G06Q20/321

System and method for access control

The present disclosure relates generally to systems and methods that enable access control for digital objects based on measured physiological signals of a user. A method of operation of a human mind interface (HMI) system includes measuring, via a physiological sensor of a HMI device, a brain pattern of a user while the user retrieves a digital object after training. The method includes identifying, via a processor of the HMI device, the measured brain pattern stored in a memory of the HMI device, and determining, via the processor, the digital object stored in the memory that is associated with the identified brain pattern. The method includes accessing, via the processor, the digital object and retrieving information contained in the digital object and providing, via the processor of the HMI device, the information contained in the digital object to a recipient on behalf of the user.

Methods and apparatus for presence sensing reporting
11546728 · 2023-01-03 · ·

A system includes sensors disposed within a location for outputting presence signals to a smart device, for receiving an ephemeral ID signal from the smart device, for outputting sensor ID signals to the smart device, for receiving responsive data from the smart device and for determining presence of the smart device in response to the responsive data, an authentication server for receiving the sensor ID signals from the smart device, for determining the responsive data, and for providing the responsive data to the smart device, a hub device coupled to the sensors for receiving an indication of the determination of the presence of the smart device, for determining additional data associated with the smart device, for facilitating a physical change perceptible to a user of the smart device in response to the additional data, and for providing the presence data to a smart device associated with a first responder.

METHOD AND SYSTEM FOR ACTIVE NFC PAYMENT DEVICE MANAGEMENT

A method and computer system for detecting, utilizing at least one sensor associated with the computer system, an attempt to establish short-range communications between a device and a short-range communications module coupled to the computer system. The method and computer system further configured for determining that no short-range communication was received by the computer system via the short-range communications module and providing a signal to the device to enable a short-range communications transceiver at the device.

Automatic Alerting Communications Systems and Methods
20220398562 · 2022-12-15 ·

A system includes a user device and a computing system. The user device accesses a plurality of images captured by a camera and identifies, from the plurality of images, a particular image that depicts a portion of a user interaction object. The user device transmits the particular image across a wireless communications network. The computing system accesses the particular image depicting the portion of the user interaction object and determines a data item from the particular image. The computing system compares the data item to one or more accounts of the user and sends instructions to the user device to automatically display an alert message on the electronic display based on the comparison of the data item to the one or more accounts.

METHOD AND SYSTEM FOR ACTIVE NFC PAYMENT DEVICE MANAGEMENT

A method and computer system for detecting, utilizing at least one sensor associated with the computer system, an attempt to establish short-range communications between a device and a short-range communications module coupled to the computer system. The method and computer system further configured for determining that no short-range communication was received by the computer system via the short-range communications module and providing a signal to the device to enable a short-range communications transceiver at the device.

Wearable RFID device for use in an event-based interrogation zone

A wearable RFID device is provided for use in an event-based interrogation zone. The zone contains terminals with RFID readers. The device has an element worn by a user and an attached or embedded RFID tag. The tag has stored data representing a UniqueID of the tag, and a stored funds balance. The tag is programmed to activate an otherwise inactive one of said terminals upon presentation of the tag to the RFID reader of said terminal in a first tap, and communicate its UniqueID to the terminal for validation. Upon validation and following a second tap of the tag at the RFID reader, the tag's stored funds balance can be changed by the amount of a transaction run through said terminal. A temporary installation of a system of RFID-based terminals and user-worn RFID devices is also provided for use within an event interrogation zone.

SMART SHOPPING AND INFORMATION COLLECTION BY NATURAL GESTURE USING UWB

Smart gesturing may facilitate smart shopping and other contactless experiences by enabling a user to perform a natural gesture toward one or more desired items with or while wearing a wearable or non-wearable electronic device. The electronic device may identify the smart gesture, and determine the one or more desired items are indicated by the smart gesture. The electronic device may identify the desired items by receiving location data of multiple items, determining a vector based on a first position a second position of the smart gesture, extending the vector to a location, and using the location data to determine which item or items correspond to the location. If more than one item is indicated by the smart gesture, the electronic device may enable selection of the items and, if at least one item is selected, provide information on the selected items or enable additional interaction with the selected items.

Method and apparatus for configuring security carrier

Embodiments of the present disclosure provide a method and apparatus for configuring a security carrier, including: adding a carrier batch field to a security carrier list, encoding, for each security carrier in the security carrier list, a plurality of pieces of batch feature information of the security carrier according to a preset encoding rule, so as to generate carrier batch information of each security carrier, and to add same to the security carrier list; and then, according to identifier information and the carrier batch information of each security carrier, configuring a supplementary security domain, a card application, an application installation package and an application provider that need to be preset for each security carrier. Since the carrier batch information contains a plurality of pieces of batch feature information of the security carrier, security carriers in the security carrier list can be effectively distinguished according to the identifier information and the carrier batch information of the security carriers, thus a plurality of preset items that need to be preset for a plurality of security carriers having the same carrier batch information can be configured, so as to improve configuration efficiency for the security carriers.

Collector Container for Non-Fungible Token (NFT) Assets

According to one exemplary implementation, a collector container includes processing hardware, an output device controlled by the processing hardware; and a memory storing a digital wallet. The collector container is configured to uniquely store a non-fungible token (NFT) in the digital wallet, the NFT certifying ownership of an NFT asset. The collector container is further configured to store the NFT asset in the memory, and to display the NFT asset using the output device.

EXTENDED REALITY INTERFACE FOR REAL-TIME TRANSACTION PROCESSING
20220383279 · 2022-12-01 · ·

Systems, computer program products, and methods are described herein for transaction management via an extended reality platform. The present invention provides the functional benefit of providing a user with the ability to manage, schedule, and complete transactions in an extended reality (XR) environment. The present invention may also be configured to communicate with a plurality of third-party systems, in order to request access to various user accounts, as well as information associated with one or more upcoming transactions associated with a user. The user may then visualize said transaction information on a virtual hub presented via an XR platform (accessible using a virtual/augmented/mixed reality device) and complete transaction management actions from any location, in real-time. User interfaces hosted in an XR environment are immersive, providing intuitive user interfaces that may bolster the effect of interactivity.