Patent classifications
G06Q20/045
Systems and methods for mobile automated clearing house enrollment
Systems and methods for mobile enrollment in automated clearing house (ACH) transactions using mobile-captured images of financial documents are provided. Applications running on a mobile device provide for the capture and processing of images of documents needed for enrollment in an ACH transaction, such as a blank check, remittance statement and driver's license. Data from the mobile-captured images that is needed for enrolling in ACH transactions is extracted from the processed images, such as a user's name, address, bank account number and bank routing number. The user can edit the extracted data, select the type of document that is being captured, authorize the creation of an ACH transaction and select an originator of the ACH transaction. The extracted data and originator information is transmitted to a remote server along with the user's authorization so the ACH transaction can be setup between the originator's and receiver's bank accounts.
Apparatus for printing, displaying, and managing documents, digital content, advertising, social media, mobile catalogues and the like for retail premises, and system thereof
A retail ticking system including a processing unit, a web services server for receiving sent messages from a terminal client device and delivering presentation data to the terminal, a credential server for receiving and verifying a processed credential access request, a profile management server for storing and retrieving user information, and a message broker adapted to receive and manage event messages.
Method and Printer Driver Unit for Performing Transaction by Automatically Transmitting Data to EDC Terminal
The present disclosure is related to a printing driver unit, which discloses method and printer driver unit for performing a transaction by automatically transmitting data to an Electronic Data Capture (EDC) terminal. Method includes receiving, by printer driver unit associated with host computing device, first print request including first data related to purchase, from host computing device. Further, the printer driver unit extracts final transaction amount from first data and determines status of EDC terminal upon extracting final transaction amount. When EDC terminal is determined to be in first state, the printer driver unit generates a second print request including extracted final transaction amount and transmits the generated second print request to EDC terminal to facilitate automatic insertion of final transaction amount in EDC terminal to initiate payment transaction. Embodiments herein helps in auto-populating final transaction amount in EDC terminal, without the help of vendor specific billing system.
BEHAVIORAL ANALYTICS FOR CRYPTOGRAPHIC TOKENS THAT LINK TO REAL WORLD OBJECTS
Systems and methods that generate data representing an analytic result relating to at least one of a state, a workflow, or an event in a digital token system, including a digital token system that cryptographically links a set of digital tokens to instances of a set of real-world entities. The systems and methods produce a behavioral analytic by processing a set of collected data, structuring and filtering the collected data to obtain a multi-dimensional structured data set, and querying the multi-dimensional structured data set. Systems and methods further leverage a set of data collection services configured to collect data from one or more interfaces, a set of workflows configured to produce event data, and a data store configured to store collected attribute data.
System and method for processing transaction records for users
A computer system can implement a network service by receiving, from a computing device of a user, image data comprising an image of a record. The computer system can then execute image processing logic to determine a set of information items from the image. The computer system may then execute augmentation logic to process the record by (i) accessing a transaction database to identify a plurality of transactions made by the user, (ii) identifying a matching transaction from the plurality of transactions that pertains to the record, and (iii) resolving the set of information items using the matching transaction.
Digital certificate and reservation
An access device is provided for use in an access control system. The access device includes a processor having control of a door lock, and a communication module connected to the processor. The processor is able to receive a reservation certificate presented by a portable terminal through the communication module. The processor activates the door lock when the current reservation certificate has been presented and disables an alarm system when the current reservation certificate has been presented.
SYSTEM FOR ADVISING CONSUMERS ON OPTIMAL PEDESTRIAN ROUTES BASED ON TRANSACTION HISTORY
Aspects described herein may provide determination of a pedestrian route for a user to reach a seating area inside of a venue. Financial transaction data of the user may be reviewed to determine the user purchased one or more tickets to an event at the venue. Information regarding the event or the venue may be determined including seating charts for the venue and whether the tickets are for assigned or unassigned seats. Crowd densities inside and outside of the venue may be determined. The pedestrian route may be determined based on the crowd densities, number of tickets, and type of seating. The route may be updated as conditions change including any change to the crowd densities or change to seating availability. The route may increase a likelihood that the user reaches the seating area prior to a start of the event, and in a less stressful manner.
ANOMALY AND FRAUD DETECTION WITH FAKE EVENT DETECTION USING MACHINE LEARNING
The present disclosure involves systems, software, and computer implemented methods for transaction auditing. One example method includes training at least one machine learning model to determine features that can be used to determine whether an image is an authentic image of a document or an automatically generated document image, using a training set of authentic images and a training set of automatically generated document images. A request to classify an image as either an authentic image of a document or an automatically generated document image is received. The machine learning model(s) are used to classify the image as either an authentic image of a document or an automatically generated document image, based on features included in the image that are identified by the machine learning model(s). A classification of the image is provided. The machine learning model(s) are updated based on the image and the classification of the image.
TIPPING TO TICKET AT ELECTRONIC GAMING MACHINE (EGM) USING SERVICE WINDOW OR A MOBILE DEVICE
Embodiments of the present disclosure relates to a gaming system including a printer, a processor coupled with the printer, and a memory coupled with and readable by the processor. The memory can store therein a set of instructions which, when executed by the processor, causes the processor to maintain an electronic record storing a value. The value stored in the record can indicate a balance of a credit meter for a player of the gaming system. The instructions can further cause the processor to receive a request to transfer an amount from the credit meter to a physical token, validate the request to transfer the amount from the credit meter to the physical token, and in response to validating the request, update the electronic record to decrement the balance of the credit meter by the amount and generate, through the printer, the physical token with an indication of the amount.
Systems and methods for message presentation using contactless cards
Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.