Patent classifications
G07F17/14
EVENT DRIVEN SECOND FACTOR CREDENTIAL AUTHENTICATION
A reader configured to perform dual-factor authentication is provided. The reader is configured to analyze credential data as well as event-based user inputs. The event-based user inputs are received in response to the reader presenting one or more events to a user and monitoring the user's reaction thereto. Utilization of an event-based user input enables the reader to perform dual-factor authentication without necessarily being provided with a keyboard or other advanced user input device.
EVENT DRIVEN SECOND FACTOR CREDENTIAL AUTHENTICATION
A reader configured to perform dual-factor authentication is provided. The reader is configured to analyze credential data as well as event-based user inputs. The event-based user inputs are received in response to the reader presenting one or more events to a user and monitoring the user's reaction thereto. Utilization of an event-based user input enables the reader to perform dual-factor authentication without necessarily being provided with a keyboard or other advanced user input device.
DEVICES, SYSTEMS, APPARATUSES, AND METHODS FOR SMART CAM LOCKS AND KEY LOCK BOXES
The present disclosure generally relates to providing electronic locking systems. Using novel designs and network technology, the present systems, methods, and apparatuses can provide a secure alternative to a cam lock or a lock box for storing items that may be left unattended, without the use of a physical key. For example, in certain embodiments, the present systems, methods, and apparatuses can facilitate the locking and unlocking of a cam lock or a lock box by using a digital construct, an encryption system, and various native and/or third-party software components.
INVENTORY MANAGEMENT SYSTEM AND METHOD OF USE
Provided is a computer-implemented method for product management The method can include obtaining user Identification information from a user, wherein the identification code is associated with a financial account, of the user; validating, by a processor, that the identification information is authentic based on registration information that was previously received; providing first access signal to a locking mechanism of a locking enclosure to unlock the locking mechanism based on the validating, wherein the locking enclosure securely stores a purchasable product; obtaining product identification information from a scan of a bar code associated with the product providing the product information that was obtained to be rendered on a display; receiving an indication from the user that the product information is correct; and providing a second access signal to the locking mechanism to lock the locking mechanism based on the indication that was received.
INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM
An information processing apparatus includes a processor configured to execute a process of renting a place where a business is conducted as a place used for purposes other than the business, in a case where a specific condition is satisfied.
Event driven second factor credential authentication
A reader configured to perform dual-factor authentication is provided. The reader is configured to analyze credential data as well as event-based user inputs. The event-based user inputs are received in response to the reader presenting one or more events to a user and monitoring the user's reaction thereto. Utilization of an event-based user input enables the reader to perform dual-factor authentication without necessarily being provided with a keyboard or other advanced user input device.
Event driven second factor credential authentication
A reader configured to perform dual-factor authentication is provided. The reader is configured to analyze credential data as well as event-based user inputs. The event-based user inputs are received in response to the reader presenting one or more events to a user and monitoring the user's reaction thereto. Utilization of an event-based user input enables the reader to perform dual-factor authentication without necessarily being provided with a keyboard or other advanced user input device.
METHOD AND SYSTEM FOR AUTHORIZING ACCESS TO GOODS AND/OR SERVICES AT A POINT OF SALE AND CORRESPONDING POINT OF SALE
A system and method for authorizing access to goods and/or services at a point of sale is disclosed. An access voucher may be issued and presented to a reading means of the point of sale. At least one good and/or service of the point of sale can be selected by the user and the corresponding identification can be transferred to the internal processing unit. A comparison can be performed. If the transferred identification of the user matches an identification of the user, and if the transferred identification of the goods and/services matches an identification of the goods/and services, the user profile data and the access parameter can be retrieved. An authorization can be transferred to the point of sale if the user profile data correspond to the access parameter for the goods and/or services.
METHOD AND SYSTEM FOR AUTHORIZING ACCESS TO GOODS AND/OR SERVICES AT A POINT OF SALE AND CORRESPONDING POINT OF SALE
A system and method for authorizing access to goods and/or services at a point of sale is disclosed. An access voucher may be issued and presented to a reading means of the point of sale. At least one good and/or service of the point of sale can be selected by the user and the corresponding identification can be transferred to the internal processing unit. A comparison can be performed. If the transferred identification of the user matches an identification of the user, and if the transferred identification of the goods and/services matches an identification of the goods/and services, the user profile data and the access parameter can be retrieved. An authorization can be transferred to the point of sale if the user profile data correspond to the access parameter for the goods and/or services.
Method and System of Access Management Using a Payment Transaction
The present disclosure relates to a method and system of access management using a payment transaction. The computer-implemented method includes receiving a payment transaction request and one or more details associated with a lock. Further, the method includes providing one of a success message or a failure message to an access management system to operate the lock based on a result of authorization of the payment transaction request and a result of a validation of the one or more details.