G06Q20/322

Payment systems and methods for in-store and online purchases
11568409 · 2023-01-31 ·

Systems and methods for implementing payments or mobile payments. In an aspect of in-store purchase, a merchant sends a payment amount and merchant account info to transaction center. A buyer sends a code and buyer account info to transaction center. The code represents the merchant. In an aspect of online purchase, an e-commerce merchant provides options for a buyer to use names other than a first name plus a surname. In one embodiment, a buyer submits a shortened name or nickname for online purchases when a given payment service is used as a payment method.

Data interaction method, verification terminal, server, and system

A data interaction method, a verification terminal, a server, and a system are described. The method includes: receiving, by a verification terminal, identity verification information from a user terminal, the identity verification information being information sent to the user terminal by a server in advance; sending, by the verification terminal, a request instruction to the server, the request instruction including the identity verification information; executing, by the server, an operation corresponding to the request instruction; and sending, by the server, feedback information to the verification terminal.

Augmented reality card activation

Systems and methods are provided for activating a card using augmented reality. The systems and methods may include capturing a real-time image of the card using a customer device, and extracting card information from the real-time image. The card information may be processed and used by a customer device or a financial provider server to activate the card. The customer device may display interactive graphics overlaid on the real-time card image to guide the customer through the activation process, and to educate the customer about the components of the card and aspects of the financial service associated with the card, such as a credit card service. The customer may interact with the overlaid graphics such as by selecting icons or portions of the card to trigger tutorials or to set preferences related to the card and/or financial service.

Apparatus and method for improved payment experience
11568379 · 2023-01-31 · ·

A method for handoff of a transaction for completion includes: registering a payment instrument with a server and storing a payment token that represents the payment instrument; storing a device identifier that corresponds to the payment token in the database record; via a point-of-sale terminal, reading the payment instrument, and transmitting it to the server; via the server, using the payment token to access the device identifier and transmitting a push notification to a device corresponding to the device identifier; upon acceptance of the push notification, executing an application on the device and simultaneously displaying details for the transaction on both the device and the point-of-sale terminal; receiving transaction completion data that is entered via the device and transmitting the transaction completion data to the server; and completing the transaction at the server and notifying the point-of-sale terminal and the device that the transaction is complete.

Personal Security System and Method
20230027652 · 2023-01-26 ·

A personal safety system comprising: a personal electronic device carried by an individual having one or more sensors for recording visual and/or audio data associated with the individual; at least one external service nominated by the individual to be in electronic communication with the personal electronic device to receive and store the recorded visual and/or audio data from the personal electronic device in real time for monitoring purposes; and wherein, the visual and/or audio data is continuously recorded in discrete predetermined intervals by the personal electronic device and at the completion of each discrete predetermined interval the visual and/or audio data for that discrete predetermined interval is transmitted to the external service together with data capturing the time and location of the individual, and following transmission of the visual and/or audio data, the data is deleted from the personal electronic device.

SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR AUTHENTICATING A DEVICE BASED ON AN APPLICATION PROFILE
20230027202 · 2023-01-26 ·

Provided are computer-implemented methods for authenticating a mobile device based on a real-time mobile device application profile which may include generating, with a mobile device application on a mobile device, a real-time mobile device application profile associated with the mobile device, receiving the mobile device application profile by the mobile device; and determining whether there is an anomaly between the real-time mobile device application profile and a historical mobile device application profile associated with the mobile device. The methods may also include performing a remedial action associated with a transaction based on determining that there is an anomaly between the real-time mobile device application profile and the historical mobile device application profile. Systems and computer program products are also provided.

METHOD AND SYSTEM FOR OPERATING A MOBILE POINT-OF-SALES APPLICATION
20230028625 · 2023-01-26 ·

A method for operating a mobile Point-of-Sales (mPOS) application includes: an application frontend, for starting a transaction, captures transaction data associated with the transaction to be started and transmits a transaction request to the application backend via the connection; an application backend transmits an authorization request and a layout for a human machine interface for entering a personal key to the application frontend; the application frontend provides the human machine interface with the received layout, captures the personal key entered via the human machine interface, and generates and transmits a transaction authorization comprising the captured personal key to the application backend; and the application backend checks the captured personal key and, depending on the check, completes the transaction. touchscreen

System and method for displaying and interacting with artwork
11710176 · 2023-07-25 · ·

System and method for interacting with at least one item, such as at least one artwork display, including at least one display device including a housing, a visual indictor element, a processor, a memory, and wireless communication capabilities, the at least one display device disposed beside or in a vicinity of the at least one item, and a user device configured to interact with the at least one display device by providing, on the at least one display device via the visual indictor element and/or the user device via a display screen of the user device, a visual popularity indicator and a visual sale status indicator for the at least one item.

DYNAMIC RECEIPT METHOD IN AN AUTONOMOUS STORE

This application relates to systems, methods, devices, and other techniques for dynamic and real-time updated receipts in an autonomous store

Split Secret Cryptography Based Security in IoT Implemented Payment Transactions or Credentials

The invention provides methods, systems and computer program products for securely provisioning an internet-of-things (IoT) device for implementing an electronic payment transaction. The invention comprises (i) retrieving a first credential element from the client device, and a second credential element from a router, (ii) generating payment credential data by applying split secret cryptography based reconstruction to the first credential element and the second credential element, (iii) retrieving a unique identifier associated with the IoT device, (iv) generating a combined data element comprising the payment credential data and the unique identifier associated with the loT device, (v) applying split secret cryptography based splitting to the combined data element to generate a first verifiable secure element and a second verifiable secure element, (vi) storing the first verifiable secure element and the retrieved unique identifier within the router, and (vii) storing the second verifiable secure element within the IoT device.