G06Q20/0855

System and method for conducting secure financial transactions
20230052197 · 2023-02-16 ·

A system and method to conduct secure electronic financial transactions are provided. The method includes receiving a request, from a user, to perform a transaction with a merchant; generating a virtual check comprising a checking account number, a bank routing number, and a date; displaying the virtual check on at least one of a display of an electronic device of a user or the merchant; receiving input from the user corresponding to at least one of a plurality of check fields; receiving a virtual signature from the user; encrypting the virtual signature; storing the encrypted virtual signature in a database; decrypting and embedding, in the image of the virtual check, the virtual signature received from the user; populating the virtual check based on the received input and depositing the virtual check.

Reduced friction for merchant interactions
11580514 · 2023-02-14 · ·

Improvements to existing technologies associated with point-of-sale transactions and merchant ecosystems to, among other things, reduce in-person contact and, in some examples, improve the efficiency at which point-of-sale transactions are completed (i.e., reduce friction) are described. In some examples, such reduced in-person contact and/or improved efficiencies can limit transmission of infectious diseases. As such, techniques described are directed to modifying aspects of point-of-sale transactions such that they occur on different computing devices (e.g., customer computing devices instead of merchant computing devices), are automated, and/or occur at different times than with conventional point-of-sale transactions. Furthermore, in at least one example, techniques described can leverage a distributed, network-based merchant ecosystem—comprising multiple merchant computing devices and/or customer computing devices that are specially configured to communicate with a service provider—to facilitate social distancing, which can reduce in-person contact and, in some examples, improve the efficiency at which point-of-sale transactions are completed.

Transparent crowd sourcing for projects
11580538 · 2023-02-14 · ·

Methods and systems are provided for crowdsourced funding via a blockchain system. A token contract, associated with a token issuer, is generated on a blockchain system. Tokens are issued to a plurality of token holders. Each of the plurality of token holders is allowed access to a feedback mechanism associated with the token issuer. A performance of the token issuer in an associated field is monitored to provide at least one performance metric. A dividend is paid to each token holder proportional to a number of tokens held by the token holder after a predetermined amount of time based on the at least one performance metric.

Transaction-enabled systems and methods for royalty apportionment and stacking

Transaction-enabled systems and methods for royalty apportionment and stacking are disclosed. An example system may include a plurality of royalty generating elements (a royalty stack) each related to a corresponding one or more of a plurality of intellectual property (IP) assets (an aggregate stack of IP). The system may further include a royalty apportionment wrapper to interpret IP licensing terms and apportion royalties to a plurality of owning entities corresponding to the aggregate stack of IP in response to the IP licensing terms and a smart contract wrapper. The smart contract wrapper is configured to access a distributed ledger, interpret an IP description value and IP addition request, to add an IP asset to the aggregate stack of IP, and to adjust the royalty stack.

Method of improving efficiency of arena concessions
11556972 · 2023-01-17 ·

A computer software application (APP) is programmed into a smartphone. The smartphone allows a user to access various concessions and facilitate ordering items such as food, beverages, souvenirs, and memorabilia. The APP allows the user to input their seat location so the vendor can locate the user to deliver what has been ordered. The APP includes information concerning the user. The concessionaires all have a communication device allowing them to receive orders from users and to fulfill them.

DYNAMIC THIRD-PARTY INCENTIVIZATION OF SAVINGS BEHAVIOR
20230044515 · 2023-02-09 ·

Disclosed herein are system, method, and computer program product embodiments for third-party sponsorship of incentives to beneficiaries via secure and continuous data retrieval across several sources of record. These sources of record may have multiple data layers across different servers and regulatory coverages. To incentivize beneficiaries to create mutually acceptable outcomes for both beneficiaries and sponsors, criteria with varying levels of detail may be established for the apportionment of incentives. To qualify beneficiaries, a multi-tier processor may retrieve securely from various internal and external data sources, confirm, qualify, quantify, and issue actions that result in the transfer of incentive from a sponsoring entity's account to an end beneficiary account. To enable such a processor to run across multiple sponsors and associated beneficiaries, the data architecture and retrieval process may provide incentive apportionment with full accuracy and scalability while segregating data storage and processing to achieve better security and privacy.

Illicit proceeds tracking system

A computerized method produces an identity code to identify each subject stored in the computer systems connected to a computer network while protecting the privacy and confidentiality of the subject. A central computer system receives an identity code of a suspect of a financial crime and sends the identity code to all computer systems connected to the computer network. The computer systems that have the matched identity code send the requested information to the central computer system. As a result, law enforcement organizations can eliminate crimes and financial institutions can recover the money stolen from them. In addition, law enforcement organizations and financial institutions can identify money launderers that are missed by their anti-money laundering transactional monitoring systems.

System and method for inserting data into an internet browser form

Systems, methods, and computer-readable storage media for inserting payment information into payment forms without user interaction. A system can identify that a user has navigated to a web page operated by a merchant computer system for a merchant and identify a payment form within the web page. The system can then execute a payment request API which generates a query for saved payment credentials for the user from the merchant computer system. When the merchant computer system indicates it does not have the saved payment credentials for the user, the system can identify browser-saved payment credentials stored in the Internet browser, then generate a virtual payment information associated with the browser-saved payment credentials. The virtual payment information can then be inserted into corresponding fields of the payment form without the user entering any additional information.

INFORMATION PROCESSING SYSTEM AND METHOD, AND INFORMATION PROCESSING DEVICE AND METHOD
20180004987 · 2018-01-04 ·

The present technology relates to information processing system and method, and information processing device and method for realizing a system capable of increasing efficiency while reducing load concentration. Each of the information processing system and method and the information processing device and method according to an aspect of the present technology belongs to one or more center servers. One or more gate controllers different from each other are allocated. Acquired is user data that relates to data about a user corresponding to identification data, and is supplied on the basis of prediction data corresponding to the identification data. Acquired is the identification data that is read from a storage device storing the identification data, and is supplied from the gate controller allocated to the corresponding system, method or device. The acquired user data that corresponds to the acquired identification data is processed. For example, the present technology is applicable to an information processing device or an information processing system.

Autonomous communication feature use and insurance pricing

Methods and systems for determining risk associated with operation of autonomous vehicles using autonomous communication are provided. According to certain aspects, autonomous operation features associated with a vehicle may be determined, including features associated with autonomous communication between vehicles or with infrastructure. This information may be used to determine risk levels for a plurality of features, which may be based upon test data regarding the features or actual loss data. Expected use levels and autonomous communication levels may further be determined and used with the risk levels to determine a total risk level associated with operation of the vehicle. The autonomous communication levels may indicate the types of communications, the levels of communication with other vehicles or infrastructure, or the frequency of autonomous communication. The total risk level may be used to determine or adjust aspects of an insurance policy associated with the vehicle.