G06Q20/4015

Beverage dispenser systems and methods
10932610 · 2021-03-02 · ·

A cartridge adaptor system may include a puncturing device; a nozzle adaptor including: a puncture port configured to receive the puncturing device; a nozzle coupling portion configured to releasably couple to a beverage dispenser nozzle; and a cartridge coupling portion configured to releasably couple to a cartridge containing a beverage ingredient; and a cartridge holster having a receiving portion for receiving a portion of the cartridge. The puncturing device may be configured to puncture the cartridge thereby releasing the beverage ingredient.

TIME SENSITIVE GEO-LOCATION DATA FOR PUSH NOTIFICATIONS AFTER SHARED TRANSACTION PROCESSING
20210073783 · 2021-03-11 ·

There are provided systems and methods for time sensitive geo-location data for push notifications after shared transaction processing. A user may utilize a communication device to perform electronic transaction processing for a group of users at a location. The device may be geo-location enabled so that a service provider may detect a location of the device. Based on the geo-location of the user at the time of processing and other nearby geo-location enabled device, the service provider may determine other users that share in the transaction and are associated with the user using messaging connections and shared data transmissions. The service provider may determine the transaction that the user processed. The service provider may request that the other users provide the required reimbursement to the user that processed the transaction data. The other users' devices may receive a push notification and data to perform transaction processing.

REAL-TIME AUTHORIZATION OF INITIATED DATA EXCHANGES BASED ON DYNAMICALLY GENERATED TOKENIZED DATA

The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that, among other things, authorize initiated exchanges of data in real-time based on dynamically generated tokenized data. For example, an apparatus may receive first positional data identifying a first geographic position of a client device and based on the first positional data, the apparatus may determine a value of a parameter characterizing an exchange of data between the client device and a terminal device disposed proximate to the client device during a temporal interval. The apparatus may transmit data requesting a pre-authorization of the data exchange to a computing system, which perform operations that pre-authorize the data exchange in accordance with the parameter value and transmit a digital token representative of the pre-authorized data exchange to the terminal device. The digital token may be valid during the temporal interval and may include a cryptogram associated with the client device.

SYSTEMS AND METHODS FOR CONTROLLED IP ACCESS USING A DISTRIBUTED LEDGER
20210090036 · 2021-03-25 ·

Systems and methods for controlled IP access using a distributed ledger are disclosed. An example system may include a controller configured to: access a distributed ledger including intellectual property (IP) data about IP assets, where the IP assets include an aggregate stack of IP; tokenize the IP data; and interpret a distributed ledger operation corresponding to one of the IP assets. The controller may also be configured to: determine an analytic result value in response to the distributed ledger operation and the tokenized IP data, where the analytic result value includes statistical information corresponding to access events for an IP asset or distribution of IP assets according to access event rates; and to provide a report of the analytic result value; and record a transaction on the distributed ledger in response to providing the report.

METHODS AND SYSTEMS FOR CONTROLLING ACCESS TO A PROTECTED RESOURCE

An electronic device is disclosed. The electronic device includes a memory, a camera module, a communications module, and a processor that is configured to: receive, from the camera module, image data associated with a machine-readable optical label, the optical label encoding transaction details of a transfer of data to a recipient account, wherein the transaction details do not indicate an identity of the recipient account; receive a user input indicating authorization to initiate a transfer of data, via a protected resource, from an account associated with the user to the recipient account; and in response to receiving the user input, generate a request for initiating the transfer of data based on the transaction details, the request including an access token for use in authenticating the user on requests to access the protected resource.

Blockchain-based Security Management Method, Related Device and Storage Medium
20210042756 · 2021-02-11 ·

The present invention provides a blockchain-based security management method, a related device and a storage medium, wherein the method is applied to a security management platform, and comprises: acquiring a state information of a first blockchain account, wherein the state information comprises at least one of a login location and a transaction situation, and the first blockchain account is any one of blockchain accounts registered on the security management platform; judging whether the first blockchain account is abnormal or not according to the state information; and monitoring a fund flow direction of the first blockchain account in the blockchain network if the first blockchain account is abnormal. According to the method, the device and the storage medium provided by embodiments of the present invention, the blockchain account can be monitored and fund security can be guaranteed.

Constructing shopper carts using video surveillance

A system can visually track which items in a store are selected for purchase by a shopper. The system can form a virtual shopping cart by analyzing multiple images, over time, to determine which purchasable items are located with the shopper, such as in a physical shopping cart, in a basket, or held by the shopper. By analyzing multiple images, over time, the system can account for items misidentified in one or more images, or fully or partially obscured in one or more images as the shopper traverses the store. Alternatively, the system can form a virtual shopping cart by analyzing instances in which a purchasable item is removed from a shelf or placed on a shelf. Items removed from, but not returned to, a shelf can be considered to be selected for purchase. The system can include a frictionless checkout that charges the shopper for the selected items.

ELIGIBILITY DETERMINATION FOR DELEGATION EXEMPTION TO STRONG AUTHENTICATION REQUIREMENTS

Disclosed are various embodiments for determining eligibility for the delegation exemption to strong customer authentication requirements. In one embodiment, a payee entity determines that a payment transaction using a payment instrument issued by a payment issuer is eligible for a delegation exemption from an authentication challenge by the payment issuer based at least in part on a previous authentication challenge by the payment issuer being successfully completed for a previous payment transaction using the payment instrument and a returned payment history associated with the payment instrument. Subsequently, the payee entity generates an alternative authentication challenge that does not involve the payment issuer instead of the authentication challenge by the payment issuer.

Transaction processing based on statistical classification and contextual analysis

A computer-implemented method includes: receiving, by a computing device, transaction information for a transaction, wherein the transaction information identifies one or more items in the transaction; classifying, by the computing device, each of the one or more items; selecting, by the computing device, one or more payment accounts, of a plurality of payment accounts, to use to pay for the one or more items based on the classifying each of the one or more items; and communicating, by the computing device, with one or more payment servers to charge the one or more payment accounts for the one or more items.

Interchange action delay based on refund prediction
10915900 · 2021-02-09 · ·

Techniques for leveraging a likelihood that a transaction (or a portion thereof) will be associated with a refund request to determine whether and/or how long to delay sending, to a payment service, a request for processing the transaction (or portion thereof) are described herein. In an example, a payment processing service may receive, from a point of sale device operated by a merchant, transaction data associated with a transaction between the merchant and a customer. The payment processing service may determine a likelihood that the customer will request a refund for a cost of an item of the transaction at a time after the transaction. Based at least partly on the likelihood, the payment processing service may determine whether to wait until at least the time before sending, to a payment service, a request to process the transaction data for at least the cost of the item.