Patent classifications
G06Q20/4015
Systems and methods for utilization of earned but unpaid income
Systems and methods of providing access to earned but unpaid income are provided. An available balance of earned but unpaid income is computed. A login request and device information may be received from a remote device and a login procedure may be invoked based on an assessed security level of the login device type. On authenticating the remote device successfully, the available balance of earned but unpaid income may be recomputed. A list of financial services is displayed to the user, and a request may be received from the remote device for access to earned but unpaid income specifying a financial service, an amount and a deduction schedule. Terms and conditions of a transaction, including a fee are displayed and a signal indicating acceptance is received. The request may be fulfilled and a deduction file associated with an employer of the user is updated.
Customer identification verification process
An example device may include one or more processors to receive a request for a service from a requestor user device; provide transaction information associated with the service to a provider user device, where the transaction information may include location information corresponding to a location at which the service may be provided; obtain verification information from the requestor user device based on an interaction associated with the requestor user device or the provider user device at the location, where the verification information may include one or more characteristics of the requestor user device; generate a verification token based on the one or more characteristics of the requestor user device; provide the verification token to the requestor user device; and provide the verification information to the provider user device to permit the provider user device to verify the requestor user device, in connection with performance of the service, based on receiving the verification information and obtaining the verification token from the requestor user device.
METHOD AND SYSTEM FOR RISK SCORING ANONYMIZED TRANSACTIONS
A method for risk scoring a blockchain transaction includes: storing blockchain data associated with a blockchain, the data including a plurality of blocks, each block including a block header and transaction values, each transaction value including a sending address, recipient address, and transaction amount; receiving a new transaction value related to a proposed blockchain transaction and a node identifier associated with a node included in a blockchain network associated with the blockchain, the new transaction value including a user address, transacting address, and blockchain amount; identifying transaction values in the blockchain where the sending address or recipient address is associated with a transacting cryptographic key pair also associated with the transacting address; determining a risk score for the proposed blockchain transaction based on at least the data included in each of the identified transaction values and the new transaction value; and transmitting the determined risk score.
Data batch processing method and system
A computer system receives, from a client device, a virtual bill request including user identification information of a user associated with the client device and then activates a virtual bill and associates the virtual bill with the client device, the virtual bill having a predefined effective time period. After receiving data corresponding to one or more items added to the virtual bill within the predefined effective time period through respective close proximity data communication between the client device and one or more respective terminals, the computer system determines a value based on the data corresponding to the one or more items and sends a verification request to the client device. Upon receipt of verification information responsive to the verification request, the computer system initiates a transfer of the value from an account associated with the user in accordance with a determination that the verification information is valid.
System and process for managing preparation and packaging of food and/or beverage products for a precise delivery time
The disclosure relates to a computer-based system for managing just-in-time preparation and delivery of food products. In the system, customers can build, place, and pay for their order. Once the order is placed, the system will track the users location, only starting to prepare their food when the customer is within a specific proximity to the retail location. The proximity will be dynamic and expand and contract with the customer's movements. Finally, the system will coordinate the preparation, assembly and packaging of the order to provide just-in-time delivery of the customer's order, thereby reducing food waste and enhancing the freshness and taste of the product delivered to improve the customer experience.
Automated teller machines (ATMs) having offline functionality
A device may receive customer data, and store the customer data in a secure memory device of the device. The device may implement a backup mode in which the device utilizes the customer data to authorize requests based on determining that the device lacks a network connection. The device may receive, when the device is in the backup mode, a request for currency that includes authentication information. The device, while in the backup mode, may authorize the request for currency based on comparing the authentication information and the customer data. The device may dispense currency based on a result of comparing the authentication information and the customer data. The device may store transaction data associated with dispensing of the currency to permit the transaction data to be transmitted when the network connection is restored.
ELECTRONIC WALLET APPLICATION EMERGENCY MODE
Systems, methods, and computer-readable media are provided for initiating an emergency mode at an electronic wallet application. An identity of a user is verified based on credentials provided by the user to an electronic wallet application via a user device. The verifying comprises comparing the credentials to normal credentials and emergency credentials. Based on the comparing, it is determined the user has provided emergency credentials to the electronic wallet application. Instructions are provided to the electronic wallet application to transition the electronic wallet application to an emergency mode. Instructions are also provided to the user device to communicate an alert to an emergency services provider.
PORTABLE DEVICE-BASED TRANSACTION
Embodiments are directed to using an NFC capable portable device to conduct a transaction at a resource provider location. The portable device (e.g., a wearable device, a physical token) may be temporarily associated with a user account at the resource provider location. The resource provider location includes one or more terminals that are configured to generate a list of items (e.g., items picked by the user) to be associated with the portable device. At checkout, the user surrenders the portable device, items on the list get automatically charged to the user account, and the user leaves the resource provider location. All communication between terminals, portable device and the resource provider computer occurs over a closed, local area network. Among the terminals, portable device and the resource provider computer, the resource provider computer is the only device configured to communicate with external entities over an external network.
ELECTRONIC PROFILE AND DATA SECURITY ENFORCEMENT WITH USER DEVICE DATA AND METHODS OF USE THEREOF
Systems and methods of the present disclosure include computer systems for improving data security. To do so, an authorization request associated with a user profile is received, including a time-stamp for a profile activity, a profile identifier, and a value. Application analytics data for a software application on a user device associated with the user profile is accessed, including an open event indicator indicating a time of a loading, and a close event indicator indicating a time of a termination. An open period of the software application at the time-stamp is determined based on the application open event indicator and the application close event indicator. A reduced set of fraud checks is selected and executed when the time-stamp associated with the profile activity is within the open period of the software application. A fraud determination is generated, and an authorization notification is generated based on the fraud determination.
ATM leveraging edge devices for offline processing
A system for facilitating offline processing of electronic transactions at an ATM when the ATM does not support a network connection may be provided. The system may include a mobile device configured to store an updatable account balance of a personal account associated with a user of the mobile device and transaction data associated with a plurality of transactions executed via the mobile device. The system may include the ATM being configured to operate in an offline processing mode when the network connection is unsupported. The offline processing mode may include the ATM receiving a transaction request and account data from the mobile device. The ATM may be configured to authenticate or deny the executing of the transaction request based on a predetermined threshold of transaction locations positioned at a distance greater than or less than a pre-determined distance from the ATM.