Patent classifications
G06Q20/3224
Cash delivery application
Systems, methods, and apparatuses described herein relate to a method for delivering cash to a user. The method includes receiving a cash delivery request from a first user device of the user. The method includes generating a cash authentication code (CAC) for the cash delivery request to be verified by a cash dispenser machine. The method may include transmitting the cash delivery request and the CAC to a second user device of a driver. The method may include determining a route for the driver from a first location of the driver, to a second location of a cash dispenser machine, and to a third location of the customer to deliver the cash delivery request. The method may include instructing the cash dispenser machine to dispense cash in response to authenticating the second user device based on the CAC and determining that the first current location is at the second location.
Authenticating Based on Behavioral Transactional Patterns
Aspects described herein may allow for authenticating a user by generating a customized set of authentication questions based on patterns that are automatically detected and extracted from user data. The user data may include transaction data collected over a period of time. By automatically detecting user patterns that correspond to user behavior over a period of time, an authentication system may be able to generate information that is recognizable to an authentic user but difficult to guess or circumvent for any other user.
Authentication decision engine for real-time resource transfer
Systems, computer program products, and methods are described herein for authentication decision engine for real-time resource transfer. The present invention is configured to electronically receive, from a computing device associated with a user, a resource distribution request at a first time; generate a notification on a computing device associated with a resource distribution source; dynamically generate a first resource authentication code based on at least the resource distribution request; transmit control signals configured to cause the computing device associated with the user to display the first resource authentication code to the user; dynamically generate a second resource authentication code based on at least the resource distribution request; transmit control signals configured to cause the computing device associated with the resource distribution source to display the second resource authentication code to the resource distribution source; initiate an execution of the resource distribution request at a second time
System and method for dynamic multifactor authentication
A method of authenticating a user. The method comprises the step of sending an authentication request to a remote authentication device and generating a first piece of authentication information. A mobile device receives the first piece of authentication information from either an access terminal or the remote authentication device. The mobile device of the user generating a second piece of authentication information which is at least partially based on the received first piece of authentication information. The second piece of authentication information is sent to the remote authentication devices and the second piece of authentication information validated. If the second piece of authentication information is successfully validated an authentication signal is generated.
Uplink control information transmission methods for carrier aggregation
A method and apparatus for transmitting uplink control information (UCI) for Long Term Evolution-Advanced (LTE-A) using carrier aggregation is disclosed. Methods for UCI transmission in the uplink control channel, uplink shared channel or uplink data channel are disclosed. The methods include transmitting channel quality indicators (CQI), precoding matrix indicators (PMI), rank indicators (RI), hybrid automatic repeat request (HARQ) acknowledgement/non-acknowledgement (ACK/NACK), channel status reports (CQI/PMI/RI), source routing (SR) and sounding reference signals (SRS). In addition, methods for providing flexible configuration in signaling UCI, efficient resource utilization, and support for high volume UCI overhead in LTE-A are disclosed.
Wearable Multimedia Device and Cloud Computing Platform with Application Ecosystem
Systems, methods, devices and non-transitory, computer-readable storage mediums are disclosed for a wearable multimedia device and cloud computing platform with an application ecosystem for processing multimedia data captured by the wearable multimedia device. In an embodiment, a method comprises: receiving, by one or more processors of a cloud computing platform, context data from a wearable multimedia device, the wearable multimedia device including at least one data capture device for capturing the context data; creating a data processing pipeline with one or more applications based on one or more characteristics of the context data and a user request; processing the context data through the data processing pipeline; and sending output of the data processing pipeline to the wearable multimedia device or other device for presentation of the output.
Validating a player's real-world location using activity within a parallel-reality game
Systems and methods for linking real world activity, such as real world commercial activity or real world data collection activity, with a location-based parallel reality game are provided. In particular, a game server hosting a parallel reality game can modify, update, or add to game data stored in a game database associated with the parallel reality game to include certain game features in the parallel reality game linked with real world activity in the real world. The game features can be linked with activities in the real world such that player actions associated with the game features in the virtual world can lead to or encourage activity in the real world, such as commercial activity and/or data collection activity in the real world. A one-time password may be used to validate a player's location in the real world and to enable controlled access to game features in the virtual world.
Blockchain-enabled crypto asset compliance system for tracking asset allocation
Blockchain-enabled crypto asset systems allow a user to control how advertisers access the user's personal data; allow crypto asset compensation in exchange for social amplification; and track asset allocation. Asset allocation tracking is made the focus of these specifications. Payments made via blockchain tracking, and the distribution of any revenues derived from cost savings provided to terrestrial, satellite or digital radio broadcasters back to music rights holders and other related groups are provided. These rights holders typically like to incentivize consumers, and by using the crypto assets or tokens created by the present invention, a reward for listening/consuming may be provided. Further, payments for industry services to the rights holder are contemplated to include, but not be limited to any Performance Rights Organizations (PROs), Record Labels, Publishing Companies—Administrators, Managers, Agents or any fractional rights holders or owners who would hold claim against any such revenues.
Predictive inventory management
In one embodiment, a method includes receiving a request from a user computing device associated with a user for one or more items from an in-vehicle vending apparatus during a ride. The method also includes sending information associated with the user to start a vending session using the in-vehicle vending apparatus. The method also includes receiving an indication that the user associated with the user computer device accessed the in-vehicle vending apparatus. The method also includes determining that the user associated with the user computing device is the only user associated with the ride, determining that the user associated with the user computing device is one of a plurality of users associated with the ride, or determining that the user associated with the user computing device is associated with the in-vehicle vending apparatus.
Real-time authorization of initiated data exchanges based on tokenized data having limited temporal or geographic validity
The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that, among other things, authorize initiated exchanges of data based on tokenized data characterized by a limited temporal or geographic validity. For example, an apparatus may receive a first signal that includes first information identifying a first geographic position of a client device. The apparatus may also obtain a digital token representative of a pre-authorization of a data exchange between the client device and a terminal device during a corresponding temporal interval. The terminal device may, for example, be disposed within a geographic region that includes the first geographic position of the client device. The apparatus may generate and transmit a second signal that includes the digital token to the client device. In some examples, the apparatus may transmit the second signal being through a programmatic interface associated with an application program executed by the client device.