Patent classifications
G06Q20/383
MAINTAINING SECURITY IN DIGITAL ELECTRONIC TRANSFERS THROUGH USE OF A LABEL TRACKING SYSTEM
Systems and method for method for increasing security in online transfers by maintaining anonymity of transferors are described herein. In an embodiment, a label tracking system receives a request to generate labels for an account of an account holder. The system generates a plurality of labels in response to the request and send the plurality of labels to an account computing device which stores a mapping of labels to identification information. The system receives an allocation request from the account computing device and stores allocations for each of the generated labels. When the system receives a request to perform a transfer between two labels, without changing any items within the account and without receiving identification information corresponding to the labels, the system updates the labels by decrementing an amount allocated to the transferor label and incrementing an amount allocated to the transferee label.
Real-time currency exchange system
A system includes a network interface circuit and a processing circuit configured to receive a physical currency transaction request from a first user device, the physical currency transaction request including a currency exchange transaction parameter, match the physical currency transaction request to another physical currency transaction request based at least in part on the currency exchange transaction parameter, provide the physical currency transaction request to a second user device associated with the another physical currency transaction request, geo-fence an area based on at least one of the currency exchange transaction parameters or a current location of the first user device, determine an exchange location based on the geo-fenced area and the matched physical currency transaction request and another physical currency exchange request, and provide instructions to the first user device and the second user device for an exchange based on the determined exchange location.
SHOPPING BASKET MONITORING USING COMPUTER VISION
A system for monitoring shopping carts uses cameras to generate images of the carts moving in a store. In some implementations, cameras may additionally or alternatively be mounted to the shopping carts and configured to image cart contents. The system may use the collected image data, and/or other types of sensor data (such as the store location at which an item was added to the basket), to classify items detected in the shopping carts. For example, a trained machine learning model may classify item in a cart as “non-merchandise,” “high theft risk merchandise,” “electronics merchandise,” etc. When a shopping cart approaches a store exit without any indication of an associated payment transaction, the system may use the associated item classification data, optionally in combination with other data such as cart path data, to determine whether to execute an anti-theft action, such as locking a cart wheel or activating a store alarm. The system may also compare the classifications of cart contents to payment transaction records (or summaries thereof) to, e.g., detect underpayment events.
SYSTEMS AND METHODS FOR FACILITATING PROTECTING RECIPIENT PRIVACY
Disclosed are systems and methods for facilitating gift purchases by a buyer on an e-commerce platform when the buyer does not know a recipient's destination address without revealing the recipient's destination address to the buyer. A computer receives information for a recipient of an online order associated with a merchant for delivery to the recipient. The computer queries a database using the recipient information to obtain the recipient's destination address. The computer generates a token corresponding to the destination address, where the token includes an obfuscated representation of the destination address. The computer transmits the token to a client device for submission of the online order for delivery to the recipient, where the token is adapted to satisfy a requirement to provide the destination address for the online order. When the computer receives the token from a merchant device, the computer presents the destination address to the merchant device.
REDUCING INFORMATION REQUIREMENTS IN DIGITAL ELECTRONIC TRANSFERS
Systems and methods for transferring between accounts in the absence of sensitive information needed to perform a direct transfer between accounts are described herein. In an embodiment, an intermediary system receives a request to perform a digital electronic transfer of an item from a first online account to a second online account through the intermediary system, wherein the intermediary system does not have access to the sensitive information for either the first online account or the second online account. Without requesting the sensitive information for either the first online account or the second online account, the intermediary system responds to the request by: performing a first digital electronic transfer of the item from the first online account to a system account, storing data assigning the item to an intermediary account for which the intermediary system has the sensitive information, and performing a second digital electronic transfer of the item from the system account to the second online account.
SYSTEMS AND METHODS FOR INLINE PASSIVE PAYMENT WITH ANONYMOUS SHIPPING
A method for inline passive payment may include a passive payment computer program: (1) identifying a communication from an electronic device associated with a customer for a merchant backend; (2) intercepting the communication; (3) generating a unique identifier for the communication; (4) communicating the unique identifier to an issuer backend associated with the customer; (5) anonymizing the customer and/or the electronic device in the communication; and (6) routing the anonymized communication to the merchant backend with the unique identifier. The wherein the merchant backend is configured to request payment for a transaction involving the electronic device by providing transaction information and the unique identifier to the issuer backend, and the issuer backend is configured to issue a guarantee of payment for the merchant backend for the transaction using the unique identifier.
Virtual payment processing system
A system, apparatus, and method for resolving a data transaction is provided in which data transactions are resolved by a hardware matching processor that identifies data transaction requests received from client devices over a data communication network, matches incoming transaction requests with previously received transaction requests, and, based thereon, transmits electronic data transaction results messages to the client device. An incoming data transaction request is received and a match is attempted with one or more previously received but not yet resolved data transaction requests. It is identified whether either the incoming data transaction request or the matching data transaction request are dependent on the resolution of another data transaction request and whether that dependent data transaction request has been resolved. The data transaction requests are resolved and/or stored based on the match and resolution of dependencies.
Methodology to prevent screen capture of sensitive data in mobile apps
Described herein are a system and methods for obfuscating sensitive data during a data capture event in order to prevent unauthorized reproduction of that sensitive data. In some embodiments, an event listener detects an event likely to result in a data capture and notifies an obfuscation module. The obfuscation module then identifies sensitive data fields, determines an appropriate obfuscation technique for each data field, and obfuscates the identified data fields for the duration of the event. In some embodiments, any active data input actions may be canceled. In some embodiments, the data values within the obfuscated data fields may be revealed upon completion of the event.
ARRANGEMENT FOR ENCRYPTED EXCHANGE OF PERSONAL MEDICAL AND FINANCIAL DATA
An arrangement for encrypted exchange of personal medical and financial data comprises a mass enrollment center computing device, a subscriber computing device, a web platform server device, and a payment provider server device. The web platform server device creates a temporary link site with a temporary link site identifier and forwards the link site identifier to the mass enrollment center computing device and to the subscriber computing device. Pre-determined messages are exchanged between the mass enrollment center computing device and the subscriber computing device, using a computer memory link location for releasing health-related data to the subscriber computing device. The web platform server device, upon reception of a payment signal from the payment provider server device, automatically initiates a transmission of identity information data of at least one subject from the mass enrollment center computing device to the subscriber computing device.
Cross-chain Communication Method, Device and Storage Medium thereof
Disclosed is a cross-chain communication method. In this method, a first edge node of a first blockchain receives a first transaction request and validates the first transaction request; on condition that the first transaction request passes the validation, the first edge node will send the first transaction request to a notary node group; the notary node group determines at least one target notary node according to a preset criterion; the at least one target notary node validates the first edge node and a second edge node of a second blockchain corresponding to the first transaction request; and on condition that both the first edge node and the second edge node pass the validation, the first edge node will set up a cross-chain communication with the second edge node depending on the first transaction request to complete a cross-chain transaction. A cross-chain communication device and a storage medium are also disclosed.