G06Q20/3276

DYNAMIC RECEIPT METHOD IN AN AUTONOMOUS STORE

This application relates to systems, methods, devices, and other techniques for dynamic and real-time updated receipts in an autonomous store

DATA PROCESSING UTILIZING A DIGITAL TAG
20230023350 · 2023-01-26 ·

A method is disclosed and includes receiving a push transfer message with a first transaction amount, and a digital tag, a credential or a token from an application server computer, in a transaction. In the transaction, a first user using a first user device interacts with a second user using the digital tag. The digital tag associated with the credential or the token, and the first user device has a transfer application that receives the digital tag and is in communication with the application server computer. The push transfer message is transmitted to an authorizing entity computer where a second amount is credited to the second user's account.

SETTLEMENT SYSTEM, RECOGNITION DEVICE, AND METHOD THEREOF
20230024823 · 2023-01-26 ·

According to one embodiment, a settlement system includes an imaging portion, a specifying portion, an acquisition portion, and a recording portion. The specifying portion specifies the commodity from an image captured by the imaging portion. The acquisition portion acquires an image of a medium used for online settlement from the image captured by the imaging portion. The recording portion records the image of the medium acquired by the acquisition portion and the information related to the transaction of the commodity specified by the specifying portion on a recording medium.

Processing a mobile payload

In one embodiment, a method includes receiving, by a payment server and from a messaging application executing on a first mobile device operated by a first user, a request to initiate a payment transaction using a payment application. The request includes a payment amount and an identifier associated with the first user. The method includes facilitating a first adjustment to a balance associated with the financial account of the first user in the data store identified based on the identifier. The method includes generating a link associated with the first adjustment and transmitting the link to the first mobile device. The method includes, upon receiving from a second user operating a messaging application, an indication that the second user has interacted with the link within the messaging application, facilitating a second adjustment of a balance of a financial account of the second user according to the payment amount.

SYSTEMS AND METHODS FOR SECURELY GENERATING AND PRINTING A DOCUMENT

Systems and methods for securely generating and printing documents are disclosed. For example, processor(s) of a computer system may receive information for the document from a computing device through a network, verify the information for the document, and upon verification, generate document generation data using at least a portion of the information for the document. The document generation data may include document metadata that enables generation of an image of the document and/or the image of the document. Upon the processor(s) verifying first authentication information of a first code associated with a printing device received from the computing device through the network and second authentication information of a second code associated with the computing device received from the printing device through the network, the processor(s) may transmit the document generation data to the printing device through the network, and cause the printing device to print the image of the document.

Systems and methods for securely pairing a transmiting device with a receiving device

Systems and methods for securely pairing a transmitting device with a receiving device are described. The systems and methods may communicate with a first device via a first communication method over a wireless communication network. The systems and methods may transmit, to the first device via a second communication method, a first sensory pattern representing a first key. In addition, the system and methods may communicate with the first device via the first communication method using the first key.

Method to verify identity using a previously collected biometric image/data
11562055 · 2023-01-24 · ·

A system for remote identity verification including a computing device configured to capture a first image of the user a first distance and capture a second image at a second distance and then processing the images to create one or more facemaps. The facemaps are processed to verify that the images were captured from a live person. If the facemaps represents a live person, the facemaps and a user identifying code are sent to a trusted image server. The rusted image server configured to, using the user ID code, retrieve a trusted image from a database and generate a trusted image facemaps. Then, compare captured image facemaps to the trusted image facemaps. Responsive to a match between the captured image facemaps and the trusted image facemaps, send a message to the computing device, a third-party server, or both providing notice of the match.

SYSTEMS AND METHODS FOR MATCHING TOKENIZED ACCOUNTS BETWEEN ANONYMOUS PARTIES
20230230061 · 2023-07-20 ·

Systems and methods that allow fulfilment of a transaction wherein a first party initiates the transaction, for example, at a point-of-sale device, and a tokenized account of an anonymous second party is identified as an account optimal for completing the transaction. The tokenized account of the anonymous second party is identified based on the transaction information. The tokenized account of the anonymous second party is matched to complete the transaction for reasons including a financial advantage or incentive associated with the tokenized account of the anonymous second party and not available to the first party at the time of the transaction. This financial advantage may be shared between both parties. The tokenized account of the anonymous second party may receive a financial benefit or other valuable consideration for completing the transaction. The tokenized account of the anonymous second party is reimbursed for costs associated with completing the transaction.

Systems and methods for authorizing a transaction

A system for authorizing a transaction includes one or more processors, and a memory storing instructions. When executed by the one or more processors, the instructions cause the system to perform operations including: receiving a configuration request associated with a financial service account via a web interface; setting a limitation in accordance with the configuration request; and generating a graphic indicium or a card number as a token for authorizing a transaction, associated with the financial service account, which satisfies the limitation in accordance with the configuration request. The token is configured to be printed on a substrate or loaded into an electronic payment system.

Nano-code-based reporting and authentication systems

A wearable computing device reads near-invisible one- or two-dimensional barcodes having a size of 100 microns to one millimeter. The device includes a magnifying lens, a digital camera, a processor, program memory and a wireless communication module, all supported on a wearable device body. The wearable device body may be an eyeglass frame, a watch body or wristband, a headband or sweatband or a cap or other headgear, among other possibilities. Applications of the wearable computing device include unattended shopping in a physical retail store.