G06Q20/4014

Systems and methods to provide user verification in a shared user environment via a device-specific display
11282066 · 2022-03-22 · ·

A method of generating a shared augmented reality payment authentication entry interface includes detecting a first consumer device and a second consumer device; prompting a display of a first augmented reality payment authentication interface at the first consumer device; and prompting a display of a second augmented reality payment authentication interface at the second consumer device.

System to determine user interaction with fixture

Sensors in a facility obtain sensor data about a user's interaction with a fixture, such as a shelf. The sensor data may include images such as obtained from overhead cameras, weight changes from weight sensors at the shelf, and so forth. Based on the sensor data, one or more hypotheses that indicate the items and quantity may be determined and assessed. The hypotheses may be based on information such as the location of a user and where their hands are, weight changes, physical layout data indicative of where items are stowed, cart data indicative of what items are in the possession of the user, and so forth. A hypothesis having a greatest confidence value may be deemed to be representative of the user's interaction, and interaction data indicative of the item and quantity may be stored.

Creation and use of controlled, and limited digital fantasy image token to enable digital wealth creation and growth-DFIT
20220101312 · 2022-03-31 ·

Public imagery for the purposes of promotion, there is a need to be efficient. Measuring the impact of using a particular image and accurately assessing the impact on consumer purchase behavior has unlimited value, and protecting those images is vital. Media companies have always desired to create desirable outcomes for their customers by measuring impact of endorsements or determining the optimal placement to impact sales and gains in market share for their client advisors. While there are market analytic groups that measure the post-launch impact of an endorsement, there are few if any methods that are able to assign a value to an image (endorsement) in real time and measure this value in real-time. The platform used here measures the pre-launch efficacy of these images and transforms digital followers of the owners of those personas into digital loyalists; capable of converting a lifetime of digital value creation into perpetual digital wealth for that persona holder. For celebrities, charities, universities, athletes, and public figures the platform described here represents a unique method for monetization of the digital value for those individuals or entities who have built significant followings.

System and method for financial services kiosk features
11295285 · 2022-04-05 · ·

A system including voice, video, and chat capability at financial services kiosks (e.g., ATMs) is disclosed. The voice, video, and chat and capabilities may be implemented using Web Real-Time Communication (WebRTC). A customer can complete all transactions and interactions with a live person in real time at the financial services kiosk. The financial services kiosk can be located anywhere in the world and only requires an Internet connection to support the system. The live person is remotely located from the financial services kiosk and can be available 24/7. The live person may be a teller or specialist located in a contact center.

Systems and methods for electronic certification of e-commerce security badges
11295301 · 2022-04-05 · ·

A method for managing secure processing of electronic payment transactions includes receiving a request submitted by a merchant computing system for a security verifier. The security verifier is to be displayed on an electronic display associated with the merchant computing system. A set of security credentials received from a security service provider is measured against a security threshold. When the set of security credentials meets the security threshold, a uniform resource locator (“URL”) is transmitted to the merchant computing system. The URL identifies the security verifier to be retrieved and displayed at the electronic display associated with the merchant computing system.

Financial management system with account guardian oversight

A financial management system may include a device processor and a non-transitory computer readable medium including instructions, executable by the processor. The computer readable medium may include instructions for receiving purchase information regarding a pending purchase of a system user using an account; sending the purchase information, along with a request for approval of the purchase, to one or more personal electronic devices of a guardian of the account; receiving a response selected by the guardian; and selectively permitting the purchase based on the response selected by the guardian.

METHOD AND SYSTEM FOR SELF-CHECKOUT IN A RETAIL ENVIRONMENT
20220084010 · 2022-03-17 ·

The present disclosure relates to systems and methods for contactless checkout in a retail environment including a security pedestal located at an entrance or exit to a retail location. The system further includes a scanning device that is communicably coupled with the security pedestal. The self-checkout system and methods may also include a processing system that is configured to receive a list of items from the security pedestal and customer identification code from the scanning device. The system and method is configured to allow for a customer to scan his purchases at the security pedestal and pay for the purchases through the use of the customer identification code generated, preferably, using the customer's personal computing device.

Systems and Methods for a Permissionless Decentralized Virtual Asset Network
20220092599 · 2022-03-24 · ·

A blockchain system for containing authority within a distributed consensual system includes a blockchain network of participating user devices. A participating user device, having a memory and a processor, is configured to create an account linking blockchain transaction to link a developer account with an external authority account of a user of the device. The user device is further configured to publish a recipe associated with the user's developer account, receive, from an external authority, a receipt indicating purchase of the recipe by another user connected to the distributed consensual system, create a recipe blockchain transaction including data identifying the recipe and the receipt, and broadcast the recipe blockchain transaction on the blockchain network. Upon validation, the user receives payment via one or more additional blockchain transactions.

PROXIMAL DISTANCE AND USAGE PATTERN ACCESS MANAGEMENT

A method for proximal distance and usage pattern access management includes identifying a first trigger event based on a financial device profile indicating a first proximal distance threshold is exceeded for a first device relative to a second device, where the first device is capable of executing financial transactions. The method further includes querying one or more network devices in the vicinity of the first device to validate the first trigger event. The method further includes responsive to receiving a first validation of the first trigger event from at least one network device from the one or more network devices, applying a first temporal lock on the first device preventing future executions of financial transactions. The method further includes responsive to validating a user associated with the second device, updating the financial device profile based on at least on the first trigger event and a location for the trigger event.

SYSTEM AND METHOD OF PERFORMING SECURED TRANSACTIONS IN A COMMUNICATION NETWORK
20220092583 · 2022-03-24 · ·

A system and a method of data communication between a first computing device, associated with a first user, and at least one second computing device associated with a second user may include: receiving, by the first computing device, one or more data elements pertaining to details of a transaction request from the second computing device, via a voice channel; extracting said transaction request details by the first computing device; transmitting, by the first computing device, one or more authentication data elements of an electronic wallet module, comprised in the first computing device, to the second computing device, via the voice channel; and carrying out the requested transaction by the first computing device, based on the extracted transaction request details and the electronic wallet authentication data.