Patent classifications
G06Q20/4015
HANDS-FREE TRANSACTIONS VERIFIED BY LOCATION
Conducting hands-free transactions comprises a server at a payment processing system, a user computing device, and a merchant computing device. The payment processing system registers a merchant system as a hands-free payment participant and provides a beacon identifier. The payment processing system receives a communication from a hands- free payment application on a user computing device, the communication comprising a transaction token, an identification of a user account, and the beacon identifier received by the user computing device via a wireless communication from a device associated with the merchant system and transmits the transaction token to the merchant system computing device. The payment processing system receives from the merchant system computing device, a transaction request, the transaction request comprising the token and transaction data associated with the transaction request and conducts the transaction between the user account and the merchant system based on the received token and transaction request.
VERSATILE MAGNETIC PRESENCE DETECTION OF A MOBILE COMPUTING DEVICE BY A TAG
Methods and systems for the magnetic presence detection of a mobile computing device. In an example embodiment, steps or operations can be provided for detecting with a magnetic sensor (e.g., a magnetic proximity detector) a magnetic field associated with one or more components (e.g., an electromagnetic component such as a speaker) of a mobile computing device (e.g., a smartphone, a tablet computing device, a wearable computing device, etc.), monitoring the magnetic field strength of the magnetic field and/or the first and/or second derivatives of a magnetic field vector of the magnetic field, extracting a perturbation in the magnetic field separately from variations in the terrestrial background magnetic field due to motion; and automatically adjusting detection thresholds and/or continuously compensating magnetic sensor offsets of the magnetic sensor to maximize the magnetic presence detection of the mobile computing device and minimize false detections thereof.
System, Method, and Computer Program Product for Providing Merchant-Based Social Networks
Provided is a computer-implemented method for providing a merchant-based social network for at least one merchant. The method may include determining whether to grant access to a group merchant network for a first merchant based on qualification data associated with the group merchant network, determining identification data associated with an identifier of at least one second merchant of the group merchant network based on at least one merchant alignment parameter, communicating the identification data associated with the identifier of at least one second merchant, receiving a selection of the at least one second merchant, communicating an invitation request message based on receiving the selection of the at least one second merchant, receiving an invitation response message, and granting access to the individual merchant network associated with the first merchant for the at least one second merchant. A system and computer program product are also disclosed.
Travel account
A user can set up a travel account with a payment provider, to inform the payment provider of expected dates and locations of travel, along with limits or restrictions at the various locations and/or dates. When the user travels and attempts to make a payment, the payment provider can determine the location and date to aid in processing the payment request, resulting in an easier process for the user, while still providing additional security with the limits and restrictions.
Anticipatory creation of point-of-sale data structures
Techniques and arrangements for creating a data structure for recording interactions between a first user and a second user for interactions to occur at a specified future time. The techniques and arrangements include facilitating annotation of the data structure. At the specified future time, the created data structure may be used to track items ordered, track tenders used to pay for items, and the like.
CUSTOMER IDENTIFICATION VERIFICATION PROCESS
An example device may include one or more processors to receive a request for a service from a requestor user device; provide transaction information associated with the service to a provider user device, where the transaction information may include location information corresponding to a location at which the service may be provided; obtain verification information from the requestor user device based on an interaction associated with the requestor user device or the provider user device at the location, where the verification information may include one or more characteristics of the requestor user device; generate a verification token based on the one or more characteristics of the requestor user device; provide the verification token to the requestor user device; and provide the verification information to the provider user device to permit the provider user device to verify the requestor user device, in connection with performance of the service, based on receiving the verification information and obtaining the verification token from the requestor user device.
CAMERA ACTIVATION AND IMAGE PROCESSING FOR TRANSACTION VERIFICATION
A device may receive first information related to a transaction. The device may identify a first device from which to receive an image of a receipt related to the transaction. The device may provide, to the first device, a notification to cause the first device to perform a set of actions including activating a camera associated with the first device to capture the image of the receipt, or providing, for display, an instruction related to capturing the image of the receipt associated with the transaction. The device may receive, from the first device, the image of the receipt. The device may process the image of the receipt to perform an analysis of the transaction. The device may perform an action related to the transaction based on a result of processing the image of the receipt.
Systems and methods for analyzing businesses based on gratuities
A gratuity analyzing computing device and method are provided. The computing device may include a receiver to receive transaction data of a plurality of merchants, wherein the transaction data includes authorization transactions and clearing transactions, a calculator to match a plurality of authorization transactions with a plurality of clearing transactions, respectively, and calculate gratuity amounts for the plurality of matched transactions, an analyzer to select at least two merchants, generate tip data for each selected merchant, the tip data for a respective merchant being generated based on gratuity amounts of matched transactions that correspond to the respective merchant, and rank the at least two merchants based on a comparison of the generated tip data of the at least two merchants with respect to each other, and a transmitter configured to output the rank and the tip data of the at least two merchants to a user.
SYSTEMS AND METHODS FOR SECURING ACCESS TO RESOURCES
In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.
Method and system for authorizing card account transactions by geographic region
A method and system for authorizing card account transactions by geographic region by providing data for a user interface displaying geographic regions and merchant locations each corresponding to the location of a merchant where a transaction using a card account may be initiated, receiving a user interface selection representing a request to authorize or restrict card account transactions, receiving authorization requests for desired transactions, and authorizing or restricting the transactions in accordance with the request.