Patent classifications
G06Q20/383
POOL GENERATION AND MANAGEMENT FOR EVENTS
Techniques for generation and management of pools for events are presented. Pool management component (PMC) generates an event associated with a recipient. Within a period of time of the event, PMC generates a pool relating to the event. Based on contact user data, transaction data relating to transactions or interactions between recipient and merchants, and affinities of the recipient to contact users or merchants, PMC determines which users to invite as candidates to contribute monetary funds to the pool and which merchants to be candidates to the pool and to present offers for products. Notification component notifies candidates of their invitation to participate in the pool. Pool component receives contributions from user candidates and offers from merchant candidates. At time of the event, notification component notifies recipient of the gift being presented to recipient via the pool, the gift comprising money, a product, or offer for a product.
GENERATING OBFUSCATED IDENTIFICATION TEMPLATES FOR TRANSACTION VERIFICATION
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for identification templates for identification search and authentication. In some implementations, obtaining first data that represents a physical document identifying a party to a transaction, providing the first data as an input to a machine learning model that comprises at least one hidden layer that is a trained security feature discriminator layer, obtaining activation data generated by the security feature discriminator layer based on the machine learning model processing the first data, determining based on the obtained activation data, that the transaction is to be denied, and based on determining that the transaction is to be denied, generating a notification that, when processed by the computer, causes the computer to output data indicating that the transaction is to be denied.
Shopping cart monitoring using computer vision
A system for monitoring shopping carts uses cameras to generate images of the carts moving in a store. In some implementations, cameras may additionally or alternatively be mounted to the shopping carts and configured to image cart contents. The system may use the collected image data, and/or other types of sensor data (such as the store location at which an item was added to the basket), to classify items detected in the shopping carts. For example, a trained machine learning model may classify item in a cart as “non-merchandise,” “high theft risk merchandise,” “electronics merchandise,” etc. When a shopping cart approaches a store exit without any indication of an associated payment transaction, the system may use the associated item classification data, optionally in combination with other data such as cart path data, to determine whether to execute an anti-theft action, such as locking a cart wheel or activating a store alarm. The system may also compare the classifications of cart contents to payment transaction records (or summaries thereof) to, e.g., detect underpayment events.
SYSTEM AND METHOD FOR FACILITATING A CONSUMER-DRIVEN MARKETPLACE FOR SELLERS
A system for facilitating a consumer-driven marketplace for sellers. The system electronically receives requirement information of a consumer for a requested asset. The system also electronically receives qualification information of the consumer for the requested asset. The system further electronically communicates at least some of the requirement information and qualification information of the consumer to one or more sellers to allow the one or more sellers to communicate an offer to the consumer.
SYSTEMS AND METHODS FOR USE IN FACILITATING APPLICATION OF SERVICES FOR PURCHASE TRANSACTIONS BASED ON TOKENS
Disclosed are exemplary embodiments of systems and methods for facilitating services associated with transaction requests. In an exemplary embodiment, a method generally includes receiving, from a first entity, a transaction request for a payment account transaction. The transaction request includes a primary account number (PAN) for a payment account involved in the transaction. The exemplary method also includes overwriting the PAN in the transaction request with a non-PAN identifier (NPI), where a first segment of the PAN is identical to a first segment of the NPI and where the NPI is an invalid PAN. The exemplary method further includes routing the transaction request to a service, whereby the service is able to be implemented for the transaction request based, in part, on the first segment of the NPI while the PAN remains anonymous to the service.
SECURING ATTESTATION USING A ZERO-KNOWLEDGE DATA MANAGEMENT NETWORK
The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
ENHANCED MULTI-PARTY USER DATA DELETION
Various systems, methods, and other aspects improve processes for handling user data deletion requests where such user data is stored in third-party data stores. For instance, a method may include receiving a data deletion request, determining a third-party data processor; and sending a user identification request via the network to the third-party data processor that includes a unique user identifier for the user. The method may receive a user identification response confirming that the third-party data processor is storing the information about the user, and responsively send a third-party data deletion request to the third-party data processor requesting that the information stored about the user in the third-party data store. In response, the method receives a third-party data deletion response including a transaction identifier for the third-party data deletion request and stores it. The transaction identifier can then be used to help ensure that the information is eventually deleted.
SYSTEM AND METHOD FOR LINK-INITIATED VERIFICATION AND VALIDATION OF USERS
A system and method for a dynamic-link verification process between an electronic device and a transaction or event. The first step is engagement by a mobile electronic device with an initiator that is linked with a specific verification event that triggers a text message to auto-populate on a mobile electronic device. The message comprising metadata about the user and the event or transaction. The second step is for the electronic device to send the auto-populated message to a message gateway thus initiating the verification of the user. The message gateway works with a management service and one or more databases to verify the identify and other aspects of the user based on instructions provided by the event host. Approval or denial of the transaction or request to gain entry is sent to the mobile device and the event host.
ANONYMOUS FUNDING OF AN ONLINE ACCOUNT WITH CASH
A system and method for anonymously funding a temporary cash account is described. The system includes a personal mobile device, a cash account, a Point-of-Sale (POS) device and a network component. A device identifier is received by the personal mobile device. A unique session identification is generated by the network component and communicated to the personal mobile device and to the POS device. The POS device and personal mobile device displays the device identifier. The POS device then proceeds to receive a cash amount. The POS receives an instruction to associate the cash amount with the personal mobile device. The personal mobile device communicates the cash amount to the network component. The network component receives the device identifier, the unique session identification and the cash amount. The network component funds the cash account with the cash amount. The personal mobile device accesses the cash account to fund an activity.
SYSTEM FOR MANAGING TRANSACTIONAL DATA
A system may include transaction storage devices. Each transaction storage device may include a data store configured to receive, from a first entity, a request to push a detailed transaction corresponding to a secure identifier. The secure identifier may be generated, using an encoding function, from a user identifier of a user. The data store may be further configured to store the detailed transaction based on a first determination to trust the first entity. The system may further include an access controller configured to perform the first determination by applying a first security rule corresponding to a type of the secure identifier to the request to push the detailed transaction, and a registry configured to store at least the first security rule.