G06Q20/403

Information processing device
11468504 · 2022-10-11 ·

The purpose of the present invention is to provide a C to C rental platform through which one or more individuals who want to lend objects can be efficiently matched with one or more individuals who desire to borrow the objects. In a management server 1 which supports lender users UL1 to ULn who desire to lend an object and borrower users UB1 to UBm who desire to borrow the object, an exhibit acquisition unit 10 acquires exhibit information provided from each of the lender users UL1 to ULn. An exhibit presentation unit 102 presents one or more pieces of the acquired exhibit information to the borrower users UB1 to UBm. A borrow receiving unit 103 receives, from the borrower user UB, an application of wanting to borrow the object as a borrow application. A borrowing presentation unit 104 presents, to the lender user UL, that there has been the borrowing application. Accordingly, the problem is addressed.

Assured payment system using delayed transaction queue

Systems and methods are provided for triggering delayed transaction processing when certain transaction gateway problems are detected across a number of transactions. To complete a given transaction, a processing system may coordinate transfer of funds in a manner that includes communications among multiple third-party systems, such as a tokenization service or token vault, a payment gateway, and a bank or credit card processor. When there are connectivity or other problems with one of these other systems, a system and associated methods are provided for selectively delaying a subset of transactions while still providing some assurance to the transaction requestor and recipient that the transaction will proceed.

DATA INTEGRITY RESOLUTION SYSTEMS AND METHODS
20230106544 · 2023-04-06 ·

A data synchronization computing device is described. The data synchronization computing device is configured to receive and store updated account data including an identifier designating a closed account, determine that a candidate identifier from an authorization request message matches the designated identifier corresponding to the closed account, and automatically decline the authorization request message associated with the candidate identifier. The data synchronization computing device is further configured to execute a data integrity monitoring process to improve an overall bandwidth of the a computer network, and, in response to determining a data synchronization issue, automatically overwrite a record to remove the closed account designation and transmit a notification message indicating the data synchronization issue has been resolved, thereby improving data integrity between records stored in the account information database and records stored at an issuer computing device.

Method, system, and computer program product for determining solvency of a digital asset exchange

Disclosed is a system, method, and computer program product for determining solvency of a digital asset exchange system. The method includes identifying a plurality of blockchain addresses corresponding to a plurality of users of the digital asset exchange system, generating a first commitment to an amount of digital assets corresponding to the plurality of blockchain addresses, generating a second commitment to a balance of each user of the plurality of users, generating a first component of a zero-knowledge algorithm configured to receive, as input, the first commitment, and to output a value generated based on each public key, generating a second component of the zero-knowledge algorithm configured to receive, as input, the second commitment, and to output a value generated based on each user balance, and determining, with at least one processor, that the digital asset exchange system is solvent based on the zero-knowledge algorithm.

Check validation and clearance
11651374 · 2023-05-16 · ·

Checks provided to payees by payers can be subject to evaluation. Evaluation includes assessing check validity, for instance by comparing data extracted from a check with data supplied by a financial institution. Evaluation can further comprise determining check clearance probability in view of financial and other credit features of a payer. Results of a validity assessment and a clearance probability computation can provide a basis for generation and communication of recommended action including whether or not to accept a check.

System, Method, and Apparatus for User-Less Payment on Delivery
20230139749 · 2023-05-04 ·

Described herein are systems, methods, and apparatuses for performing a user-less payment for an item upon its delivery by an unmanned delivery vehicle. The unmanned delivery vehicle may navigate to a delivery location, receive payment information, initiate a payment transaction with a remote server, and release the item at a specified location upon successful completion of the payment transaction. Upon arrival of the unmanned delivery vehicle, a wireless data transmission device may send payment information to a remote server, and the remote server may provide the unmanned delivery vehicle with an indication of whether the item can be released and a specific location at which the item can be released.

PROGRAM, INFORMATION PROCESSING METHOD, AND TERMINAL
20230138065 · 2023-05-04 · ·

An information processing method may be performed by a terminal, and the method may include displaying, on a display of the terminal, at least a first display based on first information relating to a remittance request from a first user to a user of the terminal or a remittance request from a user of the terminal to the first user, and a second display based on second information relating to a remittance request from a second user to the user of the terminal or a remittance request from the user of the terminal to the second user, and performing, by a processor of the terminal, first processing based on the first information and the second information, based on input to the terminal on which the first display and the second display are displayed.

METHOD AND SYSTEM FOR AUTHORIZING AND PROCESSING PAYMENT TRANSACTIONS OVER A NETWORK
20170372275 · 2017-12-28 ·

A method for authorizing and processing payment transactions over a network, the method comprising the steps of initiating, responsive to a user payment request to process a payment for a purchase on a merchants web site, a user interface, establishing a secure communication channel between the interface and an account server, the account server having stored a profile of an registered user, submitting, by the user interface, purchase information of the purchase order to the account server, requesting, by the account server through the user interface, authentication of the user, linking, at the account server, purchase information to the user profile, requesting, through the user interface, purchase confirmation by the user, requesting, by the user interface, a checkout reference for the confirmed purchase order from the account server, submitting, at least part of the purchase information and the checkout reference to a payment service provider to process the transaction.

Providing improved contact center agent assistance during a secure transaction involving an interactive voice response unit

A secure payment agent assist (“SPAA”) feature provides assistance to a contact center agent during a transaction involving sensitive information, where the sensitive information provided by the remote party is maintained in secure manner, so that the agent is not exposed to it. The agent is assisted by being provided with a pop-up window that allows the agent to invoke a “recollect” and “cancel” function during the transaction. The pop-up window also provides information to the agent making the agent aware of the progress of the transaction as the remote party interacts with an interactive voice response (“IVR”) unit. In other embodiments, a configuration parameter allows the prompts for the payment information to be provided by the agent or the IVR.

Tag-based social interaction computing system and method
11687909 · 2023-06-27 ·

Systems and methods for providing tag-based social interaction are provided. Users generate tags that allows a third party to connect with the user. Personally identifiable information of the user can be obfuscated, thereby allowing a user to send random acts of kindness, payments, gift cards, or other types of communications to other users while remaining anonymous.