G06Q20/4015

Identity recognition method and apparatus based on dynamic rasterization management, and server

An identity identification method comprises: tracking a current location of each user to determine a current grid area each user is located; receiving an identification request sent by a service terminal; the identification request comprises first location information and biological characteristic information of a target object; determining a first grid area where the service terminal is located based on the first location information; obtaining biological characteristic information of each user with respective current grid area being the first grid area; completing an identity identification according to the biological characteristic information of the target object and the biological characteristic information of each user in the first grid area. A device and server based on dynamic rasterization management are further provided.

Anonymous peer-to-peer communication system
12056695 · 2024-08-06 · ·

An in-application content transfer system that generates receiver identifiers to categorize a given exchange between two users. A first mobile device displays a plurality of user interface controls that are each selectable by a first user. In response to selection of a first control, an application message is generated that includes a unique identifier associated with a second user of a second device, and a user content that is associated with the first user and that is identified at least in part based on the selection of the first control. The application message, which is configured to seed an application on the second device with the unique identifier, is transmitted to the second device via peer-to-peer communication. The user content associated with the first user is then shifted to the second device.

Anticipatory creation of point-of-sale data structures

Techniques and arrangements for analyzing previous tickets of a customer at different merchantsspecifying interactions of the customer at the different merchantsto determine subsequent recommendations to send to a particular merchant in real-time when the customer is located at the particular merchant. Other techniques and arrangements facilitate annotation of merchant tickets by the merchants to enrich the data maintained by the tickets and, in some instances, to enhance the described real-time recommendations. Still other techniques and arrangements create a merchant ticket for recording interactions between a merchant and customer upon the customer creating a reservation at the merchant for a specified future time, or being added to a waitlist of the merchant. Upon the customer arriving at the merchant proximate to the specified future time, the merchant may use the created ticket to track items ordered by the merchants, track tenders used to pay for items, and the like.

USER POSITIVE APPROVAL AND AUTHENTICATION SERVICES (UPAAS)

The invention provides Users of Retail Payment and Identification instruments with the ability to review transaction details and approve transaction by capturing UVM in User controlled environment and Issuers of these instruments with the ability to positively authenticate Users in Issuer controlled environment. The invention accounts for real time legacy or non-legacy processing systems to provide an authorization request from POA to Issuer Host. The invention introduces two UPAAS componentsUser Gateway and User Application. The UPAAS User Gateway is implemented in an Issuer controlled environment enabling interface between Issuer legacy Host and UPAAS User Applications. The UPAAS User Application can be implemented on any device supporting communication protocol such as TCP/IP without any hardware changes enabling the User to login to UPAAS User Gateway, review and approve or decline a specific transaction in real time by entering UVM, such as PIN, for User authentication purposes.

SYSTEM AND METHOD OF MANAGING COMPUTING RESOURCES
20180357641 · 2018-12-13 ·

In one or more embodiments, one or more systems, processes, and/or methods may receive, via a network, a multiple positions corresponding to multiple physical locations of a consumer device, may receive, via the network, a position of a physical location of a financial transaction device, and may receive a request for a financial transaction, and may determine a transaction authorization based on a path indicated by the multiple positions and the position of the physical location of the financial transaction device. For example, a path and/or track may be established via periodical reports of the position information from the consumer device, which may provide and/or indicate an authenticity metric and/or a validity metric to a current position attribute when the current position attribute is utilized in a financial transaction.

Digital currency (virtual payment cards) issued by central bank for mobile and wearable devices
10147076 · 2018-12-04 ·

Provided is a method for digital currency transfers via a mobile and wearable device. The method may include receiving a transfer request with a transfer amount in digital currency and user identification data associated with the user, retrieving payment data of the user associated with the identification data, generating an optical code encoding the payment data and the transfer amount. The method may continue with providing the optical code on a screen of the mobile and wearable device. On scanning of the optical code, a transfer receiving request is created. The method may continue with receiving a transfer receiving request to perform a payment transaction associated with the user, accessing a user account maintained by a currency issuance unit, and transferring the transfer amount in the digital currency from the user account to a recipient account associated with the recipient identification data.

SYSTEMS AND METHODS FOR DETECTING TRANSACTION CARD FRAUD BASED ON GEOGRAPHIC PATTERNS OF PURCHASES
20180336565 · 2018-11-22 ·

A computer-implemented method for detecting potentially fraudulent cardholder transactions is implemented by a fraud detection computer system in communication with a memory. The method includes identifying a first home location for a first cardholder, identifying an expected range of travel relative to the first home location for the first cardholder when making a typical financial transaction in at least one merchant category, receiving transaction data associated with a first financial transaction, retrieving the first home location based on the cardholder data and a merchant location for the first merchant based on the merchant data, calculating a distance of travel between the first merchant location and the cardholder home location, comparing the calculated distance of travel to the expected range of travel, and flagging the first financial transaction as potentially fraudulent upon determining that the calculated distance of travel exceeds the expected range of travel.

METHODS AND SYSTEMS OF REVOKING AN ATTESTATION TRANSACTION USING A CENTRALIZED OR DISTRIBUTED LEDGER

A method and system of revoking an attestation transaction regarding information of a user is provided. The method is implemented on a computer system having one or more physical processors configured by machine-readable instructions which, when executed perform the method, including generating a signed revocation transaction to revoke the previously attested information, wherein the information has been previously attested to in an attestation transaction stored within a centralized or distributed ledger at an attestation address, the centralized or distributed ledger providing a verifiable record of transactions; and sending the signed revocation transaction to the centralized or distributed ledger and revoking the attestation transaction by spending cryptocurrency associated with the attestation transaction.

Camera activation and image processing for transaction verification
10115083 · 2018-10-30 · ·

A device may receive first information related to a transaction. The device may identify a first device from which to receive an image of a receipt related to the transaction. The device may provide, to the first device, a notification to cause the first device to perform a set of actions including activating a camera associated with the first device to capture the image of the receipt, or providing, for display, an instruction related to capturing the image of the receipt associated with the transaction. The device may receive, from the first device, the image of the receipt. The device may process the image of the receipt to perform an analysis of the transaction. The device may perform an action related to the transaction based on a result of processing the image of the receipt.

Systems and methods for securing access to resources

In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.