G06Q20/4015

Systems and methods for machine forward energy and energy credit purchase

Systems and methods for machine forward energy and energy credit purchase are disclosed. An example transaction-enabling system may include a machine having an energy requirement for a task and a controller. The controller may include a resource requirement circuit to determine an amount of an energy resource for the machine to service the energy requirement, a forward resource market circuit to access a forward resource market, and a resource distribution circuit to execute a transaction of on the forward resource market in response to the determined amount of the energy resource.

CONTACTLESS DELIVERY SYSTEMS AND METHODS
20230289800 · 2023-09-14 ·

A contactless delivery system is provided. The contactless delivery system includes a contactless card storing a cryptogram containing a unique identifier associated with a user account. After entry into a communication field, the contactless card is configured to transmit the cryptogram to a server. Upon receipt of the cryptogram, the server is configured to validate and decrypt the cryptogram, and extract the unique identifier. The server can query a database for an identity of the user account using the unique identifier, generate a digital signature based on the identity of the user account, and transmit a verification notification including the identity of the user account and the digital signature.

SYSTEM AND METHOD FOR AUTOMATICALLY VALIDATING USERS TO ACCESS BLOCKCHAIN BASED APPLICATIONS

A system and method are provided for automatically validating users through a country, location or residence specific manner, for example to permit access to a blockchain enabled application. Optionally, such validation comprises transmission of a code to a valid communication device, capable of receiving an SMS or other message type, that validates the location and/or citizenship of the user. Optionally, additionally or alternatively, such validation comprises the application of a national citizenship and/or residency based digital schema, such as the DigiD digital identification schema of the Netherlands. The user may be validated as being a resident or citizen of a country, and/or otherwise having a valid attachment to a particular country, location or residence. Alternatively, the user may be validated as not being a resident or citizen of a country, and/or otherwise as not having a valid attachment to a particular country, location or residence.

ASYNCHRONOUS AUTOMATED CORRECTION HANDLING IN CONCIERGE SYSTEM OF INCORRECTLY SORTED ITEMS USING POINT-OF-SALE DATA

An online concierge system performs asynchronous automated correction handling of incorrectly sorted items using point-of-sale data. The online concierge system receives orders from customer client devices and determines a batched order based on the received orders. The online concierge system sends the batched order to a shopper client device for fulfillment. The online concierge system receives transaction data associated with the batched order from a third party system. The online concierge system determines whether a sorting error occurred based on the transaction data and the batched order. In response to determining that a sorting error occurred, the online concierge system sends an instruction to correct the sorting error to the shopper client device.

PROCESSING INTERRUPTED TRANSACTIONS OVER NON-PERSISTENT NETWORK CONNECTIONS
20230289811 · 2023-09-14 ·

An offline retail machine comprising a short-range transceiver, one or more processors, and memory performs communications operations via one or more mobile devices. The communications operations include establishing via the short-range transceiver a connection with a first mobile device, and transmitting first information to the first mobile device. Upon not receiving an acknowledgement that the first information was received by a remote server, the offline retail machine maintains the first information in the memory and establishes, via the short-range transceiver, a connection with a second mobile device, appends the first information to second information, and transmits the first and second information to the second mobile device. Upon receiving acknowledgement that the first and second information were received by a remote server, the offline retail machine deletes the first and second information.

User authentication based on account transaction information in text field

Methods, systems, and apparatuses are described herein for authenticating access to an account using questions which allow users to provide textual information about transactions conducted by an account. A machine learning model may be trained to predict the guessability of merchants. A request for access to an account may be received, and transaction data for that account may be received. An authentication question may be presented. For example, a user may be prompted to list places they have shopped recently. A user response comprising text data may be received. The text data may be processed to identify one or more merchants. If the one or more merchant(s) are represented in the transaction data, the machine learning model may be used to determine the guessability of the one or more merchants. An authentication score may be determined based on the guessability, and access to the account may be provided.

System and method for conducting secure financial transactions
20230289808 · 2023-09-14 ·

A system and method for conducting secure debit and credit card electronic financial transactions involving NFC card reading using a computer device includes the steps of identifying, by a computing system, a first payment source account held by a card holder; receiving, by computing system, transaction data associated with a transaction initiated by the cardholder with a merchant using the first payment source account, the transaction having a transaction amount; requesting, by a computing system, via a first network a first transfer of the transaction amount from the first payment source account within a predetermined time; determining a card status; storing the meta data associated with the transaction in a database wherein the meta data includes at least the card status; if the card status is card-present status, converting the card-present status into card-not-present status by virtue of the NFC card reading process using a computer device having an NFC card reading capabilities; and transferring the transaction amount to pay the merchant.

Methods and systems for secure payment processing
11756032 · 2023-09-12 · ·

Exemplified systems and methods facilitate secured mobile payment transactions using credit cards, debit cards, bank account without having to transmit credit card, debit card, or bank account numbers over a wireless network. Rather, the exemplified systems and methods facilitate a highly secure and intuitive payment transaction and/or ATM cash withdrawal or transaction via two independent processes tied to a cloud or enterprise network—one performed between a customer computing device and a cloud network or enterprise network and another performed between a merchant computing device (including an ATM system) and the cloud or enterprise network. The validation token comprising a short code between 3 and 6 tokens in length is beneficially realized.

SYSTEMS AND METHODS FOR TRANSACTION AUTHORIZATION
20230281627 · 2023-09-07 ·

A set of user accounts are maintained, each associated with a corresponding mobile device. Each user account comprises a set of user-identifying features, including at least one of: an image of a user-identifying asset, and information that is derivable from an image of a user-identifying asset. Each user account also comprises the location of the associated mobile device and transactional data, such as payment card data, for performing a transaction. An image of a user-identifying asset is captured at a known service location, and a match is determined with one of the user accounts dependent on image and location similarity. The use of transactional data from the matched user account is therefore authorized, and so service provision at the service location is permitted.

BOOKING MANAGEMENT SYSTEM

A booking management system for secure authentication of payment information and delayed transaction processing is provided. Third-party services partner with booking management systems to aggregate and list offerings of the third-party services in a digestible display on a one-stop platform. A booking management system can manage the authentication of payment card information on behalf of any number of such third-party services. The booking management system may receive a delayed transaction request from one or more such third-party service. The booking management system may provide virtual payment information to the third-party services for delayed transactions. The third-party services may later initiate the delayed transactions using the virtual payment information, without being required to perform authentication processing on the payment card information maintained by the booking management system.