Patent classifications
G06Q20/4014
SYSTEMS FOR ALERTING USER TO UNDESIRED COMPONENTS IN PURCHASE ITEMS
A system for alerting a user of undesired components in purchase items is provided. The system comprises receiving a list of undesired components of purchased items, and defining an alert to a user of an undesired component in a purchased item, the alert comprising an alert timing configuration and an undesired component identification. The system further comprises receiving a notice that the user purchased an item, determining whether a listing of the purchased item has been automatically collected, and generating a list of components of the purchased item when the purchased item listing has been automatically collected, and obtaining from the user the list of components of the purchased item when the purchased item listing has not been automatically collected. The system further determines whether the purchased item contains an undesired component, and upon determining that the purchased item contains art undesired component, sends the alert to the user.
Cryptocurrency Commerce User Interface Systems
A method of effecting a purchase order includes accessing from one or more memory devices computer-readable instructions, wherein the computer-readable instructions are executable by one or more processors of a computing device to detect a purchase trigger event. The method also includes recalling a delivery address specification in response to the detecting of the purchase trigger event, forming a cryptocurrency transaction, the cryptocurrency transaction incorporating the recalled delivery address specification therein, and transmitting the cryptocurrency transaction into a peer to peer cryptocurrency network.
SYSTEM AND METHOD USING OPTICAL TAGS TO CONDUCT SECURE TRANSACTIONS AND AUTHENTICATIONS
A method for limiting exposure to infectious disease by controlling access to a controlled access venue to admit individuals who have tested non-infectious for a particular highly infectious disease or have received a vaccination against the same comprises receiving, at a central website operator server, consumer user identification information from consumer users and storing that information in a consumer user database associated with the server. A biometric identifier from the consumer users is transmitted to the consumer user database and each associated with its respective associated consumer user to form an enrollment record. Identity of a presented individual is collected at a medical certification point and an authority record is created in an accessible authority database. At said medical certification point, an antibody test or vaccination is administered and the same is noted in the authority record. A biometric is collected from a venue presented consumer at a presentation venue, compared to authority records for a match, and the result provided to the venue.
DELEGATION METHOD AND DELEGATION REQUEST MANAGING METHOD
A computer-implemented method for managing a delegation request is provided. The method includes linking a first account of a first user with a second account of the first user and receiving the delegation request from the first user, to delegate an access for the second account of the first user to a second user. The method further includes extracting, from the received delegation request, a delegation request payload and verifying the delegation request based on the extracted delegation request payload. Furthermore, the method includes transmitting the verified delegation request to an identity verification database, receiving, from the identity verification database, an authentication response indicating authentication of the first user, the second user and the delegation of access for the second account of the first user to the second user, and allocating, to the second user, an authority to conduct a transaction for the second account based on the authentication response.
Using Augmented Reality Data as Part of a Fraud Detection Process
A fraud detection system may identify a suspected fraudulent transaction based on one or more criteria. The transaction may be associated with a user. Based on identifying a suspected fraudulent transaction, the fraud detection system may receive augmented reality data from an augmented reality device of the user. The fraud detection system may determine, based on the augmented reality data, whether the transaction is fraudulent, and may take an action based on the determination.
TRUSTED BENEFICIARY IDENTIFICATION
Disclosed in some examples are methods, machine readable mediums, and systems that provide for improved payment processing utilizing a trusted beneficiary identification (ID) to identify trusted beneficiaries. The trusted beneficiary ID is included in payment details by the payor and signifies that the beneficiary of the payment is trusted by virtue of a prescreening process and was found to be trustworthy. The trusted beneficiary ID speeds payment by reducing false positives on sanctions checking and also by storing a trusted beneficiary record with beneficiary information which may be utilized to reduce missing or incorrect information.
TOKEN PROCESSING WITH SELECTIVE DE-TOKENIZATION FOR PROXIMITY BASED ACCESS DEVICE INTERACTIONS
A method includes providing an initial communication, by an access device to a user device. The access device can receive the user identifier and the access token and receive a secret associated with the user. The access device can determine, using the user identifier and/or the access token, if the transaction is authorized by an authorizing entity computer associated with the access device or by an authorizing entity not associated with the access device. If the transaction is authorized by the authorizing entity computer associated with the access device, the access device can transmit an authorization request message comprising the user identifier, the secret, and the access token to the authorizing entity computer. The authorizing entity computer validates the secret, retrieves a real credential of the user using the user identifier, and authorizes the transaction.
Dynamically Authorizing and Processing Contactless Events
Systems for contactless authentication and event processing are provided. In some examples, functionality of a self-service kiosk may be requested. In response, a user may be authenticated and a first interactive user interface may be generated and displayed by the self-service kiosk. A second, different interactive user interface may be generated and transmitted for display by an event processing device. A user may select an option displayed by the event processing device. The user selection may be made via the second interactive user interface. The user selection may then cause the self-service kiosk to execute the selected function.
Method, apparatus and electronic device for blockchain transactions
A method for implementing blockchain-based transactions comprises: determining a transaction amount to be remitted from a remitter's blockchain account into a receiver's blockchain account, wherein a balance of the remitter's blockchain account comprises multiple reserve balances, and commitments of the reserve balances are recorded in a blockchain; selecting one or more of the reserve balances from the remitter's blockchain account, wherein the sum of the selected one or more reserve balances is not smaller than the transaction amount; and submitting to the blockchain a transaction comprising an identification of each of the selected one or more reserve balances and a commitment of the transaction amount, for the selected one or more reserve balances to be removed from the remitter's blockchain account and the transaction amount to be added to the receiver's blockchain account.
SYSTEMS AND METHODS FOR AGE RESTRICTED PRODUCT ACTIVATION
Embodiments of devices and methods for restricting access to certain age related devices are disclosed, including an accessory for an aerosol delivery device comprising an interface that is configured to provide access to age restricted material within the aerosol delivery device; and authentication circuitry that is configured to receive an age verification of a user, wherein the access is not provided to the aerosol delivery device without the age verification.