G06Q20/4015

METHOD FOR ACCURATE OBJECT TRACKING WITH COLOR CAMERA IN MULTI PLANAR SCANNERS

Methods for accurate object tracking are disclosed herein. An example the method includes receiving, from a first optical imaging assembly having a first field of view (FOV), a first image captured over the first FOV and based on a decode of an indicia associated with an object of interest, identifying the object of interest within the first image. The method further includes determining a location of the object of interest within the first image and mapping the location of the object of interest within the first image to a predicted location of the object of interest within a second image, the second image being received from a second optical imaging assembly having a second FOV and the second image being captured over the second FOV.

SYSTEMS AND METHODS FOR AUTHORIZING THIRD-PARTY TRANSACTIONS

A method of implementing a transaction including receiving, by a transaction computing system from an authorizing computing system, authorization information, generating, by the transaction computing system, an authorization profile based on the authorization information, the authorization profile associated with an authorization profile identifier, and transmitting, by the transaction computing system, the authorization profile identifier. The method further includes receiving, by the transaction computing system from a provider computing system, a request for a transaction, the request including transaction information and the authorization profile identifier, identifying, by the transaction computing system, the authorization profile based on the received authorization profile identifier, determining, by the transaction computing system, that the transaction is authorized based on the authorization profile and the transaction information, implementing, by the transaction computing system, the transaction, and transmitting, by the transaction computing system, confirmation of the transaction.

Transaction validation and fraud mitigation
11157907 · 2021-10-26 · ·

Systems and methods that can verify transactions based upon location disparity between an account holder and POS (point of sale) as well as identity of a customer are provided. The system can employ camera-equipped drones or other image capture mechanisms to perform identity verification on behalf of a financial entity, cardholder or merchant. Further, the innovation provides systems and methodologies by which allegedly fraudulent or suspect transactions can be blocked or further investigated in real- or near real-time so as to assist in loss mitigation and potentially identification of fraudsters.

Accessible remote deposit capture
11159733 · 2021-10-26 · ·

Apparatuses, methods, program products, and systems are disclosed for accessible remote deposit capture. An apparatus includes a position module that determines a position of a hardware device relative to a document based on input captured from a camera of the hardware device. An apparatus includes a direction module that determines one or more directions for moving a hardware device relative to a document to position the document within a predefined area of a field of view of a camera. An apparatus includes an accessibility module that provides accessibility feedback via a hardware device based on determined one or more directions. Accessibility feedback includes feedback for assisting a user that has a visual impairment with positioning a hardware device such that a document is within a predefined area of a field of view of a camera.

SYSTEMS, METHODS, AND USER INTERFACES FOR PLANNING, EXECUTION, AND VERIFICATION OF CONSTRUCTION TASKS

A system for verifying completion of a construction task is provided, wherein the system receives verification data from an electronic device of a building party indicating that a construction task has been completed, and responsively transmits, to a verifying party, a request to verify the completion of the task based on the verification data. A system for facilitating payment using a digital wallet is provided, wherein the system executes a deposit into the wallet based on a first identification code received and executes a withdrawal request based on a second identification code received. A system for verifying presence of a worker at a work site is provided, wherein a first electronic device detects the presence of a worker, such as by detecting the presence of the worker's electronic device, and automatically prompts a user of the first electronic device to confirm the worker's presence.

SERVICE DATA PROCESSING METHOD, APPARATUS, AND ELECTRONIC DEVICE
20210326861 · 2021-10-21 · ·

One or more computing devices obtains service data of a user payment service. The one or more computing devices determines whether the service data of the user payment service falls within a service indicator range. In response to determining that the service data does not fall within the service indicator range, the one or more computing devices obtains location information of a target customer corresponding to the service data. The one or more computing devices obtains one or more local events corresponding to the location information. The one or more computing devices determines, based on the one or more local events, whether to output an alarm for the service data. In response to determining to output the alarm for the service data, the one or more computing devices outputs the alarm for the service data.

COMPUTING SYSTEMS UTILIZING GENERATED UNIQUE AUTHORIZATION IDENTIFIERS FOR AUTHORIZING USER OPERATIONS AND METHODS OF USE THEREOF
20210328981 · 2021-10-21 ·

In some embodiments, an exemplary method may include receiving by a computing device of a user, first facial image data of the user for identity verification from an authorizing entity for authorizing user operations in computing systems managed by a plurality of entities. Second facial image data of the user is obtained using an imaging device of the computing device at a predefined location of a particular entity from the plurality of entities for authenticating the user. A unique authorization identifier is displayed of the computing device of the user. A location of the computing device and a timestamp when a computing terminal of the particular entity scans the unique authorization identifier on the computing device of the authenticated user and an authorization request is relayed to the authorizing entity. An approval is received based on verification of the unique authorization identifier generated for the particular entity, the location of the computing device, and the timestamp.

COMPUTERIZED PAYMENTS FOR TRANSACTION AUTHORIZATION

Various examples are directed to systems and methods for authorizing a human user to execute transaction at a physical location. A location computing system may receive payment receipt data comprising an indication of a payment made from an account associated with a transaction party to an account associated with the location, and token data associated with the transaction. Based at least in part on the payment receipt data, the location computing system may determine to authorize execution of the transaction with a human user physically present at the location and generate an authorization output indicating that execution of the transaction with the human user is authorized.

GEOFENCED NOTIFICATION OF AN INVENTORY ITEM

Disclosed herein are system, method, and apparatus for pushing a notification corresponding to an inventory item of interest when a geofence is broken. The method includes identifying an inventory item of a plurality of inventory items as the inventory item of interest. The method includes determining a physical location of a user equipment (UE) is within a preconfigured threshold distance from a location of the inventory item of interest. The method includes based on the determining, providing an indication including the location of the inventory item of interest and the inventory item of interest. The method includes based on a response to the indication, receiving a pass including a prequalification status to complete a transaction associated with the inventory item of interest.

LOCALIZED ACCOUNT FREEZE FOR FRAUDULENT TRANSACTIONS

Computer-implemented methods and systems are provided for locally freezing a user account in a geographic or digital space. Consistent with disclosed embodiments, locally freezing a user account in a geographic or digital space includes receiving fraud data associated with the user account, the fraud data including a location where a fraud associated with the user account has occurred, wherein the fraud location includes at least one of a digital location or a geographical location; receiving account data associated with the user account, the account data including non-fraudulent account transaction information; generating a pattern of fraud based on the fraud data; generating a pattern of use associated with the user account based on the account data; determining a geodigital area for a localized account freeze based on the pattern of fraud and the pattern of use; and performing a localized account freeze on the user account based on the determined geodigital area.