Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

52results about How to "Transaction can be blocked" patented technology

Double recognizing method by means of telephone number and identification code for online credit card transactions over the internet

The present invention relates to a “double recognizing method by means of telephone number and identification code for online credit card transactions over the internet,” in which the credit card holder not only registers a “self-chosen code” by himself / herself for VBV (Verified By VISA) or MSC (MasterCard SecureCode) network identity verification but also registers another set of “telephone number and identification code” by himself / herself for serving as an exclusive personal double identity recognizing information for online credit card transactions. The credit card issuing bank registers and stores the set of “telephone number and identification code” on a double recognizing database after checking truth of the related identity certificate provided by the credit card holder. When the credit card issuing bank handles the online credit card transaction of the credit card holder over the network, the credit card issuing bank not only proceeds the check on the “self-chosen code” used in the original VBV or MSC verification system but also performs the double check on the “telephone number and identification code” used in the telecommunications transceiving processor platform of the internal credit card double recognizing computer system, for example by sending out a short message to the credit card holder for requesting him / her to immediately reply by another short message to his / her “telephone number and identification code.”
Owner:LIN CHUNG YU

Method, system and program product for communicating e-commerce content over-the-air to mobile devices

Product or service information in the form of selected wireless e-commerce content is transmitted from a server to a mobile device, such as mobile telephone or personal digital assistant. The e-commerce content is transmitted either in response to an explicit user request for communication of the e-commerce content, or, in the alternative, is “pushed” to the mobile device as permitted by a user but in the absence of a specific request. The e-commerce content received at the mobile device is presented to a user by the mobile device in textual or graphical format in conjunction with an indication of a communication needed to consummate an e-commerce transaction. If the user desires to purchase the good or service represented by the e-commerce content, the user initiates the communication indicated by the e-commerce content.
Owner:OVERSTOCK COM

Method of processing credit payments at delivery

A method of processing signature-required payment using a handheld device with a wireless access capability is disclosed. When a consumer buys goods from a seller, the seller and consumer agree on the amount of payment and acceptable payment species. The delivery person of the shipper who delivers the goods on behalf of the seller processes the payment using customer's credit / debit card and a cellular phone or handheld device at the door of the customer. Upon approval of the payment, the delivery person releases the goods to the customer.
Owner:HYPERCOM CORP

Anti-fraud POS transaction system

Anti-fraud measures are provided for a point-of-sale transaction using various consumer-oriented financial instruments such as credit cards, debit cards, and checks. Through a network, the payer is authenticated by a machine-readable official identification document and the availability of funds is verified by the payer's financial institution before the transaction is completed and the funds are immediately secured during the transaction. The entire transaction is securely verified and maintained in such a way that no party has a chance to alter any part of the transaction.
Owner:SONG YUH SHEN +3

Systems and methods for controlling payment processing

ActiveUS20110184857A1Avoid overdraft feeAvoid declined transactionFinancePayment architecturePayment transactionFinancial transaction
A computer-implemented method for generating a financial product that is configured to be used for one or more payment transactions. The method includes receiving a selection of a plurality of core accounts for providing financial backing for the financial product, and generating the financial product based on one or more control parameters that define use restrictions for the financial product.
Owner:VERIENT

Method and apparatus for verifying a financial instrument

An apparatus and method for verifying a customer's legitimacy to use a payment instrument based on access to financial account information provided by the instrument issuer is disclosed. A seller accepts details about goods and services to be delivered, and information about a payment instrument to be used in a purchase by a customer. More specifically, a merchant accepts information about a financial account from the customer including the account's billing address and the account's telephone number associated with the billing address. The merchant obtains a verified billing address from the financial institution holding the financial account by using an address verification system (AVS) and a verified physical address by performing a reverse telephone number query against a reverse telephone number database. The merchant then compares the verified billing address to the verified physical address. For further security the merchant can call either the telephone number provided by the customer or the numbers obtained from the reverse look up or AVS. The number may be called with an interactive voice system and ask questions about the transaction to verify that the customer has indeed made the transaction. Regardless of whether the telephone number provided by the “customer” is at the billing address or not, if a person commits fraud they gave a phone number where they can be reached and that phone number provides a link to the frauder which makes it easier to locate and prosecute them. Just the presence of such a link will deter some frauders.
Owner:KAGI

Last-room-available search apparatus and method

A system and method for customer-oriented searching and purchasing of goods and services relies on a database having records corresponding to purveyors, products and services, and purchasers and maintained by a third party independent from all the foregoing. Searches may obtain information with or without cooperation of purveyors (vendors). Filtering before presentation to a user, according to specific needs or requirements eliminates inapplicable vendors, products, or services. Particularly, if quality rating, features, or actual availability is lacking, the system does not waste a user's time to evaluate. Deal-killer parameters and values punish vendors lacking disclosure. Rather than publish what the seller wants to advertise, the system retrieves for a user the information on items that meet criteria of, and according to their importance to, a user, especially deal-killer parameters.
Owner:PATEL NARENDRA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products