G06Q20/4015

Replacing a customer card payment with a one-time loan at a point of sale
11379821 · 2022-07-05 · ·

A system and method for replacing a customer's debit card payment with a one-time loan at a point of sale (POS) is disclosed. The method receives, at a POS, a debit card input from a customer to be used as a transaction payment. The POS obtains, from the debit card input, identification information for the customer. A total monetary amount of the transaction payment and the identification information is provided to a one-time loan provider's computer system. The one-time loan provider's system uses the customer identification information to perform a credit screening for the total monetary amount of the transaction payment. The one-time loan provider's system provides to the POS a one-time loan offer for the customer. The one-time loan offer to be used in place of the debit card input to make the transaction payment.

Payment card with user feedback

Aspects described herein may allow for method of detecting when a payment card is in a retail establishment by establishing communication between the payment card and a real-time position tracking system; determining whether one of a plurality of accounts linked to the payment card has been used in one or more prior purchasing transactions in the retail establishment; detecting, movement of the payment card with respect to the individual carrying the payment card while the payment card is in a carrying device carried by the individual; and providing, by the payment card, haptic feedback and visible feedback to the individual carrying the payment card.

SYSTEMS AND METHODS FOR USER CONTROL OF ELECTRONIC CHAIRS

Systems and methods for operating a vending machine and/or kiosk. The methods comprise: detecting a presence of a person in a seat of the vending machine; obtaining a full or partial body heat map for the person that was created based on sensor data generated by at least one sensor of the vending machine or at least one sensor located in proximity to the vending machine (the full or partial heat map showing relative temperatures of different parts of a body of the person); selecting at least one vending service parameter for the vending machine using information obtained based on the full or partial body heat map; and causing the vending machine to provide the person with a vending service in accordance with the at least one vending service parameter that was selected.

REAL-TIME UPDATING OF A SECURITY MODEL
20220215393 · 2022-07-07 ·

In some implementations, a device may receive exchange information associated with an exchange initiated by a medium that indicates a first location associated with the exchange and may enable the exchange to be completed. The device may transmit, to the user device, an indication of the exchange and a request to indicate whether the exchange is fraudulent. The device may receive, from the user device, a response indicating whether the exchange is fraudulent that indicates a second location associated with the user device. The device may determine whether the response is valid based on a comparison between the first location and the second location. The device may determine whether the exchange is fraudulent based on the response and determining whether the response is valid. The device may train the model using the exchange information and an indication of whether the exchange is fraudulent as an input to the model.

ZERO-STEP AUTHENTICATION USING WIRELESS-ENABLED MOBILE DEVICES
20220215397 · 2022-07-07 ·

A zero-step authentication system and method which uses wireless mobile devices to automatically make payments in a secure manner without requiring the customer to handle his or her mobile device. The system and method uses a payment facilitation device at the business location which automatically detects and recognizes registered mobile devices, authenticates the customer, and automatically deducts payments for purchases from a pre-authorized Customer Account. The Customer Account is managed by a payment processing server, which stores the Customer Account data, makes appropriate deductions, sends confirmation of deductions to the customer's mobile device, and automatically refills the customer's account by making pre-authorized charges to the customer's banking institution.

Multi-Function Device Legal Claim Blockchain
20220215471 · 2022-07-07 ·

Various implementations relating to a multi-function device legal claim blockchain are described herein. In one implementation, a method may include receiving claim attribute data from users for legal claims, where a respective legal claim corresponds to a compensation claim by a respective user, and where the claim attribute data for the respective legal claim includes data corresponding to a legal claim type for the respective legal claim, a monetary value for the respective legal claim, or combinations thereof. The method may also include receiving device data for the legal claims from at least a subset of the users, where the device data for the respective legal claim includes data corresponding to locations associated with the respective legal claim. The method may further include generating legal claim blockchain databases based on the device data, where the legal claim blockchain databases are configured to store the device data.

SYSTEM FOR VERIFICATION AND MANAGEMENT FOR DIGITALLY PAIRED COLLECTABLES AND MEMORABILIA

This system if directed to verifiably pairing an asset with a digital representation and can include a computer system disposed at a use location and in communication with a persistent storage and a set of non-transitory computer readable instructions included in the computer system adapted for: creating an asset record, creating a significance record, associating the significant record with the virtual representation, storing the asset record and the associated significance record on the persistence storage, creating a transaction record representing a transfer of the asset from a first entity to a second entity wherein the transaction record includes a transaction verification, transmitting a payment request according the transaction verification to a second entity account representing payment for the asset from the second entity to the first entity, and, storing the asset record and the associated significance record of provenance of the item and owner identification on the persistence storage.

Currency, Transaction Management, and Cyber Security Systems Enabling Multiple Entity Split Exchange

Systems and methods for verifying and enabling cross-entity and split exchange for fraud protection are disclosed. Some embodiments may include: receiving, from a Point of Sale (POS) device at a server device, associated member card to Point of Sale data resulting from an associated member card being submitted to the Point of Sale (POS) device for a merchandise or service transaction, the associated member card to a Point of Sale data comprising meta data, card member information, merchant information, purchase information, and location data of the merchandise or service transaction, verifying, using the server device, the location data of the merchandise or service transaction being within permitted locations thereby preventing fraud by blocking transactions at unverified locations, determining, using the server device. Moreover, systems enabling cross-entity and split exchange for fraud protection are disclosed.

RFID-enabled payment authentication

Authentication method and systems using RFID-enabled payment cards are disclosed herein where a server receives a request corresponding to authorization of a payment associated with a payment card from an electronic terminal. The server identifies an electronic device of a user associated with the payment card. The server then transmits an instruction to the electronic device to cause an RFID reader of the electronic device to determine whether an RFID tag corresponding to the payment card is located within a predetermined proximity to the electronic device. When the payment card is located within the predetermined proximity, the server executes a first authentication protocol. Moreover, when the payment card is not located within the predetermined proximity, the server executes a second authentication protocol, wherein the second authentication protocol is more restrictive than the first authentication protocol.

Providing access to a networked application without authentication

A method and apparatus are herein disclosed for allowing suppliers to generate an invoice from a purchase order without requiring them to log in or pre-register with a networked application. Implementation is provided by having a first user provide a first document to a networked application. An electronic notification is dispatched to a receiver for the first document with a unique link to a data entry page within the networked application. The data entry page is sandboxed with limited functionality within the networked application, but accepts data from the receiver to be sent directly into the first user's system.