G06Q20/4015

AUTONOMOUS DELIVERY
20200364655 · 2020-11-19 ·

A pre-staged or in-person provided order is received from a customer location. Order details are sent to a fulfillment terminal and items associated with the order are prepared or collected. The items are loaded into an autonomous device. The autonomous device plans a route from its current location to the customer location and the autonomous device navigates from its current location to the customer location using the route. The customer is verified at the autonomous device and a secure bin is unlocked by the autonomous device. The customer removes the items associated with the order from the unlocked secure bin, and the autonomous device navigates back to its original location within an enterprise.

INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, USER TERMINAL, SERVICE PROVIDING DEVICE, AND SERVICE PROVIDING METHOD
20200366676 · 2020-11-19 · ·

For a system that provides services to users, it is desirable to provide a technique capable of improving the flexibility of the system while securing the validity of a value and the validity of a user accessing the value. Provided is an information processing device including: an information acquisition unit that acquires, in a case where information indicating that card authentication corresponding to a user terminal has succeeded is acquired, an activation state of a service management application on the user terminal; and an information providing unit that provides the activation state to a service providing device that provides a service to the user terminal.

NETWORK ENGINE FOR INTELLIGENT PASSIVE TOUCH RESOURCE ANALYSIS

Embodiments of the invention are directed to a system, method, or computer program product for intelligent passive touch network engine for resource touch misappropriation mitigation. In this way, the invention utilizes a multi-faceted resource decisioning machine learning application integration as data deployment across a built out passive touch network engine for deployment and integration for passive touch misappropriation identification. The passive touch network performs artificial intelligent pattern trends, locations, usages, and the like to determine potential misappropriation via supplemental resources. This is a deviation from standard data based misappropriation prevention based on utilization of supplemental resources as misappropriation identification.

METHOD AND APPARATUS FOR FACILITATING COMMERCE
20200364720 · 2020-11-19 · ·

A method and apparatus facilitate financial transactions using sources of pre-established funds. A source of pre-established funds can be uploaded to a secure server using an app that is operable on a mobile electronic device. The source of pre-established funds can be used by an owner to initiate a financial transaction, such as by using the app to open a tab at a venue, in which the venue might apply a number of charges for the purchase of food, beverage, merchandise, and the like, and can also permit the owner of the source of pre-established funds to add a gratuity to the tab for final charging to the source of pre-established funds. The source of pre-established funds is usable to complete a financial transaction and to thereby cause a financial obligation that arises from the financial transaction to be paid using the source of pre-established funds.

Time sensitive geo-location data for push notifications after shared transaction processing
10839367 · 2020-11-17 · ·

There are provided systems and methods for time sensitive geo-location data for push notifications after shared transaction processing. A user may utilize a communication device to perform electronic transaction processing for a group of users at a location. The device may be geo-location enabled so that a service provider may detect a location of the device. Based on the geo-location of the user at the time of processing and other nearby geo-location enabled device, the service provider may determine other users that share in the transaction and are associated with the user using messaging connections and shared data transmissions. The service provider may determine the transaction that the user processed. The service provider may request that the other users provide the required reimbursement to the user that processed the transaction data. The other users' devices may receive a push notification and data to perform transaction processing.

Systems and methods for pushing hosted universal resource locator to mobile computing devices

A host system pushing hosted Universal Resource Locators (URLs) to mobile computing devices is provided. The host system includes at least one host computing device configured to receive first merchant data and first Internet of Technology (IOT) data associated with a merchant computing device, enroll the merchant computing device using the first merchant data and the first IOT data, and build an IOT device profile. The host computing device is also configured to generate a hosted URL associated with the merchant computing device and push the hosted URL, using a URL signal, to a user computing device via an IOT device. The host computing device is further configured to instruct the user computing device to convert the URL signal into a URL address and instruct the user computing device to load the URL address in a browser of the user computing device.

System and method for card control

A system and method for card control includes a card control computing system configured to enforce a card control rule based upon transactions made with a payment card. The card control computing system includes a memory unit configured to store information associated with a card control dashboard, and a processing unit configured to cause presentation of the card control dashboard via a display associated with a remote computing device, such that the card control dashboard is associated with the payment card and the card control rule. The card control dashboard includes a user interface. The processing unit is further configured to receive an input via the user interface to activate or deactivate one or more features associated with the card control rule, and trigger the card control rule based upon the one or more features that are activated or deactivated.

Authentication platform for pin debit issuers
11868920 · 2024-01-09 · ·

A system and method processes a transaction between a merchant and a consumer. Data indicate of the security of a digital processing device being used by the consumer to carry out the transaction with the merchant is received. A determination as to whether the digital processing device is secure is made using the received data. In response to determining the digital processing device is insecure, the transaction is aborted. In response to determining the digital processing device is in secure, the transaction is processed by at least one of authenticating the consumer, authorizing the transaction using a payment processing supply chain, and capturing funds for the transaction using a payment processing supply chain.

Mobile authentification method via peer mobiles

Embodiments include systems and techniques to perform secure transactions including processing registration information for each computing device of a plurality of computing devices having authority over a financial account. In one example, embodiments include receiving a pending transaction against the financial account from a computing device. Embodiments include executing an authentication protocol to determine the computing device is a member of the plurality of computing devices based upon the registration information, and processing data identifying another computing device within a configurable distance from the computing device. Embodiments further include the system to execute the authentication protocol to determine the other computing device is a member of the plurality of computing devices based upon the registration information and bypass a portion of a security procedure for authorizing execution of the pending transaction.

Point-of-sale customization service

Concepts and technologies are disclosed herein for point-of-sale customization service. A processor executing a point-of-sale customization service can receive a unique identifier associated with a user device detected in a proximity of a computing device. The processor can query preferences stored in a data store using the unique identifier and identify point-of-sale preferences associated with the user device based upon the querying. The processor can transmit the point-of-sale preferences to the computing device to apply to a transaction.