Patent classifications
G06Q20/4015
FEDERATED EDGE-NODE AUTHORIZATION SYSTEM
Apparatus and methods for a federated edge-node computing system are provided. The federated system may allow customers to work in offline mode (e.g., during a disaster). Local data stored on edge-nodes may be used to process offline transactions. Offline transactions may include money transfers and merchant payments using mobile wallets. A plurality of nodes may form a consortium. The consortium may be formed based on geographic proximity of nodes. Member of the consortium may locally store geographically relevant data for authorizing offline transactions.
Pre-disaster education system
A pre-disaster education system may include a system controller. The controller may include a device processor; and a non-transitory computer readable medium including instructions executable by the device processor to perform the following steps: receiving location data from a personal electronic device of a user; receiving forecast data regarding a predicted disaster; making a determination of an educational message to be sent to the personal electronic device of the user, based on the location data and the forecast data; and sending the educational message to the personal electronic device of the user at a predetermined time relative to the predicted time of occurrence of the predicted disaster.
Online transaction verification based on merchant-independent user geolocation
In certain embodiments, an online transaction is verified based on merchant-independent user geolocation. A geolocation of a user associated with the online transaction is obtained from a mobile device of the user by a transaction verifying entity separate and independent from a merchant entity with which the online transaction is initiated. A server associated with the transaction verifying entity determines a proximity of the geolocation of the user to a delivery address for verifying the online transaction. The server generates a verification message including an approval message based on the proximity of the geolocation to the delivery address being within a specified threshold. The server generates a verification message including a rejection message based on the proximity of the geolocation to a delivery address exceeding the specified threshold. The server sends the verification message to another server associated with the merchant entity to carry out the online transaction accordingly.
MOBILE ELECTRONIC WALLET SYSTEM
Apparatus and methods for securing mobile payments during periods when network connections to a cloud computing environment are unavailable are provided. A mobile device may store one or more transaction maps. The transaction maps may include limitations on where offline payment requests may occur and be approved. Limitations may include monetary limitations on a value of an offline payment request. The mobile device may include a secure location for storing the one or more transaction maps. A transaction map may define one or more logical transaction zone. A logical transaction zone may define geographic limits on offline payment requests.
REMOTE CONTROL OF ARTICLE BASED ON ARTICLE AUTHENTICATION
Systems and methods for remotely controlling an article based on authentication of the article. A communication system with a sensor for detecting an interaction event can be coupled to an article. The communication system can be associated with an article identifier. A communication including the article identifier can be received and the identification of the article through the article identifier can be authenticated based on an association of the article identifier with the communication system to verify that the communication is generated in response to the interaction event occurring at the article and being detected by the sensor of the communication system. As follows, operation of the article can be remotely controlled based on whether the article is authenticated.
Selected place on maps associated uniform resource locator (URL) or selected place associated merchant account based payment transactions, connections, offers, order, deals, reservation and call-to-actions
The present disclosure relates to systems, methods, graphical user interface and devices for identifying identity of merchant based on selected from maps, particular place associated website or webpage uniform resource locator (URL) or selected place on maps and enabling user to directly make payment from user payment account to said identified merchant's account including merchant bank account or debit card. In another embodiment enabling user or merchant to connect with each other via merchant client application and user client application and share or request payloads for the transaction and conduct payment transaction, communication, view orders, status, provide deals, offers, booking and one or more types of call-to-actions. The present disclosure relates to point of sale terminal systems and contactless mobile payment systems and relates to methods and systems for completing a transaction through internet or data network.
SYSTEMS, METHODS, AND APPARATUS FOR UTILIZING FORWARD MARKET PRICING TO FACILITATE OPERATIONAL DECISIONS
Systems, methods, and apparatus for utilizing forward market pricing to facilitate operational decisions are disclosed. An example method may include interpreting an energy resource utilization requirement for a task system, and interpreting a behavioral data source, comprising entity behavioral data for an entity associated with the task system. The method may also include forecasting a forward market price for an energy credit resource in response to the energy resource utilization requirement and the behavioral data source. Then, in response to the forecast of the forward market price for the energy credit resource, adjusting an operation of the task system or executing a transaction.
AUTHENTICATION AND AUTHORIZATION WITH PHYSICAL CARDS
Systems and methods for authentication and authorization using physical computing cards include receiving from the physical computing card an authorization request, where the request includes a card identifier and an entity location. Authorized users associated with the card identifier are determined. Identifications of users with pending transactions at the entity location are obtained. Verification is performed by determining that there is a match between an identification of a user to an identification of one of the authorized users. The user is then authorized to access resources associated with the physical computing card.
Real-time authorization of initiated data exchanges based on dynamically generated tokenized data
The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that, among other things, authorize initiated exchanges of data in real-time based on dynamically generated tokenized data. For example, an apparatus may receive first positional data identifying a first geographic position of a client device and based on the first positional data, the apparatus may determine a value of a parameter characterizing an exchange of data between the client device and a terminal device disposed proximate to the client device during a temporal interval. The apparatus may transmit data requesting a pre-authorization of the data exchange to a computing system, which perform operations that pre-authorize the data exchange in accordance with the parameter value and transmit a digital token representative of the pre-authorized data exchange to the terminal device. The digital token may be valid during the temporal interval and may include a cryptogram associated with the client device.
Systems and methods for securing access to resources
In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.