOREIGN PAYMENT CARD HOLDERS WITH DOMESTIC EDUCATIONAL INSTITUTIONS - A method and a system are provided determining affiliation of foreign payment card holders (e.g., students) with domestic educational institutions (e.g., universities and colleges). In particular, the present disclosure provides a method and a system for assessing the relative degree of proximity of the residential geolocation of the foreign payment card holders and the geolocation of the domestic educational institutions to facilitate determining whether the foreign payment card holders are affiliated with the domestic educational institutions, and also for assessing purchasing and payment behavior of the foreign payment card holders at domestic merchants. Predictive behavioral profiles are generated based on the purchasing and payment activities and shopping patterns of the foreign payment card holders by date at the domestic merchants, and the relative degree of proximity of the residential geolocation of the foreign payment card holders with the geolocation of the domestic educational institutions. | 05-19-2016 |
20160140558 | PROVIDING ONLINE CARDHOLDER AUTHENTICATION SERVICES ON-BEHALF-OF ISSUERS - Methods and systems for providing cardholder authentication services on-behalf-of (OBO) issuers utilizing a payment card authorization network to bridge cardholder authentication and transaction authorization processes. In some embodiments, the process includes an OBO issuer service computer receiving an authentication message, storing the authentication message in a transaction database and then receiving a purchase transaction authorization request message from a payment network. The OBO issuer service computer then determines that an authentication value of the received purchase transaction authorization request message matches the authentication value of the stored authentication message, stores a record of the match, and transmits the purchase transaction authorization request to the payment network for purchase authorization processing. | 05-19-2016 |
20160140559 | PROCESSING SYSTEM - The present invention provides processing system that comprises an issuer function and a merchant function as part of a card processor. The issuer function is arranged to receive a first authorisation request from a first card scheme administrator associated with a first transaction card, the first authorisation request relating to a card transaction made by a cardholder using the first transaction card at a card acceptor and including a number of data elements. A mapping function is provided in the card processor that is arranged to convert the first authorisation request into a second authorisation request, the second authorisation request relating to a transaction associated with an account held with an institution, wherein the mapping function is arranged to use contents of at least some of the data elements of the first authorisation request to form the second authorisation request. The merchant function is arranged to send the second authorisation request to the issuer of the institution of the account, and to receive a first authorisation response from the institution, the first authorisation response including a number of data elements. The mapping function is then arranged to convert the first authorisation response into a second authorisation response, the second authorisation response relating to the card transaction made by a cardholder, wherein the mapping function is arranged to use contents of at least some of the data elements of the first authorisation response to form the second authorisation response. The issuer function is arranged to send second authorisation response to the card acceptor via the first card scheme administrator. | 05-19-2016 |
20160140564 | MOBILE DEVICE FRAUD DETECTION USING LOCALLY STORED BEHAVIORAL INFORMATION OF OTHERS - A system; method and a device for offline authentication of transactions using mobile device, based on, analytic engine such as behavioral pattern detection are provided. The behavioral pattern can be for a specific person, for group of people with similar characteristics, or a combination of the two. The invention has the advantage over the prior art controlized authenication and fraud detection systems in that it is more precise in identifying and preventing fraud in real time. The precision is better for both customer and merchant frauds. The present invention also requires fewer investments in infrastructure and uses less communication traffic when compared in the prior art. | 05-19-2016 |
20160140567 | MODEL-BASED PREDICTION OF AN OPTIMAL CONVENIENCE METRIC FOR AUTHORIZING TRANSACTIONS - The present disclosure describes systems and methods for authorization. The method may include accessing, by an authorization engine for a transaction by a user, an activity pattern model of the user from a database. The activity pattern model of the user may be indicative of a geospatial behavior of the user over time. The authorization engine may determine a set of sensors available for facilitating the transaction, each of the sensors assigned with a usability value prior to the transaction. The authorization engine may access an activity pattern model of the sensors, the activity pattern model of the sensors indicative of geospatial characteristics of one or more of the sensors over time. The authorization engine may determine a convenience metric for each of a plurality of subsets of the sensors, using the activity pattern model of the user, the activity pattern model of the sensors, and usability values of corresponding sensors. Each of the plurality of subsets may include corresponding sensors that can be used in combination to facilitate the transaction. The authorization engine may select, using the determined convenience metrics, a subset from the plurality of subsets to use for the transaction. | 05-19-2016 |
20160142889 | METHODS AND SYSTEMS RELATING TO VISUAL COMMUNICATIONS - The evolution in telecommunications whilst providing email, MMS, SMS, texting etc. still means that telephony is the only telecommunications format providing immediacy in respect of a recipient responding to a message from a sender. Within these other formats the recipient may view the message and elect when to respond thereby allowing them time to compose, consider, etc. rather than garnering their immediate reaction. Accordingly, it would be beneficial to add a level of immediacy to these other forms of telecommunications messaging. | 05-19-2016 |
20160142916 | Data Stitching For Networked Automation - A telecommunication carrier may stitch data from multiple sources to support device automation and access control. A state may be assigned to a user of a user device at a telecommunication carrier based on a data stitch of information from multiple data sources. The data sources may include data on a geolocation of the user device. The state may be provided to a rules engine at a remote location via a carrier network of the telecommunication carrier. An indication from the rules engine that the user device is granted or denied access to one or more entities at the location based on the state may be received via the carrier network at the telecommunication carrier. In turn, the telecommunication carrier may provide the indication of the granted or denied access to the user device of the user. | 05-19-2016 |
20160148174 | Electronic Fund Transfer Reconciliation and Management Method and Device - The present invention relates to a method of reconciliation and management of electronic fund transfer and card reader device ( | 05-26-2016 |
20160148175 | SYSTEMS AND METHODS OF USING MULTIPLE COMMUNICATION CHANNELS TO TRANSMIT DATA IN NETWORKS OF SEPARATE COMPUTING SYSTEMS IN PREPARATION FOR THE PROCESSING OF A SUBSEQUENT COMPUTING TASK IN ONE OF THE NETWORKS - A computing apparatus having: a processing system connected in a first network of computers having a predetermined communication protocol for communication among at least the processing systems, terminals, and resource controllers in the first network; a portal connected to a second network and providing an application programming interface for communication with the terminals independent from the predetermined communication protocol; and a data store coupled with the processing system and the portal. The portal receives, via the application programming interface, context data via the second network; and the processing system receives, transaction data transmitted in the first network according to the predetermined communication protocol. Via the data store, the computing apparatus correlates the context data with the transaction data to process an add-on task, in addition to the tasks associated with the transaction data in the first network. | 05-26-2016 |
20160148194 | Radio Frequency Powered Smart, Debit and Credit Card System Employing a Light Sensor to Enable Authorized Transactions - This invention provides an embedded light sensor in the card that controls whether the card can transmit card data when energized by an RF energy source. Certain smart, debit or credit cards energize internal component within the card when entering into certain RF energy fields. The use of a light sensor detects whether a predetermined light level exists. If the predetermined light level is reached, the card's logic assumes that the transaction is authorized and allows for transmission of the card's data to a card reader. If the predetermined light level is not reached, the card's logic assumes that the card is still in a purse or wallet and that the RF energy field is not related to card transactions or the RF energy field belongs to fraudulent parties who seek to capture the card's data in an unauthorized manner. As a fail-safe, the card's logic may send a signal to the card holder when transactions are attempted in low light conditions that require the card holder to touch a button on the card or input a code for the transaction to proceed. | 05-26-2016 |
20160148195 | METHOD AND SYSTEM FOR HYBRID TRANSPORTATION-ENABLED PAYMENT CARD - A method for processing a payment transaction using a hybrid payment card includes: storing an account profile, the profile including data related to a hybrid payment card including a prepaid balance and a credit allowance; receiving a validation request, the request including a transaction amount; processing the received validation request, the processing including: generating a positive validation response and a validation transaction that indicates payment is made using the prepaid balance if the prepaid balance is greater than the transaction amount, generating a positive validation response and a validation transaction that indicates payment is made using the credit allowance if the prepaid balance is less than the transaction amount and if the credit allowance is greater than the transaction amount, and generating a negative validation response if the prepaid balance and credit allowance are less than the transaction amount; and transmitting the generated validation response. | 05-26-2016 |
20160148201 | INTELLIGENT AUTHENTICATION PROCESS - A method is provided for authentication that includes receiving consumer information associated with a consumer transmitted over a first data network, determining available account authentication options based on the received consumer information and a database of potential authentication options stored in a memory, selecting a set of available authentication options from the available authentication options based on a database of the potential authentication option attributes stored in the memory, transmitting the selected set of available authentication options to the consumer over the first data network, receiving a selected authentication option transmitted over the first data network, transmitting the consumer information to an authentication provider associated with the selected authentication option over a second data network, and receiving an authentication confirmation transmitted over the second data network. | 05-26-2016 |
20160148202 | Methods and Systems for Processing Transactions, Based on Transaction Credentials - Various embodiments provide a transaction method comprising determining, by a server, if a transaction device is registered to a service, the transaction device being one of a plurality of transaction devices selectable to initiate a transaction, the plurality of transaction devices being associated with at least one transaction credential; determining, by the server, if the transaction device is selected to initiate the transaction based on the determination if the transaction device is registered to the service; and processing, by the server, the transaction using the associated at least one transaction credential if the transaction device is determined to be selected to initiate the transaction. | 05-26-2016 |
20160148205 | METHODS AND SYSTEMS FOR VERIFYING TRANSACTIONS - An aspect of the present invention provides a computer-implemented method for verifying authorisation of a transaction. The method comprises the steps of: receiving a request to process an electronic transaction for a predetermined amount of money ( | 05-26-2016 |
20160148206 | METHOD OF PROCESSING A TRANSACTION REQUEST - A transaction processing system ( | 05-26-2016 |
20160148212 | SYSTEMS COMMUNICATIONS WITH NON-SENSITIVE IDENTIFIERS - A method is disclosed for enabling transaction reversal processes without utilizing sensitive information. Instead of being identified by sensitive information, the transaction associated with a reversal can be identified by a transaction identifier that is generated by a resource provider. | 05-26-2016 |
20160148213 | METHOD FOR DETECTING A RISK OF REPLACEMENT OF A TERMINAL, CORRESPONDING DEVICE, PROGRAM AND RECORDING MEDIUM - A method is provided for detecting a risk of replacement of an authentic electronic payment terminal by a fraudulent electronic payment terminal. The method includes generating an alert when the value of at least one operating characteristic associated with the authentic electronic payment terminal is below at least one predetermined threshold. | 05-26-2016 |
20160148214 | Identity Protection - Some embodiments provide holistic and comprehensive identity protection solutions. The solutions protect user identity by screening the information trail that a user leaves behind online in order to suppress or neutralize information crumbs that can subsequently be used to harm the user. The solutions audit user privacy settings, established online friends and contacts, and friend and contact activity online to limit the exposure and disclosure of user information online. The solutions perform white-hat penetration tests. The solutions report on user risk based on available online information. The solutions validate completed transactions based on monitored user movements and site visits. The solutions provide a crowd-sourced approach to identify risk based on common transactions and visits of others. The solutions prevent identity theft by verifying that disbursements are made to the correct entity. | 05-26-2016 |
20160148332 | Identity Protection - Some embodiments provide holistic and comprehensive identity protection solutions. The solutions protect user identity by screening the information trail that a user leaves behind online in order to suppress or neutralize information crumbs that can subsequently be used to harm the user. The solutions audit user privacy settings, established online friends and contacts, and friend and contact activity online to limit the exposure and disclosure of user information online. The solutions perform white-hat penetration tests. The solutions report on user risk based on available online information. The solutions validate completed transactions based on monitored user movements and site visits. The solutions provide a crowd-sourced approach to identify risk based on common transactions and visits of others. The solutions prevent identity theft by verifying that disbursements are made to the correct entity. | 05-26-2016 |
20160154952 | METHOD AND APPARATUS FOR OFF-BODY DETECTION FOR WEARABLE DEVICE | 06-02-2016 |
20160155115 | WEARABLE DEVICE AS A PAYMENT VEHICLE | 06-02-2016 |
20160155116 | WEARABLE DEVICE AS A PAYMENT VEHICLE | 06-02-2016 |
20160155121 | METHOD AND APPARATUS FOR SECURE ACCESS PAYMENT AND IDENTIFICATION | 06-02-2016 |
20160155122 | HOST CAPTURE | 06-02-2016 |
20160155124 | METHODS AND SYSTEMS FOR UPDATING EXPIRY INFORMATION OF AN ACCOUNT | 06-02-2016 |
20160155125 | SYSTEM AND METHOD FOR ISSUING PREPAID NEGOTIABLE INSTRUMENTS | 06-02-2016 |
20160155126 | Method for Implementing and Integrating Biometric Markers, Identification, Real-Time Transaction Monitoring with Fraud Detection and Anti-Money Laundering Predictive Modeling Systems | 06-02-2016 |
20160155128 | DEVICE IDENTIFICATION BASED ON DEEP FINGERPRINT INSPECTION | 06-02-2016 |
20160162872 | REMOTE REVOCATION OF APPLICATION ACCESS BASED ON NON-CO-LOCATION OF A TRANSACTION VEHICLE AND A MOBILE DEVICE - Embodiments of the invention relate to an invention for accessing a remotely located mobile device of a user based on certain events is provided. The system, method, and computer program product are configured to: (a) monitor one or more transaction involving a transaction vehicle of a user; (b) determine a physical location of a transaction vehicle based at least partially on the one or more transactions; (c) determine a geographic location of a mobile device of the user, wherein the mobile device is associated with the transaction vehicle; (d) determine whether or not the transaction vehicle of the user and the mobile device of the user are co-located; and (e) reconfigure one or more applications accessible to the mobile device or one or more functional features of the mobile device based at least partially on determining that the mobile device and the transaction vehicle of the user are not co-located. | 06-09-2016 |
20160162879 | ELECTRONIC PAYMENT SYSTEM AND REMOTE OR NEAR-FIELD PAYMENT METHOD - The electronic payment system and an electronic payment method based on remote communication or near field communication (NFC) includes a remote payment subsystem and an NFC payment subsystem, each of which includes a payment card, a payment terminal, a payment receiving card, and a payment receiving terminal. In the remote payment method, a bound remote payment account, a payment terminal, a payment card, and a payment password are used to execute remote payment. A bound remote payment receiving account, a payment receiving terminal, and a payment receiving card are used to execute remote payment receiving. In the NFC payment method, a bound NFC payment account, a payment terminal, and a payment card are used to execute NFC payment paying. A bound NFC payment receiving account, a payment receiving terminal, and a payment receiving card are used to execute NFC payment receiving. | 06-09-2016 |
20160162886 | METHOD AND SYSTEM FOR IDENTIFYING MERCHANTS SELLING RANSOMWARE - A method for identifying a merchant associated with ransomware includes: storing, in a profile database, a plurality of merchant profiles, wherein each merchant profile is related to a merchant and includes at least a merchant identifier; receiving, by a receiving device, an authorization request for a payment transaction, wherein the authorization request includes a specific merchant identifier associated with a merchant involved in the payment transaction, and the payment transaction is initiated by a computing device infected with one or more ransomware application programs; identifying, by a processing device, a specific merchant profile in the profile database where the included merchant identifier corresponds to the specific merchant identifier included in the received authorization request; and updating, by the processing device, the specific merchant profile in the profile database to include an indication that the related merchant is associated with the distribution of the one or more ransomware application programs. | 06-09-2016 |
20160162889 | PROVISIONING PAYMENT CREDENTIALS TO A CONSUMER - A method and system for provisioning payment credentials to a consumer are disclosed. A remotely accessible server receives a request for payment credentials required to conduct a transaction, the request originating from an electronic device of a consumer. A transaction type associated with the transaction is determined, the transaction type being one of a plurality of predefined transaction types wherein each transaction type is associated with a predefined payment credential format. The remotely accessible server obtains payment credentials in the payment credential format associated with the determined transaction type and transmits the obtained payment credentials to the electronic device of the consumer for use in conducting the transaction. | 06-09-2016 |
20160162890 | EMAIL SUGGESTOR SYSTEM - The email suggestor system and method provide an efficient and effective way to capture a user identifier, such as an email address of a consumer in a retail environment. The email suggestor system generates one or more suggested first text portions based on input data, outputs at least one of the suggested first text portions, and receives a selection of a first text portion. The email suggestor system generates one or more suggested second text portions of a user identifier based on the input data, outputs at least one of the suggested second text portions, and receives a selection of a second text portion. The email suggestor system generates a user identifier including the selected first text portion and the selected second text portion. The email suggestor system uses received feedback response to refine and/or train one or more models with which it generates the suggested text portions. | 06-09-2016 |
20160162893 | OPEN, ON-DEVICE CARDHOLDER VERIFICATION METHOD FOR MOBILE DEVICES - An open, on-device Cardholder Verification Method (“CVM”) controller may receive CVM policies from issuers and store the policies in a database. The open, on-device CVM controller may then receive a request from a remote mobile device, and automatically determine at least one issuer associated with the request. Appropriate CVM policies may be retrieved and transmitted to the remote mobile device. An open, on-device CVM application executing on the mobile device may then receive a CVM authentication request, associated with a payment token, from a payment application. Responsive to the authentication request, a CVM policy may be accessed based on the payment token. It may then be arranged for an authenticator of the mobile device to authenticate a user in accordance with the CVM policy. When the user is authenticated, an authentication success indication may be sent from the open, on-device CVM application to the payment application. | 06-09-2016 |
20160162894 | SYSTEM AND METHOD FOR SECURE ACCOUNT TRANSFER - One embodiment provides a system that facilitates secure transfer of funds. During operation, the system generates, by a server, an authentication identifier for a payee of a bank account, wherein the authentication identifier indicates the bank account and a corresponding payment account of the payee. The system receives, from a payer, a message which indicates a first command to transfer a payment amount to the payee, wherein the first command includes the authentication identifier. In response to successfully verifying the authentication identifier, the system extracts information associated with the payment account and the bank account from the authentication identifier. The system transfers the payment amount to the bank account of the payee based on the extracted information. | 06-09-2016 |
20160162895 | CREDIT AND DEBIT FRAUD CARD USAGE MONITORING FOR TRANSIT - A method for detecting fraudulent use of a payment media using a transit server includes receiving, at a transit server, an input from a payment media as part of a payment transaction at a first transit fare vending machine. The input includes an account identifier associated with a payment account of the payment media. Authentication information is received and an authentication request is communicated to an issuer of the payment account. The authentication request includes the account identifier. Information indicative of improper use of the payment media is received from one or more of a second transit fare vending machine or the issuer of the payment account. A determination is made, based on the information, that the payment media is being used improperly. An improper use alert is communicated to an enforcement authority. The improper use alert includes identification information related to the payment transaction. | 06-09-2016 |
20160162896 | USER AUTHENTICATION BASED ON HISTORICAL TRANSACTION DATA - Embodiments are directed to systems, methods and computer program products for providing user authentication based on transaction data. Embodiments receive from a user, a request to execute a user action associated with an application, wherein execution of the user action requires validation of authentication credentials; collect a transaction set of data comprising information related to transactions conducted by the user; collect a location set of data comprising information related to a physical location of the user; determine a transaction proximity score associated with the user and the transactions; determine a level of authentication associated with the determined transaction proximity score; determine which authentication types are associated with the level of authentication; request authentication credentials; receive authentication credentials from the user; validate the authentication credentials, thereby resulting in a successful validation of the authentication credentials; and, in response to the successful validation of the authentication credentials, execute the user action. | 06-09-2016 |
20160162899 | SETTLEMENT SYSTEM, INFORMATION PROCESSING DEVICE AND SERVER DEVICE - An example system includes: a data storage medium including a storage unit storing data concerning settlement and a non-contact communication unit performing non-contact communication; a server device performing settlement processing concerning a merchandise article sold and purchased, based on data stored in the data storage medium; and a plurality of information processing devices including a non-contact communication unit performing non-contact communication with the data storage medium, a data acquisition unit acquiring data stored in the storage unit of the data storage medium through the non-contact communication unit and a settlement processing unit performing settlement processing with the server device based on data acquired by the data acquisition unit. The plurality of information processing devices include a stationary information processing device and a portable information processing device. A standby time during which the non-contact communication unit waits for non-contact communication with the data storage medium for data acquisition by the data acquisition unit is set to be different for each of the stationary information processing device and the portable information processing device. | 06-09-2016 |
20160162900 | FRAUD DETECTION SYSTEM, METHOD, AND DEVICE - A system for authentication for a user device associated with a user, said system comprising: a processing system to generate a first user interface running on a screen of said user device, said first user interface comprising one or more components, wherein said one or more components comprises a first icon, which when activated, directs a user to a second user interface to select a secret pattern, a second icon, which when activated, generates a current randomly populated keyboard, further wherein said processing system provides a current Personal Identification Number (PIN) to said user by correlating said secret pattern with the current randomly populated keyboard, and a regular keyboard for said user to enter a PIN for authentication. | 06-09-2016 |
20160162901 | REMOTELY GENERATED BEHAVIORAL PROFILE FOR STORAGE AND USE ON MOBILE DEVICE - A system, method and device for offline authentication of transactions using mobile device, based on, analytic engine such as behavioral pattern detection are provided. The behavioral pattern can be for a specific person, for group of people with similar characteristics, or a combination of the two. The invention has the advantage over the prior art centralized authentication and fraud detection systems in that it more precise in identifying and preventing fraud in real time. The precision is better for both customer and merchant frauds. The present invention also requires fewer investments in infrastructure and uses less communication traffic when compared to the prior art. | 06-09-2016 |
20160162902 | METHOD AND APPARATUS FOR SECURE ACCESS PAYMENT AND IDENTIFICATION - According to one aspect, the invention provides a system for authenticating identities of a plurality of users. In one embodiment, the system includes a first handheld device including a wireless transceiver which is configured to transmit authentication information, a second device including a wireless receiver, where the second device is configured to receive the authentication information. | 06-09-2016 |
20160164934 | INTERACTIVE JUKEBOX SYSTEM AND DISPLAY - An interactive jukebox system. The system includes a local controller located at a venue and a central server located remotely to the venue. Patrons of the venue can use their private mobile devices to select content to be broadcast at the venue. The patrons' selections are communicated to the central server. The central server tallies the selections of a plurality of patrons at the venue and provides the local controller with a ranked ordering of content to be broadcast at the venue. The local controller broadcasts the content in the ranked order. A dashboard display is provided on a display device at the venue and presents information associated with current and upcoming broadcasts of content, messages posted by patrons, videos, and advertisements. A DJ mode is provided in which the ranked order of content is provided to a DJ at the venue to aid selection of content for broadcast. | 06-09-2016 |
20160171476 | Mobile Application Solution for Payment (Debit and Credit) Card Validation | 06-16-2016 |
20160171477 | Payment System with Reduced User Interaction | 06-16-2016 |
20160171478 | MOBILE TERMINAL AND METHOD FOR CONTROLLING THE SAME | 06-16-2016 |
20160171479 | PROVISIONING PLATFORM FOR MACHINE-TO-MACHINE DEVICES | 06-16-2016 |
20160171482 | SYSTEM AND METHOD FOR OVER THE AIR PROVISIONED WEARABLE CONTACTLESS PAYMENTS | 06-16-2016 |
20160171483 | PAYMENT CARD SUSPENSION | 06-16-2016 |
20160171488 | AUTHENTICATION AND VERIFICATION SERVICES FOR THIRD PARTY VENDORS USING MOBILE DEVICES | 06-16-2016 |
20160171493 | System and Method of Secure Payment Transactions | 06-16-2016 |
20160171494 | SOFTWARE BEHAVIOR MONITORING AND VERIFICATION SYSTEM | 06-16-2016 |
20160171495 | AUTOMATIC DETECTION OF MOBILE PAYMENT APPLICATIONS | 06-16-2016 |
20160171497 | METHOD FOR AVOIDING THE MISUSE OF ACCESS AUTHORIZATIONS OF AN ID-BASED ACCESS CONTROL SYSTEM | 06-16-2016 |
20160171498 | SYSTEMS AND METHODS FOR FRAUD DETECTION BY TRANSACTION TICKET SIZE PATTERN | 06-16-2016 |
20160171499 | FRAUD DETECTION VIA MOBILE DEVICE LOCATION TRACKING | 06-16-2016 |
20160171500 | Authentication System and Method | 06-16-2016 |
20160171501 | ELECTRONIC TRANSACTION METHOD | 06-16-2016 |
20160171502 | SYSTEM AND METHOD FOR PERFORMING AUTOMATIC PAYMENT TRANSACTIONS | 06-16-2016 |
20160180299 | PAYMENT UNIFICATION SERVICE | 06-23-2016 |
20160180304 | COMBINED ELECTRONIC PAYMENT AND TRANSFER FOR DIGITAL BANKING CHANNELS | 06-23-2016 |
20160180319 | SYSTEM AND METHOD FOR FACILITATING AN ONLINE TRANSACTION WITH A MOBILE DEVICE | 06-23-2016 |
20160180320 | SYSTEM AND METHOD FOR FACILITATING AN ONLINE TRANSACTION WITH A SECOND MOBILE DEVICE | 06-23-2016 |
20160180322 | MOBILE TERMINAL AND CONTROL METHOD THEREOF | 06-23-2016 |
20160180325 | FACILITATING SENDING AND RECEIVING OF PEER-TO-BUSINESS PAYMENTS | 06-23-2016 |
20160180327 | SYSTEMS AND METHODS FOR CONTACTLESS AND SECURE DATA TRANSFER | 06-23-2016 |
20160180329 | System and Method for Providing Emergency Prepaid Card | 06-23-2016 |
20160180330 | METHOD AND SYSTEM FOR RECOVERY OF A LOST PAYMENT CARD | 06-23-2016 |
20160180339 | METHOD AND SYSTEM FOR INDUSTRY-BASED SUPPRESSION OF PAYMENT TRANSACTIONS | 06-23-2016 |
20160180341 | SYSTEM SERVER FOR RECEIVING TRANSACTION REQUESTS | 06-23-2016 |
20160180342 | PREEMPTIVE CREDIT AND DEBIT CARD FRAUD PROTECTION SYSTEM | 06-23-2016 |
20160180344 | COMMUNICATION DEVICE INTERFACES FOR TRANSACTION APPROVAL AT A MERCHANT LOCATION | 06-23-2016 |
20160189133 | SYSTEMS AND METHODS FOR LOCATION-BASED TRANSACTION INFORMATION CAPTURING - Systems and methods for capturing location-based transaction details are provided. The system includes a location component configured to determine a location of a user device. The system also includes one or more processors configured to determine if the determined location is a favorite location of a user of the user device or if the user has been in the location for a time period greater than a threshold time, prompt the user to enter transaction information, and receive entered transaction information. The system also includes a memory configured to store the received transaction information, and a network interface component configured to send the stored transaction information. The sent transaction information may be stored on a remote server and may be accessed by user so that a user may be capable of viewing their transaction and other account information over a network. | 06-30-2016 |
20160189134 | COLLABORATING USER DEVICES FOR SECURITY - A system and method includes a first device with one or more processors coupled to a memory and reads instructions from the memory to perform the step of receiving a first NFC communication from a master device and enabling payment capabilities of the first device based on the first NFC communications from the master device. | 06-30-2016 |
20160189136 | AUTHENTICATION OF MOBILE DEVICE FOR SECURE TRANSACTION - There are provided systems and methods for authenticating a mobile device for use in a secure transaction. A user having a master device authenticated for use in a secure transaction system, such as an electronic payment system, identifies a secondary device to be enabled for use in processing a secure transaction. The secondary device connects to a companion device and shares information associated with the secondary device and companion device with a transaction processing server, which returns authentication information associated with both devices. When the user initiates a secure transaction, the secondary device identifies whether the third device is in proximity. The secure transaction is processed only if the second and third devices are in communication and authenticated during the transaction. If the secondary device is lost or stolen, the device may be disabled until reauthenticated through the master device. | 06-30-2016 |
20160189149 | BIOMETRIC SYSTEMS AND METHODS FOR AUTHENTICATION AND DETERMINATION OF GROUP CHARACTERISTICS - Systems and methods for authentication of users based on biometrics and determination of group characteristics based on biometrics are provided. Biometric profiles of users, which include reference biometric data for behavioral patterns and/or physiological characteristics, are stored in a biometric system. A biometric capture device captures a biometric sample that includes a representation of one or more biometrics of a user. The biometric system determines biometric data from the biometric sample and compares the biometric data with the reference biometric data. The biometric system may authenticate the user based on the comparison alone or in combination with other authentication techniques. Further, for biometric samples that include a representation of biometrics for a group of users, the biometric system may determine a group characteristic from the biometric sample and provide services relevant to the group. | 06-30-2016 |
20160189150 | DYNAMIC AUTHENTICATION THROUGH USER INFORMATION AND INTENT - There are provided systems and methods for dynamic authentication through user information and intent. A user may wish to purchase an item that they view on a merchant marketplace using a computer of mobile phone. The merchant for the merchant marketplace may register the user's intent to purchase the item by receiving the user's actions while browsing the marketplace. The user may further provide user information with the merchant, such as a biometric reading, identifier, or other information. When the user then arrives at a merchant location to purchase the item and complete a transaction using a payment instrument, the merchant may process the user's intent and information to determine how confident the merchant is that the user is entitled to utilize the payment method. Such confidence rating may correspond to whether the merchant believes the transaction is fraudulent or if the user is misrepresenting their identity. | 06-30-2016 |
20160189153 | SYSTEMS AND METHODS FOR ONLINE ACTIVITY-BASED AUTHENTICATION - Systems and methods for authentication of users using online activity are provided. An authentication system may build a user profile in a database by associating online activity data with a user in the user profile, and further by processing the online activity data to generate user interest data and associating it with the user. The authentication system may receive a payment request for a purchase of an item using a payment account of the user. The authentication system may determine if the purchase of the item by the user is consistent with the user's online activity data and/or user interest data. If consistent, the authentication system may authenticate the user and process the payment request by approving the payment request. | 06-30-2016 |
20160189154 | AUTHENTICATION DEVICE THAT ENABLES TRANSACTIONS WITH A PAYMENT INSTRUMENT - Embodiments of systems and methods are provided for an authentication device that enables transactions with a payment instrument at different limitations, restrictions and/or use conditions. In an embodiment, a system comprises a receiver configured to receive, through an authentication device, authentication information associated with a user of the authentication device or with a payment instrument, wherein the payment instrument communicates with the authentication device, and the payment instrument has a first limitation that does not need pre-authorization. The system also comprises a payment instrument authorization module implemented by at least one hardware processor operatively connected to the receiver, the hardware processor(s) configured to: determine validity of the received authentication information; authorize a second limitation for the payment instrument based on the validity of the received authentication information; and communicate, to the authentication device or to a an entity device, authorization information for the payment instrument at the second limitation. | 06-30-2016 |
20160189155 | Transaction Information Processing Method and Apparatus - A method and an apparatus of processing transaction information are disclosed. The method includes receiving a transaction instruction from a user account; generating corresponding transaction information according to the transaction instruction; sending the transaction information to a transaction account that is bound to the user account in advance; processing the transaction information through the transaction account; and sending the processed transaction information to the user account through the transaction account. By setting up a transaction account to bind with a user account, even though the user account is not capable of receiving transaction information in an international business scenario, the transaction information can be received by the user account through the transaction account, thus effectively solving a problem that certain user accounts cannot directly receive transaction information in an international business scenario and improving an efficiency of processing transaction information. | 06-30-2016 |
20160189157 | CARD LESS AND ATM LESS MONEY WITHDRAW / DEPOSIT - A method for completing a transaction based on Card-less and ATM less is provided. The system embodying the method may be operatively connected to at least one server comprising a plurality of customer, merchants and banks, where in each customer profile comprises payment account information and at least one corresponding verified customer image, and or at least one corresponding device to securely authenticate payment if necessary. The payment account information comprises at least one payment card and or bank account associated with a pin number. At least one server may be configured to execute a payment authorization module and an authentication module comprising the following: receiving a request to authorize the transaction from the card/bank account of the customer to the merchant, or initiating request to authorize the transaction from the card/bank account of the customer from the merchant, where in the request may include a pin number based on the preferences of the customer; verifying whether the putative transaction details along with the pin number and details with the server are a match; transmitting customer validation info to the merchant; and generating in response to the match, a request of customer verification from the merchant. | 06-30-2016 |
20160189158 | AUTHENTICATING REQUESTS TO ACCESS ACCOUNTS BASED ON PRIOR REQUESTS - A system, a medium, and a method involve a communication interface of a server device that receives activity data associated with an activity of an account, where the activity data includes a payment request for a transaction between a user of the account and a merchant. A processor of the server device determines a location associated with the payment request based at least on the activity data. An authentication component of the server device accesses prior authenticated requests of the account. The authentication component determines a prior authenticated request of the account based at least on the location and a time period. The authentication component determines an authentication of the payment request based at least on the prior authenticated request and an authentication input. A transceiver of the communication interface transmits an indication of the authentication to a client device. | 06-30-2016 |
20160189160 | SYSTEM AND METHOD FOR DEANONYMIZATION OF DIGITAL CURRENCY USERS - Methods and systems for deanonymizing digital currency users and transactions. The deanonymization system monitors communication sessions that are conducted in a communication network. From among the monitored sessions, the system detects sessions in which users carry out digital currency transactions. Having detected such a session, the system attempts to deanonymize the user, i.e., to correlate the digital currency pseudonym given in the session with some other information that is indicative of the user. The system may determined the identity of the terminal on which the user conducts the session, and uses the identity of the terminal to establish a correlation between the pseudonym and the user. In some cases the terminal is known to belong to a specific user. | 06-30-2016 |
20160189161 | AUTHENTICATION SCHEMES FOR ACTIVITIES OF ACCOUNTS - A system, a medium, and a method involve a communication interface of a server device that receives a selection of an authentication scheme to authenticate activities of an account. The communication interface receives activity data associated with a given activity of the account. A processor of the server device determines the activity data includes biometric data to authenticate the given activity of the account. An authentication circuit of the server device determines the authentication scheme is selected from a number of authentication schemes, where the selected authentication scheme requires the biometric data to authenticate the activities of the account. The authentication circuit determines an authentication of the given activity based at least on the biometric data. A transmitter of the communication interface transmits an indication of the authentication to a client device. | 06-30-2016 |
20160189162 | INFORMATION PROCESSING SYSTEM, AND STORAGE MEDIUM WHICH STORES INFORMATION PROCESSING PROGRAM - According to one embodiment, an information processing system includes a first interface, a first processor, a second interface, and a second processor. The first interface acquires information including face information of a visitor. The first processor stores, in a database, registered information of a member corresponding to the registered face information which was successfully authenticated with the face information of the visitor, in association with the face information of the visitor. The second interface acquires information including face information of a person of settlement. The second processor executes a settlement process by using the registered information of the member corresponding to the face information of the visitor which was successfully authenticated with the face information of the person of settlement. | 06-30-2016 |
20160196539 | PAYMENT LINK | 07-07-2016 |
20160196544 | METHOD AND APPARATUS FOR ELECTRONIC PAYMENT AND AUTHENTICATION | 07-07-2016 |
20160196545 | PAYMENT SERVICE SYSTEM USING BEACON, AND PAYMENT SERVICE DEVICE AND METHOD IN THE SYSTEM | 07-07-2016 |
20160196555 | ELECTRONIC PLATFORM FOR SUPPORTING TRANSACTION TRANSMISSION MODIFICATION CAPABILITIES FOR VARIOUS LEVELS OF ENTITLEMENT | 07-07-2016 |
20160196558 | RISK ASSESSMENT BASED ON CONNECTED WEARABLE DEVICES | 07-07-2016 |
20160203466 | METHOD OF TRANSMITTING INFORMATION FROM EFFICIENT COMMUNICATION PROTOCOL CARD READERS TO MOBILE DEVICES | 07-14-2016 |
20160203484 | METHOD AND SYSTEM FOR RETRY PROCESSING OF CONTROLLED PAYMENT TRANSACTIONS | 07-14-2016 |
20160203485 | SELECTIVE AUTHENTICATION BASED ON SIMILARITIES OF ECOMMERCE TRANSACTIONS FROM A SAME USER TERMINAL ACROSS FINANCIAL ACCOUNTS | 07-14-2016 |
20160203486 | FRAUDULENT TRANSACTION DETECTION SYSTEM FOR USE IN IDENTITY-BASED ONLINE FINANCIAL TRANSACTION DECISIONING SYSTEM | 07-14-2016 |
20160203487 | SYSTEMS AND METHODS FOR DETECTION OF SESSION TAMPERING AND FRAUD PREVENTION | 07-14-2016 |
20160203488 | Anti-Money Laundering Compliance Alert Life Cycle Management Process and System | 07-14-2016 |
20160203490 | Systems and Methods for Travel-Related Anomaly Detection | 07-14-2016 |
20160203491 | DEVICE REPUTATION | 07-14-2016 |
20160205112 | SYSTEM AND METHOD FOR TRANSACTION SECURITY ENHANCEMENT | 07-14-2016 |
20160253650 | METHODS AND SYSTEMS FOR PROVIDING MOBILE SERVICES BETWEEN MOBILE NETWORK PROVIDERS | 09-01-2016 |
20160253657 | METHOD AND APPARATUS FOR PROVIDING CARD SERVICE USING ELECTRONIC DEVICE | 09-01-2016 |
20160253661 | OBFUSCATING PRIVATE INFORMATION USING A TRANSACTION IDENTIFIER | 09-01-2016 |
20160253665 | USER INTERFACE FOR PAYMENTS | 09-01-2016 |
20160253675 | A METHOD AND A SYSTEM FOR PERFORMING 3D-BASED IDENTITY VERIFICATION OF INDIVIDUALS WITH MOBILE DEVICES | 09-01-2016 |
20160379182 | Methods for Providing an Online Consumer Network - Methods for providing a consumer services network are provided. For each electronic transaction that occurs between members of the network, a public and private trust rating score are determined based on the outcome and quality of electronic transactions. | 12-29-2016 |
20160379183 | METHODS AND SYSTEMS FOR AGNOSTIC PAYMENT SYSTEMS - Computationally implemented methods and systems include potential transaction between a client and a vendor indicator acquiring module, vendor payment channel set including one or more of at least one vendor payment modality and at least one vendor payment option, at least partial acquiring module, and application of a client payment channel to at least one vendor payment channel of the acquired vendor payment channel set to facilitate the potential transaction module. In addition to the foregoing, other aspects are described in the claims, drawings, and text. | 12-29-2016 |
20160379210 | METHOD OF CONDUCTING A TRANSACTION BASED ON A CODE - A method of conducting a transaction. The method receives a first request from an originating device. The first request comprises a first identification. A code is provided to a payer device for conducting the transaction. A second request is processed from a payee device to complete the transaction. The second request comprises a transaction amount, wherein the transaction is completed based on a verification of the code. | 12-29-2016 |
20160379213 | SYSTEM AND METHOD FOR PROVIDING A BROWSER API FOR MANAGING PRODUCT PURCHASES - Disclosed is an updated browser having an API for communicating payment data between the browser and a site for processing payments of purchases and to reduce the number of user interactions needed for a purchasing process. The method includes receiving, via the user interface, an interaction by a user with an object associated with a site, the interaction indicating a user intent to make a purchase, receiving, based on the interaction and via an application programming interface, a request from the site for payment data in connection with the purchase and transmitting, to the site and via the application programming interface, the payment data, wherein the payment data confirms the purchase or can be used to process or deliver a product associated with the purchase. | 12-29-2016 |
20160379215 | METHOD AND SYSTEM FOR SUPERVISORY CONTROL OF PAYMENT TRANSACTIONS - A method for facilitating supervisory control of payment transactions initiated using a computing device includes: storing account profiles, each including a first identifier, second identifier, and transaction controls; receiving transaction details from a second device for a payment transaction, the transaction details including a second identifier and transaction data values; identifying a specific profile that includes the second identifier; determining that the payment transaction does not satisfy the transaction controls in the specific profile based the transaction data values; transmitting a confirmation request including the transaction data values to the first device associated with the first identifier in the specific profile; receiving a confirmation message from the first device indicating approval or denial of the payment transaction; and transmitting a message to at least one of: the second device, a payment network, and a merchant involved in the payment transaction based on the indication. | 12-29-2016 |
20160379216 | AUTOMATIC CHARGEBACK MANAGEMENT - Technologies for automatically managing chargebacks include a chargeback processing server for receiving a chargeback corresponding to a disputed payment vehicle transaction and analyzing chargeback data as a function of historical chargeback win data and transaction-specific economic feasibility data. The chargeback processing server automatically determines, based on the analysis of the chargeback data, whether further review of the chargeback is necessary, whether to automatically represent the disputed payment vehicle transaction, or whether to automatically accept financial liability for the disputed payment vehicle transaction. Additionally, the chargeback processing server automatically collects representment evidence in response to determining to automatically represent the disputed payment vehicle transaction. Other embodiments are described and claimed. | 12-29-2016 |
20160379219 | SETTLEMENT APPARATUS - According to one embodiment, a settlement apparatus includes a commodity detection unit, a personal authentication unit, and a settlement unit. The commodity detection unit detects commodities to be settled. The personal authentication unit executes first personal authentication on a settler who settles a purchase price of the commodities which the commodity detection unit detects, and further executes second personal authentication if the commodities which the commodity detection unit detects meet a predetermined condition. The settlement unit settles the purchase price of the commodities which the commodity detection unit detected, if the personal authentication by the personal authentication unit was successfully carried out. | 12-29-2016 |
20170236034 | COMPUTERIZED INTEGRATED AUTHENTICATION/DOCUMENT BEARER VERIFICATION SYSTEM AND METHODS USEFUL IN CONJUNCTION THEREWITH | 08-17-2017 |
20170236113 | AUTHENTICATION SYSTEMS AND METHODS USING LOCATION MATCHING | 08-17-2017 |
20170236118 | TRANSACTION TOKEN ISSUING AUTHORITIES | 08-17-2017 |
20170236122 | METHOD AND SYSTEM FOR UNIFICATION OF WEARABLE ACTIVITY DATA AND TRANSACTION DATA | 08-17-2017 |
20170236124 | METHOD AND SYSTEM FOR DETERMINING TERMINAL LOCATION | 08-17-2017 |
20170237739 | Authentication System and Method | 08-17-2017 |
20180025342 | ONLINE MOBILE PAYMENT SYSTEM AND METHOD USING AUTHENTICATION CODES | 01-25-2018 |
20180025344 | COMMUNICATING AUTHENTICATION INFORMATION BETWEEN MOBILE DEVICES | 01-25-2018 |
20180025348 | METHOD SYSTEM OF ONLINE PAYMENT USING MOBILE DEVICE AND CONTACTLESS EMV CARD | 01-25-2018 |
20180025352 | SINGLE USE QR CODE AUTHORIZATION SYSTEM | 01-25-2018 |
20180025354 | SYSTEMS AND METHODS FOR MAPPING NON-VALIDATED DATA WITH VALIDATED DATA | 01-25-2018 |
20180025355 | SYSTEM FOR COORDINATING ACCESS TO MULTIPLE ACCOUNTS USING A SINGLE ACCESS CARD | 01-25-2018 |
20190147431 | Credit Protocol | 05-16-2019 |
20190147439 | METHOD OF DISTRIBUTING TOKENS AND MANAGING TOKEN RELATIONSHIPS | 05-16-2019 |
20190147442 | Transaction System and Method | 05-16-2019 |
20190147444 | SYSTEM AND METHOD FOR MOBILE EXPRESS RETURN OF PRODUCTS | 05-16-2019 |
20190147445 | AUTHORISATION MANAGEMENT SERVER FOR MANAGING AN AUTHORISATION CODE, RELATED COMPUTER PROCESS AND DEVICE NETWORK | 05-16-2019 |
20190147449 | ENHANCED SECURITY FOR TRANSACTION REQUESTS UTILIZING AUTOMATIC SOURCE IDENTIFICATION | 05-16-2019 |
20190147515 | FACILITATING TRANSACTIONS USING TRANSACTION TOKENS | 05-16-2019 |
20220138720 | WEARABLE DEVICE LEARNING USER MOTIONS TO PROMPT PRODUCT REORDER - Embodiments of the present invention disclose a method, computer program product, and system for repurchasing a product. A method comprising receiving motion data from a wearable device and determining an activity that corresponds to the motion data. Increasing a counter for the activity every time the activity occurs and determining if the counter is greater than or equal to a threshold value that is associated with a product used during the activity. Transmitting a repurchase order of the product associated with the activity when the counter is greater than or equal to the threshold value. | 05-05-2022 |
20220138722 | FACILITATING SMART GEO-FENCING-BASED PAYMENT TRANSACTIONS - Example systems disclosed herein include a pressure sensitive mat to detect a presence of a first user, the first user associated with a first computing device. Disclosed example system also include at least one processor to trigger initiation of communication between the first computing device and a second computing device associated with a second user in response to detection of the presence of the first user by the pressure sensitive mat at a first time, obtain a job completion notification from the first computing device at a second time after the first time, the job completion notification to indicate a task performed by the first user has been completed; and execute a payment transaction between the first user and the second user in response to the job completion notification and detection of the presence of the first user by the pressure sensitive mat at the second time. | 05-05-2022 |
20220138724 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM - A configuration allowing use of one representative card as various types of cards is achieved. There are provided a memory that stores a representative card ID that is an identifier of a representative card, and a control unit that executes a use process for using a registration card registered is association with the representative card through communication with a reader/writer. The use process for using the registration card is executed under a condition that registration card information associated with the registration card is recorded is a database in association with the representative card. The database is a database managed by a server, and including data where the representative card ID, a user ID, and an ID of the registration card registered in association with the representative card are recorded in association with each other. | 05-05-2022 |
20220138735 | Method and System for Filtering Transactions Using Smart Contracts and Updating Filtering Smart Contracts - A method for filtering blockchain value transfer transactions and updating filtering including receiving a transaction request comprising an indication that the transaction request is associated with an update to an existing transaction smart contract, defining an updated transaction smart contract, applying a filter smart contract to the transaction request, and recording to a log an indication that the updated transaction smart contract was made to the existing smart transaction contract, responsive to the applying the filter smart contract. | 05-05-2022 |
20220138751 | REMOTE SERVER PROCESSING - An application virtualization system including an application repository storing applications, wherein at least one of the applications is associated with a geofence, and a processing circuit. The processing circuit including at least one processor and memory, the memory having instructions stored thereon, that when executed by the at least one processor cause the processing circuit to, receive location data from a client device, determine a current location of the client device based on the location data, compare the current location to the geofence of the at least one application, and provide the at least one application to the client device based on the comparison, wherein the applications are not stored locally on the client device. | 05-05-2022 |