G06Q20/4014

CRYPTOBIONIC SYSTEM AND ASSOCIATED DEVICES AND METHODS
20220255925 · 2022-08-11 ·

Introduced here are cryptobionic implants designed for implantation within a human body that are capable of facilitating an identity authentication and/or an intent validation process. These cryptobionic implants can be designed to be cryptographically secure. For example, a cryptobionic implant may include a processor configured to encrypt data residing in an internal storage and a transponder configured to transmit the encrypted data to a reader device located outside of the human body for decryption. The reader device (or some other electronic device) may be able to verify the identity of the individual in whom the cryptobionic implant is implanted based on the decrypted data.

Systems and methods for pre-authenticating a user of a payment card over a network

The present disclosure provides for systems and methods for pre-authenticating a user over a network, the system including an authentication computing device configured to receive, over a first computer network, a pre-authentication signal from a client device, determine an account number associated with a payment card of the user, verify i) that the user has satisfied at least one security measure, and ii) that the account number is associated with the client device, store the account number in association with a timer, initiate the timer, monitor, until the timer expires, a second computer network to detect an authorization request message for a transaction having the account number, and embed a digital authentication flag in the authorization request message when the authorization request message is detected before the timer expires, the digital authentication flag indicating that the transaction has been pre-authenticated.

Systems and methods for monitoring for and lowering the risk of addiction-related or restriction violation-related behavior(s)
11388546 · 2022-07-12 · ·

Exemplary embodiments are disclosed of systems and methods for providing location-based security and/or privacy for restricting user access. In an exemplary embodiment, a system is configured to restrict and condition access to the system and/or data based on a user's selection of location-based data from a plurality of options presented by the system for selection by the user. The plurality of options include the location-based data and one or more other options that are selectable by the user.

Smart meal ordering method and device

A smart meal ordering method comprises: conducting body sensing of a diner by a body sensing hardware of a smart meal ordering device; outputting a meal ordering interface by a display screen of a smart meal ordering device in response to sensing that the diner has taken a seat, and obtaining information of one or more dishes selected by the diner on the meal ordering interface; and in response to sensing that the diner has left the seat, sending a total price of the dishes and identification information of the smart meal ordering device to a server.

Platform-Agnostic Account Access Using Facial Recognition
20220215365 · 2022-07-07 ·

Facial recognition is used to allow access to platform-agnostic account information. A processing and verification device receives a request for a transaction requiring access to account information of a user. Responsive to the request, a new image of the user is generated, such as using an image sensor of a camera. The new image is used to query a database to determine whether an existing image stored in the database matches or substantially matches the new image. Responsive to a positive result of the query, the request is allowed by the processing and verification device granting the access to the account information. The access to the account information is then used to complete the transaction. The account information uses a global architecture such that it can be used with different hardware and software configurations of a connected system.

System, Method, and Computer Program Product to Determine Cuisine Type Classifiers
20220253853 · 2022-08-11 ·

Provided is a method that includes determining cuisine type classifiers based on merchant data, receiving transaction data associated with each payment transaction of a plurality of payment transactions involving a plurality of merchants and a plurality of consumers; determining, with at least one processor, a plurality of cuisine type labels based on a plurality of merchant names associated with the plurality of payment transactions or a portion of the plurality of payment transactions, wherein a cuisine type label identifies a cuisine type provided by a respective merchant of the plurality of merchants; generating a merchant cuisine type model from the transaction data to determine a cuisine type label of a merchant, the merchant cuisine type model based on the transaction data, and makes an inference based on a combination of merchant or consumer features associated with a payment transaction of the plurality of payment transactions; and automatically predicting one or more cuisine type classifications using the merchant cuisine type model based on one or more payment transactions associated with a consumer. A system and a computer program product are also disclosed.

Executing application without unlocking mobile device

Implementations of the present specification disclose mobile payment methods, apparatuses, and devices. In one aspect, the method includes: monitoring, by a terminal device that is in lock screen mode, outputs of one or more sensors of the terminal device; determining that the outputs of the one or more sensors satisfy first specified criteria indicative of one or more particular body movements; in response to determining that the outputs of the one or more sensors satisfy the first specified criteria, displaying, on the terminal device, a payment processing interface; receiving an input through the payment processing interface; and executing a payment service based on the input.

FUEL LOYALTY REWARDS

A processing system for fuel transactions analyzes transactions for symbols indicating a purchase amount and directs information about the purchase to a loyalty platform. The loyalty platform may identify and communicate in real time or near real time with a personal device associated with the purchaser of the fuel. A user interface of the personal device may allow the purchaser to review and select options for processing the fuel purchase using value from a loyalty program account. The selected option may be used to modify fuel purchase parameters prior to settlement of the transaction or simply add points to the user loyalty program account.

ZERO-STEP AUTHENTICATION USING WIRELESS-ENABLED MOBILE DEVICES
20220230159 · 2022-07-21 ·

A zero-step authentication system and method which uses wireless mobile devices to automatically make payments in a secure manner without requiring the customer to handle his or her mobile device. The system and method uses a payment facilitation device at the business location which automatically detects and recognizes registered mobile devices, displays a photo of the customer to a business employee for identity confirmation, and automatically deducts payments for purchases from a pre-authorized customer account. The customer account is managed by a payment processing server, which stores the customer account data, makes appropriate deductions, sends confirmation of deductions to the customer's mobile device, and automatically refills the customer's account by making pre-authorized charges to the customer's banking institution.

IDENTITY-BASED TRANSACTION PROCESSING
20220222673 · 2022-07-14 ·

Methods and systems disclosed herein related to analyzing the risk of an identity-based transaction and offering the identity-based transaction to a risk exchange. An identity-based transaction may be a transaction that is initiated with a digital identity, and an assertions model manager may provide assertions about the digital identity for completing the identity-based transaction. The assertions model manager may use the assertions and information about the identity-based transaction to analyze transaction risk. A risk score for the identity-based transaction can be calculated, and then the identity-based transaction may be offered on a risk exchange.