G06Q20/4015

Systems and methods for estimating authenticity of local network of device initiating remote transaction

A system includes one or more memory devices storing instructions, and one or more processors configured to execute the instructions to perform steps of a method for providing network security. The system may receive customer credentials in association with an attempted transaction initiated by a user device that is connected to a local network. The system may receive network identification data associated with the local network and generate a network confidence score based on the network identification data and a historical local network footprint. The system may determine a security action based on the network confidence score.

Automated guided vehicle control system and control method thereof

An automated guided vehicle control system includes a commodity database, a historical shopping information acquisition module, a purchase-item prediction module, an automated guided vehicle database, an automated guided vehicle dispatch demand assessment module and an automated guided vehicle dispatch module. The historical shopping information acquisition module is utilized to retrieve the historical shopping information related to the customer, further to locate the instant predicted commodity to be purchased, and thereby to dispatch the suitable automated guided vehicle to the waiting area of the customer. Further, the historical shopping information is evaluated to provide the commodity type options for the customer to select, to locate the commodity type to be purchased, and thereby to organize the automated navigation path for the automated guided vehicle to travel along to reach the assigned commodity display area.

Method for validating electronic transactions
11978052 · 2024-05-07 · ·

A computer system is configured to authenticate the identity of a user who is attempting to access a website or conduct a transaction. The system is configured to receive a geographical location associated with the user and to receive the geographical location of a mobile phone associated with the user, and to determine whether the two geographical locations are within an acceptable distance.

System and method for transactional data acquisition, aggregation, processing, and dissemination in coordination with a preference matching algorithm
11978081 · 2024-05-07 ·

A method for determining customer lifetime value for a cohort of customers using an incentive system to provide for geographically limited rewards earned for transactions includes tracking payment card transactions between enrolled payment cardholders and enrolled merchants, creating a database of rewards eligible transactions, instructing a virtual payment card issuer to apply the rewards amount for each rewards eligible transaction to an account, receiving transaction authorization requests from the virtual payment card issuer corresponding to enrolled cardholders requesting to spend rewards within their corresponding account, if the transaction is occurring within a prescribed geographic area in which rewards can be spent, transmitting an authorization for the virtual card issuer to complete the transaction using the rewards, an enrolled payment cardholder attribute database, and applying a matching algorithm to the attribute database resulting in prediction based on similarity between one or more attributes with one or more other enrolled payment cardholders.

LOCATION-BASED AUTHENTICATION OF TRANSACTIONS CONDUCTED USING MOBILE DEVICES
20190251534 · 2019-08-15 · ·

A transaction authentication system authenticates a transaction by determining whether a mobile device and POS device involved in the transaction are at the same location. A POS registry stores location data for POS devices. A PAN registry stores mobile device IDs corresponding to account numbers. A mobile device ID can be provided from the PAN registry in response to receiving an account number from a POS device. The mobile device ID can then be used to retrieve location information from a home location register maintained by a mobile service provider. The retrieved location data for a POS device and the retrieved location data for a mobile device are compared.

DATA BATCH PROCESSING METHOD AND SYSTEM
20190251533 · 2019-08-15 ·

A computer system receives, from a client device, a virtual bill request including user identification information of a user associated with the client device and then activates a virtual bill and associates the virtual bill with the client device, the virtual bill having a predefined effective time period. After receiving data corresponding to one or more items added to the virtual bill within the predefined effective time period through respective close proximity data communication between the client device and one or more respective terminals, the computer system determines a value based on the data corresponding to the one or more items and sends a verification request to the client device. Upon receipt of verification information responsive to the verification request, the computer system initiates a transfer of the value from an account associated with the user in accordance with a determination that the verification information is valid.

SYSTEMS AND METHODS FOR CASH ACCESS TO EARNED BUT UNPAID INCOME
20190251564 · 2019-08-15 ·

Systems and methods of providing access to earned but unpaid income are provided. An available balance of earned but unpaid income is computed. A login request and device information may be received from a remote device and a login procedure is invoked based on an assessed security level of the login device type. On authenticating the remote device successfully, the available balance of earned but unpaid income is recomputed. A list of financial services is displayed to the user, and a request may be received from the remote device for access to earned but unpaid income specifying cash access, an amount and a deduction schedule. Terms and conditions of a transaction, including a fee are displayed and a signal indicating acceptance is received. The request is fulfilled, cash dispensed, and a deduction file associated with an employer of the user is updated.

Offline mobile phone payments

A method for performing vending transactions includes generating a token upon request by a wireless appliance is provided. The method includes placing the token in a remote server; placing the token in the wireless appliance; providing the token from the wireless appliance to a point-of-sale (POS) terminal; authenticating the token with the remote server; validating the token to perform the vending transaction; and deleting the token from the remote server when the vending transaction is complete. A method for using a wireless appliance in vending transactions is provided. A method for using a remote server configured to connect to a wireless appliance and a POS terminal in vending transactions is provided. A system to perform vending transactions using an internet connection as above is provided. The system may include a remote server including a private account; the remote server configured to communicate with a POS terminal and a wireless appliance.

System for managing personal identifiers and financial instrument use
10373166 · 2019-08-06 ·

A method for the secure use of a personal identifier and/or financial instrument that may take place simultaneously with traditional methods of authorization for credit card, check, funds withdraw/transfer or purchase. Authorization according to the present invention may take place as follows: A) the Owner provides a pre-approval of authorization if the request meets an array of Owner-defined parameters; B) a authorization may be granted based on proximity of the Owner to the point of use; or C) the Owner provides a real time approval by smart device. In each case the invention subjects the request for authentication to a sequential verification procedure in which the request is tested against one or more pre-defined verification protocols, the deployed authentication protocol being pre-determined by the Owner and pre-selected in accordance with a user profile that was pre-programmed by the Owner.

SETTLEMENT SYSTEM, USER TERMINAL AND METHOD EXECUTED THEREBY, SETTLEMENT DEVICE AND METHOD EXECUTED THEREBY, AND PROGRAM
20190236580 · 2019-08-01 ·

A settlement system with higher security which replaces a settlement system using credit cards is provided. The settlement system has a user terminal, a settlement device, and a settlement terminal. First, a user ID, a password, and upper limit amount information identifying an amount are inputted in a user terminal 100 (S912), and sent to the settlement device (S913). The settlement device performs credit determination (S922), generates temporary permission information if credit is possible (S923), and sends the temporary permission information to the user terminal (S924). The user terminal generates a one-time password (S915). The one-time password is inputted to the settlement terminal (S931). If the one-time password sent from the settlement terminal to the settlement device is identical to the one-time password created in the settlement device, the settlement device allows a user's payment (S928).