G06Q20/4015

AUGMENTED REALITY VIRTUAL NUMBER GENERATION

Disclosed herein are system, method, and computer program product embodiments for generating and displaying virtual number information using augmented reality technology. Interaction with virtual number information may be provided via an augmented reality display in relation to a payment object that is detected within a real-time view of an augmented reality application. Exemplary operations of the augmented reality application include providing a real-time view via the mobile device, processing a payment object shown via the real-time view, generating a virtual number based on processing of the payment object, and utilizing the generated virtual number.

AUTOMATED VERIFICATION OF USER INTERFACE PROCESS FLOWS
20210357939 · 2021-11-18 ·

Methods and systems are presented for automatically verifying online content for different device configurations and/or account configurations. A request for verifying a user interface software workflow is received from a device. The request can specify particular parameters and content to see if that content appeared correctly when presented to users. Session data associated with one or more real-world user interaction sessions between user devices and a service provider server is obtained. The session data is used to generate data representing how one or more user interface elements are rendered on one or more user devices during the one or more real-world user interaction sessions. The data is comparable against benchmark data to determine if content was correctly presented. Reporting data can be made available that indicates if the user interface workflows are operating correctly.

REMOTE ACTIVATION OF KIOSK TO SERVE PRODUCT OR RELEASE CASH TO CUSTOMER

Disclosed herein are system, method, and computer program product embodiments for remote activation of an automated teller machine (ATM) to dispense cash to a customer. The customer may stage a transaction using a mobile application on a mobile device. Upon the staged transaction being authenticated and approved, the customer may visit the ATM. The customer may capture an image being displayed on a display of the ATM using a camera of the mobile device. The captured image may be sent to an application server from the mobile device. The application server may associate the ATM with the staged transaction that is staged using the mobile application, and send instructions to the ATM to dispense cash according to the staged transaction.

COMPENSATION MANAGEMENT SYSTEM FOR RULES-BASED BEHAVIOR
20210357905 · 2021-11-18 · ·

A method for managing and providing compensation between devices in order to encourage positive behavior is disclosed. The system is operable to receive a request for providing compensation to a user account and is further operable to fulfil the request, track the compensation transfer, and provide historical data of the transfer based on geographic location. The geographic locations preferably include multiple tiers of permissions that are managed by multiple governing entities.

CONTROL METHOD, SERVER, AND RECORDING MEDIUM

A control method is executed by one server out of a plurality of servers, each managing one of a plurality of distributed ledgers. The control method includes receiving first transaction data from a measured-value server over a network, the measured-value server providing, for each of one or more parameters for determining a price for a variable-price service, a measured value that corresponds to the parameter, and the first transaction data including the one or more parameters, the measured value, and a location and a time where and when the measured value is obtained; and transferring the received first transaction data to other servers different from the one server out of the plurality of servers and storing a first block including the first transaction data into a first distributed ledger managed by the one server.

DEEP BEHAVIORAL NETWORKS FOR FRAUD DETECTION

A transaction processing system includes a transaction processing module configured to receive first information associated with a first proposed transaction, retrieve second information associated with at least one prior transaction that is associated with the first proposed transaction, and calculate a time-decayed algorithm using the second information to generate third information. The transaction processing system also includes a weighting module communicably coupled to the transaction processing module, wherein the weighting module is configured to receive the third information from the neural-based processing module, apply a weighting factor to the third information to generate fourth information, and calculate at least one processing algorithm using the first information and the fourth information to generate an output. The output of the weighting module is used by an additional transaction processing module to determine whether the first proposed transaction is fraudulent.

Location information processing method and apparatus

Systems, methods, and storage media for location information processing are disclosed. An example of a method comprises: obtaining transaction information from user terminals of a plurality of users using a service provided by a service provider, the transaction information comprising a plurality of pieces of location information of the user terminals; clustering, using an algorithm, the plurality of pieces of location information into a plurality of areas; determining a transaction attribute corresponding to each area in the plurality of areas, the transaction attribute comprising a number of users in a corresponding area and a number of transactions of users using the service in the corresponding area; determining, according to information entropy values of the transaction attributes, a dispersity of the service provided by the service provider according to a number of areas in the plurality of areas and a plurality of transaction attributes corresponding to the plurality of areas.

BLOCKCHAIN ARCHITECTURE, SYSTEM, METHOD AND DEVICE INCLUDING A HYBRID PUBLIC-PRIVATE ITERATION FOR FACILITATING SECURE DATA COLLECTION AND CONTROLLED DISTRIBUTION USING A DECENTRALIZED TRANSACTION INFORMATION PLATFORM AND TOKEN ECOSYSTEM
20220012731 · 2022-01-13 ·

A distributed transaction and data storage platform including a distributed notary ledger or blockchain and one or more individual user micro-identifier chains that together enable the secure effectuation and recordation of one or more transactions, and/or storage of data in an automated, real-time, zero-trust, globally data law and privacy law centric manner while maintaining transaction party confidentiality and preventing chain poisoning.

Computer-based systems and methods configured for one or more technological applications for authorizing a credit card for use by a user

A configured application for authorizing a credit card by a user and a method that may include receiving an electronic request to pair a mobile device associated with a user with a credit card of the user. The credit card may include a location tracking circuitry to remotely communicate a location of the credit card to a remote electronic recipient. The location of the credit card may be received by a processor from the remote electronic recipient. A proximity multi-factor authentication may verify that the user is an authorized user of the credit card. The mobile device associated with the user may be paired with the credit card of the user after verifying that the user is the authorized user. The processor may receive the location of the credit card paired with the mobile device from the remote electronic recipient. The location of the credit card may be displayed on a display of the mobile device associated with the user.

SYSTEMS AND METHODS FOR IMPOSING PHYSICAL ACTIONS, BY ENDPOINTS, BASED ON ACTIVITIES BY USERS
20210349475 · 2021-11-11 ·

Systems and methods are provided for imposing physical actions, by endpoints, based on activities by users. One such method includes imposing a physical actions via a drone, by an endpoint associated with the drone, based on an activity undertaken by a user. The method includes receiving, by a computing device, an activity message including data indicative of an activity of a user and retrieving at least on rule from a data structure based on the data indicative of the activity where the at least one rule includes a physical action for said activity of the user. The method then includes identifying, by the computing device, the physical action from the at least one rule and transmitting, by the computing device, an order for the physical action to an endpoint, whereby the endpoint commands a drone to perform the physical action.