Patent classifications
G06Q20/4015
Lens depiction profile technology
A smart card with secure and efficient image capture and analysis is provided. The card may include a non-transitory memory embedded in the housing storing computer-executable instructions. The instructions, when run on the microprocessor, are configured to capture, via the camera, an image of a building (or other suitable image), process the image via an image processing module, determine, based at least in part on the processing of the image, a payment amount and a payment recipient associated with the building. The smart card may also display payment information on the display screen. The payment information may include the payment amount and/or the payment recipient. When authorization is received via a tactile sensor, the card may execute a payment or other communication, over a payment gateway from an account associated with a user of the platform to an account associated with the payment recipient.
System and method for facilitating investigation of expense card fraud
In preferred embodiment, an analysis tool is provided to help a user quickly comb through a vast number of expense card purchases, to focus only on those where there is some indication that fraud could have been involved. These suspect purchases are those where there is a lack of correspondence between the location and time of any vehicle stop and the purchase record. Because the purchase record can be misleading regarding time and location, a lack of match is not a certain indication of fraud, but it does merit further investigation. The tool permits a user to set a time and distance window about each fuel purchase time and location, or to choose a best match algorithm. After a table showing the purchases and closest stops is returned, the user may, for any one of them, choose to view a map view showing vehicle stops and purchase location.
FRAUD PREVENTION SYSTEMS AND METHODS FOR SELECTIVELY GENERATING VIRTUAL ACCOUNT NUMBERS
Disclosed embodiments may include a method that includes receiving first identifying information associated with a first user from a computing device; determining a score based on the first identifying information; determining whether the score is less than a threshold; pseudo-randomly generate and transmit a one-time use number to the computing device when the score is less than the threshold. When the score is greater than or equal to the threshold, the method may include transmitting, to the computing device, second instructions prompting the first user to provide second identifying information. Responsive to receiving the second identifying information of the first user, the method may include determining that the second identifying information matches stored second identifying information. Responsive to the second identifying information matching stored second identifying information, the method may include pseudo-randomly generate and transmit the one-time use number to the computing device.
SYSTEMS AND METHODS FOR SELECTIVELY PREVENTING ORIGINATION OF TRANSACTION REQUESTS
Processing transaction requests may be considered a computationally expensive operation for a computing system such as an e-commerce platform. An aspect of the present disclosure relates to systems and methods to reduce the number of transaction requests that are received and/or processed by a computing system. This may reduce demand on the computing system's resources and potentially improve the responsiveness of the computing system. In some embodiments, a set of users is selected based on at least one defined condition for a particular transaction request. Origination of the particular transaction request on behalf of users excluded from the set of users is prevented in order to reduce the number of the particular transaction requests that are received and/or processed by a corresponding computing system.
METHODS AND SYSTEMS FOR AUTHENTICATION FOR REMOTE TRANSACTIONS
Disclosed are methods, systems, and non-transitory computer-readable medium for authentication of remote transactions. For instance, the method may include receiving a request for an interaction, obtaining data relating to an authentication item, and determining the location of a user device used by the user to initiate the interaction. The method may further include transmitting, to the user device, authentication data configured to cause a camera device to generate a response including the location of the camera device, receiving the response, authenticating the camera device as being associated with the user, and receiving one or more images of the authentication item captured by the camera device. The method may additionally include verifying that the user is in possession of the authentication item based on an analysis of the one or more images being received from the camera device and approving the interaction.
TRANSACTION TOKEN THAT STORES AND PRESENTS LOCATION-SPECIFIC TOKEN IDENTIFIERS
In certain embodiments, location-based activation of card identifiers may be facilitated. In some embodiments, an electrophoretic display card may store a set of location-specific card identifiers, where each card identifier of the set is associated with (i) an account of a user and (ii) creation location information indicating a device location of the user at a creation time of the card identifier. In response to being powered by a user device, the card may initiate wireless communication with the user device. The card may determine a device location of the user device, select a card identifier from the set of card identifiers that matches the device location, and switch a state of the card identifier to an active state to enable transaction processing for the card identifier. In some embodiments, the card may cause the active card identifier to be presented on an electrophoretic display of the card.
APPARATUS AND METHODS FOR ADMINISTERING ONLINE SHOPPING BY A CHILD
The present disclosure relates to apparatus and methods that allow a Parent or other designated guardian to provide an educational shopping experience to a Child within parameters that protect the Child and Parent. The Parent may indicate a price and details related to the Child's experience, including an event, an amount spent, and an teaching environment engages. Implementations may include a downloadable or pre-installed app, an API or other executable code.
SYSTEM AND METHOD FOR GENERATING NOTIFICATIONS BASED ON DIGITAL WALLET PASS DATA
A server computer system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to receive, via the communications module and from a computing device, a signal including digital wallet pass data; store the digital wallet pass data in association with an account; monitor location data and data associated with a value card account to identify a notification event; responsive to identifying the notification event, generate a notification based on the digital wallet pass data; and send, via the communication module and to the computing device, a signal causing the computing device to display the notification.
SYSTEMS AND METHODS FOR GENERATING AND TRANSMITTING DIGITAL PROOFS OF OWNERSHIP FOR PURCHASED PRODUCTS
Novel techniques for generating and ascertaining proof of ownership of physical goods employing blockchain-based methodologies. Upon purchase of a physical good, data relevant to that purchase including identification of the purchaser are employed to mint an NFT purchase token that is appended on a block chain and placed within the customer wallet to represent a unique certificate of ownership for the purchased physical good. Transaction fees associated with the process, creation of an electronic wallet, generation of tokens that include sub-tokens for maintaining chain of title information for the good's entire lifetime, among other things also are discussed.
Establishing consent for cardless transactions using short-range transmission
A method for processing a cardless payment includes receiving, by a first mobile device, a signal from a second mobile device using a short-range wireless transmission protocol. A value for the received signal strength indication of the signal between the first mobile device and the second mobile device can be determined. The process can include determining that the first mobile device and the second mobile device are in proximity based on the received signal strength indication. Consent to enter into a payment transaction can be established upon a determination that the devices are in proximity to one another.