G06Q20/4014

USER INTERFACES FOR MANAGING AN ACCOUNT

In some embodiments, exemplary user interfaces for provisioning an electronic device with an account are described. In some embodiments, exemplary user interfaces for providing usage information of an account are described. In some embodiments, exemplary user interfaces for providing visual feedback on a representation of an account are described. In some embodiments, exemplary user interfaces for managing the tracking of a category are described. In some embodiments, exemplary user interfaces for managing a transfer of items are described. In some embodiments, exemplary user interfaces for managing an authentication credential connected with an account are described. In some embodiments, exemplary user interfaces for activating a physical account object are described. In some embodiments, exemplary user interfaces for managing balance transfers are described.

Temporarily provisioning functionality in a multi-device point-of-sale system

Temporarily provisioning functionality to a personal device in a multi-device point-of-sale (POS) system is described. In an example, a personal device can be determined to be within a range of a POS system of a merchant. The POS system can include a merchant-facing device and a customer-facing device that is coupled to the merchant-facing device. Functionality can be provisioned to the personal device that (i) configures the personal device to present a customer user interface (UI) via a display of the personal device to enable a customer operating the personal device to interact with the merchant and (ii) enables the personal device to interact with at least one of the merchant-facing device or the customer-facing device. Responsive to determining an occurrence of an event, the functionality can be de-provisioned from the personal device.

KIOSK DEVICE HAVING STORAGE BINS

In some examples, a controller includes a processing resource and a memory resource storing instructions to cause the processing resource to determine, via a radio frequency identification (RFID) reader in response to a storage bin of a kiosk being accessed, details regarding an item transiting the storage bin via an RFID tag associated with the item based on a received access request for the storage bin that includes an associated user identity, associate the details regarding the item with a user register associated with the user identity, and update an inventory of the storage bin based on the determined details regarding the item transiting the storage bin.

PROVIDING AUGMENTED REALITY USER INTERFACES FOR AUTOMATED TELLER MACHINE TRANSACTIONS
20220108289 · 2022-04-07 ·

Aspects of the disclosure relate to providing augmented reality user interfaces for ATM transactions. In some embodiments, a computing platform may receive presence information indicating that a mobile computing device is within a predetermined distance of a first ATM at a first location, authenticate a user of the mobile computing device to an online banking account, and generate a transaction-specific device identifier that uniquely identifies the first ATM at the first location. Thereafter, the computing platform may generate and send an augmented reality user interface to the mobile computing device, prompting the user to use the mobile computing device to capture the transaction-specific device identifier. Based on verifying that the user is authorized to perform a transaction at the first ATM, the computing platform may cause an NFC connection to be established between the mobile computing device and the first ATM, via which the transaction may be conducted.

INTELLIGENT PREPROCESSING ROUTING TO DECISIONING SERVICES

The system and methods described herein allow users to give their applicant information when seeking to purchase a good with financing from multiple potential lenders, and may be pre-screened by one or more rule sets implemented by a marketplace client in an eligibility analysis to ultimately submit applicant information to a subset of the multiple potential lenders which are found to be suitable for lending to an applicant based on the applicant information, wherein lender microservices are then run in a jailed, firewalled, and self-contained, autonomous environment, and the results of said lender microservices are reported to the user and may be used to change the one or more rule sets implemented by the marketplace client for future pre-screening of applicants.

BLOCKCHAIN BASED ACCOUNT FUNDING AND DISTRIBUTION

The present methods and systems relate to using and accessing data stored in a blockchain, and in particular, interacting with the blockchain and users via smart contracts to handle account funding and distribution methods. The methods and systems include receiving a transaction from a participant, and verifying the transaction, such as by accessing a smart contract stored on the blockchain and checking a set of parameters against a set of conditions stored in the smart contract. Depending on whether the set of parameters satisfy the conditions, the results may be communicated to participants about the success or failure of the transaction.

Platform-agnostic account access using facial recognition
11288646 · 2022-03-29 · ·

Facial recognition is used to allow access to platform-agnostic account information. A processing and verification device receives a request for a transaction requiring access to account information of a user. Responsive to the request, a new image of the user is generated, such as using an image sensor of a camera. The new image is used to query a database to determine whether an existing image stored in the database matches or substantially matches the new image. Responsive to a positive result of the query, the request is allowed by the processing and verification device granting the access to the account information. The access to the account information is then used to complete the transaction. The account information uses a global architecture such that it can be used with different hardware and software configurations of a connected system.

Systems and methods for preserving privacy and incentivizing third-party data sharing

Methods and systems relating incentivizing a data provider to participate in a match making protocol between a business (second entity) to a user (first entity) are shown. Encryption techniques maintain the secrecy of the data providers data such as proprietary analytics of user information such that the data is need not be shared with users or businesses. Businesses can verify that the user has desired properties without learning the actual raw data owned by the data provider. Users initiate data sharing by explicit request but do not learn the actual raw data known to the data provider, only whether or not they satisfy the properties of interest. The data provider is incentivized because the business compensates the data provider for access to proofs of properties about user data.

Speculative transaction operations for recognized devices
11301853 · 2022-04-12 · ·

Techniques are disclosed relating to speculatively processing transactions. A transaction processing system may receive an indication of a trigger event associated with an electronic transaction not yet initiated by a client computing device. In some embodiments, in response to the indication of the trigger event and prior to receiving an indication of the electronic transaction being initiated, the computer system begins speculative processing of the electronic transaction. In some embodiments, the speculative processing includes identifying the client computing device based on device authentication information received from the client device, determining a user account based on the identifier client computing device, retrieving account information for the determined account, and storing the retrieved account information. In response to receiving an indication of the electronic transaction being initiated, in some embodiments, the computer system performs one or more operations using the stored account information to complete the transaction.

System and method for user authentication at a kiosk from a mobile device
11283615 · 2022-03-22 · ·

A system and method for user authentication at a kiosk from a mobile device is disclosed. A particular embodiment is implemented for: configuring a kiosk to detect the presence of a mobile device in the proximity of the kiosk; configuring the mobile device to detect the presence of kiosk in the proximity of the mobile device; prompting a user of the mobile device to perform a login operation on the mobile device upon detection of the kiosk in the proximity of the mobile device; verifying the authentication of the user with the mobile device as a result of the login operation on the mobile device; and transferring unique kiosk session keys from the mobile device to the kiosk in proximity of the mobile device upon authentication of the user with the mobile device.