G06Q20/4015

Remote activation of kiosk to serve product or release cash to customer

Disclosed herein are system, method, and computer program product embodiments for remote activation of an automated teller machine (ATM) to dispense cash to a customer. The customer may stage a transaction using a mobile application on a mobile device. Upon the staged transaction being authenticated and approved, the customer may visit the ATM. The customer may capture an image being displayed on a display of the ATM using a camera of the mobile device. The captured image may be sent to an application server from the mobile device. The application server may associate the ATM with the staged transaction that is staged using the mobile application, and send instructions to the ATM to dispense cash according to the staged transaction.

AMBIENT TRANSACTION SYSTEM

An ambient transaction system is described for facilitating various transactions types between a management system and a connected device over a transaction platform. Based on a variety of different triggering conditions, the transaction platform may establish an integrated session among the transaction platform, the management system, and the connected device. The transaction platform includes integrated logic of the management system such that a presentment layer provided to the connected device by the transaction platform via the integrated session includes features of the management system associated with the transaction type. When the transaction is a payment transaction, the features may include a payment feature through which checkout options may be selected for payment via the connected device. Upon receiving a payment selection from the connected device, the transaction platform may transmit the payment information to a payment processing system, and provide payment confirmation to at least the management system.

LOCATION BASED AUTHENTICATION
20190080320 · 2019-03-14 ·

A portable consumer device that is used to conduct a transaction at a merchant is authenticated. Information provided to a server computer includes locations of a merchant and a mobile communication device possessed by a consumer. If the location of the mobile communication device corresponds to the location of the merchant, the portable consumer device that is used to conduct the transaction is authenticated.

Systems and Methods of Decentralized Geospatial Data Gathering
20190073645 · 2019-03-07 ·

The present invention relates to systems and methods for decentralized gathering of geospatial data in a cryptocurrency environment. Methods of incentivizing users to provide geospatial data, and incentivizing computing operators to process the data, are provided. The system comprises a node configured to receive a first instance of geospatial data from a first device and a second instance of geospatial data from a second device. The node further comprises executable code for comparing a first instance of geospatial data to a second instance of geospatial data, and based on the comparison, associating a unit of cryptocurrency with an identifier associated with the second instance of geospatial data.

Digital user identity verification
20190073675 · 2019-03-07 ·

Verification of user identities is an important aspect of computer and network security. In some instances, a first user may attempt to engage with a second user via a web application, mobile phone app, or other software without necessary knowing that the identity of a second user is accurate. The computer security problem of identity verification may be particularly acute when the only contact information is an email address, phone number, or other electronic identifier that can potentially change ownership (e.g. a person may get a new phone number, someone might purchase an Internet domain and thus change ownership of an email address, etc.) This disclosure and claims relate to techniques that allow for enhanced security by verifying an identity of a user via specific prompts and interactions provided via software. Particular credentials may be required in order to verify user identity, including biometrics and other specific required responses.

System, Method, and Computer Program Product for Predicting Payment Transactions Using a Machine Learning Technique Based on Merchant Categories and Transaction Time Data

Provided is a computer-implemented method for predicting payment transactions using a machine learning technique that includes receiving transaction data, generating a categorical transaction model based on the transaction data, determining a plurality of prediction scores including determining, for one or more users, a prediction score in each merchant category of a plurality of merchant categories for each predetermined time segment of a plurality of predetermined time segments, where a respective prediction score includes a prediction of whether a user will conduct a payment transaction in a merchant category at a time associated with a predetermined time segment associated with the respective prediction score, determining a recommended merchant category and a recommended predetermined time segment of at least one offer, generating the at least one offer, and communicating the at least one offer to the one or more users. A system and computer program product are also disclosed.

METHODS AND SYSTEMS FOR EFFICIENT TRANSFER OF ENTITIES ON A PEER-TO-PEER DISTRIBUTED LEDGER USING THE BLOCKCHAIN

The invention provides a secure method for exchanging entities via a blockchain. The invention incorporates tokenisation techniques, and also techniques for embedding metadata in a redeem script of a blockchain transaction. Embodiment(s) provide a computer implemented method of performing a transfer, the method comprising: generating a first exchange transaction, and broadcasting, over a first network, the first exchange transaction for inclusion on a P2P distributed ledger, wherein the first exchange transaction comprises: an indication of a first quantity of a cryptocurrency to be transferred; a first input provided from an output of a first invitation transaction from a first user, the first invitation transaction previously included on the P2P distributed ledger, a first script, a first user private key associated with the first user, a first third-party private key associated with a first third-party, and a first output indicating a transfer of a first entity from the first user to a second user; and wherein the first script comprises: a first set of metadata providing an indication of the first entity to be transferred and a first set of conditions for the transfer, a first user public key associated with the first user, the first user public key being a cryptographic pair with the first user private key, and a first third-party public key associated with the first third-party, the first third-party public key being a cryptographic pair with the first third-party private key.

VIDEO KIOSK INMATE ASSISTANCE SYSTEM
20190065286 · 2019-02-28 ·

A video kiosk inmate assistance system is disclosed herein. A kiosk management server receives, from an inmate agent device, a login request to a presence based service. Further, the kiosk management server authenticates the client device based on client credentials and sets a presence status of a client to available. In addition, the kiosk management server determines client information corresponding to the client, and transmits the client information to a kiosk device located in a booking facility based on the presence status. Additionally, the kiosk management server receives a selection of the client from the kiosk device, and initializes an out of band communication channel between the client device and the kiosk device.

Security features for offline transactions

Techniques and arrangements for providing payment protection to merchants who utilize point-of-sale (POS) devices that are configured to conduct transactions in both online and offline modes. In an offline mode, a POS device of a merchant stores information regarding a payment instrument used in a transaction between the merchant and a customer, for later sending of the information to a payment service for authorization of the payment instrument when the POS device is in the online mode. The described techniques protect the merchant in a situation where a payment instrument used in an offline transaction is later declined, by providing payment to the merchant for at least a portion of the cost associated with the transaction.

SYSTEMS AND METHODS FOR ESTIMATING AUTHENTICITY OF LOCAL NETWORK OF DEVICE INITIATING REMOTE TRANSACTION

A system includes one or more memory devices storing instructions, and one or more processors configured to execute the instructions to perform steps of a method for providing network security. The system may receive customer credentials in association with an attempted transaction initiated by a user device that is connected to a local network. The system may receive network identification data associated with the local network and generate a network confidence score based on the network identification data and a historical local network footprint. The system may determine a security action based on the network confidence score.