G06Q20/4014

ASSET TRADING SYSTEM ENABLING TRANSPARENT TRADING HISTORY MANAGEMENT
20220270087 · 2022-08-25 ·

Provided is an asset transaction system capable of: authenticating a user of a connected user terminal in conjunction with an external authentication server; creating blockchain accounts corresponding to an asset transaction with respect to a seller and a purchaser; performing sale registration for a high-priced asset of a seller; processing a transaction of N fractional ownerships into which the full ownership of the registered high-priced asset is split; creating a blockchain account for a new trader through a blockchain account creating unit when the new trader is created while sale registration or transaction of a fractional ownership is being processed; creating a transaction history in which the created blockchain account and a member corresponding to the trader are matched; and transmitting the created transaction history to a blockchain network so that the transaction history is be shared by all nodes participating in the transaction of the asset.

NON-NATIVE ACCOUNT PROCESSING
20220270095 · 2022-08-25 ·

A technique for enabling non-native accounts to be processed by a processing system may include receiving an account identifier scheme that is used by a third-party entity to provide access to accounts associated with the third-party entity, and assigning an entity identifier to the third-party entity in which the entity identifier conforms to a native format used by the processing system. An application programming interface can be modified to recognize account identifiers of the third-party entity. A transaction request can be received to execute a transaction in which the transaction request includes a resource provider identifier of the third-party entity and an account identifier of an account of the third-party entity. The entity identifier assigned to the third-party entity can be determined using the modified application programming interface, and the transaction can be processed using the entity identifier assigned to the third-party entity.

AUTHENTICATED PURCHASE OF RESTRICTED ITEMS
20170221060 · 2017-08-03 ·

A point of sale (POS) is programmed to add unrestricted items to a transaction. In response to presentation of unique customer identification, the customer's identity is verified by transmitting an image associated with the unique identification to the POS. In response to receiving verification that the image corresponds to the presenter of the unique identification, a self-checkout interface is displayed by the POS. Restricted items are input by the customer and, if the customer is determined eligible to purchase the restricted items, they are added to the transaction. Payment for both restricted and unrestricted items in the transaction is then processed. Eligibility may be determined on a server system that determines the customer's age and possibly one or more other eligibility criteria.

Electronic device and method for same controlling external device

Provided are an electronic device and a method of controlling an external device by the electronic device. According to various embodiments of the present disclosure, a method of controlling an external device by an electronic device includes displaying, on a screen, a first user interface (UI) corresponding to first UI data received from an external server, transmitting, to the external device, second UI data corresponding to the first UI, receiving, from the external device, coordinates selected by a user using the external device, obtaining additional information related to the first UI when the coordinates correspond to a position of the first UI displayed on the screen, and transmitting, to the external device, the additional information and an execution command of an application using the additional information.

Signature system for verifying a signature, and corresponding signature method
11238452 · 2022-02-01 ·

A signature system for verifying a signature, includes a writing device which is equipped with identification devices for determining identification data which are linked to the identity of an user of the writing instrument, and code generating devices for generating an identification code from the identification data and from further data, the writing device further including display devices for displaying the identification code; as well as a corresponding signature method.

TRANSPARENT CUBBY SYSTEM FOR AUTONOMOUS DELIVERY SERVICES

An autonomous delivery system for a vehicle is described and includes a plurality of cubbies for retaining items for delivery to users, wherein each of the cubbies comprises a door for selectively enabling access to contents of the cubby, wherein each of the doors comprises a selectively transparent display and wherein upon arrival at a delivery destination, the selectively transparent displays communicate to a recipient associated with the delivery destination in which one of the cubbies a delivery associated with the recipient is retained; and an authentication system for authenticating the recipient and, subsequent to successful authentication of the recipient, permitting access to contents of the one of the cubbies in which the delivery associated with the recipient is retained.

Methods for authorizing use of an application on a device

According to an embodiment, there is provided a method for authorizing use of an application on a device. The method includes: identifying a plurality of device identifiers of the device; determining authorization information based on predetermined one or more of the plurality of device identifiers; and determining authorization for use of the application on the device in response to the authorization information.

METHODS AND SYSTEMS FOR ENHANCED ENDPOINT IDENTITY VALIDATION IN ELECTRONIC TRANSACTIONS
20220271943 · 2022-08-25 ·

Methods and systems are disclosed for merchant system identity validation. One method comprises generating, by an access management system, a primary key associated with an integrator system and transmitting the primary key to the integrator system. The access management system may also generate a hash value associated with a merchant system, and may transmit the hash value to the merchant system. When a payment transaction is initiated at the merchant system, the access management system may receive an authorization request comprising a key-hash pair. The key-hash pair may be validated against a validation database. Upon successful validation, the access management system may transmit the authorization request to an acquirer processor.

VERSATILE POINT-OF-SALE SYSTEMS AND METHODS
20220051216 · 2022-02-17 ·

Systems and methods related to point-of-sale devices are disclosed. In an embodiment, a point-of-sale system includes a base stand having a receiving interface that includes first electrical contacts. The POS system may further include a computing device having a user interface, a docking interface comprising second electrical contacts, wherein the docking interface is configured to removably dock the computing device to the receiving interface of the base stand such that the first electrical contacts of the computing device are in contact with the second electrical contacts of the base stand. The computing device may further include a card reader configured to receive and read a card when inserted into the card reader and a scanner configured to scan machine-readable codes. The computing device may be configured to extend or enable various functions of the base stand when the computing device is docked to the base stand.

CONTEXT SPECIFIC DOCUMENT RECOMMENDATION SYSTEM FOR AUTOMOTIVE RETAIL

A document recommendation system provides a set of documents to a user to complete an automotive transaction between an automotive dealership and a customer. The system stores documents for completing automotive transactions over a wide range of transaction attributes. The store includes base documents and secondary documents. Base documents are used for all transactions. Secondary documents are transaction specific and are based on attribute details of the transaction. After the transaction attributes are received, the system selects a set of base documents and a set of secondary documents. The system may select the secondary documents according to a predefined set of rules. After both sets of documents are selected, the system populates fields of the documents with values using the received transaction attributes. The populated documents are then provided to the user of the document recommendation system for review.