G06K5/00

Systems and methods for cash-till optimization

The operation of one or more cash handling devices may be remotely modified by updating locally stored cash dispensing data at each of the one or more cash handling devices based at least in part on optimization data generated at a monitoring server. Operational data is received from the one or more cash handling devices and utilized to generate historical data within a historical database. Optimization parameters are received for each of one or more cash handling devices, and the optimization parameters are utilized together with the generated historical data to generate optimization data utilizing one or more optimization models. The optimization data is transmitted to applicable cash handling devices to cause the cash handling device to update locally stored executing instructions causing operation of the cash handling device to dispense cash into one or more register tills.

System and method for digital media content creation and distribution

A method and system for providing on-site content delivery and on-demand content access. The method comprising recording digital media content on a DMR device, managing distribution of the digital media content to one or more remote devices, automatically distributing the digital media content to the one or more remote devices, the distributed digital media content configured for local hosting at the one or more remote devices, and monitoring consumption of the digital media content distributed to the one or remote devices.

Portable terminal, information display system, information display method, and multi-tag
09842235 · 2017-12-12 · ·

A problem is to provide a portable terminal, an information display system, an information display method, and a multi-tag in which two sheets of two-dimensional bar code for download and for individual information data reading need not be installed and hence an installation space can be reduced and a user need not select which bar code is to be read. A processing section (11) of a portable terminal (1) sets a transfer destination for a message of a read-out multi-tag to be a different destination depending on whether a tag reading application (113) has been installed in the own terminal (1).

System to identify vulnerable card readers

Example embodiments relate to a network-based vulnerability detection system configured to access a database of customer transaction data corresponding to a set of card readers that includes transaction codes, receive an identification of a set of compromised card readers among the set of card readers, identify common transaction codes within the transaction data of the set of compromised card readers, and correlate the common transaction codes to one or more instances of fraud associated with the compromised set of card readers. In some example embodiments, the vulnerability detection system may be applied to monitor one or more card readers, receive transaction data corresponding to transaction conducted through the card readers, identify the common transaction codes correlated to the instances of fraud, and cause display of a notification that includes an indication of the instance of fraud at a client device.

Semantic card view

Architecture that enables a card interaction model that can present cards in different ways. When a user performs tasks, new stacked cards (one card on top of another card) corresponding to those tasks open in a left pane over the top of a background canvas (a card overlay of the underlying canvas). Users can scroll through the card stack of the card overlay to retrieve previous cards. Additionally, in an alternative viewing mode, a user can interact with the card overlay via an interactive affordance (an interactive object made available to facilitate a potential action) to enable viewing (e.g., an overview) of the cards in a side-by-side card overlay manner to further enable the opening and quick navigation to one of the previous cards. The architecture has applicability to mapping systems where searches range over many different geographical sites.

Augmented reality numberless transaction card

A method implemented on an augmented reality (AR) electronic device includes receiving a request to activate a transaction card account on a transaction card. The transaction card account is activated on the transaction card. A virtual representation of account information corresponding to the transaction card account is displayed on the AR electronic device. The exterior of the transaction card is free of account identifying information.

System incorporating actively authenticated multifactor proximity card
09830550 · 2017-11-28 · ·

A portable card includes a resonance circuit of the portable card that wirelessly receives power from an external source, a processor of the portable card that wirelessly transmits a predetermined data sequence in response to the resonance circuit receiving power from the external source, and a set of at least three contacts on an exterior of the portable card, wherein a user bridges the contacts with the user's fingers in a predetermined combination to create a circuit and activate the processor for transmission of the predetermined data sequence.

Resolving card malfunctions using card information access control

An apparatus that includes a vision system configured to capture images of two-dimensional barcodes. The apparatus further includes a processor operably coupled to the vision system and a network interface. The processor is configured to process a captured image of a two-dimensional barcode on a card to obtain card processing information, to obtain user information for a user associated with the card, and to combine the card processing information with the user information to generate a resolution request message. The network interface is configured to send the resolution request message to an institution associated with the card.

Systems and methods for a wearable user authentication factor

A system, method, and computer-usable medium are disclosed for providing multifactor authentication with a wearable user authentication factor. A multi-factor authentication module is implemented to use a plurality of authentication factors, including a unique tag identifier associated with an electronic tag embedded within a wearable article, such as a ring or watch, for the authentication of a user. A user of a wearable user authentication factor approaches a multi-factor terminal, which detects the electronic tag and reads its unique identifier. The user is then requested to provide a predetermined biometric feature, such as a fingerprint, to a biometric reader. The biometric feature is processed to generate a unique biometric identifier. The unique identifier of the electronic tag and the unique biometric identifier is then submitted to a multi-factor authentication module, which compares it to authentication information associated with the user. If the submitted unique identifiers match the user's authentication information, then the user is authenticated.

Systems and methods for a wearable user authentication factor

A system, method, and computer-usable medium are disclosed for providing multifactor authentication with a wearable user authentication factor. A multi-factor authentication module is implemented to use a plurality of authentication factors, including a unique tag identifier associated with an electronic tag embedded within a wearable article, such as a ring or watch, for the authentication of a user. A user of a wearable user authentication factor approaches a multi-factor terminal, which detects the electronic tag and reads its unique identifier. The user is then requested to provide a predetermined biometric feature, such as a fingerprint, to a biometric reader. The biometric feature is processed to generate a unique biometric identifier. The unique identifier of the electronic tag and the unique biometric identifier is then submitted to a multi-factor authentication module, which compares it to authentication information associated with the user. If the submitted unique identifiers match the user's authentication information, then the user is authenticated.