G06Q20/204

SYSTEMS AND METHODS FOR SECURELY GENERATING AND PRINTING A DOCUMENT

Systems and methods for securely generating and printing documents are disclosed. For example, processor(s) of a computer system may receive information for the document from a computing device through a network, verify the information for the document, and upon verification, generate document generation data using at least a portion of the information for the document. The document generation data may include document metadata that enables generation of an image of the document and/or the image of the document. Upon the processor(s) verifying first authentication information of a first code associated with a printing device received from the computing device through the network and second authentication information of a second code associated with the computing device received from the printing device through the network, the processor(s) may transmit the document generation data to the printing device through the network, and cause the printing device to print the image of the document.

Point of sale device power management and undervoltage protection
11561593 · 2023-01-24 · ·

A point-of-sale (POS) device includes a processor, a battery, a transaction object reader, a printer with a printer controller, and optionally a temperature sensor. The processor determines a present power discharge capability rate of the battery, optionally based on a temperature measured by the temperature sensor. The processor also calculates a first estimated power draw rate based on a first setting value for at least one of the components of the POS device, such as the printer. If the first estimated power draw rate is dangerously close to the present power discharge capability rate of the battery, a second estimated power draw rate is calculated based on a second setting value for the one or more components. If the second estimated power draw rate is no longer dangerously close to the present power discharge capability rate of the battery, the components are set to the second settings value.

User authentication based on a user interaction associated with a transaction

An example fraud analysis platform may receive timing information associated with a user interaction during a transaction, wherein the user interaction is associated with a user engaging in a transaction using a transaction account and a transaction device to access the transaction account. The fraud analysis platform may generate, based on the timing information, a transaction interaction signature associated with the user interaction. The fraud analysis platform may compare the transaction interaction signature to a reference signature associated with an authorized user of a transaction account. The fraud analysis platform may determine, based on the transaction interaction signature being associated with the reference signature, that the user interaction was performed by the authorized user of the transaction account. The fraud analysis platform may perform, based on determining that the user interaction was performed by the authorized user, an action associated with the transaction or transaction account.

Information processing device, information processing method, payment system and program
11704721 · 2023-07-18 · ·

An information processing device obtains order identification information capable of identifying an order placed by an order-placing person, transmits, as payment information, the order identification information, causes a printing process of a print medium to be executed, the print medium being capable of identifying the order identification information and gives, to another information processing device when an additional order placed by the order-placing person is received, an invalidation command which invalidates the order identification information in such a way that a payment with respect to the order identification information on an order not paid yet and placed by the same order-placing person is disabled.

FACILITATING TRANSACTIONS WITH A USER ACCOUNT USING A WIRELESS DEVICE
20230014371 · 2023-01-19 ·

A wireless device can store account identifiers and facilitate transactions. The wireless device can be loaded with user account identifiers and can be presented to various checkpoint devices. When presented, the wireless device can transmit a selected account identifier to the checkpoint device. In the context of a purchase transaction, the checkpoint device can be a point-of-sale terminal and the account data can be financial account data. In some instances, the wireless device can also facilitate a purchase transaction, e.g., by obtaining information about products to be purchased, constructing a purchase order from the product information, and transmitting the purchase order to a point-of-sale terminal.

Zero-step authentication using wireless-enabled mobile devices
11704656 · 2023-07-18 · ·

A zero-step authentication system and method which uses wireless mobile devices to automatically make payments in a secure manner without requiring the customer to handle his or her mobile device. The system and method uses a payment facilitation device at the business location which automatically detects and recognizes registered mobile devices, displays a photo of the customer to a business employee for identity confirmation, and automatically deducts payments for purchases from a pre-authorized customer account. The customer account is managed by a payment processing server, which stores the customer account data, makes appropriate deductions, sends confirmation of deductions to the customer's mobile device, and automatically refills the customer's account by making pre-authorized charges to the customer's banking institution.

INTERACTIVE SHOPPING SYSTEM AND METHOD
20230230151 · 2023-07-20 ·

An interactive shopping system, or smart cart. The system allows a user to select items in a store and complete a purchase without having to wait in lines or interact with store personnel. The system can have a container for holding products selected by at least one user, a user interface, a scanner in communication with the user interface, a processor in communication with the user interface, and a data storage comprising computer instructions executable by the processor. A user can select products, place them within the container, scan the products, and initiate a payment transaction to complete a purchase.

Method, system, and computer program product for automatically providing items based on item preferences

A method for automatically providing items based on an item preference may include receiving payment credential data associated with a payment credential and preference data associated with an item preference of a user, determining whether one or more items associated with the item preference of the user is available, and processing, with at least one processor, a payment transaction involving the one or more items associated with the item preference of the user based on determining that the item is available. A system and a computer program product are also provided.

Computer-implemented method for performing a restricted transaction

The present disclosure is related to a field of payment transactions using a card that discloses a computer-implemented method and a system for restricting a transaction while using a payment card. A card processing server may receive card details, a transaction amount, a flag, and signature data of the payment card from a remote terminal upon initiating a transaction using the payment card. Further, the card processing server validates the payment card based on the card details and the signature data of the payment card and thereafter determines a value associated with the flag upon successful validation. The value associated with the flag indicates one of two conditions, e.g., a true condition and a false condition. Based on the condition indicated by the flag, the card processing server performs one of a first action and a second action related to either processing or declining the transaction.

Contactless payment relay attack protection

A method for contactless payment relay attack protection includes receiving an online authorization request including a cryptogram, a measured processing time, and a reference processing time from a terminal. The cryptogram is verified, and a determination is performed as to whether the measured processing time exceeds the reference processing time. An online authorization response authorizing or declining a monetary transaction is transmitted, based on the determination. An artificial intelligence transaction analysis can be performed based on past and current conditions (e.g., battery level, operating system, open applications) of a payment device such as a mobile phone, past and current conditions of a terminal, and/or a monetary amount. The online authorization response can be based on the artificial intelligence transaction analysis.