Patent classifications
G06Q20/4015
SYSTEMS AND METHODS FOR AUTHENTICATING A USER USING PRIVATE NETWORK CREDENTIALS
A cardholder authentication computing device for authenticating user computing devices during online payment transactions are provided. The cardholder authentication computing device leverages pre-authentication of a user by a private network to facilitate authentication of a user in the context of an online payment transaction between the user and a merchant. During the course of an online payment transaction, the cardholder authentication computing device may receive an authentication request messages containing pre-authentication data from a merchant computing device. The cardholder authentication computing device then authenticates the user based, in part, on the pre-authentication data. In certain embodiments, the cardholder authentication computing device may also determine whether one or more partner services apply to transactions between the user and the merchant based on the user's affiliation with the organization.
Transportation and Freight Capacity Units
Implementations of a computer implemented method and system to transform transportation and freight capacity units with two waypoints or a destination waypoint or a series sequence of waypoints into multi-modal objects which are tradable as commodities such as wheat, oil, corn, stocks, foreign exchange, fixed income or other forward or securitized markets. The present disclosed invention relates to combining the concepts of objected oriented programming and navigation systems and social networking, price-time priorities queues, replacement costs, termination valuations, financial markets, commodity structuring transformation and transportation and freight as a fungible asset class or tradable market.
LOCKING SYSTEM FOR EXCHANGE OF ITEMS, SERVICES, AND/OR FACILITIES
One or more techniques and/or systems are provided for facilitating the exchange of an item. For example, a containment component is configured to receive one or more items. A locking component is configured to selectively restrict or allow access to the item. A code generation component is configured to generate and provide an unlocking code to a requestor (e.g., based upon payment by the requestor that requests access to the item). A code entry component is configured to receive user input of a code. The code entry component either retains the locking component in a locked state if the code is not validated as the unlocking code or transitions the locking component into an unlocked state if the code is validated as the unlocking code.
INFORMATION PROCESSING SYSTEM, SERVER, AND COMPUTER READABLE RECORDING MEDIUM
An information processing system includes: a first mobile terminal including a first processor including hardware; and a server including a second processor including hardware, wherein the first processor is configured to output, to the server, attendance information indicating that a user attends an event requiring a participation fee, and a settlement request for the participation fee using electronic money deposited into an electronic wallet, and the second processor is configured to decide the user as an attendee of the event, and perform settlement processing of the participation fee by the electronic money based on the attendance information and the settlement request.
TRADE SERVICES PROVIDER LOCATING METHOD
A trade services provider locator method facilitated by a software application wherein multitude of service providers are able to be located and retained to provide a service by a requesting user. The software application of the present invention provides the service category, pricing and other parameters in addition to the geographic location of the service providers relevant to the requesting user. The geographic location of the service providers are displayed on a graphical map within the software application of the present invention wherein the icons are configured to identify the type of service that can be provided by the service provider and further identify the time window in which the service can be delivered. The user can utilize the method of the present invention to select services from more than different type of service provider simultaneously. Furthermore, the requested service can be either on-demand or for a subsequent scheduled day.
METHODS AND SYSTEMS FOR PERFORMING SECURE TRANSACTIONS ASSOCIATED WITH INSTRUCTIONS RECEIVED IN NATURAL LANGUAGE FORM
Embodiments provide methods and systems for facilitating scheduled payment transactions to users via an application provided by the server system, the application available on the user device. The method performed by the server system includes receiving a transaction request message from the user device, the transaction request message includes scheduled transaction instruction provided by the user in natural language format. The method includes authenticating the user based on a plurality of user authentication factors received from the user at pre-defined time intervals. In an embodiment, the server system is configured to train a data model using ML algorithms by learning the plurality of user authentication factors based on which the user is automatically authenticated by the server system. Upon successful authentication, the method includes parsing the transaction request message to determine a scheduled transaction instruction. The method includes facilitating, processing of the scheduled transaction based on the scheduled transaction instruction.
Method and apparatus for identifying terminals
A method and an apparatus for identifying terminals. The method includes: sending by an NFC card reader of the identifying terminal, a preset instruction to an NFC chip of a terminal to be identified packaged in a packaging box, to switch on the terminal to be identified in a compartment; obtaining identification information corresponding to the terminal to be identified; obtaining location information of the identifying terminal; transmitting the location information and the identification information of the terminal to be identified to a verification server; and obtaining and outputting the identification result sent by the verification server.
AUTHENTICATION OF TRANSACTIONS CONDUCTED USING MOBILE DEVICES
A transaction authentication system authenticates a transaction by determining whether a mobile device and POS device involved in the transaction are at the same location. A POS registry stores location data for POS devices. A PAN registry stores mobile device IDs corresponding to account numbers. A mobile device ID can be provided from the PAN registry in response to receiving an account number from a POS device. The mobile device ID can then be used to retrieve location information from a home location register maintained by a mobile service provider. The retrieved location data for a POS device and the retrieved location data for a mobile device are compared.
SHOPPING BASKET MONITORING USING COMPUTER VISION
A system for monitoring shopping carts uses cameras to generate images of the carts moving in a store. In some implementations, cameras may additionally or alternatively be mounted to the shopping carts and configured to image cart contents. The system may use the collected image data, and/or other types of sensor data (such as the store location at which an item was added to the basket), to classify items detected in the shopping carts. For example, a trained machine learning model may classify item in a cart as “non-merchandise,” “high theft risk merchandise,” “electronics merchandise,” etc. When a shopping cart approaches a store exit without any indication of an associated payment transaction, the system may use the associated item classification data, optionally in combination with other data such as cart path data, to determine whether to execute an anti-theft action, such as locking a cart wheel or activating a store alarm. The system may also compare the classifications of cart contents to payment transaction records (or summaries thereof) to, e.g., detect underpayment events.
REAL-TIME PREDICTION OF PARAMETER MODIFICATIONS BASED ON STRUCTURED MESSAGING DATA
The disclosed embodiments include computer-implemented apparatuses and processes that predict, in real-time modifications to parameters based on structured messaging data. For example, an apparatus obtains (i) first elements of decomposed message data that characterize real-time payments requested by a first counterparty and (ii) a second elements of decomposed message data that characterize real-time payments requested by one or more second counterparties associated with the first counterparty. The apparatus determines a first value of a parameter of a data exchange based on the first elements of decomposed message data, and determines a second value of the parameter based on the second elements of decomposed message data. Based on the first and second parameter values, the apparatus generates information characterizing a modification to at least the first parameter value during a temporal interval, and transmit notification data that includes the information characterizing the modification to a device operable by the first counterparty.