Patent classifications
G06Q20/4014
Payment device and process
A method for receiving and executing a request from an electronic communications device in a point-of-sale location, the device configured to receive, from a device reader, magnetic signature data from a magnetic field produced by the device reader and wirelessly receiving a reader unique identifier from the device reader. The device configured to communicate the magnetic signature data and unique identifier to a backend service as reader identifying data together with customer credentials. The backend service configured to match customer credentials with a customer database, and match reader identifying data to a reader database to verify the reader identify; the backend service configured to use verified reader identity to identify order data received from a terminal and to pass order data to a payment provider for executing payment.
SYSTEMS AND METHODS FOR AUTONOMOUS BANKING RESOURCES
Systems and methods for autonomous banking resources are disclosed. Embodiments include a mobile banking resource including an unmanned motorized vehicle, a controller configured to control the movement of the motorized vehicle, an authentication device configured to verify the identity of a user, a server configured to communicate with the controller and the authentication device, and a user interface module configured to interface with the user conducting a transaction. The user interface module may include a user input device configured to receive user input, and a communication interface module configured to communicate with a server and the user input device. The controller may be configured to operate the motorized vehicle to move the motorized vehicle to a location based on a predicted behavior of the user.
SEARCHABLE INDEX ENCRYPTION
Auditing data containing sensitive data are stored in a data structure comprising data objects. Each data object comprises one or more pairs of a name and a value. Pairs that are flagged or identified as containing sensitive data are partially encrypted; the value is encrypted using an asymmetric key and the name corresponding to the encrypted value remains unencrypted. Some pairs that are not flagged or identified as containing sensitive data are left unencrypted. Unencrypted data may be stored in the partially encrypted auditing data as plain text. The auditing data may be analyzed to generate business metrics and identify application errors. The auditing data may also be queried, and data objects containing unencrypted pairs and/or partially encrypted pairs may be returned based on matching unencrypted names and/or values to the data query.
AUTHENTICATION FOR THIRD PARTY DIGITAL WALLET PROVISIONING
Various embodiments are directed to securely verifying an identity of a user who is requesting to add or link a financial instrument to a third-party digital wallet using one-tap contactless card authentication. The financial instrument may be added or linked to the third-party wallet in at least two scenarios: pull provisioning and push provisioning. In either provisioning scenarios, the user may be required to authenticate the financial instrument being added or linked by successfully verifying the identity of the user via the one-tap contactless card authentication at a banking application associated with the financial instrument.
BOOKING MANAGEMENT SYSTEM
A booking management system for secure authentication of payment information and delayed transaction processing is provided. Third-party services partner with booking management systems to aggregate and list offerings of the third-party services in a digestible display on a one-stop platform. A booking management system can manage the authentication of payment card information on behalf of any number of such third-party services. The booking management system may receive a delayed transaction request from one or more such third-party service. The booking management system may provide virtual payment information to the third-party services for delayed transactions. The third-party services may later initiate the delayed transactions using the virtual payment information, without being required to perform authentication processing on the payment card information maintained by the booking management system.
COLLECTING AND LINKING DIGITAL CONSUMER SURVEY PANEL DATA TO A SEMI-PERSISTENT IN-STORE CONSUMER LOYALTY CARD IDENTIFIER
A method for providing survey consumer data to a centralized server via a consumer panel application is provided. The method includes receiving in a server, from an application installed in a mobile device of a consumer, a transaction data linking a consumer identification with a selected retailer and associating a consumer segment with the transaction data based on a demographic attribute shared between a server account for the consumer and the consumer segment. The method also includes determining a sales lift factor for the consumer segment based on an adjustment factor and the transaction data, and updating a scalable measurement protocol in the application installed in the mobile device of the consumer based on the sales lift factor. A system and a non-transitory, computer-readable medium storing instructions to perform the above method are also provided.
Dynamically configurable social media platform
Disclosed is an electronic commerce system integrated with a social networking system. In some aspects, a user of the social networking system may claim a merchant offer by scanning a visual code identifying the offer. Later, the user may make a purchase at the merchant using the social network application. The social network application may apply the offer to the purchase transaction, and authorize a payment based on application of the offer to the purchase. One or more features of the social networking system may also be associated with the offer, such that these features become available to the user within the social network system upon use of the offer as part of the purchase transaction. For example, in some aspects, additional image filters may be made available within the social network system as a result of redemption of an offer.
Account assertion
Methods and systems for processing interactions with account assertions are disclosed. A method includes receiving, by an assertions model manager, a first request from a resource provider computer for a set of assertions including an account assertion, related to a digital identity of a user. The method then includes responding, by the assertions model manager, to the first request with a response message, comprising a set of assertions, wherein one of the plurality of assertions is an account assertion. Then the method includes receiving, by the assertions model manager, a second request from the resource provider for a value interaction from the user and initiating, by the assertions model manager, the value interaction.
Local cache-based identification system
An identification system uses a local cache for performing identifications. An identity system device may store identity information and identification information. An electronic device stores a cache of a portion of the identity information and a part of the identification information. The electronic device receives user input, determines an identity by comparing the user input to the cached identification information (such as by comparing a received digital representation of a biometric with cached biometric identification information), and performs an action using information in the cached identity information that is associated with the identity. The electronic device may update the identity information stored by the identity system device based on the action.
Dynamically generating visualization data based on shipping events
Technologies are described for generating visualizations that graphically represent an item being exposed to extreme environmental conditions while en route to a destination. An exemplary visualization may include a still graphic that shows a symbol of a detected environmental condition positioned adjacent to and/or superimposed over a graphic that represents the item. Another exemplary visualization may include an animation that includes a sequence of frames that, when sequentially displayed at a particular frame rate, animate the item being subjected to the detected environmental condition. Various implementations include receiving measurements of the environmental conditions that the item is exposed to from sensors that are proximate to the item while it is en route to the destination. Then, when thresholds are reached for specific environmental conditions (e.g., temperature, acceleration, etc.), visualizations may be generated that graphically represent the item being exposed to such specific environmental conditions.