Patent classifications
G06Q20/105
System and Method for Pre-Paid Services
A system and method for payment of services, especially health care services, at fixed prices allows a user to purchase a service card that is accepted by a service provider for full payment of a service. A card manager holds funds from the sale of the card and releases the funds to a service provider when documentation that the service has been provided is received.
Systems, methods, and program products for a digital math-based asset exchange
Systems, methods, and program products for providing exchanges for converting from, to, or between digital assets, and in particular digital math-based assets, such as bitcoins, Namecoins, Litecoins, PPCoins, Tonal bitcoins, IxCoins, Devcoins, Freicoins, I0coins, Terracoins, Liquidcoins, BBQcoins, BitBars, PhenixCoins, Ripple, Dogecoins, Mastercoins, BlackCoins, Ether, Nxt, BitShares-PTS, Quark, Primecoin, Feathercoin, and Peercoin, to name a few, are disclosed. In embodiments, such systems, methods, and program products can further provide or be used in conjunction with automated transactions, digital asset arbitrage systems, and/or kiosk systems for transacting or interacting with digital math-based assets. A kiosk for transacting with digital assets and digital asset exchanges is also disclosed. Systems, methods, and program products for automated transactions and automated digital asset arbitrage transactions are also disclosed.
Method for minimizing financial risk for wireless services
A method and system for managing financial risk through the use of postpaid processing during use of wireless services is presented within the scope of the following invention. The present invention uses credit card authorization to pre-reserve credit card funds for wireless services in excess of planned usage. Authorizations eliminate the credit risk associated with overages and payment timing, and also maintain a customer experience identical to postpaid processing. The authorizations are invisible to the customer and no charge is brought to a customer's credit card until the monthly bill is settled. Separating the authorization and settlement stages of retail wireless payment processing allows the branded wireless provider to avoid inherent areas of credit risk during the tenure of a customer's wireless service, while maintaining a familiar customer experience.
Automated digital method and system of providing or sharing access
Advantageously, the invention is a competitor to money transfer systems. Conventional digital transactions facilitate electronic payment, such as money transfers, payment card charges, e-commerce transactions and other types of transactions. However, payees may be unbanked people (e.g., children) or people with no payment card (e.g., may have lost card), and payment card fund transfers may be expensive, time consuming, and cumbersome for financial institutions. Thus, there is need for an improved approach. The invention discloses an automated digital method of providing or sharing access to a payment card and/or similar financial account or non-card product, transactions between individuals or legal entities without physical transmission of a payment card, non-card product or its credentials, even without a recipient of an access having a payment card and/or financial account or non-card product, particularly by providing or sharing access to a payment card and/or similar financial account or non-card product of a sender.
Transaction device, computer program and transaction method
A transaction device is described. The device comprises storage configured to store a first data record comprising first value data and a unique identifier associated with one other device; communications circuitry configured to receive an identifier and second value data from a device; and control circuitry configured to compare the received identifier with the unique identifier and in the event of a positive comparison, the control circuitry is further configured to update the stored first value data in accordance with the exchanged second value data.
Distributed database methods and systems
Data representing ownership of a traditional asset of a first party having a predefined monetary value stored at a first party network node is replicated to a plurality of other party network nodes, including a second party network node, communicably coupled to the first party network node and to one another. Entry of data is received at the first party network node that represents a partition by the first party of the asset of the first party on a non-value axis into at least two non-overlapping assets and a transfer of ownership of one of those two assets to the second party. The data representing the partition of the non-value axis and transfer of ownership of one of the two non-overlapping assets to the second party is replicated to the plurality of other party nodes, including the second party network node.
AUTONOMOUS TRANSPORT VEHICLE CHARGING SYSTEM
A charging system for autonomous transport vehicles including at least one charging contact disposed on each pick floor level of a storage and retrieval system, each of the at least one charging contact being located at a transfer station, at least one power supply configured to supply power to the at least one charging contact, and a controller in communication with the transfer station and being configured to communicate information relating to a transfer of items between the transfer station and a predetermined one of the autonomous transport vehicles and to apply power from the power supply to the at least one charging contact for charging the predetermined autonomous transport vehicle corresponding to the transfer and located at the transfer station, wherein the controller is configured to supply power to the charging contacts simultaneously with the predetermined autonomous transport vehicle exchanging items related to the transfer at the transfer station.
METHOD FOR AUTHENTICATING FINANCIAL INSTRUMENTS AND FINANCIAL TRANSACTION REQUESTS
A method for authenticating a check of a plurality of checks where the check was previously issued from a first party to a second party, including receiving first information from the first party, storing the first information in a file of a third party and receiving the check. The check has first party identifying information, a unique pseudorandom number of a pseudorandom sequence, and an amount. A status of activating the plurality of checks is determined. At least a portion of the first party identifying information included with the check, the unique pseudorandom number included with the check and the check amount included with the check are authenticated. The received check is authenticated if the first party, the unique pseudorandom number included with the check and the amount included with the check are authenticated and if the plurality of checks have been activated.
DUPLICATED WIRELESS TRANSCEIVERS ASSOCIATED WITH A VEHICLE TO RECEIVE AND SEND SENSITIVE INFORMATION
A vehicle is provided that comprises two or more radio frequency (RF) antennas and two or more RF transceivers to communicate wirelessly sensitive information associated with a user of the vehicle (the two or more RF antennas being at different physical locations on an exterior of the vehicle). The vehicle determines which one of the two or more RF antennas is receiving a strongest signal from a common signal source, selects a first RF transceiver associated with the RF antenna with the strongest signal to send the sensitive information associated with the user to the common signal source, and sends the sensitive information associated with the user to the first RF transceiver for transmission to the common signal source.
CONSUMER AUTHENTICATION SYSTEM AND METHOD
A method for authenticating a consumer. The method includes receiving an authorization request message associated with a consumer conducting a transaction with a portable consumer device. A challenge message is sent to the consumer, where the challenge message is dynamic or semi-dynamic. A challenge response message is received from the consumer, and an authorization response message is sent to the consumer. The authorization response message indicates whether or not the transaction is authorized.