239 patents
Page 8 of 12
Utility
Systems and methods for cloud-based asynchronous communication
29 Mar 22
A method for cloud-based asynchronous communication includes receiving a transaction request message from a cloud-based application, sending the received transaction request message to a PIN pad by way of an electronic message repository, updating a current state according to the received transaction request, listening for a new incoming message event from the electronic message repository, receiving a new incoming message event from the electronic message repository, and retrieving an incoming message from the electronic message repository, determining whether the retrieved incoming message matches the current state, upon determining that the retrieved incoming message matches the current state, transmitting the retrieved incoming message to the cloud-based application, and upon determining that the retrieved incoming message does not match the current state, retaining the retrieved incoming message in the electronic message repository.
Walter Banks
Filed: 19 Dec 18
Utility
Methods and systems for enhanced endpoint identity validation in electronic transactions
22 Mar 22
Methods and systems are disclosed for merchant system identity validation.
Damien M. Davoli, Jeremy Gifford, Ryan G. Fox
Filed: 13 Nov 19
Utility
Systems and methods to provide user verification in a shared user environment via a device-specific display
22 Mar 22
A method of generating a shared augmented reality payment authentication entry interface includes detecting a first consumer device and a second consumer device; prompting a display of a first augmented reality payment authentication interface at the first consumer device; and prompting a display of a second augmented reality payment authentication interface at the second consumer device.
Charlotte Spender
Filed: 18 Jan 19
Utility
Combination payment card and methods thereof
22 Mar 22
Systems and methods for processing payment transactions using combination payment cards.
Bryan T. Bailey, Edward D. Paciolla
Filed: 23 Feb 21
Utility
Systems and methods for optimized routing of electronic transactions across multiple acquirer processors
22 Mar 22
A method for routing electronic payment transactions may include receiving transaction-related information from a merchant, extracting transaction routing criteria from the received transaction-related information, identifying one or more eligible payment networks and one or more eligible acquirer processors based on extracted transaction routing criteria, predicting a likelihood of authorization acceptance for each combination of identified acquirer processor and identified network, identifying one or more breakeven transaction amounts for each combination of identified eligible acquirer processor and identified eligible payment network, and routing signature debit transactions from the merchant to a least cost combination of acquirer processor and PIN-less debit network selected from the eligible payment networks based on identification of a desired breakeven transaction amount for the PIN-less debit network.
Dennis A. Kettler, Ryan Clapp
Filed: 12 Dec 17
Utility
Systems and methods for network configurations of pin pads
8 Mar 22
A method of network configuration of personal identification number (PIN) pads includes obtaining a PIN pad configuration hash value for a current configuration of the PIN pad, comparing the obtained PIN pad configuration hash to a locally stored PIN pad configuration hash, upon determining that the obtained PIN pad configuration hash and the locally stored PIN pad configuration hash do not match, performing additional operations, which include requesting a new PIN pad configuration, receiving the new PIN pad configuration, receiving a new PIN pad configuration hash, and storing the PIN pad configuration hash.
Bryan Cox
Filed: 20 Dec 18
Utility
Decentralized computer systems and methods for efficient transaction dispute management using blockchain
8 Mar 22
Decentralized computer systems and methods are disclosed for efficient transaction dispute management using blockchain.
Ramesh Vijayaraghavan
Filed: 25 Aug 17
Utility
Systems and methods for a context-driven electronic transactions fraud detection
8 Mar 22
Systems and methods are disclosed for establishing a multi-dimensional fraud detection system and payment analysis.
Nicole S. Jass
Filed: 27 Dec 18
Utility
Systems and methods for computing and applying consumer value scores to electronic transactions
8 Mar 22
Systems and methods are disclosed for generating a consumer value score.
Nicole S. Jass
Filed: 27 Dec 18
Utility
Systems and methods for personalized transactions and individualized payment by associating device with joint transaction
8 Mar 22
Systems and methods are disclosed for managing personalized dining checks created by individualized check item ownership or payment enabled by associating device and table indicia.
Coy A. Christensen, Scot Bryant, Michael de la Fuente
Filed: 15 Jan 21
Utility
Systems and methods for real-time processing and transmitting of high-priority notifications
8 Mar 22
Systems and methods are disclosed for secure transmission of high-priority computer server event notifications.
Sachin Pawaskar
Filed: 23 Mar 20
Utility
Systems and methods for hosted authentication service
8 Mar 22
Systems and methods for authenticating an electronic transaction using a hosted authentication service.
Christopher S. Dee
Filed: 15 Jan 20
Utility
Methods and systems for displaying virtual objects from an augmented reality environment on a multimedia device
1 Mar 22
Methods and systems are disclosed for displaying an augmented reality virtual object on a multimedia device.
Kevin Gordon, Charlotte Spender
Filed: 24 Jun 20
Utility
Wireless communication between electronic devices in close proximity
1 Mar 22
A method of communicating between a first electronic communication device of a plurality of electronic communication devices and a wireless communication initiating device for reading the first electronic communication device.
Daren Pickering, Nicholas Telford-Reed
Filed: 7 Dec 18
Utility
Methods and systems for detecting suspicious or non-suspicious activities involving a mobile device use
22 Feb 22
Systems and methods are disclosed for detecting a suspicious and/or a non-suspicious activity during an electronic transaction performed by a user device.
Jonathan Stewart Vokes, Daren L. Pickering
Filed: 4 Sep 20
Utility
Methods and systems for obfuscating entry of sensitive data at mobile devices
22 Feb 22
Systems and methods are disclosed for obfuscating entry of sensitive data at a mobile device, which may be infected with a rogue application configured to steal the sensitive data.
Daren L. Pickering, Jonathan S. Vokes, Marc Massar, Danny K. Russell
Filed: 28 Dec 18
Utility
Systems and methods for optimizing transaction authorization conversion rate
15 Feb 22
A method for optimizing transaction authorization conversion rates includes retrieving payment transaction parameters and authorization results for a plurality of past payment transactions, generating authorization success factors for each of a plurality of payment transaction parameters based on the retrieved payment transaction parameters and authorization results, receiving, at an acquirer processor, a payment transaction from a merchant, modifying one or more parameters of the payment transaction according to the generated authorization success factors, and submitting the modified payment transaction to a financial institution for processing.
William H. Cohn, Sayid Shabeer, Ned Canning
Filed: 21 Feb 20
Utility
Methods and systems for displaying virtual objects from an augmented reality environment on a multimedia device
15 Feb 22
Methods and systems are disclosed for displaying an augmented reality virtual object on a multimedia device.
Kevin Gordon, Charlotte Spender
Filed: 14 Apr 20
Utility
Systems and methods for detecting security risks in network pages
15 Feb 22
Embodiments include methods and systems for detecting security risks in network pages, comprising providing at least one secure transaction page to a secure transaction provider, the secure transaction page enabling the secure transaction provider to request secure transactions, determining a request rate for the secure transaction page associated with the secure transaction provider, determining a predetermined threshold for a change in request rate for the secure transaction page by the secure transaction provider, determining that the predetermined threshold, for the change in request rate for the secure transaction page by the secure transaction provider, has been exceeded, and providing a notification to the secure transaction provider based on the determination that the predetermined threshold, for the change in request rate for the secure transaction page by the secure transaction provider, has been exceeded.
Brant Peterson
Filed: 11 Oct 19
Utility
Systems and methods for substitute controlled-use tokens in secure network transactions
1 Feb 22
Methods and systems are disclosed for enabling the creation of substitute low-value token creation, comprising providing software content to a content delivery network wherein, when transmitted to a user browser, the software content is configured to enable the user browser to create a substitute low-value token if a token service is unavailable, wherein the content delivery network is configured to provide the software content to at least one user browser, and receiving the substitute low-value token from a merchant system, the substitute low-value token having been generated by the user browser in response to the user browser being unable to obtain a low-value token from the token service.
Stefan K. Karaivanov
Filed: 17 Dec 19