G06Q20/4037

SYSTEMS AND METHODS OF ACCESS CONTROL AND SYSTEM INTEGRATION
20230325940 · 2023-10-12 · ·

Automated provisioning, according to one example embodiment, enables a mutual customer to establish an intelligent and automated connection between an accounting software system and their financial institution. For example, this might be achieved by allowing a financial institution customer to make feeds from their bank accounts available to the accounting software system within financial internet software (e.g., hosted and operated by the customer's financial institution). Once a customer selects the bank account(s) they want to share with the accounting software system, they are passed along to the accounting software system to link the selected bank account with an account they have set up in the accounting software system.

Automatic alerting communications systems and methods
11823162 · 2023-11-21 · ·

A system includes a user device and a computing system. The user device accesses a plurality of images captured by a camera and identifies, from the plurality of images, a particular image that depicts a portion of a user interaction object. The user device transmits the particular image across a wireless communications network. The computing system accesses the particular image depicting the portion of the user interaction object and determines a data item from the particular image. The computing system compares the data item to one or more accounts of the user and sends instructions to the user device to automatically display an alert message on the electronic display based on the comparison of the data item to the one or more accounts.

VALIDATION COMPUTING ENTITY NODE-STAKED DIGITAL ASSET-BASED INTERACTION SYSTEM

A digital asset-based interaction system includes a digital asset-based interaction computing entity that facilitates a digital asset based-interaction. The digital asset-based interaction involves a first computing entity providing digital assets and a second computing entity accepting assets in a desired asset format. The digital asset-based interaction system further includes at least one validation computing entity node associated with an off-main ledger layer of a multi-layer digital asset distributed ledger technology network associated with the digital assets. The at least one validation computing entity node verifies the obtaining the amount of the digital assets. The on-main ledger layer settles the offloaded verification of obtaining the amount of the digital assets. The digital asset-based interaction system further includes a digital asset backing computing entity operable to lock an amount of system digital assets in an account associated with the at least one validation computing entity node to back the offloaded verification.

SYSTEMS AND METHODS FOR REMOTE ATM ACCESS

A system includes a location identifier device and a computer system. The location identifier is configured to transmit an identifier to a user device when the user device is within a predetermined range of an area and receive location information from the user device associated with a user. The computer system is configured to receive the location information from the user device within the area via the location identifier device and receive a request for an ATM transaction from the user device. The request includes attribute information associated with the user. The computer system is configured to receive attribute information associated with the user comprising an indication of a license plate within the area and identify, based on a determination that the attribute information at least partially matches the attribute information from the request, the user associated with the request. The computer system is configured to transmit, based on the user device being within the area and the identification of the user, a transaction code to the user device.

Systems and methods for remote ATM access

A system includes a location identifier device configured to receive location information from a user device; a surveillance device configured to capture video surveillance; and a computer system. The computer system is configured to: receive the location information; receive a request for an ATM transaction that includes attribute information associated with the user; obtain, from the received video surveillance, captured attribute information associated with the user; determine that the captured attribute information at least partially matches the received attribute information; transmit a transaction code to the user device based on (i) the location information from the user device being within the area, (ii) the captured attribute information at least partially matching the attribute information, and (iii) the identification of the user associated with the request; and facilitate the ATM transaction based at least partially on the received transaction code.

Computing system implementing secondary authorizations for prepaid transactions
11829973 · 2023-11-28 · ·

A computing system can receive a primary authorization request corresponding to use of a prepaid payment means of a user of a transaction service for a transaction with a merchant. Based on receiving the primary authorization request, that system can determine that an account balance corresponding to the prepaid payment means comprises inadequate funds to fulfill the transaction. In response, the system can automatically transmit a secondary authorization request to a financial entity associated with an account of the user, and subsequently receive an approval of the secondary authorization request, which enables the system to utilize the account of the user to make up for the inadequate funds of the account balance of the prepaid payment means.

SYSTEMS AND METHODS OF ACCESS CONTROL AND SYSTEM INTEGRATION
20230385953 · 2023-11-30 · ·

Automated provisioning, according to one example embodiment, enables a mutual customer to establish an intelligent and automated connection between an accounting software system and their financial institution. For example, this might be achieved by allowing a financial institution customer to make feeds from their bank accounts available to the accounting software system within financial internet software (e.g., hosted and operated by the customer's financial institution). Once a customer selects the bank account(s) they want to share with the accounting software system, they are passed along to the accounting software system to link the selected bank account with an account they have set up in the accounting software system.

SYSTEM AND METHOD FOR SETTLING MONETARY AND QUOTA-ALLOCATED DUAL CURRENCY TRANSACTIONS
20230024145 · 2023-01-26 · ·

A system and method for settling monetary and quota-allocated dual currency transactions may be used to reduce Co2 emissions. Each purchasable item (product or service) in the system may have a monetary price and a Carbon price whose value corresponds to a number of Kg of Co2 emitted by the manufacture/sale/use of the purchasable item. The system and method individualizes the reduction of Co2 emissions and allows each consumer to choose purchasable items in part based on the Carbon price.

DATABASE WITH DIMENSIONAL BALANCES UPDATING
20220405755 · 2022-12-22 ·

In an example embodiment, a method for updating a database with dimensional balancing comprises receiving a transaction request to transfer a portion of a first balance from the first balance to a second balance; determining a subset of the first balance less than or equal to the portion in the first balance compliant with dimensional rules based on one or more attributes of the subset and an identifier of an account holding the second balance; moving the determined subset from the first balance to the second balance; and updating attributes of the moved subset in the second balance.

Trusted pair authentication with edge-computing devices

Apparatus and methods are provided for executing a rules-based authentication of an electronic transaction. The method may include receiving first and second payment authorization parameters and second payment authorization parameters. The method may also include receiving from a Point of Sale device a request for payment information and a purchase amount. The method may also include, determining if first or second parameters are satisfied. The first parameters may include a first time range, a pairing of the electronic device to a first apparatus, a first geolocation of the electronic device, and a first maximum transaction value. The second parameters may include a second time range, a pairing of the electronic device to a second apparatus, a second geolocation of the electronic device, and a second maximum transaction value, wherein the second time range does not include the first time range.