摘要:
The invention provides for optimizing Near Field Communications (NFC) at a NFC-enabled interaction terminal configured for conducting user interactions. The invention provides for a user to designate which user credentials are applied to which type of NFC-enabled interaction terminals. A NFC-enabled interaction terminal-specific Application Identifier (AID) is assigned to the user credentials, and, in use, the AID list that is communicated, via NFC, by a mobile communication device to the NFC-enabled interaction terminal includes the NFC-enabled interaction terminal-specific AID, which implements an AID selection order that prioritizes use of the AID. In response, the application executing on the mobile communication device processes commands from the NFC-enabled interaction terminal using the pre-designated user credentials.
摘要:
Embodiments of the invention are directed to a system, method, or computer program product for providing a customer with a single transaction card that is tied to the customer's available payment vehicles. As such, the single transaction card may be utilized by the customer to complete a transaction with a merchant. Subsequently, based on customer rules or customer selection, the invention may direct the transaction to the selected payment vehicle. Rules include any preferences that a customer may input that allows the invention to automatically apply a single transaction card transaction to a payment vehicle. As such, rules may be trigged for a specific merchant, a specific transaction amount, a specific location, and/or the like. If a rule is triggered by a transaction made with the single transaction card, the triggered transaction will be automatically applied to the payment vehicle tied to that rule.
摘要:
Systems, computer program products, and methods are described herein for source independent but source value dependent transfer monitoring. The invention is configured to receive a processing request to initiate a processing network session, wherein the processing network session is associated with the processing of a first activity; receive, a processing interaction request to access a first resource associated with the user; extract a resource processing value associated with the first activity from the processing parameter data structure; determine whether the resource processing value is associated with triggering at least one block intervention step; block the entity input device from accessing the first resource in response to determining that the resource processing value is associated with triggering the at least one block intervention step during processing of the first activity; transmit a block notification to the entity input device; and trigger display of a success notification at an end-user application.
摘要:
Additional user data in resource transfer event messaging is leveraged for generating customized and refined web browsing experiences. Resource transfer messages are configured to include, not only the user data required to affect the resource transfer, but other user data related to the resource transfer event, such as user preference data. The resource transfer event messages are communicated to a resource storage entity, which stores the other user data in resource transfer event repository. In response to a user authenticating with the resource storage entity and accessing a distributed communication network, such as the Internet or the like, the user records are accessed and the additional user data is used to customize the websites that the user navigates.
摘要:
Intelligently determination of intent of a resource provider when attempting to delete a resource event device, specifically, the resource event credentials associated with the resource event device, from a network location. Intent is determined by implementing Artificial Intelligence (AI) to analyze the resource provider's historical data to determine a probable/possible intent and, in response, queries are presented to the resource provider that attempt to confirm the probable/possible intent as the actual intent. In response to determining the intent, the invention is configured to perform one or more actions that are based on the determined intent.
摘要:
Configuring resource transfer event messages to include, not only the user data required to affect the resource transfer (e.g., resource repository identifier and the like), but other user data related to the resource transfer event, such as user preference data. The resource transfer event messages are communicated to resource storage entities that subsequently store user records that associate users with the resource transfer events and the additional user data. In this regard, a security benefit is realized, in that, resource storage entities can leverage the additional data to investigate potential nefarious actions. Moreover, by including the additional user information in resource transfer event messages communicated to resource storage entities, the volume of resource transfer event messages or other network-based messages is lessened thereby limiting network traffic and making the overall process more efficient and effective.
摘要:
Systems, computer program products, and methods are described herein for layered digital resource distribution in an electronic network environment. The present invention is configured to electronically receive computing instructions from a computing device associated with a first entity comprising a first request to execute a resource transfer with a second entity; determine a primary digital resource associated with the first entity; generate a first digital resource specifically to execute the resource transfer with the second entity, wherein the first digital resource is associated with the primary digital resource, wherein the first digital resource is electronically linked to the primary digital resource; initiate the execution of the first request of the resource transfer with the second entity using the first digital resource; and store the first digital resource in a digital repository associated with the primary digital resource.
摘要:
Embodiments of the present invention provide systems, apparatus, methods and/or the like for generating a resource distribution hub using for fully electronic resource distribution by using mobile device application designed to interface with an embedded Near-Field Communication (NFC) tag in a resource distribution instrument that stores instructions for processing the resource distribution authorization information. The holder (i.e., resource provider) of the resource distribution instrument can use the resource distribution instrument to communicate to a mobile communication device having an NFC reader to read the instructions and process a resource distribution according to the parameters of the mobile device application. As such, the holder (i.e., resource provider) of the resource distribution request can process the resource distribution without having to issue a credentials, aliases, pin codes, and the like conventionally used to authorizes the distribution of resources to the resource requester.
摘要:
Embodiments of the invention are directed to systems, methods, and computer program products for resource dispensing at a computer terminal using pre-stage capabilities for a completely contactless experience for physical resource distribution. The system identifying one or more tokens within a user application at a pre-stage event, where the user is able to pre-stage a resource dispensing at a computer terminal in the future. The system may review the token selected for confidence and transmit a resource distribution request amount and a security token tied to the identified user application. Upon contactless communication with a computer terminal, the system extracts the resource distribution request information and security token. The system may confirm the resource distribution request information and security token received at pre-stage with a user current token selection and authorize the pre-staged resource distribution at the computer terminal without additional authentication.
摘要:
Contactless dispensing of objects from object-dispensing machines. A digital token is wirelessly communicated to the machine via short-range wireless communication, such as Near Field Communication (NFC) or the like. In response, a push notification is communicated to the user's wireless device, which includes an activatable link for launching a mobile application. In response to launching the mobile application and authenticating the user, the mobile application provides object-dispensing machine-like user interfaces that are configured to allow the user to input object requesting parameters and submit a request for objects to be dispensed from the object-dispensing machine. The request is communicated to the object-dispensing machines (or corresponding backend processing systems) and, once the request is verified, the object-dispensing machine dispenses the requested objects.