Abstract:
The disclosed embodiments include systems and methods for issuing a virtual certified financial instrument. The disclosed embodiments may be configured to receive a financial instrument request for a virtual certified financial instrument, generate a payor token and a payee token, generate a reference token from the payor token and the payee token using an algorithm rendering it computationally infeasible for the reference token to be derived from only one of the payor token and the payee token, and uniquely associate the reference token with the virtual certified financial instrument. The disclosed embodiments may also be configured to receive, from the payor device or the payee device, a financial instrument redemption request that includes a composite token, and redeem the virtual financial instrument in accordance with a confirmation that the composite token matches the reference token.
Abstract:
Mobile communications devices, systems and methods are provided for identifying a risk of fraudulent activity associated with a merchant before a user executes a transaction with the merchant. In an embodiment, a mobile communications device obtains first information identifying prior instances of fraudulent activity associated with a merchant. The mobile communications device may determine a level of risk of fraudulent activity associated with the merchant based on the obtained first information, and may identify, based on the determined risk level, one or more payment instruments and associated incentives appropriate for financial services transactions involving the merchant. The mobile communications device may present, to a user, a notification including the identified payment instruments and associated incentives prior to execution of a transaction between the user and the merchant.
Abstract:
A method of person-to-person anonymous electronic payment processing may involve a payment processing server receiving from a payor payment device a payment initiation request for a payment from a payor account. The payment initiation request may identify a payment amount and excludes payee particulars and the payee account. The server may also receive from a payee payment device a payment completion request requesting completion of the payment. The payment completion request may include a payee identifier and exclude the payment amount, payor account and payor particulars. The server may confirm that the payment completion request is uniquely associated with the payee payment device and the payee identifier, and determine the payment amount and the payor account by correlating the payment completion request with the payment initiation request. In accordance with an outcome of the confirming, the payment processing server may effect a transfer in the payment amount from the payor account to the payee account.
Abstract:
The disclosed embodiments include methods and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction. The method may also include providing, by the one or more processors, the validation information to the authentication network.
Abstract:
A payment processing method involves a server receiving a payee identifier, and linking the payee identifier to a device identifier identifying a payee device. The server receives from a payor device a payment initiation request identifying a specified payment amount and a payor identifier, links a unique token to the specified payment amount and to the payor identifier, and provides the payor device with the token. The token excludes the payor identifier and particulars of the associated payor. The server receives a payment completion request including the payee identifier and the token, and excluding the payment amount, the payor identifier and payor particulars. The server uses the payee identifier to confirm that the payment completion request was signed with the device identifier, uses the payee identifier to locate a payee account, and uses the token to determine the specified payment amount and a payor account associated with the payor identifier.
Abstract:
The disclosed embodiments include systems and methods for administering actual and virtual investment portfolios based on transaction data associated with one or more users. The disclosed embodiments may be configured to modify an investment risk tolerance of a user based on transaction data identifying one or more first products purchased by the user and one or more prior financial services transactions associated with the user. The disclosed embodiments may also be configured to identify one or more first securities based on a portion of the transaction data and the modified investment risk tolerance. In certain aspects, the identified first securities may be related to at least one of the purchased products.
Abstract:
The disclosed embodiments include methods, systems, system terminals, and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction. The method may also include providing, by the one or more processors, the validation information to the authentication network.
Abstract:
Online reviews present a wealth of information for consumers to consider when making purchase decisions. Consumers however, can be disadvantaged by an inability to determine the usefulness of reviews, the wealth of information thus providing marginal utility. Where consumers can establish an affinity or trust with a reviewer, the usefulness of a review can be vetted against the perspective of the consumer, assisting consumers in making purchase decisions with greater confidence and reliability. Social media further supports consumers by providing a convenient pool of reviewers with whom a consumer may already have pre-existing relationships or familiarity with, bolstering the ability of the consumer to establish an affinity or trust with the reviewer. An adaptive influence process provides a method for consumers to adapt such a collection of reviews, and tailor them to the consumer's own perspective to assist in making purchase decisions with greater confidence.
Abstract:
The disclosed embodiments include methods, systems, system terminals, and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction. The method may also include providing, by the one or more processors, the validation information to the authentication network.
Abstract:
The disclosed embodiments include methods and systems that provide secure data transmission between networked computing systems by obfuscating sensitive customer account data with placeholder account data generated in real-time and without customer intervention. The disclosed embodiments may include a computerized device that monitors user input to detect an initiation of a purchase transaction at a merchant, and upon detection of the initiated purchase transaction, may obtain a placeholder account suitable for use in the purchase transaction and capable of masking a user's sensitive account information without user intervention. In some instances, a system of a financial institution may activate and fund the placeholder account in real time and in an amount consistent with a transaction amount of the purchase transaction. Devices consistent with the disclosed embodiments may request execution of the initiated purchase transaction in accordance with the activated and funded placeholder account.