498 patents
Page 3 of 25
Utility
Systems and methods for reducing identity fraud of electronic transaction device
21 Nov 23
Tamper-proofing and secure identity validation techniques in a transaction processing system and secure electronic payment techniques are disclosed.
Daren Lee Pickering, Jonathan Stewart Vokes, Nicholas Telford-Reed
Filed: 28 Sep 22
Utility
Systems and methods for preventing identity fraud of electronic transaction device
21 Nov 23
Tamper-proofing and secure identity validation techniques in a transaction processing system and secure electronic payment techniques are disclosed.
Daren Lee Pickering, Jonathan Stewart Vokes, Nicholas Telford-Reed
Filed: 22 Nov 22
Utility
Wireless Communication Between Electronic Devices In Close Proximity
16 Nov 23
An electronic wireless communication device is provided, comprising: a wireless communication means for communicating with a wireless communication initiating device; means for monitoring a communication signal received by the wireless communication means; means for sending at least a first characteristic value relating to the communication signal received by the wireless communication means to at least one other electronic wireless communication device; means for receiving at least a further characteristic value relating to a communication signal received by the at least one other electronic wireless communication device; and processing means for carrying out a comparison based on the first characteristic value and the further characteristic value, wherein the electronic wireless device is configured to selectively activate communication with the wireless communication initiating device based on the result of the comparison.
Daren PICKERING, Nicholas TELFORD-REED
Filed: 27 Jul 23
Utility
Systems and methods for employer direct electronic payment
14 Nov 23
A method for conducting payment transaction by an employee using an employer payment system includes retrieving a token or an account identification from the employee payment card presented by a consumer, sending an authorization request with token, account identification and transaction data to an acquirer processor, identifying the employer and the employee associated with the token or account identification, determining whether the employee is authorized for the requested transaction based on an employee information from the employer's database, sending, to the employer, a transaction request from the point of sale terminal, transferring funds electronically from the employee's funds account or employer's account to the merchant in accordance with the transaction request between the merchant and the employee, and updating the employer's database with the transaction information once the transfer of funds is completed.
Coy Christensen
Filed: 28 May 21
Utility
Systems and methods of creating order lifecycles via daisy chain linkage
7 Nov 23
Systems, devices, and methods for linking orders to develop a consolidated audit trail (CAT) are configured to receive event data for one or more orders based on one or more order characteristics; determine linkages between the one or more orders based on parent relationships of the one or more orders; verify the linkages between the one or more orders based on the event data; and determine order lifecycles based on the linkages between the one or more orders.
Neil Palmer, Michael Sherman
Filed: 14 Jun 21
Utility
Technologies for Token-based Authentication and Authorization of Distributed Computing Resources
2 Nov 23
Technologies for token-based access authorization to an application program interface (API) include an access management server to receive a service request message from an application executed by a remote computing device.
Scott Edward BLASI
Filed: 28 Jun 23
Utility
Systems and Methods for Optimized Routing of Electronic Transactions Across Multiple Acquirer Processors
2 Nov 23
A method for routing electronic payment transactions may include receiving transaction-related information from a merchant, extracting transaction routing criteria from the received transaction-related information, identifying one or more eligible payment networks and one or more eligible acquirer processors based on extracted transaction routing criteria, predicting a likelihood of authorization acceptance for each combination of identified acquirer processor and identified network, identifying one or more breakeven transaction amounts for each combination of identified eligible acquirer processor and identified eligible payment network, and routing signature debit transactions from the merchant to a least cost combination of acquirer processor and PIN-less debit network selected from the eligible payment networks based on identification of a desired breakeven transaction amount for the PIN-less debit network.
Dennis KETTLER, Ryan CLAPP
Filed: 29 Jun 23
Utility
Systems and Methods for Optimizing Electronic Refund Transactions for Detected Fraudulent Transactions
2 Nov 23
A method for optimizing refunds for suspected or detected fraudulent transactions includes receiving a chargeback analysis request for a potential chargeback transaction from a merchant or a payment processor using an Application Programming Interface (API) over a computer network, extracting identifying information of transactions associated with the chargeback transaction from the chargeback analysis request, searching for a chargeback analysis profile in a profile database, determining whether the chargeback analysis profile exists in the profile database, upon determining that the chargeback analysis profile does not exist in the profile database, obtaining a new fraud analysis profile, determining, based on the chargeback analysis profile, a first probability that the potential chargeback transaction will result in a chargeback, determining, based on the chargeback analysis profile, a second probability that the potential chargeback transaction will result in a chargeback after a proactive electronic refund transaction, and generating a proactive electronic refund transaction based on the first probability and the second probability.
Dmitriy BURMISTROV, Dennis A. KETTLER, Tao HONG
Filed: 7 Jul 23
Utility
Systems and methods for blockchain-based payment transactions, alerts, and dispute settlement, using a blockchain interface server
31 Oct 23
Systems and methods are disclosed for blockchain-based payment transactions, alerts, and dispute settlement, using a blockchain interface server.
Ramesh Vijayaraghavan
Filed: 29 Nov 21
Utility
Systems and Methods for Executing Real-time Electronic Transactions Using Api Calls
26 Oct 23
Systems and methods of executing a real-time electronic transaction by a real-time transaction system are disclosed.
William J. WIED, Aman S. CHEEMA, Manuela DRAGAN, Stephen DINAN
Filed: 13 Jun 23
Utility
System and Method for Tokenizing Information from a Digital Wallet Host by an Acquirer Processor
26 Oct 23
Systems and methods are provided for receiving an encrypted payment payload from a digital wallet host, transmitting a low value token to a merchant, receiving an authorization request, requesting authorization for the transaction from an issuer financial institution using financial data from the encrypted payment payload, receiving an authorization decision from the issuer financial institution, and transmitting an authorization response to the merchant.
William H. COHN, Sayid SHABEER, David TARBOX
Filed: 27 Jun 23
Utility
Methods and Systems for Displaying Virtual Objects from an Augmented Reality Environment on a Multimedia Device
26 Oct 23
Methods and systems are disclosed for displaying an augmented reality virtual object on a multimedia device.
Kevin GORDON, Charlotte SPENDER
Filed: 30 Jun 23
Utility
Decentralized computer systems and methods for loyalty points payments using distributed ledgers
24 Oct 23
Decentralized computer systems and methods are disclosed for establishing and conducting payment processing with loyalty points using distributed ledger.
Chandra Olson, Joshua Mather, Paul Anthony Rose
Filed: 23 Mar 22
Utility
Methods and systems for obfuscating entry of sensitive data at a point-of-sale (POS) device
24 Oct 23
Systems and methods are disclosed for obfuscating entry of sensitive data at a mobile device, which may be infected with a rogue application configured to steal the sensitive data.
Daren L Pickering, Jonathan Stewart Vokes, Marc Massar, Danny K. Russell
Filed: 23 Nov 21
Utility
Conducting a Transaction at a Mobile Pos Terminal Using a Defined Structure
19 Oct 23
A system and method configured for conducting a transaction between two parties using a mobile device, or a plurality of mobile devices.
Chance ULRICH, Scot A. BRYANT
Filed: 20 Jun 23
Utility
Technologies for Preprocessing Transaction Authorization Records
19 Oct 23
Technologies for preprocessing transaction authorization records for clearing data batch file generation include a settlement processing server.
Christopher M. BEATTY, Erik William BAAR
Filed: 27 Jun 23
Utility
Merchant Issued Payment Vehicles Linked to Preexisting Financial Accounts
19 Oct 23
Systems and methods are provided for linking a customer's preexisting financial account to a merchant issued payment vehicle.
Bryan T. BAILEY
Filed: 16 Jun 23
Utility
Systems and methods for routing electronic transactions using network simulation and forecasting
17 Oct 23
Systems and methods are for routing electronic payment transactions to PIN-less networks using payment pseudo-networks and electronic transaction simulation.
Dennis Kettler, Scott Wayne DeAngelo
Filed: 5 Dec 22
Utility
Systems and methods for optimizing electronic refund transactions for detected fraudulent transactions
17 Oct 23
A method for optimizing refunds for suspected or detected fraudulent transactions includes receiving a chargeback analysis request for a potential chargeback transaction from a merchant or a payment processor, extracting identifying information of transactions associated with the chargeback transaction from the chargeback analysis request, searching for a chargeback analysis profile in a profile database, determining whether the chargeback analysis profile exists in the profile database, upon determining that the chargeback analysis profile does not exist in the profile database, obtaining a new fraud analysis profile, determining, based on the chargeback analysis profile, a first probability that the potential chargeback transaction will result in a chargeback, determining, based on the chargeback analysis profile, a second probability that the potential chargeback transaction will result in a chargeback after a proactive electronic refund transaction, and generating a proactive electronic refund transaction based on the first probability and the second probability.
Dmitriy Burmistrov, Dennis A. Kettler, Tao Hong
Filed: 18 Mar 20
Utility
Systems and Methods for Simulation-based Replay of Integrated Devices
12 Oct 23
A method of simulating device state changes in an integrated system includes receiving a transaction request from a client device, storing the transaction request as a first event in an event log, transmitting the transaction request to a terminal device, storing the transmission of the transaction request as a second event in the event log, receiving a device response from the terminal device, storing the device response as a third event in the event log, and when the integrated system is under test, a simulator replays the stored events in the integrated system under test.
Jared WOOD
Filed: 15 Jun 23