Patent classifications
G06Q20/4012
System and method for remotely activating a pin-pad terminal
A network gateway includes a gateway authenticator, a first network interface for interfacing the network gateway with a first computer network, and a second network interface for interfacing the network gateway with a second computer network that is distinct from the first computer network. The gateway authenticator receives from a pin-pad terminal, via the first computer network, an activation credential request that includes a first administrator credential. The pin-pad terminal receives the first administrator credential from a hardware token that is interfaced with the pin-pad terminal. The gateway authenticator is configured to (i) verify that, before the pin-pad terminal received the first administrator credential from the hardware token, the first computer network associated the first administrator credential with the pin-pad terminal; and (ii) install in the pin-pad terminal a digital authentication certificate that facilitates authentication of the pin-pad terminal to the second computer network via the network gateway.
Multi-state merchant-facing device
Techniques associated with a dual state merchant-facing device are described herein. A point-of-sale system can comprise multiple devices, such as a customer-facing device and a merchant-facing device that is coupled to the customer-facing device and can operate in a first state or a second state. In at least one example, the merchant-facing device operating in the first state can present a graphical user interface (GUI) on a display. The merchant-facing device can transition from the first state to the second state, the second state enabling the merchant-facing device to perform at least one additional functionality that is not available to the merchant-facing device in the first state, and can update the GUI based at least in part on the at least one additional functionality.
AUGMENTED REALITY-ENABLED ATM FOR SECURE AUGMENTED REALITY CHECK REALIZATION
An Augmented Reality (AR)-enabled Automated Teller Machine (ATM) receives a request to dispense cash equal to amount of an AR document. The AR document comprises an AR check. The AR-enabled ATM fetches a first AR check image from a memory. The AR-enabled ATM extracts a first set of features from the first AR check image. The AR-enabled ATM receives a second AR check image from a computing device associated with the receiver. The AR-enabled ATM extracts a second set of features from the second AR check image. The AR-enabled ATM compares the first AR check image with the second AR check image. The AR-enabled ATM determines whether the first AR check image corresponds to the second AR check image. In response to determining that the first AR check image corresponds to the second AR check image, the AR-enabled ATM dispenses cash equal to the amount.
Interactive video overlay
Systems and methods are provided for enabling in-video shopping functionality during presentation of live streaming video content. A system may initiate a video streaming support instance based on a request from a streamer device. The system may then send code to one or more client devices viewing a live video stream of the streamer device, where the code causes the client devices to present, in association with the live video stream, an interactive shopping overlay configured to listen for item information from the system. During the live video stream, in response to the system receiving an instruction from the streamer device to insert a product or other item into the interactive shopping overlay, the system may send information to the client devices that causes the interactive shopping overlay on each client device to present the specified item as a selectable item displayed over the live streaming video.
Techniques to generate and store characteristics of a signature on a transaction card circuit
Various embodiments are generally directed to techniques to perform transaction with transaction cards utilizing characteristics of customer's signature. Techniques may further include determining characteristics of a signature including a reduced set of data points for the signature and storing the characteristics in secure memory of transaction card. The transaction card including the characteristics are used to perform transactions, such as those performed at Point-of-Sale (POS) terminals.
Biometric authentication system
The disclosure describes a biometric authentication system that can authorize a transaction at a retail store using a person's biometric data and password. The biometric authentication system may include a point-of-sale device that can receive a biometric data (e.g., voice data, fingerprint data, or facial data) of a person that initiates a transaction. The biometric authentication system may also include one or more authentication systems that analyzes the received biometric data, and an authorization system that compares data obtained from the one or more authentication systems and the POS device to determine whether the information obtained from the person is related to that person's biometric and password information previously stored by the authorization system.
Keyboard Application With Third Party Engagement Selectable Items
Embodiments of the invention are directed to an embodiment of a keyboard application in which a plurality of selectable items (representing keys) are associated with transactions. The keyboard application may be imported into any application that utilizes text input, and replaces a default keyboard used to provide the text input. Upon selection of one of the plurality of selectable items, a transaction is initiated by a service provider computer. In some embodiments, the transaction may result in the engagement of a third party entity. Once completed, an access credential associated with the completion of the transaction is generated. The access credential may be entered into the text input field of the application that utilizes text input.
IDENTIFICATION OF POTENTIALLY SENSITIVE INFORMATION IN DATA STRINGS
Methods for identifying potentially sensitive information and protecting such potentially sensitive information include scanning systems that collect and/or disseminate such information. Without limitation, systems collect and/or disseminate personal identification numbers (e.g., personal identification numbers, tax identification numbers, etc.), such as merchant systems, bank systems, healthcare systems, and the like, that collect, use, or disseminate sensitive information may be scanned to identify sequences of data that are likely to be sensitive, and may take actions to protect such sequences of data. Scanning and protection systems are also disclosed.
Touchless transaction on a transaction terminal
A transaction is detected on a transaction terminal. A first code is presented on a display of the transaction terminal that is encoded with an identifier and a passcode for a wireless connection between the transaction terminal and a mobile device operated by a customer. The mobile device processes the code to wirelessly connect to the transaction terminal using the identifier and the passcode. A second code is presented on a display of the transaction terminal. The second code when captured by the mobile device causes a transaction interface to be remoted from the transaction terminal to the mobile device over the wireless connection. The transaction continues with interactions provided on the mobile device and processed on the transaction terminal without any customer touching of the display of the transaction terminal and without any customer touching of any keys or keypad of the transaction terminal.
ONDO self-serve food locker system
Embodiments of the disclosure are directed to a touchless automatic food locker apparatus, system, and method providing automated self-serve food lockers. Embodiments include arrays of modular food lockers having a public access door and a kitchen access door opposed to each other, assembled as a wall between the public space and the kitchen. Each food locker kitchen access door is adapted to receive a food item disposed into the locker. Heating and cooling elements maintain the appropriate food item temperature in the locker. Sensors, lighting, and UV lighting coupled to the locker detects a state of the item in the locker. The locker further includes credentialed access by the customer to the food locker from the public access door by an assembly coupled to the food locker utilizing mobile communication and intelligent analysis to reduce waiting time, keep food products fresh, and assure quality product delivery.