Abstract:
A transaction request is received. The transaction request is for a transaction to charge a payment account managed by a payment entity. It is detected that the transaction request exceeds a transaction limit that is applicable to the payment account. A message is transmitted to the payment entity to indicate that the transaction request exceeds the transaction limit.
Abstract:
A mobile device includes a housing and an antenna. The mobile device further includes a power-receiving circuit, and power-transmitting circuit, and a short-range communications circuit. The antenna performs multiple functions in that it is shared by the power-receiving circuit, the power-transmitting circuit and the short-range communications circuit. Each of the three circuits is selectively connectable to the antenna. The mobile device is configured to participate in a mobile-to-mobile battery-charge-sharing operation via inductive coupling from mobile device to mobile device.
Abstract:
A method of associating a transaction device with a user profile on an activation computing device, the method comprising: receiving, from an issuing entity, information associated with a user profile, the user profile having been created by an issuing entity; generating, at the activation computing device, an activation code; sending the activation code to a transaction device associated with the user; receiving, from the transaction device, verification data, the verification data being associated with the activation code and the information associated with the user profile; validating, at the activation computing device, by comparing the received verification data with the generated activation code and the information associated with the user profile received from the issuing entity; and associating the transaction device with the user profile if the verification data is valid.
Abstract:
Various implementation described herein are directed to a method for providing access control. User information is received at a device. A request to provide access control is generated by the device based on the received user information. The request is transmitted via a network to an access manager. A response to the request is received from the access manager. Access control via the device is provided based on the response to the request.
Abstract:
A method for carrying out a wireless transaction for authorization through a transaction processing system between a first computing device and a second computing device is described. The first computing device establishes a secure network connection with a third computing device. The first computing device initiates the wireless transaction with the second computing device. The first computing device provides information to perform a security protocol for the transaction to the third computing device over the secure connection. The performance of the security protocol includes determination of a secure result. The first computing device receives a dummy secure result from the third computing device, and performs the wireless transaction with the second computing device using the dummy secure result. The third computing device prepares a true secure result for the wireless transaction. The dummy secure result may be used to reconcile the wireless transaction with the true secure result.
Abstract:
A network management system includes: a memory configured to store instructions; and a parallel processor configured to execute the instructions to: (a) receive a request for a transaction; (b) determine a first authorization decision for the request; (c) determine a second authorization decision for the request; and (d) perform a first procedure when the first authorization decision is different from the second authorization decision. The request corresponds to use of electronic payment for the transaction and wherein the first authorization decision is generated in parallel with generation of the second authorization decision.
Abstract:
Pursuant to some embodiments, systems, methods and computer program code are provided for receiving a transaction request message, the transaction request message specifying transaction attributes for a proposed payment transaction involving a user of a mobile device and a merchant, comparing the transaction attributes with a permitted transaction rule, the permitted transaction rule having been stored in the mobile device prior to receiving the transaction request message, approving the proposed transaction upon determining that the transaction attributes satisfy the permitted transaction rule, the approving including generating a transaction cryptogram, and transmitting the transaction cryptogram to the merchant for use in completing the proposed payment transaction.
Abstract:
Various implementation described herein are directed to a method for providing access control. User information is received at a device. A request to provide access control is generated by the device based on the received user information. The request is transmitted via a network to an access manager. A response to the request is received from the access manager. Access control via the device is provided based on the response to the request.
Abstract:
Pursuant to some embodiments, systems, methods and computer program code are provided for receiving a transaction request message, the transaction request message specifying transaction attributes for a proposed payment transaction involving a user of a mobile device and a merchant, comparing the transaction attributes with a permitted transaction rule, the permitted transaction rule having been stored in the mobile device prior to receiving the transaction request message, approving the proposed transaction upon determining that the transaction attributes satisfy the permitted transaction rule, the approving including generating a transaction cryptogram, and transmitting the transaction cryptogram to the merchant for use in completing the proposed payment transaction.
Abstract:
A cryptographic method of performing a tokenised transaction between a payment offering party and a payment accepting party is described. The tokenised transaction is mediated by a transaction scheme. The payment accepting party is provided with a merchant identity and a merchant certificate associated with that identity by the transaction scheme provider. The payment accepting party provides the merchant identity and transaction seed data to the payment offering party. The payment offering party validates the merchant identity and uses the merchant identity and the transaction seed data to generate a cryptogram for the tokenised transaction. The payment offering party provides the cryptogram to the payment accepting party for transmission to the transaction scheme provider for authorisation of the tokenised transaction. A suitable user computing device and merchant computing device for acting as payment offering party and payment accepting party respectively are also described.