G06Q20/4015

ASYNCHRONOUS AUTOMATED CORRECTION HANDLING IN CONCIERGE SYSTEM OF INCORRECTLY SORTED ITEMS USING POINT-OF-SALE DATA

An online concierge system performs asynchronous automated correction handling of incorrectly sorted items using point-of-sale data. The online concierge system receives orders from customer client devices and determines a batched order based on the received orders. The online concierge system sends the batched order to a shopper client device for fulfillment. The online concierge system receives transaction data associated with the batched order from a third party system. The online concierge system determines whether a sorting error occurred based on the transaction data and the batched order. In response to determining that a sorting error occurred, the online concierge system sends an instruction to correct the sorting error to the shopper client device.

USER ATTRIBUTE VALIDATION BASED ON LOCATION REQUESTS
20240388637 · 2024-11-21 ·

Aspects of the present application correspond to processing of requests for user attribute information. One or more computing devices can transmit request for user attribute information that include at least one captured information associated with an identified user. A user attribute information request processing service processes the requests based on location profile according to verified attribute information associated with the captured information. The user attribute information request processing service then generates a processing result responsive to the request, such as identifying financial rate information based on the verified attribute information.

Methods and systems for generating a unique signature based on user device movements in a three-dimensional space
12147981 · 2024-11-19 · ·

Systems and methods are disclosed for device movement-based authentication. One method comprises receiving contextual data from one or more sensors of a user device and determining a device movement pattern based on the received contextual data. The determined device movement pattern is compared with a device movement-based signature associated with a user of the user device. If the determined device movement pattern matches the device-movement based signature within a predetermined threshold, the user is authenticated for an electronic transaction. If the determined device movement pattern does not match the device-movement based signature, a notification indicating authentication failure is sent to the user device.

System and method for account verification by aerial drone

A verification application executing at a user's mobile phone directs the user to take a photo of an identification document (e.g., driver's license or other form of government issued identification) or of their face. After the verification application sends the image to a backend service, the service may then dispatch a drone to the user's location and take a photograph of the user. The service may then validate the previously-imaged document or photo of the user's face against the photograph of the user and the geolocation sent with the first image. The service may then verify the new account and provision a token to the verification application to complete a secured account generation.

Systems and methods for multi-factor authentication using device tracking and identity verification

Systems and methods are directed to a modified device configuration for disposing a NFC compatible user card within a NFC field of a user mobile device so as to enable continuous proximity monitoring based on a status of an NFC link established between the card and the mobile device. The modified device configuration may be utilized to implement card tracking functionality by using a mobile application, running on the mobile device, to generate a timestamp upon detection of change in a connectivity status of the NFC link to the card. The timestamp NFC connectivity data may then be paired with mobile device GPS coordinates, concurrently retrieved from one or more mobile GPS-based navigation applications, to facilitate card tracking functionality as well as multi-factor validation for electronic transactions initiated by the NFC compatible card and/or the mobile device.

CHAIN OF AUTHENTICATION USING PUBLIC KEY INFRASTRUCTURE
20240380613 · 2024-11-14 ·

A method for sequential authentication based on chain of authentication using public key infrastructure (PKI) is provided. The method includes abutting a first wearable device belonging to a first party with a second wearable device belonging to a second party; transmitting, by the first wearable device, authentication information of the first party; verifying the authentication information of the first party; transmitting, by the second wearable device, authentication information of the second party; verifying the authentication information of the second party; authorizing electronic transaction in response to successfully verifying both the authentication information of the first party and the authentication information of the second party. Each of the authentication information of the first party and the authentication information of the second party includes information configured for authentication based on a public key infrastructure (PKI) certificate.

CHAIN OF AUTHENTICATION USING PUBLIC KEY INFRASTRUCTURE
20240380614 · 2024-11-14 ·

A method for sequential authentication based on chain of authentication using public key infrastructure (PKI) is provided. The method includes generating, by a user, a first private key and a first public key corresponding to each other; generating, by an n.sup.th service provider, an n.sup.th private key and an n.sup.th public key corresponding to each other; transmitting, from the user to the n.sup.th service provider, a level n key; verifying, by the n.sup.th service provider, the level n key; generating, by the n.sup.th service provider, a level (n+1) key by concatenating the level n key and the n.sup.th public key signed with the n.sup.th private key; and transmitting, by the n.sup.th service provider, the level (n+1) key to the user, where n is a natural number, and when n=1, the level 1 key is the first public key signed with the first private key.

REMOTE ACTIVATION OF KIOSK TO SERVE PRODUCT OR RELEASE CASH TO CUSTOMER

Disclosed herein are system, method, and computer program product embodiments for remote activation of an automated teller machine (ATM) to dispense cash to a customer. The customer may stage a transaction using a mobile application on a mobile device. Upon the staged transaction being authenticated and approved, the customer may visit the ATM. The customer may capture an image being displayed on a display of the ATM using a camera of the mobile device. The captured image may be sent to an application server from the mobile device. The application server may associate the ATM with the staged transaction that is staged using the mobile application, and send instructions to the ATM to dispense cash according to the staged transaction.

Systems and methods for completing transactions via lockable boxes

A provider computing system comprises a network interface configured to communicate data to and from a lockbox computing system associated with the provider and a user device associated with a user over a network, and a lockbox management circuit structured to receive a lockbox transaction request from the user device where the lockbox transaction request comprises a transaction identification and a desired time window for the lockbox transaction, identify a lockbox available to complete the lockbox transaction according to the lockbox transaction request from a plurality of lockboxes located at different lockbox locations, transmit a lock request to the lockbox causing the lockbox to physically lock via an actuator of the lockbox, dispense currency into the lockbox by a currency dispenser based on the transaction identification, and cause the actuator to unlock the lockbox based on an input terminal of the lockbox receiving a passcode during the time window.

Control of network systems for automatic assessment and remediation of processing anomalies

A remote deposit capture (RDC) processing anomaly detection and remediation tool that can communicate with the RDC system over a network, and determine whether a RDC transaction is missing from the RDC system by comparing created and assigned unique identifiers represented in RDC transaction data received at a selected RDC system location or component with unique identifiers represented in RDC transaction data received at a RDC system location or component that is upstream thereof. In response to finding a missing RDC transaction, the tool can determine one or more RDC system remediation actions, execute the one or more RDC system remediation actions on the RDC system, and report the missing RDC transaction and any RDC system remediation actions executed on the RDC system.