Patent application number | Description | Published |
20110106708 | Techniques for temporary access to enterprise networks - Techniques for temporary access to enterprise networks are provided. Devices of customers are detected and authenticated for temporary enterprise network access to a facility of an enterprise when the customers are in a configurable geographic distance to that facility. Temporary access credentials for accessing select resources of the facility or enterprise network are pushed to the processing device upon successful authentication. When one or more terminating actions are detected, the temporary access credentials are revoked and access to the enterprise network ceases. | 05-05-2011 |
20120105197 | TECHNIQUES FOR AUTOMATING RENTAL CAR TRANSACTIONS - A customer uses a wireless portable device to interact with a remote cloud-based car rental service. Details at check in are recorded and the customer is authorized to take possession of the car. At checkout, additional details are noted, a receipt is produced, and the customer leaves the car at the car facility. The check-in and checkout process can be achieved without any car rental attendant. That is, the customer via the wireless portable device and with the assistance of the remote cloud-based car rental service completely achieves check in and checkout for a car rental. | 05-03-2012 |
20120110311 | CUSTOMIZED KIOSK MODES OF OPERATION - Techniques for customized kiosk modes of operation are provided. A kiosk is configured to recognize periods of operation that are slow, moderate, or busy. A number of factors can be used to automatically recognize these periods and change the periods on demand. For each type of period (slow, moderate, or busy), the kiosk uses a different customized mode of operation so as to optimally use the kiosk for the benefit of the kiosk owner, customers interfacing with the kiosk, and marketers selling advertisements via the kiosk. | 05-03-2012 |
20130105575 | SYSTEM AND METHOD OF SECURELY DELIVERING AND VERIFYING A MOBILE BOARDING PASS | 05-02-2013 |
20130110676 | TECHNIQUES FOR CUSTOMER IDENTIFICATION WITH AUTOMATED TRANSACTIONS | 05-02-2013 |
20130110717 | TECHNIQUES FOR VISUALLY CONDUCTING TRANSACTIONS | 05-02-2013 |
20130110727 | TECHNIQUES FOR MOBILE TRANSACTION PROCESSING | 05-02-2013 |
20130110728 | TECHNIQUES FOR AUTOMATED TRANSACTIONS | 05-02-2013 |
20130124411 | TECHNIQUES FOR AUTOMATED TELLER MACHINE (ATM) TRANSACTIONS - Techniques for automated transactions are provided. A customer pre-stages a financial transaction with a financial service. Subsequently, the customer visits an ATM and automatically acquires a code from the ATM that is then sent to a mobile transaction service for verification and to identify the staged financial transaction. The ATM interacts with the customer via the mobile device and interacts with the financial service to complete the transaction for the customer at the ATM. | 05-16-2013 |
20130132234 | TECHNIQUES FOR AUTOMATING A RETAIL TRANSACTION - Techniques for automating a retail transaction are provided. In an embodiment, a customer of a retailer is provided a bill to complete a transaction with the retailer. The bill includes a barcode or a Quick Response (QR) code with details of the bill encoded therein. The customer, using a mobile device, scans the code. The mobile device automatically connects with a mobile transaction service and completes payment details for the customer. The retailer's system is notified that payment was received and the transaction is completed. | 05-23-2013 |
20150039392 | TECHNIQUES FOR RETAIL LOCATION-AWARE SERVICES - Techniques for retail location-aware services are provided. A consumer defines parameters in which it is acceptable to the consumer to receive an offer for a good or service. When the parameters are achievable for an enterprise and when the consumer is in a configured proximity to the desired good or service, the mobile device of the consumer is notified of the offer. | 02-05-2015 |
Patent application number | Description | Published |
20100145807 | DEVICE FOR MANAGEMENT OF PERSONAL DATA - A portable device which stores and transmits personal information relating to a person, to simplify transfer of such information in transactions. The device contains a first database, such as a medical history of a person, which is encrypted. Specific parties, such as medical personnel, are authorized to gain access to the first database, but not other parties. The device de-crypts the first database and transmits the data to the authorized parties. Similar procedures are undertaken with respect to other databases contained within the device. | 06-10-2010 |
20110225032 | APPARATUS, SYSTEM AND METHOD FOR CONTROLLING THE FLOW OF CUSTOMERS - An apparatus, system and method are presented for controlling the flow of customers using self-service terminals. It is possible for self-service terminals to receive and process customer orders faster than the orders can be prepared for delivery to the customer thus causes long wait times for the customer if the condition is allowed to exist for an extended period of time. Controlling the flow of customers through the order entry process prevents the situation. | 09-15-2011 |
20140081677 | Self-Service System and Method for Lodging Establishment Convenience Shops - A self-service system and method for lodging establishment convenience shops to allow a guest to pay for convenience shop items and avoid waiting in line at a front desk. An example method includes obtaining item identification information associated with items selected for purchase by a customer at a convenience shop of the lodging establishment by a self-service terminal, obtaining prices of the items by the self-service terminal, recording customer selection of a charge to room payment option by the self-service terminal, determining whether the customer has registered as a guest of the lodging establishment by the self-service terminal, and charging a total cost of the items to a reservation record by the self-service terminal when the customer has registered. | 03-20-2014 |
20140249939 | TECHNIQUES FOR MOBILE TRANSACTION PROCESSING - Techniques for automated mobile transaction processing are provided. A consumer traverses to a web portal or other type of enterprise terminal device of an enterprise and proceeds to shop. During checkout, the portal contacts a transaction service and is delivered back an identifying barcode or Quick Response (QR) code. The consumer uses a mobile device to scan the code and send it to the transaction service. Previously registered payment details of the consumer are located and payment is received from the consumer. The portal is notified that payment is completed by the transaction service. | 09-04-2014 |
20140250013 | TECHNIQUES FOR MOBILE TRANSACTION PROCESSING - Techniques for automated mobile transaction processing are provided. A consumer traverses to a web portal or other type of enterprise terminal device of an enterprise and proceeds to shop. During checkout, the portal contacts a transaction service and is delivered back an identifying barcode or Quick Response (QR) code. The consumer uses a mobile device to scan the code and send it to the transaction service. Previously registered payment details of the consumer are located and payment is received from the consumer. The portal is notified that payment is completed by the transaction service. | 09-04-2014 |
20140304169 | TECHNIQUES FOR MOBILE TRANSACTION PROCESSING - Techniques for automated mobile transaction processing are provided. A consumer traverses to a web portal or other type of enterprise terminal device of an enterprise and proceeds to shop. During checkout, the portal contacts a transaction service and is delivered back an identifying barcode or Quick Response (QR) code. The consumer uses a mobile device to scan the code and send it to the transaction service. Previously registered payment details of the consumer are located and payment is received from the consumer. The portal is notified that payment is completed by the transaction service. | 10-09-2014 |
Patent application number | Description | Published |
20100162144 | Methods and Apparatus for User Interface Management in Point of Sale Applications - Systems and techniques for managing implementation of user interfaces and related elements of a point of sale application. A stencil is created to define aspects of a user interface to be used with on or more point of sale applications. A user interface defined by the stencil is integrated with a point of sale application model, with integration including establishing bindings between elements defined by the stencil and corresponding elements of the application and importing appropriate specific elements defined by the model to more generalized elements defined by the stencil. An integrated point of sale configuration is loaded to one or more point of sale stations for use in point of sale operations. | 06-24-2010 |
20120109826 | TECHNIQUES FOR CONDUCTING SINGLE OR LIMITED USE PURCHASES VIA A MOBILE DEVICE - A customer uses a mobile device to acquire a mobile app thereon. The mobile device is configured by a cloud-based service to escrow one or more card numbers mapped by a financial facility to the customer's primary account's number. Further security limitations can be configured into the mobile app by the cloud-based service. Subsequently, the customers uses the mobile app at a point-of-sale location to access one or more of the escrowed card numbers to make purchases; these purchases can be made while the mobile device lacks any connectivity to a network. | 05-03-2012 |
20140068248 | Learning a New Peripheral Using a Security Provisioning Manifest - A secure provisioning manifest used to authenticate and securely communicate with peripherals attached to a computer is provided with techniques to learn about a new peripheral not authorized to be attached to the computer and possibly gain authorization for the peripheral. A secure I/O module, that is separate from an operating system and transaction software executed by a processor of the computer, uses the secure provisioning manifest to authenticate and establish a secure encrypted session for communicating with each peripheral authorized to be attached to the computer. When an unauthorized peripheral is found, identifying information for the peripheral is transmitted to an enterprise provisioning server with a request to authorize the peripheral. | 03-06-2014 |
20140188732 | SECURE PROVISIONING MANIFEST FOR CONTROLLING PERIPHERALS ATTACHED TO A COMPUTER - There is provided a secure provisioning manifest used to authenticate and communicate with peripherals attached to a computer. A secure I/O module, that is separate from an operating system and transaction software executed by a processor of the computer, uses the secure provisioning manifest to establish a secure encrypted session for communicating with each peripheral attached to the computer when a peripheral is authenticated and able to establish a secure encrypted session. | 07-03-2014 |
20140241523 | Installable Secret Functions for a Peripheral - There is provided a pluggable secure device identity module (SDIM) attached to a peripheral where the SDIM includes one or more secret functions provided by a third party that are used by the peripheral to provide additional security features or functions that can only be authenticated by the third party. The peripheral is attached to a computer and a secure provisioning manifest is used to authenticate and communicate with the peripheral. The computer includes a processor that executes an operating system and transaction software. A secure I/O module, that has a processor and software that is separate and isolated from the processing environment of the computer, uses the secure provisioning manifest to authenticate the peripheral and then to establish a secure encrypted session for communicating with the peripheral. | 08-28-2014 |
20140281527 | Detecting Fraud Using Operational Parameters for a Peripheral - A secure provisioning manifest used to authenticate and securely communicate with peripherals attached to a computer is provided with techniques to withdraw the authentication and terminate the secure communications with any peripheral when operating parameters for the peripheral indicate that there is a security threat associated with the peripheral. A secure I/O module, that is separate from an operating system and transaction software executed by a processor of the computer, uses the secure provisioning manifest to establish a secure encrypted session for communicating with each peripheral attached to the computer when a peripheral is authenticated and able to establish a secure encrypted session. The secure I/O module uses current and known operating parameters for each peripheral to periodically determine if a peripheral has been compromised by a security threat. | 09-18-2014 |
20140338987 | Checkout Methods and Apparatus - Checkout techniques are described to address fraud reduction and prevention. As an example, a bypass fraud detection process determines when a customer may have attempted to bypass self-checkout security. | 11-20-2014 |
20150029339 | Whole Store Scanner - Video monitoring and tracking techniques are addressed to allow consumers to purchase items in a store with no need to checkout at a traditional checkout lane. A large number of cart check and shelf check cameras monitor additions to carts and removals from shelves along with knowledge of location and what is on a particular shelf are employed to analyze which products are selected for purchase. Customer analytic data, as well as, store inventory data are preferably also developed from the camera image data. | 01-29-2015 |
20150039456 | Method and Apparatus for Detecting Misidentification of Items Sold by Weight - A point of sale terminal that performs purchase transactions is presented. The point of sale terminal includes an optical code scanner and weigh scale device. The optical code scanner portion of the optical code scanner and weigh scale device continuously scans for an optical code while the weigh scale portion of the optical code scanner and weigh scale device weighs an item placed on the scale. When the point of sale terminal receives data for an optical code that is read during the time an item is being weighed, the point of sale terminal compares information from the optical code data to the identification data entered by an operator for the item being weighed. If the item information does not match, the point of sale terminal halts the current purchase transaction until a supervisor intervenes. | 02-05-2015 |