G06Q20/4014

Transaction with security integrity and permission management

Methods, computer program products, and systems are presented and can include for instance: The method can include for example, establishing a permission that authorizes a second shopper to act on behalf of a first shopper, the first shopper having a profile that includes first shopper information stored in a secure computing environment; and performing a transaction based on one or more input of the second shopper, the transaction using content of the first shopper information stored in a secure computing environment, wherein the second shopper is restricted from accessing one or more information item of the first shopper information stored in a secure computing environment.

Post-paid transaction data processing method and device, processing apparatus, and server
11373161 · 2022-06-28 · ·

A post-paid transaction data processing method includes: receiving risk search information via a wireless or wired interface, the risk search information including a transaction amount and a transaction user identifier of a post-paid transaction; acquiring, according to the transaction user identifier, a payment channel corresponding to the transaction user identifier; determining a predictive affordable value of the payment channel for the transaction amount based on the payment channel and the transaction amount; and determining a default evaluation result of the post-paid transaction according to the predictive affordable value.

Multi-slot automated teller machine

Embodiments disclosed herein generally related to an automated teller machine (ATM) and a method of operating the same. In one embodiment, an apparatus is disclosed herein. The apparatus includes a body, a display, two or more currency dispensing components, two or more currency cartridges, two or more tracks, and a controller. Each currency dispensing component is dedicated to a specific currency denomination. The two or more currency cartridges are configured to store currency. Each currency cartridge dedicated to a specific currency denomination. Each track extends between a currency dispensing component and a currency cartridge. The two or more tracks are configured to transmit currency from the two or more currency cartridges to the two or more currency dispensing components. The controller is in communication with the display, the two or more currency dispensing components, the two or more currency cartridges, and the two or more tracks.

Systems and methods for use in facilitating network transactions based on user authentication

Systems and methods are provided for facilitating network transactions. One exemplary method includes receiving, by a computing device, via a first wireless connection, a credential from a mobile device where the credential is specific to an account associated with the mobile device. The method also includes determining an identifier of the mobile device, compiling an authorization request for the network transaction, where the authorization request includes the identifier and the credential, and transmitting the authorization request to a first party for authorization. The method further includes; receiving an authorization reply in response to the authorization request, where the authorization reply includes a result for the network transaction and the identifier, and transmitting, via a second wireless connection, a notification, including the result of the network transaction, to the mobile device, based on the identifier included in the authorization reply. The first wireless connection is different than the second wireless connection.

Secure transactions for in-flight entertainment systems
11374752 · 2022-06-28 · ·

Disclosed are devices, systems and methods for performing secure transactions in an aircraft are disclosed. Embodiments of the disclosed technology enable low cost carriers to provide payment verification for on-board purchases via the in-flight entertainment system. An exemplary method for performing secure transactions in an aircraft includes transmitting, by a user device in the aircraft using a wireless protocol, a first authentication factor and a request for one or more on-board services; receiving, from an on-board transceiver using the wireless protocol, an authentication token (a) comprising a one-time code and (b) encrypted using an asymmetric cryptographic algorithm; transmitting, using the asymmetric cryptographic algorithm, a second authentication factor comprising (a) the authentication token and (b) a text message transmitted from the user device; and receiving a confirmation of a delivery of the one or more on-board services.

System for authentication of resource actions based on multi-channel input

Embodiments of the present invention provide systems and methods for authentication of users and authorization of user actions, and distribution or transfer of resources based on multi-channel input via a user device or one or more auxiliary user devices, such as smart home devices. The system is further configured to perform one or more user activities, in an integrated manner, within a single interface of the user device, without requiring the user to operate disparate applications. Furthermore, the system is configured to receive user input through multiple communication channels such as a textual communication channel and an audio communication channel and store unique user patterns to form an authentication baseline for subsequent user communications.

TARGET OBJECT MANAGEMENT METHOD, SMART CONTRACT, AND MANAGEMENT DEVICE
20220198447 · 2022-06-23 · ·

A method of managing an object according to the disclosure includes executing, by a smart contract implemented on a blockchain, an operation on a non-fungible token. The non-fungible token is identified by an identifier included in a code assigned to the object.

REAL-TIME DETERMINATION OF TARGETED BEHAVIORAL DATA BASED ON DECOMPOSED STRUCTURED MESSAGING DATA

The disclosed embodiments include computer-implemented systems and processes that provision targeted behavioral data based on structured messaging data. For example, an apparatus may obtain elements of decomposed message data that characterize real-time payments associated with a counterparty during a first temporal interval. Based on the elements of decomposed message data, the apparatus may determine a value of a plurality of parameters that characterize the counterparty during the first temporal interval. Further, and based on the elements of decomposed message data and on the parameter values, the apparatus may generate output data indicative of a likelihood of an occurrence of an event during the first temporal interval or a second temporal interval. The apparatus may also transmit notification data to a device operable by the counterparty. The notification data may cause an application program executed at the device to present the portion of the output data within a digital interface.

CHECKOUT SYSTEM AND CHECKOUT METHOD

A checkout system is implemented by one or more computers. The checkout system includes: a product detection unit configured to detect a product to be purchased; a determination unit configured to detect whether the product detected by the product detection unit is a restricted product; an input unit configured to receive a designation operation of a settlement method by a customer; a reading unit configured to read settlement information from a settlement medium corresponding to the settlement method; an acquisition unit configured to acquire age information of the customer in accordance with the settlement method; and a processor configured to determine, in a case in which the restricted product is detected by the determination unit, purchase permission process of the restricted product based on whether the age information can be acquired by the acquisition unit.

Absentee Ballot System and Method Using Codes For Minimizing Pandemic Exposure
20220198865 · 2022-06-23 ·

The inventive apparatus for printing, sending, receiving and counting absentee ballots, comprises a printer for creating a plurality of ballots, each of the ballots bearing a unique code device containing a unique identification code and a would-be voter personal computing device for sending a communication from a would be voter requesting a ballot and for sending personal identification information. The personal computing device must receive a biometric to become activated. A board of elections computing device receives a communication from a would-be voter requesting a ballot, the board of elections computing device being operated by software which causes it to execute a number of program steps comprising verifying that the personal computing device must receive a biometric to become activated, receiving personal identification information from the would-be voter personal computing device, and comparing the received personal identification information with voter record information contained in the database of registered voter information a board of elections to determine whether the would-be voter is registered to vote. A balloted voter database is adapted for storing a notation of a positive identification of the would-be voter as a registered voter, and for storing in the balloted voter database a notation that the would be voter is to be sent one of the ballots. A scanning device is adapted for scanning the unique code device on one of the ballots. A sent ballots database stores the identification of the one ballot in the sent ballots database. A voted ballots database receives an indication that a communication has been received from the registered voter personal computing device of the would be voter, the communication comprising the output of a scan of the unique code device on the ballot sent to the would-be voter, the information including the unique identification code, whereby returned voted ballots may be assessed for authenticity, wherein the program of steps comprises assessing authenticity of return ballots by determining that each ballot is included in the sent ballots database and is included in the voted ballots database, whereby the ballots that are included in the sent ballots database and in the voted ballots database are identified as verified ballots, and the election choices in the verified ballots may be counted.