G06Q20/4015

System and Process for Managing Preparation and Packaging of Food and/or Beverage Products for a Precise Delivery Time

The disclosure relates to a computer-based system for managing just-in-time preparation and delivery of food products. In the system, customers can build, place, and pay for their order. Once the order is placed, the system will track the users location, only starting to prepare their food when the customer is within a specific proximity to the retail location. The proximity will be dynamic and expand and contract with the customer's movements. Finally, the system will coordinate the preparation, assembly and packaging of the order to provide just-in-time delivery of the customer's order, thereby reducing food waste and enhancing the freshness and taste of the product delivered to improve the customer experience.

Intelligent authentication process

A method is provided for authentication that includes receiving consumer information associated with a consumer transmitted over a first data network, determining available account authentication options based on the received consumer information and a database of potential authentication options stored in a memory, selecting a set of available authentication options from the available authentication options based on a database of the potential authentication option attributes stored in the memory, transmitting the selected set of available authentication options to the consumer over the first data network, receiving a selected authentication option transmitted over the first data network, transmitting the consumer information to an authentication provider associated with the selected authentication option over a second data network, and receiving an authentication confirmation transmitted over the second data network.

INFORMATION PROCESSING APPARATUS, SERVER DEVICE, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM
20240428247 · 2024-12-26 · ·

An information processing apparatus related to the present example embodiment comprising: an acquisition unit for acquiring visitor registration information of a person permitted to enter a management area by a first biometrics authentication; and a control unit for performing a second biometrics authentication for a predetermined transaction in the management area using the visitor registration information.

Image-based Authorization Systems

Aspects described herein may allow transactions to be authenticated based on images taken at the transaction site. For example, a computing device may decline a transaction request based on a first category of the transaction indicated in the category information violates a transaction category restriction of the user account. The computing device may send, to a user device associated with the user account, an instruction to upload one or more photos that depict a physical environment where the transaction is requested. If the photos indicate the requested transaction belongs to another category that does not violate the transaction category restriction, the system may approve the transaction based on the photos.

PROCESSING INTERRUPTED TRANSACTIONS OVER NON-PERSISTENT NETWORK CONNECTIONS
20240428254 · 2024-12-26 ·

A machine comprising a transceiver, one or more processors, and memory performs communications operations via one or more user devices. The communications operations include establishing via the transceiver a connection with a first user device, and transmitting first information to the first user device. Upon not receiving an acknowledgement that the first information was received by a server, the machine maintains the first information in the memory and establishes, via the transceiver, a connection with a second user device, appends the first information to second information, and transmits the first and second information to the second user device. Upon receiving acknowledgement that the first and second information were received by a server, the offline retail machine deletes the first and second information.

SYSTEMS AND METHODS FOR REMOTE ATM ACCESS

A system includes a database that stores user information regarding a plurality of customers; a network interface configured to communicate data over a network; and a processing circuit. The processing circuit is configured to: receive, from a customer computing device, a first indication that a customer is within a first predetermined distance of a first customer area and activate, based on the first indication, an interface of the customer computing device. The interface is configured to receive an input. The processing circuit is further configured to receive a second indication that the customer is within a second predetermined distance of a second customer area that is within the first customer area and authorize, based on the second indication and reception of the input, a transaction at the terminal.

ANONYMOUS PEER-TO-PEER COMMUNICATION SYSTEM
20240420127 · 2024-12-19 ·

An in-application content transfer system that generates receiver identifiers to categorize a given exchange between two users. A first mobile device displays a plurality of user interface controls that are each selectable by a first user. In response to selection of a first control, an application message is generated that includes a unique identifier associated with a second user of a second device, and a user content that is associated with the first user and that is identified at least in part based on the selection of the first control. The application message, which is configured to seed an application on the second device with the unique identifier, is transmitted to the second device via peer-to-peer communication. The user content associated with the first user is then shifted to the second device.

METHODS AND SYSTEMS FOR AUTHENTICATION FOR HIGH-RISK COMMUNICATIONS

An authentication method includes assigning a risk status to a request received from a remote interaction system, transmitting a notification communication to a device associated with the request, monitoring interaction data from an interaction network, and identifying, from the monitored interaction data, authentication interaction information, the authentication interaction information including a coded sequence and a predetermined authentication identifier. The authentication method also includes comparing the coded sequence in the authentication interaction information to an expected coded sequence and transmitting a verification communication after determining the coded sequence in the authentication interaction information matches the expected coded sequence.

RFID-enabled payment authentication

Authentication method and systems using RFID-enabled payment cards are disclosed herein where a server receives a request corresponding to authorization of a payment associated with a payment card from an electronic terminal. The server identifies an electronic device of a user associated with the payment card. The server then transmits an instruction to the electronic device to cause an RFID reader of the electronic device to determine whether an RFID tag corresponding to the payment card is located within a predetermined proximity to the electronic device. When the payment card is located within the predetermined proximity, the server executes a first authentication protocol. Moreover, when the payment card is not located within the predetermined proximity, the server executes a second authentication protocol, wherein the second authentication protocol is more restrictive than the first authentication protocol.

Training a Machine Learning System for Transaction Data Processing
20250005580 · 2025-01-02 ·

A method of training a supervised machine learning system to detect anomalies within transaction data is described. The method includes obtaining a training set of data samples; assigning a label indicating an absence of an anomaly to unlabelled data samples in the training set; partitioning the data of the data samples in the training set into two feature sets, a first feature set representing observable features and a second feature set representing context features; generating synthetic data samples by combining features from the two feature sets that respectively relate to two different uniquely identifiable entities; assigning a label indicating a presence of an anomaly to the synthetic data samples; augmenting the training set with the synthetic data samples; and training a supervised machine learning system with the augmented training set and the assigned labels.