Patent classifications
G06Q20/325
System and method employing virtual ledger with non-fungible token (NFT) generation
A system, method and computer program product for computer based open innovation, includes an asset valuation device receiving asset information regarding tangible or non-tangible assets, and generating a valuation signal, based thereon; a self-executing code device receiving the valuation signal, and generating a self-executing code signal, based thereon; an air router device having both low band radio, and internet router channels for redundant internet communications, and a malicious code removal device for scrubbing malicious code from data received, receiving the valuation signal, and generating a node voting request signal, based thereon; a mesh network having node devices receiving the node voting request signal, and generating vote confirmation signals, based thereon; and computing devices connected to each of the respective node devices, and configured to perform non-fungible token (NFT) generation based on the assets, including tracking respective ownership and valuation of the assets, based on the asset information.
Artificial intelligence-based system and method for conditional electronic transaction processing
Systems and methods for artificial intelligence (AI)-based systems and methods for conditional electronic processing are provided. An example method includes receiving real time data from one or more data sources associated with one or more connected smart devices; continuously evaluating the real time data to determine whether the one or more transaction conditions is met; upon determining that the one or more transaction conditions has been met, utilizing prioritized parameters to determine to which users an alert of a transaction request is broadcast; broadcasting the alert of the transaction request via a user application; transmitting, via a push notification gateway, a push notification to the user application on a user device; and establishing, via a network, a secure connection between the user device and an AI engine for executing the transaction request.
SYSTEMS AND METHODS FOR ALTERNATIVE PAYMENT MECHANISM PAYMENTS USING ULTRA-WIDEBAND RADIO TECHNOLOGY
Systems and methods for alternative payment mechanism payments using ultra-wideband radio technology are disclosed. A method may include a payment terminal computer program executed by a payment terminal selecting a customer electronic device that is conducting the payment transaction with the payment terminal; communicating, via a payment terminal UWB radio to the selected customer electronic device, payment transaction details for the payment transaction comprising a merchant identifier and a transaction amount; receiving, from the selected customer electronic device via the payment terminal UWB radio, an APM payment message for an APM payment provider; communicating the APM payment message to the APM payment provider, wherein the APM payment provider is configured to decision the transaction based on the APM payment message; and receiving, from the APM payment provider, a payment confirmation for the payment transaction.
SYSTEMS AND METHODS FOR ELECTRONIC RECEIPT TRANSFER USING ULTRAWIDEBAND RADIO TECHNOLOGY
A method for electronic receipt transfer via ultra-wideband electronic (UWB) radio technology may include: causing, by a payment terminal computer program, an UWB radio to transmit a range request signal from a first antenna; receiving, by the payment terminal computer program and one or more customer electronic devices, a pair of replies to the range request signal, each comprising a first reply signal received at the first antenna and a second reply signal received at a second antenna; determining, by the payment terminal computer program, a distance between the UWB radio and each customer electronic device based on a time of flight; selecting, by the payment terminal computer program, the customer electronic devices having the distance that is closest to the UWB radio; and communicating, by the payment terminal computer program, an electronic receipt for a transaction to the selected customer electronic device.
Secure communication protocols for proximity-based validation in distributed multi-device frameworks
Various systems, apparatuses, and methods are described herein for enabling secure communication protocols for proximity-based validation in distributed multi-device frameworks. Distributed multi-device frameworks present unique challenges when it comes to ensuring that user communications between various devices and over variable-security communication mediums remain secure. To address the noted challenges, some embodiments of the present invention provide for an apparatus configured to establish secure communications with a central system using wallet identifying data that is configured to secure data transfers between the apparatus and the central system. In accordance with some embodiments, devices communicating on proposed networks are arranged in a manner and using a network architecture that is configured to optimize overall network security and system integrity.
Map on a phone used to find and operate public multi-user devices
A phone display, shows an internet map. The map allows a user to search for, and operate, multiuser public devices, such as, a hydrogen car fuelling station. The user finds the device, by viewing the device's location, and the phone's location on the map. For example, the phone searches for, and finds elevators, which are shown on the map. The user finds an elevator, by using the map. The user touches the elevator's displayed menu, to receive the elevator's menu's control panel. The received control panel, is displayed on the phone. The user requests the elevator move to the 4 floor, by touch activating a floor 4 icon, on the phone elevator panel. The phone, and elevator computer communicate, over the internet wirelessly, or wirelessly. The user avoids bacteria, that may be on a store's self serve check out machine's physical touch screen, by operating it with the phone.
Systems and methods for proactive call spam/scam protection using network extensions
The disclosed computer-implemented method for proactive call spam/scam protection may include intercepting network traffic by the at least one processor employing a network extension feature of an operating system of a computing device. The method may additionally include capturing, by the at least one processor employing the network extension feature, a phone number in the network traffic. The method may also include comparing, by the at least one processor employing the network extension feature, the phone number to a plurality of entries in a spam/scam repository. The method may further include performing, by the at least one processor, a security action in response to the comparison. Various other methods, systems, and computer-readable media are also disclosed.
ELECTRONIC FINANCIAL TRANSACTION SYSTEM AND METHOD
An electronic fund transfer system comprises a transaction server, a first mobile electronic device operated by a first user, and a second mobile electronic device operated by a second user. The transaction server stores user profiles, including financial account details and other personal details, for each of the first user and the second user, and further stores therein a list of first users associate with a premise. The second mobile electronic device is operable to obtain from the transaction server the list of first users associated with the premise. The second mobile electronic device is further operable by the second user to select one first user from the list and effect a transfer of funds from the second user to the selected first user. The transfer of funds from the second user to the selected first user is effected without any of the financial account details and other personal details of the first user being provided to the second user.
DATA EXCHANGE DURING A VOICE CALL SESSION
Techniques for performing data exchanges during voice call sessions is described. In one example, a network server may facilitate a voice call session between user devices and associate a unique session number (USN) to each of the voice call sessions. The USN may be used as a reference when toggling between voice call sessions. In one example, when a particular voice call session is toggled to an active state, the network server may limit recipients of sensitive financial information to be between transacting parties in the active voice call session. By isolating other user devices that are not privy to transactions in the active voice call session, the chances for a transacting party in the active voice call session to accidentally send payments, for example, to an unintended recipient can be substantially minimized.
TRANSACTION METHOD AND DEVICE USING UWB COMMUNICATION
A method is provided for operating an ultra-wide band (UWB) device, the method including transmitting, to a gate, a first message including a device identity (ID) for identifying the UWB device and a transaction ID for identifying a transaction of the UWB device, receiving, from the gate, a second message including a gate authentication cryptogram generated based on the device ID and the transaction ID, verifying the gate based on the gate authentication cryptogram, encrypting payment information for the transaction in response to the gate being verified, and transmitting, to the gate, a third message including the encrypted payment information.