G06Q20/4015

Open system for parking of vehicles using incentives.
20240054518 · 2024-02-15 ·

A method for ensuring verifiable parking of micro-mobility vehicles in designated locations through centralized or decentralized systems. The invention seeks to solve situations of scattered and disorderly parking of micro-mobility vehicles. Through sensing devices, the main system receives information of a parked vehicle within a designated space, which may include vehicle features or alphanumeric code, and processes the data for verification via machine learning or other techniques. Upon verification of the proper parking of a vehicle, a ledger logs the corresponding user with the parking event. Cryptocurrency tokens may be distributed to users or operators upon verification of proper parking, depending on whether the vehicle is owned by the user or part of a shared fleet.

ACTIONABLE ALERT AT NEGATIVE MODIFICATION EVENT
20240054557 · 2024-02-15 ·

In some aspects, a computing system may include a processor. Also, the computing system may include a communications module coupled to the processor. Furthermore, the computing system may include a memory coupled to the processor, the memory storing instructions that, when executed, configure the computing system to: determine a daily positive modifier amount based on an amount of positive adjustments to an account over an extended time period; determine a daily non-discretionary negative modifier amount based on an amount of non-discretionary negative adjustments to the account over the extended time period; determine a daily discretionary amount based on the daily positive modifier amount and the daily non-discretionary negative modifier amount; detect an expected negative modification event; and in response to detect the expected negative modification event, trigger a notification based on the daily discretionary amount.

Customer identification verification process

An example device may include one or more processors to receive a request for a service from a requestor user device; provide transaction information associated with the service to a provider user device, where the transaction information may include location information corresponding to a location at which the service may be provided; obtain verification information from the requestor user device based on an interaction associated with the requestor user device or the provider user device at the location, where the verification information may include one or more characteristics of the requestor user device; generate a verification token based on the one or more characteristics of the requestor user device; and provide the verification information to the provider user device to permit the provider user device to verify the requestor user device, based on receiving the verification information and obtaining the verification token from the requestor user device.

Automatic inventory tracking in brick and mortar store based on sensor data

A brick-and-mortar (BAM) store control system uses sensors and wireless transceivers to track customers, merchant representatives, devices, and/or objects within a BAM store area. The system can identify and track product and/or service inventory within the BAM store area and/or in individual's personal inventories, for instance by detecting movements of objects by individuals in sensor data. The system can generate inventory replenishment schedules, for instance based on inventory quantity patterns. The system can provide recommendations to customers and/or merchants, for example recommending products that customers have interacted with. The system can identify individuals and/or objects using a machine learning algorithm, which can learn based on feedback. The system can generate temporary identifiers for unrecognized individuals or objects, which it can merge or convert into long-term identifiers as more information is received. The system can recognize sensitive information based on secure identifiers generated based on the sensitive information.

Determining shopping duration based on a movement of a user device and transaction data

A device may detect a first entry of a first user device of a first user into a merchant area. The device may monitor a movement of the first user device within the merchant area. The movement may include a transition from a shopping area of the merchant area to a checkout area of the merchant area. The device may detect a transaction between the first user and the merchant. The device may determine a shopping duration for the first user and a checkout duration for the first user. The device may detect a second entry of a second user device of a second user into the merchant area. The device may perform one or more actions based on detecting the second entry. The one or more actions may be performed selectively based on the shopping duration or the checkout duration of the first user.

Location-based anomaly detection based on geotagged digital photographs

Location-based anomaly detection based on geotagged digital photographs. In some embodiments, a method may include identifying a completed transaction associated with a user. The method may also include determining a transaction geographic location associated with the completed transaction. The method may further include identifying a mobile device associated with the user. The method may also include identifying one or more geotagged digital photographs taken by the mobile device. The method may further include extracting one or more photograph geographic locations from the one or more geotagged digital photographs. The method may also include, in response to determining that the transaction geographic location is not within a threshold distance of any of the one or more photograph geographic locations, identifying the completed transaction as a suspicious transaction and performing a remedial action.

Apparatuses and methods for payment for consumable content

Methods, apparatuses, and computer program products are disclosed for effectuating payment for consumable content. An example method includes receiving a request for payment associated with a content source device and identifying a first user device associated with a first user accessing consumable content of the content source device. The method further includes transmitting an actionable payment notification to the first user device. In an instance in which the computing device receives responsive authorization from the first user device, the method includes transmitting a first real-time payment to the content source device. In an instance in which the computing device fails to receive responsive authorization from the first user device, the method includes causing access of the consumable content to the first user device to halt.

Stage-Specific Pipeline View Using Prediction Engine

Techniques for displaying a stage-specific pipeline view with a prediction engine are disclosed. A system displays a plurality of regions representing various stages of completion for a plurality of transactions. The system determines a stage of completion for each of the plurality of transactions at a first point-in-time, and generates and displays visualizations representing each of the plurality of transactions in one of the plurality of regions based on the respective current stage of completion. Generating a visualization representing a first transaction includes determining a likelihood of the first transaction completing a stage associated with the first transaction. The likelihood may be determined by selecting attributes associated with the first transaction and identifying prior transactions with similar attributes. The system may compute the likelihood of the first transaction completing the stage based on completion rates associated with the prior transactions, and select the visualization based on the computed likelihood.

SYSTEM, METHOD AND COMPUTER-ACCESSIBLE MEDIUM FOR FRAUD DETECTION BASED ON SATELLITE RELAYS
20240046273 · 2024-02-08 ·

An exemplary system, method, and computer-accessible medium can include receiving first information related to a first transaction associated with a financial account, determining a first network coverage area associated with the first transaction, receiving second information related to a second transaction associated with the financial account, determining a second network coverage area associated with the second transaction, flagging the second transaction as potentially fraudulent based on the first network coverage area and the second network coverage area. The financial account can be a credit card account. The second transaction can be flagged if the first network coverage area and the second network coverage area do not overlap. The first network coverage area can be based on a coverage area for a first satellite and the second network coverage area can be based on the coverage area for a second satellite, where the first satellite can be different than the second satellite.

SYSTEMS AND METHODS FOR BYPASSING CONTACTLESS PAYMENT TRANSACTION LIMIT
20240046272 · 2024-02-08 ·

Example embodiments of systems and methods for a cryptographic bypass system, comprising: a contactless card; and a server, wherein the server is configured to: receive a cryptogram and location data after a tap of the contactless card to a client device, identify a first merchant based on the location data, set a flag associated with the first merchant and the contactless card, receive a transaction request from a merchant payment system of the first merchant associated with the contactless card, wherein the transaction request indicates a transaction amount, and approve the transaction request when the transaction amount exceeds a first transaction limit when the flag is set.