G06Q20/4015

System for reducing transaction failure

A method includes receiving a payment request that indicates a card identifier corresponding to a payment instrument to be used for payment. The method further includes determining that the card identifiers fails to satisfy at least one card activity criteria. Additionally, method includes subsequent to determining that no failed authorization attempts were performed for the card identifier within a previous time period, retrieving, from a database, a decline probability score associated with the card identifier. The method also includes based on the decline probability score, determining whether to transmit an authorization request for the card identifier prior to processing the payment request.

SYSTEMS AND METHODS FOR PAYMENT OPTION CURATION

Various embodiments describe approaches for maximizing rewards associated with financial accounts for at least one user-defined goal (e.g., a travel benefit, a cashback benefit, a flight benefit, a hotel benefit, a charitable contribution benefit, a return benefit, etc.) For example, a user may submit a request for a portfolio of accounts (e.g., credit card accounts, checking accounts, savings accounts, a combination thereof) to achieve specific goals within a specified time given the user's spending habits, the number of credit card accounts desired, etc. Financial transaction information, reward program terms, banking institution policies, and the like can be obtained and analyzed to determine and present the portfolio of accounts, timing guidelines, and spending guidelines can be generated. Thereafter, rewards earned from purchases of goods and/or services made in accordance with the timing and spending guidelines maximize the rewards earned towards the user's goal for the specified period of time.

COST MANAGEMENT IN DISTRIBUTED COMPUTING TEAMS
20220358489 · 2022-11-10 ·

A method for managing operational costs associated with distributed computing. The method includes: creating, via a graphical user interface (GUI), a distributed computing team; linking a digital team wallet to the distributed computing team, wherein the digital team wallet is linked to a currency account; adding a member to the distributed computing team; allowing the member to purchase compute resource access from a plurality of compute resource providers using the digital team wallet; and notifying a team manager when funds in the digital team wallet reduce to at least a team threshold value.

SYSTEMS AND METHODS FOR CONTACTLESS AND SECURE DATA TRANSFER

In one embodiment, a method comprises receiving a unique identifier from an item and sending a communication to an electronic device requesting that a user confirm a pending transaction, receiving input from the electronic device associated, and sending the received input to an authentication system for completing a transaction. In another embodiment, a system comprises a sensor, an authentication system, and a transaction processing system. The sensor is configured to emit energy and receive at least one first identifier, send at least one communication to an electronic device requesting a second identifier, receive at least one second identifier, and send the at least one first identifier and the at least one second identifier to the authentication system. The authentication system is configured to receive the at least one first and second identifiers from the sensor, to choose, based on the at least one first identifier and the at least one second identifier, a transaction processing system, and send the at least one first and second identifiers to the chosen transaction processing system.

Location-based automatic compilation of charges accrued for venue provided goods/services

Technology is disclosed for automatically building an expandable invoice for incurred charges based on recognition of charge-incurring activities by persons whose specific identities are not known via the activity recognition process. A separate process detects location of sourcing and time for a Patron-presence and Patron-identifying Advertising radio Signal (P/PAS) repeatedly broadcast by a P/PAS emitter possessed by each participating patron. Records from the two processes are matched and combined based on substantial proximity in time and space for the activity recognition and the presence detection. Payment on a pay-go-whenever-ready (PGWeR) basis is enabled with use of the built invoice. A patron can pay and leave whenever ready to do so without need for intervention by an on premise staff member.

Digital user identity verification
11574309 · 2023-02-07 · ·

Verification of user identities is an important aspect of computer and network security. In some instances, a first user may attempt to engage with a second user via a web application, mobile phone app, or other software without necessary knowing that the identity of a second user is accurate. The computer security problem of identity verification may be particularly acute when the only contact information is an email address, phone number, or other electronic identifier that can potentially change ownership (e.g. a person may get a new phone number, someone might purchase an Internet domain and thus change ownership of an email address, etc.) This disclosure and claims relate to techniques that allow for enhanced security by verifying an identity of a user via specific prompts and interactions provided via software. Particular credentials may be required in order to verify user identity, including biometrics and other specific required responses.

AUTOMATED VERIFICATION OF USER INTERFACE PROCESS FLOWS
20230102077 · 2023-03-30 ·

Methods and systems are presented for automatically verifying online content for different device configurations and/or account configurations. A request for verifying a user interface software workflow is received from a device. The request can specify particular parameters and content to see if that content appeared correctly when presented to users. Session data associated with one or more real-world user interaction sessions between user devices and a service provider server is obtained. The session data is used to generate data representing how one or more user interface elements are rendered on one or more user devices during the one or more real-world user interaction sessions. The data is comparable against benchmark data to determine if content was correctly presented. Reporting data can be made available that indicates if the user interface workflows are operating correctly.

System for verification and management for non-fungible tokens

A computerized system for verification and management of a digital asset, including an immutable digital asset, comprising: a computer system a sensor and a set of non-transitory computer readable instructions that can include instructions adapted for: receiving a digital asset from a creator of the digital asset; receiving significant information wherein the significant information is taken from a group consisting of date, time, event, individual, team, organization, notation, and any combination thereof; receiving identification information using the sensor of the creator; retrieving location information representing a physical location where the identification information is received, and the computer system is located; retrieving date and time information from the computer system; creating a digital asset record that includes a unique identifier associated with the digital asset, identification information, location information, and date and time information; and storing the digital asset record on the persistent storage.

SAFETY INDEX FOR THE CALCULATION OF A RATING BASED ON USER GENERATED REPORTS OR ACTIONS AND REWARDS SYSTEM THEREFOR

The method and system allows for users to share and be rewarded for information submitted or actions performed, including reports containing messages, images, videos, and geolocation data, of any issues they encounter. The submissions can be shared with the appropriate organization and/or stored on a server, and uploaded to a blockchain to ensure that there is a permanent, tamper-proof record verifying the authenticity of all related transactions. Each submission or action can be verified to create a rating for each user. The system can have the ability to reward users with digital value in return for receiving and verifying authenticity of the information, and to provide such users with the ability to redeem those rewards for goods and services.

Systems, Methods, and Devices to Map and/or Provide an Interface to a Distributed Ledger
20230098246 · 2023-03-30 ·

In one implementation, a method comprises: receiving, on a computing device, a search term for a search engine; and mapping to a distributed ledger based at least on the search term, wherein the distributed ledger is stored on one or more servers coupled to the computing device over one or more computer networks, and wherein the distributed ledger corresponds to augmented data associated with the search term.