Abstract:
A user traveling abroad may decide to make a purchase transaction from a merchant, or exchange cash to foreign currency, or withdraw foreign currency from a funding source of the user. A service provider server may determine exchange rates and transaction fees for different funding sources of the user and/or at different currency exchange locations. The service provider server may further suggest a particular funding source and/or a currency exchange location. The user may conveniently make an informed decision regarding which currency exchange location to go to and which funding source to use. After the trip, the user may have leftover foreign currency. The user may exchange the foreign currency for credit in a restricted account that can be used to make purchases but cannot be cashed out. The credit may be converted to domestic currency and may conveniently be used to make purchases.
Abstract:
Methods and systems are provided for loading money from a gift card into a digital wallet. The transfer can be done at a point of sale (POS), such as during a purchase of the gift card. The digital wallet can be a digital wallet of a user who is purchasing the gift card. The money in the digital wallet can be used to purchase products from the same merchant or another merchant. The money can be transferred from the digital wallet to any other person or entity.
Abstract:
A method to authenticate an application on a first computer system at a second computer system is disclosed. The first computer system receives an authentication bitmap from a second computer system identifying locations in an application. The first computer system extracts portions of the application based on the identified locations in the bitmap. A hashing algorithm is applied by the first computer system to the extracted portions producing a resultant hash. The resultant hash is transmitted to the second computer system for authentication of the application.
Abstract:
Methods and systems are provided for loading money from a gift card into a digital wallet. The transfer can be done at a point of sale (POS), such as during a purchase of the gift card. The digital wallet can be a digital wallet of a user who is purchasing the gift card. The money in the digital wallet can be used to purchase products from the same merchant or another merchant. The money can be transferred from the digital wallet to any other person or entity.
Abstract:
Example embodiments describe a method and a system to provide mobile payments on a secondary linked account. In example embodiments, a secondary account is linked to a primary account. One or more parameters from a primary account holder of the primary account is received that define limitations on access and use of funds in the secondary account by a secondary account holder. Based on the one or more parameters, a determination that the secondary account holder is allowed to make mobile payments is made. An identifier of a mobile device and a PIN from the secondary account holder is received to activate the mobile device to make the mobile payments in response to the determining that the secondary account holder is allowed to make the mobile payments.
Abstract:
A method to authenticate a first computer system over a network to a second computer system is disclosed. A login user interface (UI) is presented to a user of the first computer system while disconnected from the second computer system. The login UI presents at least one input field to receive login input from the user and a security indicator that has been previously selected by the user and that is local to the first computer system. Login input is selectively received from the user based on a determination that the user recognizes the security indicator as having been previously selected by the user. A connection is established between the first computer system and the second computer system over the network. The received user input is transmitted using the established connection to the second computer system for authentication of the first computer system.
Abstract:
Methods and systems according to one or more embodiments are provided for storing online transaction records associated with user-merchant transactions. In an embodiment, a system comprises one or more processors. The system also comprises one or more memories adapted to store a plurality of machine-readable instructions which when executed by the one or more processors are adapted to cause the system to: receive transaction information captured and passed from a client device in response to the client device determining that information or content provided by a merchant server comprises transaction information, wherein the transaction information is associated with a user-merchant transaction; and store the received transaction information in a searchable machine-readable transaction record associated with a user account.
Abstract:
In accordance with embodiments of the present disclosure, systems and methods for facilitating financial transactions over a network include communicating with a financial institution over the network, wherein the financial institution includes a first user account related to a user. The systems and methods include receiving a fund transfer request from the financial institution on behalf of the user and establishing a second user account related to the user based on user information passed with the fund transfer request. The systems and methods include processing the fund transfer request by linking the first user account to the second user account based on the user information passed with the fund transfer request, receiving funds from the financial institution associated with the first user account, and depositing the received funds in the second user account on behalf of the user.
Abstract:
A method to authenticate a first computer system over a network to a second computer system is disclosed. A login user interface (UI) is presented to a user of the first computer system while disconnected from the second computer system. The login UI presents at least one input field to receive login input from the user and a security indicator that has been previously selected by the user and that is local to the first computer system. Login input is selectively received from the user based on a determination that the user recognizes the security indicator as having been previously selected by the user. A connection is established between the first computer system and the second computer system over the network. The received user input is transmitted using the established connection to the second computer system for authentication of the first computer system.
Abstract:
A method to authenticate an application on a first computer system at a second computer system is disclosed. The first computer system receives an authentication bitmap from a second computer system identifying locations in an application. The first computer system extracts portions of the application based on the identified locations in the bitmap. A hashing algorithm is applied by the first computer system to the extracted portions producing a resultant hash. The resultant hash is transmitted to the second computer system for authentication of the application.