Patent classifications
G06Q20/18
Jukebox with customizable avatar
A digital downloading jukebox system including a mechanism for delivering custom services to a recognized user is provided. For example, information specific to a recognized user may be stored and optionally may include a recognized user avatar representative of the recognized user. The user avatar may be an image, video, and/or animation, which may be displayed on and/or played through the jukebox. The user avatar may be associated with transactions associated with the user. For example, an avatar may be displayed when a playlist of the recognized user is played, when a message is sent, etc. In other examples, the avatar may introduce instances of media by playing an audio and/or video message, and the avatar may sing, dance, etc. while an instance of media is playing.
Maintaining secure access to a self-service terminal (SST)
A memory device is interfaced to a SST; an identifier and, optionally, an invalid identifier list are received from the device. The invalid identifier list is updated to the SST when the invalid identifier list is a more recent version of a SST invalid identifier list. The identifier is invalidated when the identifier is matched in the invalid identifier list or when an expiration date associated with the identifier has expired. When the identifier is invalid, access to administrative features of the SST is denied; and when the identifier is valid access to the administrative features is granted.
Maintaining secure access to a self-service terminal (SST)
A memory device is interfaced to a SST; an identifier and, optionally, an invalid identifier list are received from the device. The invalid identifier list is updated to the SST when the invalid identifier list is a more recent version of a SST invalid identifier list. The identifier is invalidated when the identifier is matched in the invalid identifier list or when an expiration date associated with the identifier has expired. When the identifier is invalid, access to administrative features of the SST is denied; and when the identifier is valid access to the administrative features is granted.
SYSTEM, METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIA FOR MANAGING NON-FUNGIBLE TOKEN
A networked computer system for storing promotional awards associated with non-fungible tokens (NFTs) is described herein. The networked computer system includes a master engagement record blockchain system including a plurality of master engagement records associated with NFTs, an engagement computer server system, and a plurality of kiosk terminals. A kiosk processor is programmed to capture a dynamic NFT verification (DNV) displayed on a user's mobile device via a kiosk camera and display the plurality of engagement activities via the display touchscreen. The processor of the engagement computer server system performs algorithm steps including determining a promotional award associated with the user selected engagement activity upon receiving the engagement activity completion message from the kiosk processor, and recording a master engagement record to the master engagement record blockchain system associating the determined promotional award with the user owned NFT.
SYSTEM, METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIA FOR MANAGING NON-FUNGIBLE TOKEN
A networked computer system for storing promotional awards associated with non-fungible tokens (NFTs) is described herein. The networked computer system includes a master engagement record blockchain system including a plurality of master engagement records associated with NFTs, an engagement computer server system, and a plurality of kiosk terminals. A kiosk processor is programmed to capture a dynamic NFT verification (DNV) displayed on a user's mobile device via a kiosk camera and display the plurality of engagement activities via the display touchscreen. The processor of the engagement computer server system performs algorithm steps including determining a promotional award associated with the user selected engagement activity upon receiving the engagement activity completion message from the kiosk processor, and recording a master engagement record to the master engagement record blockchain system associating the determined promotional award with the user owned NFT.
PREDICTIVE RESCAN SERVICE
Transaction records for self-service checkout transactions are provided in real-time to a customizable machine-learning rescan audit service. Any retailer defined settings with respect to random audits are enforced by the service and the real-time transaction records are provided to a machine-learning model that returns rescan scores based on the real-time transaction records. The service compares the rescan scores in view of retailer-defined suspicious scores for both a full rescan of a given checkout transaction and a partial rescan of the given checkout transaction. The service alerts the retailer when a rescan audit is predicted to be warranted for any given self-service checkout transaction based on random selection or based on the computed rescan score. The machine-learning model is continuously and regularly retrained. In an embodiment, the service provides reports, a dashboard, and mining of the transaction records and the audits to the retailer though a service-provided interface.
PREDICTIVE RESCAN SERVICE
Transaction records for self-service checkout transactions are provided in real-time to a customizable machine-learning rescan audit service. Any retailer defined settings with respect to random audits are enforced by the service and the real-time transaction records are provided to a machine-learning model that returns rescan scores based on the real-time transaction records. The service compares the rescan scores in view of retailer-defined suspicious scores for both a full rescan of a given checkout transaction and a partial rescan of the given checkout transaction. The service alerts the retailer when a rescan audit is predicted to be warranted for any given self-service checkout transaction based on random selection or based on the computed rescan score. The machine-learning model is continuously and regularly retrained. In an embodiment, the service provides reports, a dashboard, and mining of the transaction records and the audits to the retailer though a service-provided interface.
DYNAMIC RECEIPT METHOD IN AN AUTONOMOUS STORE
This application relates to systems, methods, devices, and other techniques for dynamic and real-time updated receipts in an autonomous store
DETECTION APPARATUS FOR DETECTING ABNORMAL OPERATIONS AT A POINT OF SALES APPARATUS
A detection apparatus for detecting abnormal operations at a point of sales (POS) terminal in a POS system that includes the POS terminal and an attendant terminal for monitoring the status of the POS terminal. The detection apparatus includes a camera interface connected to a camera for capturing images of customers operating the POS terminal, a network interface to communicate with a display control apparatus for the attendant terminal, and a processor configured to identify an action performed by a customer using an image thereof, identify an operation performed on the POS terminal by the customer based on changes in monitoring screen data generated by the display control apparatus for the attendant terminal, detect whether an abnormal operation is performed by the customer based on the identified actions and operations, and control the network interface to transmit a notification to the attendant terminal when an abnormal operation is performed.
Methods and Systems for Sharing e-Keys to Access Vehicles
Methods and systems are provided. One method includes processing operations to share electronic keys (e-keys). The method includes receiving a request to share an electronic key (e-key) of a vehicle with a recipient device. The request to share the e-key is initiated by sending a message to the recipient device using a sharing device. The method includes processing the request to validate the request to share the e-key, as received from the sharing device having associated therewith a registered owner e-key. Processing the request includes generating the e-key securely by the sharing device and registering the e-key that was generated with a server associated with a manufacturer of the vehicle. The method includes enabling the e-key for use on the vehicle by the recipient device responsive to said processing of the request. The request to share the e-key includes enabling a setting to apply a privilege level for use of the vehicle via the e-key. The privilege level provides one or more conditions of use of the vehicle via the e-key.