Patent classifications
G06Q20/30
Computer-based system for secure curbside banking
Techniques discussed herein describe an example system for verifying the identity and location of a customer in a bank branch parking lot. A server determines whether to provision a service for a vehicle based on telemetry data received from a telemetry module on the vehicle in a fleet of vehicles. The telemetry data includes a first location and status information of the vehicle. The server identifies a vendor to provide the service and directs the vehicle to a second location of the vendor from the first location of the vehicle. The server provides authorization to the vehicle for an on-board transaction module to initiate a request for the service when the vehicle is at the second location of the vendor.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR GENERATING EMBEDDINGS FOR OBJECTS
Provided are computer-implemented methods for generating embeddings for objects which may include receiving heterogeneous network data associated with a plurality of objects in a heterogeneous network; selecting at least one pattern of objects; determining instances of each pattern of objects based on the heterogeneous network data; generating a pattern matrix for each pattern of objects based on the instances of the pattern of objects; generating pattern sequence data associated with a portion of each pattern matrix; generating network sequence data associated with a portion of the heterogeneous network data; and combining the pattern sequence data and the network sequence data into combined sequence data. In some non-limiting embodiments or aspects, methods may include generating a vector for each object of the plurality of objects based on the combined sequence data. Systems and computer program products are also provided.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR GENERATING EMBEDDINGS FOR OBJECTS
Provided are computer-implemented methods for generating embeddings for objects which may include receiving heterogeneous network data associated with a plurality of objects in a heterogeneous network; selecting at least one pattern of objects; determining instances of each pattern of objects based on the heterogeneous network data; generating a pattern matrix for each pattern of objects based on the instances of the pattern of objects; generating pattern sequence data associated with a portion of each pattern matrix; generating network sequence data associated with a portion of the heterogeneous network data; and combining the pattern sequence data and the network sequence data into combined sequence data. In some non-limiting embodiments or aspects, methods may include generating a vector for each object of the plurality of objects based on the combined sequence data. Systems and computer program products are also provided.
A SYSTEM AND METHOD FOR SECURELY DELIVERING INFORMATION
A computer-implemented method for correlating payment service submissions and data captured from a call stream is described herein. The method comprises receiving data captured from a call stream by a data capture device; receiving a payment service submission comprising an identifier; determining an association between the identifier and the call stream; and replacing the identifier in the payment service submission with the data captured from the call stream associated with the identifier.
System and method for accessing data via smart articles including purchasing data
A networked system comprises a main controller that allows users to act as customers, promoters or merchants of smart articles that are displayed by promoters who have purchased these articles from the merchants. The customer uses a controller device to access data from the smart article by capturing an identifying marker on the article and transmitting the foregoing data to the main controller which places the customer in communication with a merchant controller associated with the merchant from whom the promoter purchased the article. The merchant can thus provide data regarding the article to the customer via the main controller and depending on how the customer acts, the merchant can allocate a reward to the promoter via a promoter controller associated therewith.
System and method for accessing data via smart articles including purchasing data
A networked system comprises a main controller that allows users to act as customers, promoters or merchants of smart articles that are displayed by promoters who have purchased these articles from the merchants. The customer uses a controller device to access data from the smart article by capturing an identifying marker on the article and transmitting the foregoing data to the main controller which places the customer in communication with a merchant controller associated with the merchant from whom the promoter purchased the article. The merchant can thus provide data regarding the article to the customer via the main controller and depending on how the customer acts, the merchant can allocate a reward to the promoter via a promoter controller associated therewith.
Enrolling a payer by a merchant server operated by or for the benefit of a payee and processing a payment from the payer by a secure server
Processing a payment from a payer to a payee (operating a first computing system), by a second computing system, by receiving an electronically-generated payment transaction instruction (identifying the payer, specifying the amount of the payment, and specifying a communications link for the second computing system to obtain financial account information from the payer) from the first computing system, obtaining the financial account information from the payer via the specified communications link, generating an electronic data token representing the financial account information, outputting the electronic data token for transmittal to the first computing system (where the first computing system does not receive the financial account information and the second computing system does not provide the electronic data token to the payer), obtaining the amount from the payer using the financial account information, and forwarding at least a portion of the amount to the payee.
Conducting secure transactions by detecting credential message with audio between first appliance and second appliance
Provided is a system, method, and computer program product for conducting secure transactions with at least two appliances. The method includes monitoring audio data with a first appliance including a processor, a speaker, and a microphone; detecting, with the first appliance, an audible request to initiate a transaction from a user from the audio data; communicating, with the first appliance, a transaction request to at least one remote server in response to detecting the audible request to initiate the transaction; detecting, with the first appliance, a credential message received by the first appliance directly from a second appliance via an audio transmission, the credential message corresponding to the transaction request and including a limited use key provided to the second appliance from the at least one remote server or another remote server; and in response to detecting the credential message, initiating, with the first appliance, the transaction based on the limited use key.
METHODS AND SYSTEMS FOR SEAMLESSLY TRANSPORTING OBJECTS BETWEEN CONNECTED DEVICES FOR ELECTRONIC TRANSACTIONS
Methods and Systems are disclosed for displaying objects between disparate devices connected to an electronic network. One method comprises detecting, by a multimedia device connected to an electronic network, an object in a multimedia stream; determining an identifier associated with the detected object; detecting a mobile device connected to the electronic network, the mobile device being a device other than the multimedia device; and generating a display of the detected object at the detected mobile device.
System for harnessing a connected network to securely verify a transaction
A method for harnessing a connected network to securely verify and execute a transaction is provided. The method may include requesting a PIN from a mobile device. The request may be transmitted via a USSD message. The method may also include receiving the PIN from the mobile device. The PIN may be received via a response to the USSD message. The method may also include authenticating the mobile device. The method may also include accessing a third-party network to verify an authentication status of the mobile device. The third-party network may include a plurality of IoT endpoints. Each IoT endpoint may include a stored verification usage process. The stored verification usage process may relate to a user associated with the mobile device. The method may also include executing the transaction upon receipt of an authentication signal from the third-party network.