Patent classifications
G06Q20/4015
SYSTEM AND METHOD FOR HOMOGENIZING PAYMENT TRANSACTION DATA ACQUISITION FROM DISPARATE POINTS OF SALE
A method for homogenizing payment transaction data acquisition from disparate merchant points of sale includes tracking payment card transactions between enrolled payment cardholders and enrolled merchants, based on the tracked payment card transactions creating a database of rewards eligible transactions, and querying the database of rewards eligible transactions and creating a homogenized transaction database including a specific set of transaction datums retrieved from the database of rewards eligible transactions, wherein the homogenized transaction database includes transaction, information from at least a first transaction involving a first merchant using a first point of sale system and a second transaction involving a second merchant using a second point of sale system, the first point of sale system and the second point of sale system differing from one another.
Method for providing rewards based on consumption of contents and apparatus thereof
Provided is a method for providing a reward based on consumption of content performed by a computing device. The method comprises querying a user terminal located in a first space by using location information of a first space, measuring the number of users located in the first space according to the number of the queried user terminals and a first content playback record and calculating a first reward for the first content by using the measured number of users and the first content playback record, and providing the first reward to an account of a producer linked to a producer terminal of the first content.
SYSTEM AND METHOD FOR TRANSACTIONAL DATA ACQUISITION AND ESTABLISHMENT OF CUSTOMER LIFETIME VALUE USING ACQUIRED TRANSACTIONAL DATA
A method for determining customer lifetime value using an incentive system to provide for geographically limited rewards earned for transactions includes tracking payment card transactions between enrolled payment cardholders and enrolled merchants, creating a database of rewards eligible transactions, instructing a virtual payment card issuer to apply the rewards amount for each rewards eligible transaction to an account, receiving transaction authorization requests from the virtual payment card issuer corresponding to enrolled cardholders requesting to spend rewards within their corresponding account, if the transaction is occurring within a prescribed geographic area in which rewards can be spent, transmitting an authorization for the virtual card issuer to complete the transaction using the rewards, establishing a cohort of enrolled payment cardholders and associated transaction data, and calculating a custom lifetime value for the enrolled payment cardholders within the cohort, the calculation based on the transaction data acquired by the incentive management system.
Parking continuity with unused duration between automated vehicles
An artificial neural network trained to predict the availability of an unused duration of a parking space based on input features is executed. Input features may include at least a contextual situation associated with the second entity, a behavior factor associated with a first entity that has been using the parking space, geographical location and time, events occurring within a threshold distance from the parking space. The artificial neural network may be further trained to output a transfer affinity based on the predicted availability of an unused duration, the contextual situation associated with the second entity and the behavior factor associated with the first entity. Based at least on the transfer affinity, the second entity can be selected. The unused duration can be transferred to the second entity from the first entity. The transferring can also include storing a payment and associated computation as a blockchain node in a blockchain.
Correlating asset identifiers
Systems, methods, and computer-readable media provide automated identification techniques that associate at least two unique identifiers of one segment of a segmental multimode wireless flexible product to seamlessly and accurately bridge different identification methodologies to enable advanced real-time tracking of shipment location and status, and other such useful and advanced product and service offerings.
SYSTEM FOR DYNAMICALLY RE-AUTHENTICATING A VIRTUAL RESOURCE
Systems, computer program products, and methods are described herein for dynamically re-authenticating a virtual resource. The present invention is configured to receive an indication that a user has initiated an execution of one or more resource transfer requests using a virtual resource; determine one or more resource usage metrics associated with the virtual resource; determine one or more conditions associated with the use of the virtual resource; determine that the one or more resource usage metrics meets the one or more conditions associated with the use of the virtual resource; automatically initiate a virtual resource re-authentication protocol; transmit an authentication request to re-authenticate the virtual resource; receive an authentication response from the user in response to the authentication request; and re-authenticate the virtual resource based on at least validating the authentication response received from the user.
SYSTEM FOR VERIFICATION AND MANAGEMENT FOR NON-FUNGIBLE TOKENS
A computerized system for verification and management of a digital asset, including an immutable digital asset, comprising: a computer system a sensor and a set of non-transitory computer readable instructions that can include instructions adapted for: receiving a digital asset from a creator of the digital asset; receiving significant information wherein the significant information is taken from a group consisting of date, time, event, individual, team, organization, notation, and any combination thereof; receiving identification information using the sensor of the creator; retrieving location information representing a physical location where the identification information is received, and the computer system is located; retrieving date and time information from the computer system; creating a digital asset record that includes a unique identifier associated with the digital asset, identification information, location information, and date and time information; and storing the digital asset record on the persistent storage.
CHAIN OF AUTHENTICATION USING PUBLIC KEY INFRASTRUCTURE
A method for sequential authentication based on chain of authentication using public key infrastructure (PKI) is provided. The method includes receiving, by an n.sup.th party, an (n−1).sup.th modified public key from an (n−1).sup.th party; generating, by the n.sup.th party, an n.sup.th private key and an n.sup.th public key corresponding to each other; generating, by the n.sup.th party, an n.sup.th modified public key by concatenating the (n−1).sup.th modified public key and the n.sup.th public key signed with the n.sup.th private key; and transmitting, by the n.sup.th party, the n.sup.th modified public key, where n is a natural number greater than 1, and when n=2, the first modified public key is the first public key signed with the first private key.
CHAIN OF AUTHENTICATION USING PUBLIC KEY INFRASTRUCTURE
A method for sequential authentication based on chain of authentication using public key infrastructure (PKI) is provided. The method includes abutting a first wearable device belonging to a first party with a second wearable device belonging to a second party; transmitting, by the first wearable device, authentication information of the first party; verifying the authentication information of the first party; transmitting, by the second wearable device, authentication information of the second party; verifying the authentication information of the second party; authorizing electronic transaction in response to successfully verifying both the authentication information of the first party and the authentication information of the second party. Each of the authentication information of the first party and the authentication information of the second party includes information configured for authentication based on a public key infrastructure (PKI) certificate.
CHAIN OF AUTHENTICATION USING PUBLIC KEY INFRASTRUCTURE
A method for sequential authentication based on chain of authentication using public key infrastructure (PKI) is provided. The method includes generating, by a user, a first private key and a first public key corresponding to each other; generating, by an n.sup.th service provider, an n.sup.th private key and an n.sup.th public key corresponding to each other; transmitting, from the user to the n.sup.th service provider, a level n key; verifying, by the n.sup.th service provider, the level n key; generating, by the n.sup.th service provider, a level (n+1) key by concatenating the level n key and the n.sup.th public key signed with the n.sup.th private key; and transmitting, by the n.sup.th service provider, the level (n+1) key to the user, where n is a natural number, and when n=1, the level 1 key is the first public key signed with the first private key.