Presented herein are systems and methods for processing tokens in identity assertions for access control to resources. A server may receive, via an interface from a gateway, a request to permit a customer device to access a resource associated with the server. The request may include an identifier for the customer device and a first token used to authenticate the customer device at the gateway. The server may generate, responsive to validating the first token, a second token to be used to authorize the customer device at the server for access to the resource. The server may store, on a database, an association identifying the identifier, the first token, and the second token. The server may perform the server, an action to permit the customer device access to the resource associated with the server based on the association maintained on the database.
Described herein are methods and systems to dynamically generate interactive graphical interfaces. Upon receiving a selection to display an execution page, a webserver may (1) transmit a request for a user identifier and (2) transmit a request for one or more options for a user. The webserver may receive an array including one or more options and instructions to display the one or more installment options on the execution page. Upon extracting the one or more options from the array, the webserver dynamically revises the webpage with at least one interactive graphical element having a visual characteristic of the webpage. Responsive to a second selection of the at least one interactive graphical element on the webpage, the webserver displays the one or more options as selectable graphical components having the visual characteristic of the webpage.
Described herein are methods and systems to dynamically generate interactive graphical interfaces. Upon receiving a selection to display an execution page, a webserver may (1) transmit a request for a user identifier and (2) transmit a request for one or more options for a user. The webserver may receive an array including one or more options and instructions to display the one or more installment options on the execution page. Upon extracting the one or more options from the array, the webserver dynamically revises the webpage with at least one interactive graphical element having a visual characteristic of the webpage. Responsive to a second selection of the at least one interactive graphical element on the webpage, the webserver displays the one or more options as selectable graphical components having the visual characteristic of the webpage.
A financial institution can provide a best price guarantee to debit or credit card account holders. By providing a consolidated system including automatic price monitoring of purchased products and automatic claim form generation upon identifying a lower price, the consumer is relieved of the burden typically associated with conventional price matching. An exemplary method comprises receiving, by a server, purchase information from a financial customer, wherein the purchase information comprises a purchase price and purchased product description and wherein the customer has a credit or debit card issued by the financial institution; storing, by the server, the purchase information in a first database; locating, by the server, from a second database, stored product information corresponding to the received purchased product description, wherein the stored product information comprises a lowest price datum; comparing, by the server, the lowest price datum to the purchase price; and, if the lowest price datum is less than the purchase price, generating a claim form for the financial customer.
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/24 - Schémas de crédit, c.-à-d. de "paiement différé"
G06Q 20/26 - Schémas de débit, c.-à-d. de "paiement immédiat"
G06Q 30/0207 - Remises ou incitations, p. ex. coupons ou rabais
A network system to provide mutable access tokens for access requests that eliminate a need for token replacement. The system allows an access token to be changed to update data in the token. When data stored with the token changes, such as when a user or partner has a change in status, a new token is not required to be requested, generated, dispersed, or stored. Conventional systems refuse the API call request and require the new token be provided. The described system instead completes the request while simultaneously notifying the user to subsequently retrieve an updated access token. Requesting, generating, communicating, and presenting a new token requires additional time, bandwidth, computing capacity, and system interactions. While performing new token acquisition in conventional systems, devices are forced to perform additional interactions, which may result in a time delay or in one or more devices exceeding capacity, becoming overloaded, and seizing.
MACHINE LEARNING SYSTEMS AND METHODS TO CORROBORATE AND FORECAST USER EXPERIENCE ISSUES ON WEB OR MOBILE APPLICATIONS UTILIZING USER VERBATIM, MACHINE LOGS AND USER INTERFACE INTERACTION ANALYTICS
Systems and methods for data corroboration and forecasting in which a sever generates structured customer feedback data from unstructured customer verbatim data and uses unsupervised machine learning modeling techniques to identify similar word clusters within the structured customer feedback data, classifies the identified word clusters into multiple categories of customer issues, and detects one or more trending customer issues within the multiple categories. The server may also retrieve web/mobile application usage analytics data and system logs data and use unsupervised machine learning modeling techniques to corroborate customer web/mobile navigation and service issues associated with the structured customer feedback data.
G06Q 30/016 - Fourniture d’une assistance aux clients, p. ex. pour assister un client dans un lieu commercial ou par un service d’assistance après-vente
H04L 41/5074 - Traitement des plaintes des utilisateurs ou des tickets d’incident
7.
END-TO-END ENCRYPTION FOR SESSIONLESS COMMUNICATIONS
Presented herein are systems and methods for end-to-end encryption for session-less communications. A first server may receive, from a second server, a request to retrieve keys for a customer device to access a service. The request may include a device identifier and a first token encrypted using a first encryption key. The first server may determine, responsive to validating, that the customer device is to be issued a second token. The first server may identify least a portion of the first token decrypted using the first encryption key. The first server may generate a set of second encryption keys to be used by the customer device. The first server may package the second token to include (i) at least the portion of the first token and (ii) the set of second encryption keys. The first server may transmit, to the second server, a response including the second token.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A network system to provide mutable access tokens for access requests that eliminate a need for token replacement. The system allows an access token to be changed to update data in the token. When data stored with the token changes, such as when a user or partner has a change in status, a new token is not required to be requested, generated, dispersed, or stored. Conventional systems refuse the API call request and require the new token be provided. The described system instead completes the request while simultaneously notifying the user to subsequently retrieve an updated access token. Requesting, generating, communicating, and presenting a new token requires additional time, bandwidth, computing capacity, and system interactions. While performing new token acquisition in conventional systems, devices are forced to perform additional interactions, which may result in a time delay or in one or more devices exceeding capacity, becoming overloaded, and seizing.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
Machine learning systems and methods to corroborate and forecast user experience issues on web or mobile applications utilizing user verbatim, machine logs and user interface interaction analytics
Systems and methods for data corroboration and forecasting in which a sever generates structured customer feedback data from unstructured customer verbatim data and uses unsupervised machine learning modeling techniques to identify similar word clusters within the structured customer feedback data, classifies the identified word clusters into multiple categories of customer issues, and detects one or more trending customer issues within the multiple categories. The server may also retrieve web/mobile application usage analytics data and system logs data and use unsupervised machine learning modeling techniques to corroborate customer web/mobile navigation and service issues associated with the structured customer feedback data.
G06Q 30/016 - Fourniture d’une assistance aux clients, p. ex. pour assister un client dans un lieu commercial ou par un service d’assistance après-vente
H04L 41/5074 - Traitement des plaintes des utilisateurs ou des tickets d’incident
10.
Methods and systems for secure user authentication
Secure user authentication using an OTP involve pre-storing an OTP application on a first computing device for generating a valid OTP value for the user responsive to receiving entry of a valid PIN value of the user, no part of the valid PIN value is stored on the first computing device and pre-storing on a back-end server the valid PIN value and a valid shared secret for the user. Upon receiving entry of a purported PIN value, a purported shared secret is dynamically synthesized by the OTP application based on the purported PIN value of the user and a purported OTP value is generated. Upon receiving entry of the purported OTP value in a login attempt on the back-end server from another device, the server cryptographically calculates a window of OTP values, and login is allowed if the calculated window of OTP values corresponds to the received OTP value.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
11.
Methods and systems for secure user authentication
Secure user authentication using a OTP involve pre-storing an application on a first device for generating a valid OTP for the user responsive to receiving entry of a valid PIN, no part of the valid PIN is stored on the first device and pre-storing on a back-end server the valid PIN and a valid shared secret for the user. Upon receiving entry of a purported PIN, a purported shared secret is dynamically synthesized on the first device by the application based on the purported PIN and a purported OTP is generated on the first device. When entry of the purported OTP is received by the server in an attempt to log on the server from a second device, the server cryptographically calculates a window of OTPs, and logs on to the server from the second device is allowed if the calculated window of OTPs corresponds to the received OTP.
H04L 29/00 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Multifactor authentication systems and methods employ an online payment server processor that authenticates a user in an online session with a merchant website server processor based on data representing one or more predefined authentication factors received from a user device processor over a communication network and sends data representing a secure user login cookie to the user device processor over the communication network based on the authentication of the user in the online session with the merchant website server processor. Thereafter, the online payment server processor authenticates the user in a subsequent online session with the merchant website server processor based in part on identifying the data representing the secure user login cookie on the user device and in part on data representing a second predefined authentication factor received from the user device processor over the communication network.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
13.
End-to-end encryption for sessionless communications
Presented herein are systems and methods for end-to-end encryption for session-less communications. A first server may receive, from a second server, a request to retrieve keys for a customer device to access a service. The request may include a device identifier and a first token encrypted using a first encryption key. The first server may determine, responsive to validating, that the customer device is to be issued a second token. The first server may identify least a portion of the first token decrypted using the first encryption key. The first server may generate a set of second encryption keys to be used by the customer device. The first server may package the second token to include (i) at least the portion of the first token and (ii) the set of second encryption keys. The first server may transmit, to the second server, a response including the second token.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Presented herein are systems and methods for processing tokens in identity assertions for access control to resources. A server may receive, via an interface from a gateway, a request to permit a customer device to access a resource associated with the server. The request may include an identifier for the customer device and a first token used to authenticate the customer device at the gateway. The server may generate, responsive to validating the first token, a second token to be used to authorize the customer device at the server for access to the resource. The server may store, on a database, an association identifying the identifier, the first token, and the second token. The server may perform the server, an action to permit the customer device access to the resource associated with the server based on the association maintained on the database.
A network system to provide mutable access tokens for access requests that eliminate a need for token replacement. The system allows an access token to be changed to update data in the token. When data stored with the token changes, such as when a user or partner has a change in status, a new token is not required to be requested, generated, dispersed, or stored. Conventional systems refuse the API call request and require the new token be provided. The described system instead completes the request while simultaneously notifying the user to subsequently retrieve an updated access token. Requesting, generating, communicating, and presenting a new token requires additional time, bandwidth, computing capacity, and system interactions. While performing new token acquisition in conventional systems, devices are forced to perform additional interactions, which may result in a time delay or in one or more devices exceeding capacity, becoming overloaded, and seizing.
Multifactor authentication systems and methods employ an online payment server processor that authenticates a user in an online session with a merchant website server processor based on data representing one or more predefined authentication factors received from a user device processor over a communication network and sends data representing a secure user login cookie to the user device processor over the communication network based on the authentication of the user in the online session with the merchant website server processor. Thereafter, the online payment server processor authenticates the user in a subsequent online session with the merchant website server processor based in part on identifying the data representing the secure user login cookie on the user device and in part on data representing a second predefined authentication factor received from the user device processor over the communication network.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
17.
End-to-end encryption for sessionless communications
Presented herein are systems and methods for end-to-end encryption for session-less communications. A first server may receive, from a second server, a request to retrieve keys for a customer device to access a service. The request may include a device identifier and a first token encrypted using a first encryption key. The first server may determine, responsive to validating, that the customer device is to be issued a second token. The first server may identify least a portion of the first token decrypted using the first encryption key. The first server may generate a set of second encryption keys to be used by the customer device. The first server may package the second token to include (i) at least the portion of the first token and (ii) the set of second encryption keys. The first server may transmit, to the second server, a response including the second token.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
Presented herein are systems and methods for end-to-end encryption for session-less communications. A first server may receive, from a second server, a request to retrieve keys for a customer device to access a service. The request may include a device identifier and a first token encrypted using a first encryption key. The first server may determine, responsive to validating, that the customer device is to be issued a second token. The first server may identify least a portion of the first token decrypted using the first encryption key. The first server may generate a set of second encryption keys to be used by the customer device. The first server may package the second token to include (i) at least the portion of the first token and (ii) the set of second encryption keys. The first server may transmit, to the second server, a response including the second token.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
Systems and methods involve a database function of an ATM processor on which rules database records for positive transition flows of ATM hardware or software activities are stored, a security agent function of the ATM processor that extracts data points from a transition flow for every succeeding ATM activity, and an algorithm function of the ATM processor that generates a rules database record for the transition flows for succeeding ATM activity based on the extracted data points and discards any generated rules database record that is identical to a rules database record already stored on the rules database function. A discovery phase of the algorithm function stores new rules database records, rules database function, and a protection phase of the algorithm function selects a risk protocol, when a generated record is not identical to a record already stored.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
Methods and systems for secure user authentication using a OTP involve, for example, pre-storing a OTP application on a first computing device for generating a valid OTP value for the user responsive to receiving entry of a valid PIN value of the user, no part of the valid PIN value is stored on the first computing device and pre-storing on a back-end server the valid PIN value and a valid shared secret for the user. Upon receiving entry of a purported PIN value of the user, a purported shared secret is dynamically synthesized on the first computing device by the OTP application based on the purported PIN value of the user and a purported OTP value is generated on the first computing device. When entry of the purported OTP value is received by the back-end server in an attempt to log on the back-end server from a second computing device, the back-end server cryptographically calculates a window of OTP values, and log on to the back-end server from the second computing device is allowed if the calculated window of OTP values corresponds to the received OTP value.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
21.
Methods and systems for use of a prepaid payment device for a healthcare service or product
The methods and systems disclosed herein attempt to overcome the deficiencies of the conventional methods and systems by providing a prepaid card for reimbursing a healthcare service provider for the cost of providing a patient with a specific healthcare service. A prepaid card can identify a specific healthcare service and can be used by a patient at a healthcare service provider to obtain the healthcare service of administering a controlled substance for which the patient does not have a prescription. The prepaid card can be associated with one or more accounts of third parties who may be financially responsible for reimbursing the healthcare service provider for the cost of providing the controlled substance and/or the specific healthcare service to the patient.
A financial institution can provide a best price guarantee to debit or credit card account holders. By providing a consolidated system including automatic price monitoring of purchased products and automatic claim form generation upon identifying a lower price, the consumer is relieved of the burden typically associated with conventional price matching. An exemplary method comprises receiving, by a server, purchase information from a financial customer, wherein the purchase information comprises a purchase price and purchased product description and wherein the customer has a credit or debit card issued by the financial institution; storing, by the server, the purchase information in a first database; locating, by the server, from a second database, stored product information corresponding to the received purchased product description, wherein the stored product information comprises a lowest price datum; comparing, by the server, the lowest price datum to the purchase price; and, if the lowest price datum is less than the purchase price, generating a claim form for the financial customer.
G06Q 30/02 - MarketingEstimation ou détermination des prixCollecte de fonds
G06Q 20/24 - Schémas de crédit, c.-à-d. de "paiement différé"
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/26 - Schémas de débit, c.-à-d. de "paiement immédiat"
23.
Methods and systems for person-to-person reward currency redemption
Methods and systems for person-to-person reward currency redemption involve, for example, receiving a request to redeem of reward currency of a reward currency holder as a direct deposit of cash to a deposit account of a recipient using a processor coupled to memory; converting the reward currency to an amount of cash based on a predefined conversion rate likewise using the processor; and also using the processor, transferring the amount of cash to the deposit account of the recipient.
The methods and systems disclosed herein attempt to overcome the deficiencies of the conventional methods and systems by providing a prepaid card for reimbursing a healthcare service provider for the cost of providing a patient with a specific healthcare service. A prepaid card can identify a specific healthcare service and can be used by a patient at a healthcare service provider to obtain the healthcare service of administering a controlled substance for which the patient does not have a prescription. The prepaid card can be associated with one or more accounts of third parties who may be financially responsible for reimbursing the healthcare service provider for the cost of providing the controlled substance and/or the specific healthcare service to the patient.
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 50/22 - Aide sociale ou assistance sociale, p. ex. activités de développement communautaire ou services de consultation
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
A financial institution can provide a best price guarantee to debit or credit card account holders. By providing a consolidated system including automatic price monitoring of purchased products and automatic claim form generation upon identifying a lower price, the consumer is relieved of the burden typically associated with conventional price matching. An exemplary method comprises receiving, by a server, purchase information from a financial customer, wherein the purchase information comprises a purchase price and purchased product description and wherein the customer has a credit or debit card issued by the financial institution; storing, by the server, the purchase information in a first database; locating, by the server, from a second database, stored product information corresponding to the received purchased product description, wherein the stored product information comprises a lowest price datum; comparing, by the server, the lowest price datum to the purchase price; and, if the lowest price datum is less than the purchase price, generating a claim form for the financial customer.
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 30/02 - MarketingEstimation ou détermination des prixCollecte de fonds
G06Q 20/24 - Schémas de crédit, c.-à-d. de "paiement différé"
G06Q 20/26 - Schémas de débit, c.-à-d. de "paiement immédiat"
26.
Methods and systems for dynamically generating and reusing dynamic web content
Methods and systems for generating and reusing dynamic web content involve, for example, automatically generating client-side code on a server at run time, and automatically downloading the client-side code to the client side at run time. The client-side code is executed on the client side to become a widget with dynamic behavior attributes displayed as a component of a web page on a display screen of a client-side computing device. Dynamic behavior of the client-side code may triggered via an event handler mechanism wherein properties of the client-side code are dynamically changed without affecting any other content on the web page. The widget may be redisplayed on a subsequent occasion with a change in the widget without regenerating the client-side code.
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
G06F 8/38 - Création ou génération de code source pour la mise en œuvre d'interfaces utilisateur
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
G06F 16/958 - Organisation ou gestion de contenu de sites Web, p. ex. publication, conservation de pages ou liens automatiques
27.
Methods and systems for dynamically generating and reusing dynamic web content
Methods and systems for generating and reusing dynamic web content involve, for example, automatically generating client-side code on a server at run time, and automatically downloading the client-side code to the client side at run time. The client-side code is executed on the client side to become a widget with dynamic behavior attributes displayed as a component of a web page on a display screen of a client-side computing device. Dynamic behavior of the client-side code may triggered via an event handler mechanism wherein properties of the client-side code are dynamically changed without affecting any other content on the web page. The widget may be redisplayed on a subsequent occasion with a change in the widget without regenerating the client-side code.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
G06F 8/38 - Création ou génération de code source pour la mise en œuvre d'interfaces utilisateur
28.
Methods and systems for use of a prepaid payment device
The methods and systems described herein attempt to provide a card where a consumer can reload the card with additional funds at a point of sale whereby no new or additional hardware is needed, the consumer can have access to the funds immediately, and the consumer does not need to perform any additional steps beyond conducting the transaction at a point of sale. In one embodiment, a method of reloading a prepaid card comprises receiving a prepaid card; receiving information transmitted from the prepaid card; receiving an amount to credit to the prepaid card; generating a request for the credit to the prepaid card, wherein the request comprises an account number of the prepaid card and an indicator in a discretionary field, wherein the indicator provides an instruction to credit the account number with the amount; transmitting the request to an acquirer for verification by the issuer the of the prepaid card; and receiving authorization to credit the prepaid card with the requested amount, wherein the prepaid card is credited with the requested amount at the point of sale terminal.
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/00 - Architectures, schémas ou protocoles de paiement
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
29.
Establishing, modifying, and customizing account-based products
Providing an account-based product. A communications portal is provided and consumer data is received via the portal. At least one derived characteristic, e.g., qualification, is determined contemporaneously from the consumer data. A product set is presented, via the portal, including at least one product determined at least in part by the derived characteristic. A selection from the product set is received via the portal, and at least one product feature, e.g., balance transfer, of at least one selected product is activated contemporaneous with the product selection.
A transaction card has a substructure consisting at least in part of a layer of fibrous material, such as carbon fiber strands or filaments, arranged in a pre-selected pattern, such as a weave pattern, that is at least partially enclosed by a transparent plastic film. A sheet is laminated on each of two opposing faces of the substructure to form a transaction card core. One or both of the sheets laminated on the opposing faces of the substructure is also made of a transparent material, and one or both of the two opposing faces of the transaction card core can be printed. An over-laminate film, such as a transparent polyvinyl chloride plastic film, can be laminated on each of two opposing faces of the transaction card core.
G06K 19/00 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques
B32B 5/00 - Produits stratifiés caractérisés par l'hétérogénéité ou la structure physique d'une des couches
B32B 27/00 - Produits stratifiés composés essentiellement de résine synthétique
B32B 37/00 - Procédés ou dispositifs pour la stratification, p. ex. par polymérisation ou par liaison à l'aide d'ultrasons
B32B 38/00 - Opérations auxiliaires liées aux procédés de stratification
G06Q 20/00 - Architectures, schémas ou protocoles de paiement
G06K 19/02 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par l'utilisation de matériaux spécifiés, p. ex. pour éviter l'usure pendant le transport à travers la machine
B32B 37/02 - Procédés ou dispositifs pour la stratification, p. ex. par polymérisation ou par liaison à l'aide d'ultrasons caractérisés par la séquence des opérations de stratification, p. ex. par addition de nouvelles couches à des postes successifs de stratification
B32B 27/30 - Produits stratifiés composés essentiellement de résine synthétique comprenant une résine vinyliqueProduits stratifiés composés essentiellement de résine synthétique comprenant une résine acrylique
B32B 27/36 - Produits stratifiés composés essentiellement de résine synthétique comprenant des polyesters
B32B 5/02 - Produits stratifiés caractérisés par l'hétérogénéité ou la structure physique d'une des couches caractérisés par les caractéristiques de structure d'une couche comprenant des fibres ou des filaments
B29C 65/00 - Assemblage d'éléments préformésAppareils à cet effet
B32B 27/08 - Produits stratifiés composés essentiellement de résine synthétique comme seul composant ou composant principal d'une couche adjacente à une autre couche d'une substance spécifique d'une résine synthétique d'une sorte différente
B32B 27/12 - Produits stratifiés composés essentiellement de résine synthétique adjacente à une couche fibreuse ou filamenteuse
B32B 37/18 - Procédés ou dispositifs pour la stratification, p. ex. par polymérisation ou par liaison à l'aide d'ultrasons caractérisés par les propriétés des couches toutes les couches existant et présentant une cohésion avant la stratification impliquant uniquement l'assemblage de feuilles ou de panneaux individualisés
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
B29K 667/00 - Utilisation de polyesters pour des pièces préformées, p. ex. pour des inserts
B29L 17/00 - Supports d'enregistrement comportant des sillons ou des tracés fins, p. ex. enregistrements sur disques pour le play-back à aiguilles, sur cylindres
A computer-implemented method and system for managing transaction card accounts involves enabling a transaction card account by a card issuer for use with pre-defined categories of providers of goods/services and goods/services sold and issuing a transaction card and establishing an associated pre-qualified category card account. Upon receiving data for a transaction with the transaction card at a transaction terminal by a processing platform of the card issuer via a card association processing network, the category of the provider and goods/services is interrogated to determine whether or not the transaction can be posted on the pre-qualified category card account of the cardholder, and the transaction is approved and posted to the pre-qualified category card account if the transaction falls within the pre-qualified category of the cardholder.
G06K 5/00 - Méthodes ou dispositions pour vérifier l'exactitude du marquage sur un support d'enregistrementDispositifs de localisation de colonne
G06K 15/00 - Dispositions pour produire une présentation visuelle permanente des données de sortie
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
32.
Transaction card with carbon fiber substructure and method of making same
A transaction card has a substructure consisting at least in part of a layer of fibrous material, such as carbon fiber strands or filaments, arranged in a pre-selected pattern, such as a weave pattern, that is at least partially enclosed by a transparent plastic film. A sheet is laminated on each of two opposing faces of the substructure to form a transaction card core. One or both of the sheets laminated on the opposing faces of the substructure is also made of a transparent material, and one or both of the two opposing faces of the transaction card core can be printed. An over-laminate film, such as a transparent polyvinyl chloride plastic film, can be laminated on each of two opposing faces of the transaction card core.
B32B 3/00 - Produits stratifiés comprenant une couche ayant des discontinuités ou des rugosités externes ou internes, ou une couche de forme non planeProduits stratifiés comprenant une couche ayant des particularités au niveau de sa forme
B32B 19/02 - Produits stratifiés composés essentiellement de fibres ou particules minérales naturelles, p. ex. d'amiante, de mica collées avec ou enrobées dans une substance plastique
B32B 27/04 - Produits stratifiés composés essentiellement de résine synthétique comme substance d'imprégnation, de collage, ou d'enrobage
B42D 25/20 - Cartes ou structures de type feuille portant des informations caractérisées par leurs éléments d’identification ou de sécuritéLeur fabrication caractérisées par une utilisation ou une finalité particulières
33.
Methods and systems for dynamically generating and reusing dynamic web content
Methods and systems for generating and reusing dynamic web content involve, for example, automatically generating client-side code on a server at run time, and automatically downloading the client-side code to the client side at run time. The client-side code is executed on the client side to become a widget with dynamic behavior attributes displayed as a component of a web page on a display screen of a client-side computing device. Dynamic behavior of the client-side code may triggered via an event handler mechanism wherein properties of the client-side code are dynamically changed without affecting any other content on the web page. The widget may be redisplayed on a subsequent occasion with a change in the widget without regenerating the client-side code.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
G06F 9/44 - Dispositions pour exécuter des programmes spécifiques
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
34.
Methods and systems for secure user authentication
For secure user authentication using a one-time password (OTP) application is pre-stored on a device for generating a OTP value responsive to entry of a valid PIN, no part of the PIN is stored on the device and pre-storing on a server the PIN and a valid shared secret for the user. Upon receiving entry a purported PIN, a purported shared secret is dynamically synthesized on the device by the OTP application based on the purported PIN of the user and a purported OTP value is generated based on the purported shared secret. When entry of the purported OTP value is received by the server in an attempt to log on the server from another device, the server cryptographically calculates a purported shared secret based on the purported OTP value, and log on to the server from the other device is allowed if the calculated purported shared secret corresponds to the pre-stored shared secret.
G06Q 20/00 - Architectures, schémas ou protocoles de paiement
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
A computer-implemented method and system for managing transaction card accounts involves enabling a transaction card account by a card issuer for use with pre-defined categories of providers of goods/services and goods/services sold and issuing a transaction card and establishing an associated pre-qualified category card account. Upon receiving data for a transaction with the transaction card at a transaction terminal by a processing platform of the card issuer via a card association processing network, the category of the provider and goods/services is interrogated to determine whether or not the transaction can be posted on the pre-qualified category card account of the cardholder, and the transaction is approved and posted to the pre-qualified category card account if the transaction falls within the pre-qualified category of the cardholder.
G06K 5/00 - Méthodes ou dispositions pour vérifier l'exactitude du marquage sur un support d'enregistrementDispositifs de localisation de colonne
G06F 17/00 - Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 30/02 - MarketingEstimation ou détermination des prixCollecte de fonds
G06Q 50/22 - Aide sociale ou assistance sociale, p. ex. activités de développement communautaire ou services de consultation
36.
Methods and systems for managing transaction card accounts enabled for use with particular categories of providers and/or goods/services
A computer-implemented method and system for managing transaction card accounts involves enabling a transaction card account by a card issuer for use with pre-defined categories of providers of goods/services and goods/services sold and issuing a transaction card and establishing an associated pre-qualified category card account. Upon receiving data for a transaction with the transaction card at a transaction terminal by a processing platform of the card issuer via a card association processing network, the category of the provider and goods/services is interrogated to determine whether or not the transaction can be posted on the pre-qualified category card account of the cardholder, and the transaction is approved and posted to the pre-qualified category card account if the transaction falls within the pre-qualified category of the cardholder.
Methods and systems for routing payment transactions electronically involve interrogating by computer logic each payment transaction received by a payments interface processor to identify a payment destination and a payment source and to determine, according to pre-defined parameters, whether the payment transaction is eligible for processing via an internal payment transaction processor of the financial institution that minimizes processing costs. Eligible payment transactions may be routed, for example, to an internal debit or credit card processor or ACH processor, and ineligible payment transactions may be routed to external card processing networks.
G06Q 40/00 - FinanceAssuranceStratégies fiscalesTraitement des impôts sur les sociétés ou sur le revenu
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p. ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
Methods and systems for managing communication streams from multiple sources while utilizing a single short code employ a processor coupled to memory and other computer hardware and software components for establishing at least one conversation session with an outbound message to a recipient and defining a lifespan of the outbound message of the at least one conversation session. At least one reply to a response from the recipient to the outbound message of the at least one conversation session is delivered during the lifespan of the outbound message of the at least one conversation session.
A method and system for managing transaction card accounts involves providing a customer a transaction card account by a financial institution against which the customer can charge predetermined types of transactions during predefined account statement periods and sending a statement of charges against the account to the customer at an end of each account statement period specifying a due date, after which a predefined late fee is assessed on the account if the statement is not paid. However, the late fee is automatically waived on the account within specified products if the customer makes a purchase or secures a cash advance during the account statement period for which the payment is due. Further, a voice response unit of the financial institution gives the customer a first menu option to opt out of a voice response unit scripted call and speak directly to a live representative about the account at any time during the call.
Methods and systems for routing payment transactions electronically involve interrogating by computer logic each payment transaction received by a payments interface processor to identify a payment destination and a payment source and to determine, according to pre-defined parameters, whether the payment transaction is eligible for processing via an internal payment transaction processor of the financial institution that minimizes processing costs. Eligible payment transactions may be routed, for example, to an internal debit or credit card processor or ACH processor, and ineligible payment transactions may be routed to external card processing networks.
Methods and systems of processing payments globally over one of a plurality of payment processing paths employ computer hardware and software for receiving a request to access a global payment utility, presenting a plurality of payment options by the global payment utility, and receiving information by the global payment utility consisting at least in part of a source of payment, a payment destination, and a user-designated payment vehicle. Upon receiving the information, one of a plurality of payment processing paths for the payment is selected according to a clearing rules aspect of a rules engine of the global payment utility, and the payment is routed for processing via the selected payment processing path.
A method and system for managing employment candidate data utilizes a pre-screen application to enable pre-screening of employment candidates who log on to a website and are prompted to enter additional information and schedule pre-employment tests via the website. The method and system for managing employment candidate data also uses a tracking and testing application to handle screening of candidates' paper-based applications, administration of interviews, hiring pool management, job offer support, and scheduling of training, and is integrated with an applicant tracking system. A resume tracking application of the method and system for managing employment candidate data automatically identifies and merges duplicate resume information to create a single unique resume in the tracking system.
A method and system for building an Internet portal provides a portal toolkit platform consisting at least in part of a portal application server and a web server associated with the portal toolkit platform that is accessible by at least one end user. A business is allowed to access the portal application server and fill one or more content management templates from a selection of content management templates governing content elements to be presented to end users via the website server. When an end user accesses the website server, content governed by the template is presented for the end user by the portal application server via the web server. The business can populate a database with content and populate the web server, for example, with a set of images, HTML files, and other assets such as PDF files and build an Internet portal on top of the toolkit as an approach to integrating transaction systems. The portal toolkit platform provides internationalization, content management, scalability and performance, personalization, navigation, and allows legacy systems to be quickly leveraged.
Methods and systems for performing a pre-staged financial transaction using a computing device involve, for example, receiving, using a self-service transaction terminal processor, pre-staged transaction data in a session at the self-service financial transaction terminal, which pre-staged transaction data was entered on a mobile computing device at a time preceding a time of the session. Thereafter, using the self-service transaction terminal processor, a transaction is executed, based at least in part on the pre-staged transaction data.
G06Q 20/18 - Architectures de paiement impliquant des terminaux en libre-service, des distributeurs automatiques, des bornes ou des terminaux multimédia
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
45.
Methods and systems for routing payment transactions
Methods and systems for routing payment transactions electronically involve interrogating by computer logic each payment transaction received by a payments interface processor to identify a payment destination and a payment source and to determine, according to pre-defined parameters, whether the payment transaction is eligible for processing via an internal payment transaction processor of the financial institution that minimizes processing costs. Eligible payment transactions may be routed, for example, to an internal debit or credit card processor or ACH processor, and ineligible payment transactions may be routed to external card processing networks.
Methods and systems for generating and reusing dynamic web content involve, for example, automatically generating client-side code on a server at run time, and automatically downloading the client-side code to the client side at run time. The client-side code is executed on the client side to become a widget with dynamic behavior attributes displayed as a component of a web page on a display screen of a client-side computing device. Dynamic behavior of the client-side code may triggered via an event handler mechanism wherein properties of the client-side code are dynamically changed without affecting any other content on the web page. The widget may be redisplayed on a subsequent occasion with a change in the widget without regenerating the client-side code.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
G06F 9/44 - Dispositions pour exécuter des programmes spécifiques
47.
Method and system for conducting commerce over a wireless communication network
Described herein is an enabling product that facilitates implementation of an m-commerce business solution. According to an embodiment of the present invention an m-commerce solution includes: a content provider or merchant site that provides products and goods to be purchased; a payment system allowing online authorization of funds to purchase the goods; and a wireless network for all customer interactions. Embodiments described herein perform at least one of the following three functions: 1) protocol conversions; 2) customer information reposing, and 3) payment authorization system interfacing.
A system and method for associating consumers with their purchases so that consumer transactions can be tied back to a particular consumer is described. More particularly, a central transaction entity as part of a larger network collects, aggregates, manages and mines consumer transaction data from at least consumer and merchant members of the network for the purpose of routing electronic purchase history to consumers and allowing merchant analysis of consumer behavior in order to create consumer profiles to better service consumers and provide more personalized offers.
Methods and systems for routing payment transactions electronically involve interrogating by computer logic each payment transaction received by a payments interface processor to identify a payment destination and a payment source and to determine, according to pre-defined parameters, whether the payment transaction is eligible for processing via an internal payment transaction processor of the financial institution that minimizes processing costs. Eligible payment transactions may be routed, for example, to an internal debit or credit card processor or ACH processor, and ineligible payment transactions may be routed to external card processing networks.
Computer-implemented methods and systems for managing consumer transactional accounts provides a temporary line of credit with an installment option that a consumer can use for specific occasions or life events. The account remains open for only a limited period of time during which interest does not accrue. Thereafter, the account automatically expires, interest begins to accrue on the amount charged on the account, and an invoice is sent to the consumer with a number of payment options.
A method and system for securely logging onto a banking system authentication server so that a user credential never appears in the clear during interaction with the system in which during a log on process, an encryption applet and the public key of a public/private key pair of a banking application server, the private key for which is known by a hardware security module (HSM) of the banking application, are downloaded by a user's browser. The applet contains code for generating a DES key and performing DES and PKI encryption. A user's credential is DES encrypted, and the DES key is PKI encrypted with the public key of the application server by the applet before being transmitted to the application server. Within the HSM of the application server, the HSM decrypts and re-encrypts the credential under a new DES key known to the authentication server, the re-encrypted credential is forwarded to the authentication server, decrypted with the new DES key known to the authentication server, and verified by the authentication server.
Methods and systems for managing transaction card accounts in which cardholders are permitted to incur transaction charge balances on existing transaction card accounts and substituting the existing transaction card for each of at least a portion of the plurality of cardholders with a different transaction card product upon an occurrence of one of termination of a private label or co-branded agreement and a predetermined level of inactivity on the transaction card account which has significant additional features and benefits absent from the existing transaction card product.
A delivery system and method allow a financial institution to provide financial services to a plurality of remote devices and internally within the financial institution to staff terminals using a set of re-usable global components which are modular and are organized into services sets. The system and method operate in sessions and, for instance, employ a dialog component for gathering information from a customer, a rule broker component for providing answers to the various legal and regulatory rules in a particular country, a language man component for selecting appropriate language, a transaction executor component for performing transactions, and a presentation manager component for formatting outputs to the customer. The system and method provide interfaces which can be configured and delivered to the customer in a globally consistent format that is based on the customer's account profile, various languages, various currencies, different legal regulatory requirements, as well as, different sets of business products.
Methods and systems for secure user authentication using a OTP involve, for example, pre-storing a OTP application on a first computing device for generating a valid OTP value for the user responsive to receiving entry of a valid PIN value of the user, no part of the valid PIN value is stored on the first computing device and pre-storing on a back-end server the valid PIN value and a valid shared secret for the user. Upon receiving entry of a purported PIN value of the user, a purported shared secret is dynamically synthesized on the first computing device by the OTP application based on the purported PIN value of the user and a purported OTP value is generated on the first computing device. When entry of the purported OTP value is received by the back-end server in an attempt to log on the back-end server from a second computing device, the back-end server cryptographically calculates a window of OTP values, and log on to the back-end server from the second computing device is allowed if the calculated window of OTP values corresponds to the received OTP value.
G06Q 20/00 - Architectures, schémas ou protocoles de paiement
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A method and system for purchased-based segmentation of potential customers employs the use of actual, observed purchases instead of presumptions and correlations to improve the accuracy of segmentation and involves collecting empirical data for a client on actual purchasing behavior of a group of customers and applying statistical modeling techniques to the empirical purchasing behavior data to identify segments or clusters of the customers that exhibit similar purchasing propensity characteristics. Thereafter, the segments or clusters are further differentiated from one another according to other factors having a tendency to directly affect actual purchasing behavior of the customers within the segments or clusters, and potential customers are then identified according to a correlation with the segments or clusters for customized marketing.
A payment device has identifiers, read in a magnetic strip or visual indicia by a healthcare provider, for an influenza vaccine and an account issued by an issuer to a party (e.g.; a governmental entity) upon which a transaction can be conducted that is limited to administering the influenza vaccine. The healthcare provider sends an authorization request for the transaction for delivery through its acquirer and a transaction handler to the issuer. The issuer uses the identifiers to authorize the healthcare provider to administer the influenza vaccine and to conduct the transaction, and sends an authorization response to the authorization request back through the transaction handler and the acquirer. After the receiving of the authorization response, the healthcare provider administers the influenza vaccine and conducts the transaction on the account for the sale of the service of the administering of the influenza vaccine.
A computer-implemented method and system for managing transaction card accounts involves enabling a transaction card account by a card issuer for use with pre-defined categories of providers of goods/services and goods/services sold and issuing a transaction card and establishing an associated pre-qualified category card account. Upon receiving data for a transaction with the transaction card at a transaction terminal by a processing platform of the card issuer via a card association processing network, the category of the provider and goods/services is interrogated to determine whether or not the transaction can be posted on the pre-qualified category card account of the cardholder, and the transaction is approved and posted to the pre-qualified category card account if the transaction falls within the pre-qualified category of the cardholder.
Methods and systems for secure user authentication utilizes OTP generation and validation techniques in which the shared secret for generating the OTP is not stored in the user's mobile device but instead is dynamically synthesized based on a PIN that activates the OTP generation and the personalized OTP data. The client software has no knowledge of what the correct PIN should be and always generates a normal looking OTP based on whatever PIN is entered, and the only way to learn whether or not the OTP is correct is to submit it during user login. By limiting the number of failed login attempts before the account is locked, brute-force attacks via the online channel will fail, and further, brute-force attacks to uncover the correct PIN for generating the correct OTP offline will also fail even if a hacker steals the user's mobile device and extracts the data inside for offline hacking, because there is nothing on the client that contains the PIN or encrypted by the PIN.
A system and method whereby an unregistered, anonymous user at an organization's website makes a submission/inquiry and is able to access a secure response containing private information without pre-registering or establishing an account with the organization. A response to the user is made via an unsecured e-mail notification that provides the user with an HTTPS link to an authentication page. The user then enters his/her user identification, for example, the user email address and password which was associated with the original submission/inquiry. Once the email address and password is authenticated, the secure response message is displayed on the user's web browser in SSL. Each response is provided on a per-submission basis.
G06F 9/00 - Dispositions pour la commande par programme, p. ex. unités de commande
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
G06F 17/00 - Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
60.
Methods and systems for updating web pages via a web data instant update utility
A method for updating web pages on a web server without republishing the web pages involves providing on a production database server a live version of one or more business data tables containing information used to populate web pages on a production web server and storing in a quality assurance database server a quality assurance version of the business data tables that can be used to populate pages on a quality assurance web server. A maker at a business workstation can access the quality assurance database server from time to time and enter a change to data on the quality assurance version of the business data tables. Thereafter a checker at a business workstation accesses the quality assurance database server to review and approve or reject the changes to the data on the quality assurance version of the business data tables, and if the checker approves the changes, the changes to the data on the quality assurance version of the business data tables are replicated from the quality assurance database server to the live version of the business data tables on the production database server.
A computer-implemented method and system for managing transaction card accounts involves enabling a transaction card account by a card issuer for use with pre-defined categories of providers of goods/services and goods/services sold and issuing a transaction card and establishing an associated pre-qualified category card account. Upon receiving data for a transaction with the transaction card at a transaction terminal by a processing platform of the card issuer via a card association processing network, the category of the provider and goods/services is interrogated to determine whether or not the transaction can be posted on the pre-qualified category card account of the cardholder, and the transaction is approved and posted to the pre-qualified category card account if the transaction falls within the pre-qualified category of the cardholder.
G06Q 40/00 - FinanceAssuranceStratégies fiscalesTraitement des impôts sur les sociétés ou sur le revenu
G07D 11/00 - Dispositifs acceptant des pièces de monnaieDispositifs acceptant, distribuant, triant ou comptant des papiers de valeur
G07F 19/00 - Systèmes bancaires completsDispositions à déclenchement par carte codée adaptées pour délivrer ou recevoir des espèces ou analogues et adresser de telles transactions à des comptes existants, p. ex. guichets automatiques
G06K 5/00 - Méthodes ou dispositions pour vérifier l'exactitude du marquage sur un support d'enregistrementDispositifs de localisation de colonne
62.
Methods and systems for managing financial institution customer accounts
A computer-implemented method and system for managing financial institution customer transaction accounts involves issuing a relationship presentment card with a relationship identifier unique to the customer that is linked to a plurality of the customer's financial institution transaction accounts via pre-defined parameters for determining to which of the customer's linked accounts to post particular transactions with the relationship presentment card. Thereafter, when data for a transaction with the card is received by a processing platform of the financial institution via a merchant acquirer and a card association processing network, the card processing platform of the financial institution identifies a particular financial institution account of the customer to which the transaction should be posted according to the pre-defined parameters based on the transaction data and posts the transaction to the identified financial institution account of the customer.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 40/02 - Opérations bancaires, p. ex. calcul d'intérêts ou tenue de compte
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
Computer-implemented methods and systems for creating and managing website content involve, for example, providing a user at a computer terminal a data capture template for a user-selected content type, providing the user at the computer terminal presentation pages using content management tags, allowing the user at the computer terminal to author content using the data capture template, and allowing the user at the computer terminal to deploy the content to a server. Other aspects of the methods and systems for creating and managing website content include, for example, allowing the user to personalize content, allowing the user to embed dynamic content in the middle of static content, allowing the user to refresh the deployed content in real-time without impacting current existing user sessions on the server where content is being deployed.
A method and system for managing transaction card accounts involves providing a customer a transaction card account by a financial institution against which the customer can charge predetermined types of transactions during predefined account statement periods and sending a statement of charges against the account to the customer at an end of each account statement period specifying a due date, after which a predefined late fee is assessed on the account if the statement is not paid. However, the late fee is automatically waived on the account within specified products if the customer makes a purchase or secures a cash advance during the account statement period for which the payment is due. Further, a voice response unit of the financial institution gives the customer a first menu option to opt out of a voice response unit scripted call and speak directly to a live representative about the account at any time during the call.
A computer-implemented method and system for secure user authentication in electronic commerce involves maintaining electronic information having a first aspect that is accessible over a first electronic communication channel in response to entry of a first credential known to the user and a second aspect that is accessible by the user over the first electronic communication channel in response to entry of a second credential provided to the user at a pre-registered delivery address on a second electronic communication channel. The second credential is provided to the user via the second electronic communication channel in response to entry of a pre-determined user selection during a current session of user access to the first aspect if no change has occurred in the pre-registered delivery address within a pre-determined period of time, and the user is allowed a session of access to the second aspect in response to entry of the second credential either during the current session of user access to the first aspect or during a succeeding session of user access to the first aspect.
G06F 7/04 - Contrôle d'égalité, c.-à-d. pour valeurs égales ou non
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04N 7/16 - Systèmes à secret analogiquesSystèmes à abonnement analogiques
66.
Methods and systems for management of data for multiple call centers
Computer-implemented methods and systems for management of real-time and historical data for multiple call centers in which real-time and historical data are received electronically from a plurality of call center sites and displayed simultaneously for each of the plurality of call center sites on a single display screen in a separate call center site column for each call center and integrated and displayed for all of the plurality of call center sites in a separate division column on the single display screen.
Computer-implemented methods and systems for managing consumer transactional accounts provides a temporary line of credit with an installment option that a consumer can use for specific occasions or life events. The account remains open for only a limited period of time during which interest does not accrue. Thereafter, the account automatically expires, interest begins to accrue on the amount charged on the account, and an invoice is sent to the consumer with a number of payment options.
A platform and program for enhancing the value and desirability of a credit card (or other payment product) to a card holder and encouraging increased use of the card as a payment device by rewarding the card holder based not only on qualifying purchases but on miles traveled in connection with travel ticket or travel pass purchases. The inventive program leverages qualifying transaction information and other data (e.g., Level 3 Data) which automatically flow with such transaction information. The rewards redeemed by the card holder according to the inventive platform and program are not tied to a particular provider of goods or services, and reward fulfillment is managed through the card issuer or its fulfillment agent.
Providing an account-based product. A communications portal is provided and consumer data is received via the portal. At least one derived characteristic, e.g., qualification, is determined contemporaneously from the consumer data. A product set is presented, via the portal, including at least one product determined at least in part by the derived characteristic. A selection from the product set is received via the portal, and at least one product feature, e.g., balance transfer, of at least one selected product is activated contemporaneous with the product selection.
The present invention relates particularly to a method and system for consolidating a plurality of a consumer's payment and non-payment source accounts into a consolidated platform with a customer identification or available proxy account numbers that can be assigned to source accounts. The source accounts can be, for example, credit card accounts, ATM accounts, debit card accounts, demand deposit accounts, stored-value accounts, merchant-loyalty card accounts, membership accounts, and identification card numbers. The consumer can access and modify any of the source accounts and manage funds across the source accounts by accessing the consolidated platform with a single access device or mode.
A computer-implemented method and system for managing financial institution customer transaction accounts involves issuing a relationship presentment card with a relationship identifier unique to the customer that is linked to a plurality of the customer's financial institution transaction accounts via pre-defined parameters for determining to which of the customer's linked accounts to post particular transactions with the relationship presentment card. Thereafter, when data for a transaction with the card is received by a processing platform of the financial institution via a merchant acquirer and a card association processing network, the card processing platform of the financial institution identifies a particular financial institution account of the customer to which the transaction should be posted according to the pre-defined parameters based on the transaction data and posts the transaction to the identified financial institution account of the customer.
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives