Patent classifications
G06Q20/325
Processing a mobile payload
In one embodiment, a method includes receiving, by a payment server and from a messaging application executing on a first mobile device operated by a first user, a request to initiate a payment transaction using a payment application. The request includes a payment amount and an identifier associated with the first user. The method includes facilitating a first adjustment to a balance associated with the financial account of the first user in the data store identified based on the identifier. The method includes generating a link associated with the first adjustment and transmitting the link to the first mobile device. The method includes, upon receiving from a second user operating a messaging application, an indication that the second user has interacted with the link within the messaging application, facilitating a second adjustment of a balance of a financial account of the second user according to the payment amount.
DYNAMIC MODIFICATION OF A VERIFICATION METHOD ASSOCIATED WITH A TRANSACTION CARD
A device may determine that a verification method associated with a transaction card is to be modified from a first verification method to a second verification method. The first verification method and the second verification method may use different types of verification information. The device may provide a set of instructions to the transaction card after determining that the verification method is to be modified. The set of instructions may cause the transaction card to modify the verification method from the first verification method to the second verification method. The device may provide information identifying a modification to the verification method to a transaction backend device to notify the transaction backend device that the verification method associated with the transaction card has been modified from the first verification method to the second verification method.
SYSTEM AND METHOD FOR SELF CORRECTING ERRORS IN DATA RESOURCE TRANSFERS
Embodiments of the invention are directed to systems, methods, and computer program products for intelligently identifying and correcting errors in resource transfer processes. The invention is generally comprised of a deployable layer of intelligent recommendation systems. The resulting service has ability to self-correct failed resource transfers. The invention is also dynamic, in that it can be integrated with other existing user interfaces. The intelligent recommendation systems are iteratively trained using feedback from real successes or failures in order to achieve a high degree of accuracy.
Nano-code-based reporting and authentication systems
A wearable computing device reads near-invisible one- or two-dimensional barcodes having a size of 100 microns to one millimeter. The device includes a magnifying lens, a digital camera, a processor, program memory and a wireless communication module, all supported on a wearable device body. The wearable device body may be an eyeglass frame, a watch body or wristband, a headband or sweatband or a cap or other headgear, among other possibilities. Applications of the wearable computing device include unattended shopping in a physical retail store.
METHOD AND SYSTEM FOR IN-STORE PURCHASE OF SECURITY-TAGGED ITEMS WHILE AVOIDING THE POINT OF SALE
A method and a system for enabling in-store purchasing of security-tagged merchandise, avoiding going through the point of sale of a retailer, are provided herein. The method may include the following steps: identifying, using a user-coupled device, a security tag attached to specific item to be purchased, wherein the security-tag is unique to the specific identified item; initiating a purchase request of said item via the user-coupled device, wherein the request includes a price of the item and identifiers of: the item, the security-tag identification, the retailer, and the user; attempting a transaction based on the purchase request, wherein the transaction is capable of being authorised by a third party; and indicating at a data repository associated with an in-store security gate sensitive to said security tag, that the security tag is no longer capable of initiating an alarm.
Blaze non-browser based application for purchasing digital products
A method and system for conducting an online payment transaction through a point of sale device. The method includes receiving input from a user selecting an item for purchase through the point of sale device; calculating a total purchase amount for the item in response to a request from the user to purchase the item; and sending payment authorization for the total purchase amount from the point of sale device to a payment entity, in which the payment authorization is sent to the payment entity via a mobile communication device of the user. The method further includes receiving a result of the payment authorization from the payment entity through the mobile communication device; and completing the payment transaction based on the result of the payment authorization.
Systems and methods for distributing data
Systems and methods are provided for distributing data to multiple data centers within a network based on unique information associated with the data. One example method includes receiving data including a device ID specific to a device of a user and generating, by a filter computing device, a group identifier for the received data based on the device ID. The group identifier is associated with only one of the multiple data centers within the network. The method then includes storing the received data in a data storage device of the one of the multiple data centers based on the group identifier.
System and method for matching patrons, servers, and restaurants within the food service industry
A system and method of combining table management software and customer experience skills by generating profiles of patrons, servers, and restaurants by using machine learning algorithms on and location data in those profiles to build more intimate relationships between patrons, food service establishments, and food service professionals. Trait matching provides optimized matchmaking between patrons and servers who share certain commonalities or affinities while also balancing the table management operations. Machine learning algorithms may be used to identify patterns of commonality that would not otherwise be recognized. This system allows patrons to choose servers at an establishment over a plurality of electronic devices by using the cluster analysis results. It provides servers more lateral work experience between participating restaurants, and restaurants more power to operate smoothly and build highly cohesive teams.
METHODS AND SYSTEMS FOR SMART IDENTIFICATION AND STEP-UP AUTHENTICATION
The disclosure describes systems and techniques for assessing risk of an open Wi-Fi network, at a consumer's request, before the consumer performs a transaction. The system receives a Wi-Fi network risk assessment request associated with a Wi-Fi network connection of a mobile device. Upon receiving the request, the system retrieves connection-related data from the mobile device. The connection-related data is associated with the Wi-Fi network connection. The system performs a Wi-Fi risk assessment of the Wi-Fi network connection. The system transmits a result of the risk assessment to the mobile device for presentation on the mobile device. The system also transmits the result of the risk assessment to an issuer server. The issuer server is associated with a payment account of the consumer. Moreover, the system transmits a step-up authentication alert to the issuer server.
System and method for cashless exchange at table games
A system includes a smart table. The smart table is configured to use radio-frequency identification (RFID)-enabled chips and includes a table management device and at least one RFID sensor. A dealer scratchpad defines a scratchpad area on the smart table, and the smart table defines a plurality of player positions. The smart table is configured to detect a presence of a player at a first player position of the plurality of player positions, and receive, from the table management device, a request to cash the player out of the wagering game. The processor is configured to determine, using the at least one RFID sensor, a chip cash-out value within the scratchpad area, and receive, from a player computing device of the player, a selection of a digital wallet account accessed from the player computing device. The processor also facilitates a deposit transaction to the digital wallet account.