Patent classifications
G06Q20/4015
AUTHENTICATING ACTIVITIES OF ACCOUNTS
A system, a medium, and a method involve a communication interface of a server device that receives first activity data associated with a first activity of an account and second activity data associated with a second activity of the account. A processor of the server device determines a first location of the first activity from the first activity data and a second location of the second activity from the second activity data. An authentication circuit of the server device determines a first authentication of the first activity based at least on the first activity data. The authentication circuit determines a second authentication of the second activity based on at least one of the first authentication, the first location, and the second location. A transmitter of the communication interface transmits an indication of the second authentication to a client device.
SYSTEMS AND METHODS FOR AUTHENTICATING USER IDENTITIES IN NETWORKED COMPUTER SYSTEMS
The disclosed embodiments include methods and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction. The method may also include providing, by the one or more processors, the validation information to the authentication network.
Shareable widget interface to mobile wallet functions
Configuring a shareable widget interface to mobile wallet functions includes disposing a wallet module in a memory of a client device, and disposing a wallet companion applet in a secure element accessible by the client device, wherein the wallet companion applet facilitates access by at least one other applet and at least one wallet module to content that is stored in the secure element via a mobile wallet function sharable interface.
Methods and systems of providing verification of information using a centralized or distributed ledger
A method and system of providing verification of information of a user relating to an attestation transaction is provided, and includes sending a request for information of the user, wherein the information has been previously attested to in an attestation transaction stored within a centralized or distributed ledger at an attestation address; receiving at a processor associated with a verifier the information of the user; sending a cryptographic challenge nonce; receiving at the processor associated with the verifier the cryptographic challenge nonce signed by the user's private key; verifying user identity with the cryptographic challenge nonce signed by the user's private key; deriving a public attest key by using the information of the user; deriving an attestation address using the public attest key; and verifying the existence of the attestation transaction at the attestation address in the centralized or distributed ledger.
Systems and methods for use in geolocation tracking
Disclosed are exemplary embodiments of systems and methods for use in geolocation analysis. In one exemplary method, a computing device accesses boundary definitions associated with regions. For each region, the computing device determines a centroid of the region, having a location including a latitude and a longitude, based on an associated boundary definition, truncates the centroid location by deleting the latitude or longitude, and stores the truncated location as a partition key for the region. The computing device also accesses a transaction record, including a merchant point location having a latitude and longitude. The computing device truncates the point location by deleting the latitude or longitude, and identifies regions associated with the partition keys based on a comparison of the truncated point location to the partition keys. The computing device then determines whether the point location is included in one of the identified regions.
METHODS AND SYSTEMS FOR MEASURING AND IMPROVING REAL-TIME USER SATISFACTION IN HOSPITALITY INDUSTRY
The embodiments herein provide methods and systems for measuring real-time user satisfaction in hospitality industry, a method includes delivering at least one service to at least one user by tracking location of the at least one staff in real-time. The method includes detecting at least one fault in functioning of at least one appliance present in at least one user staying area of a hospitality unit by collecting data from the at least one sensors connected to the at least one appliance. The method includes initiating blockchain based smart contract to fix the detected at least one fault. Based on feedback received from the at least one user, movements of the at least one staff and the data collected from the at least one sensor, the method includes predicting at least one user satisfaction score during a stay of the at least one user at the hospitality unit.
Vending machine route management
An embodiment includes a method executed by at least one processor comprising: determining inventories for first and second times for a first vending machine (VM); determining inventories for first and second times for a second VM; determining inventories for first and second times for a third VM; and determining a service route to visit the first and second VMs on a specific date, and to specifically avoid visiting the third VM on the specific date, in response to determining the inventories for the second times for the first, second, and third VMs. Other embodiments are described herein.
Secure contactless payment systems and methods
According to the invention, a system for providing payments to a point of sale device is disclosed. The system may include a mobile device having a storage medium, an input device, a wireless transmission device, and a processor. The storage medium may include individual authentication information and device authentication information. The input device may be configured to receive an input. The wireless transmission device may be configured to selectively transmit the device authentication information to a nearby point of sale device. The processor may be configured to compare the input with the individual authentication information, and activate the wireless transmission device to transmit the device authentication information if the input is correlated with the individual authentication information.
SYSTEMS AND METHODS FOR ATTRACTING CUSTOMERS WITH DIGITAL REWARDS
A consumer mobile software application is designed to entice new or infrequent visitors to visit a merchant. The application may permit the consumer to register and receive reward offers from the merchant, typically only when the consumer is at the merchant's place of business. The application may store each of the merchants added to the consumer's account and track the available rewards. The application may also store anywhere dollars, which may be usable across any of the participating merchants. The anywhere dollars may be converted into a crypto currency whose value may fluctuate based on the value of such currency. The merchants accepting such currency when redeemed by the consumer may opt to auto exchange the crypto currency to dollars on their account or may choose to retain the crypto currency itself.
Computational systems and methods for regulating information flow during interactions
Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one request for personal information from a party to a transaction; evaluating the transaction; and negotiating presentation of at least one persona to the party to the transaction at least partly based on an evaluation of the transaction.