402 patents
Page 9 of 21
Utility
Power management for a computing system
21 Mar 23
The present application describes a power management system for controlling delivery of power to a plurality of processing elements.
Jeremy Wade
Filed: 11 Aug 22
Utility
Cash transaction machine
21 Mar 23
Introduced is a technology for withdrawing cash from a cash transaction machine (CTM) by use of a mobile payment application installed on a mobile device of a consumer user (“the CTM technology”).
Matthew W. Janiga
Filed: 3 Jun 19
Utility
243cnqrdrw9gkrcrmw3dcwzitpx430bwn11dhr
21 Mar 23
A card reader includes a digital connector such as a Universal Serial Bus (USB) plug or an Apple® Lightning® plug.
Mani Razaghi, Joseph Laucks, Jeremy Martin
Filed: 28 Jun 21
Utility
nnywt75zxe7y222v0 d6talqzzknz3ut7de4y57tjsc1lnw
21 Mar 23
Intelligent management of authorization requests are described.
Christina Riechers, Michael Cormier, Zachary Margolis, Kyle Callender, Trevor Luong, Janaiah McClure
Filed: 30 Aug 21
Utility
c5mkmqrux37k78ahwli0bc932u8p22gofxt0qi7d5qfbo07dvd05supjb4
14 Mar 23
In particular embodiments, techniques include generating a user account for a user of a payment service.
Brian Grassadonia
Filed: 15 Nov 21
Utility
kihasx5i88 gynupggif32hwogs
9 Mar 23
In one embodiment, techniques include storing indications of unique identifiers used by users of service providers that are part of a federated system.
Jeremy Mawson
Filed: 12 Nov 21
Utility
4daljcqtukv6zlpl0y548641h
9 Mar 23
Transaction identification is described.
Pritesh Bodalia, Deepkarn Bedi, Christopher Sukovich, Jessica Bullitt
Filed: 15 Nov 22
Utility
xypusubnb1894pr0y uvfruz
9 Mar 23
An appointment and payment handling system may operate to handle payments for appointments based on user locations at times associated with appointments.
Lauren A. Myrick, Evan Ginsburg, Willem Ave
Filed: 14 Nov 22
Utility
x0stouvd biskzi3x27d37h57pfs39v6dj1zbccdqldye334sl8rf772tw
7 Mar 23
A method and apparatus for selecting a financial account associated with a payment object based on fund availability are disclosed.
James Paul Thome, Kartik Lamba, Imran Sana Khan
Filed: 6 Mar 20
Utility
xt6lbbwzsm5sku84o21ttatbzrx0o5qpxms7
2 Mar 23
Described is a technology that enables a customer, who uses a payment card in a point-of-sale (POS) transaction and provides a biometric identifier to the merchant, to use the biometric identifier as a payment mechanism in future transactions.
Brian Grassadonia, Ajit Kalidindi Varma, Mark Jen
Filed: 7 Nov 22
Utility
4x6ud0u65yxed7 xtlb9vyatfolirtb
2 Mar 23
In one aspect, a method includes receiving, from a sender device, a request to initiate a transfer of an asset to a recipient; causing a user interface to be presented on the sender device to receive an input of an amount of the asset to be transferred; causing an indication of the transfer of the asset to be presented via the user interface in association with a graphical icon representing a gift wrapping that conceals at least some information regarding a payload associated with the transfer; associating the graphical icon with the payload to generate a gift-wrapped element that includes the amount and the information regarding the payload; causing a notification to be sent to a recipient device of the recipient that includes the gift wrapped element; and causing assets in the amount to be withdrawn from an account of the sender and transferred to an account of the recipient.
Alan PAULIN, Peter Westen, Shawn Welch, Daniel Federman, Michael Gershunovsky, Ayokunle Omojola
Filed: 21 Oct 22
Utility
42vgg vddecozyh0fkv38tnqk7ztj37coh21svyamjbg3zhbvzyvjl7ptm2
2 Mar 23
Some examples include providing an application for installation on a user device of a user of a payment service, and receiving transaction data associated with transactions of the user.
Taylor Hunt, Xingjie Liu
Filed: 25 Oct 22
Utility
2w4om0qos7x17gy4tuu6
2 Mar 23
Techniques for conducting transaction(s) between a merchant and customer(s) via a multi-device point-of-sale (POS) system is described.
Sara Sanchez-Llorens, Todor Ristov, Elise Hurwitz, Arnaud Ponchon, Evan Doyle, Isreal Blagdan, Christine Lin, Imran Khan
Filed: 9 Nov 22
Utility
n1oxwivdhnfscks1zk1cc1r0ulev657ehz0xz7mp82gn8oe1mw8kp98pnatn
2 Mar 23
Verified transactions through integrations of social network and payment service computing platforms are described.
Disha Patel, Natalie Tarabay, Alexander Leung
Filed: 15 Dec 21
Utility
18ej1p0pb81ut5qwecwbluwtmjf3heb2nzn53s34uzwoa19 jh
2 Mar 23
In one embodiment, a method includes receiving first payment data and a first identifier of a first user, wherein the first payment data is linked to the first identifier and stored in a datastore of the payment service and in association with a first user account of the payment service; receiving, second payment data and a second identifier of a second user, wherein the second payment data is linked to the second identifier and stored in the datastore and in association with a second user account of the payment service; receiving a request for a near-instantaneous transfer of a payment for a transaction between the first user and the second user, the request including the first identifier; and in response to receiving the request, identifying the first user account and the second user account; and causing the near-instantaneous transfer of the payment to a financial account of the first user.
Robert ANDERSEN, Brian GRASSADONIA
Filed: 14 Oct 22
Utility
mo890ytpm42aqdphpw9jqdrj0et6hki z56lnkfyvlrogzy46grxja6otj3
2 Mar 23
Verified transactions through integrations of social network and payment service computing platforms are described.
Disha Patel, Natalie Tarabay, Alexander Leung, Yudi Sun
Filed: 15 Dec 21
Utility
bcqaatjvt1d6jfzycg6 r88lct2o
2 Mar 23
Verified transactions through integrations of social network and payment service computing platforms are described.
Natalie Tarabay, Alexander Leung
Filed: 15 Dec 21
Utility
ihnzk8cuy2hd3d2yjfj8kx agrh
28 Feb 23
This disclosure describes, in part, techniques for validating a money transfer request between a sender and a recipient via challenge questions.
Timothy Yip, Brian Mullins
Filed: 31 Mar 17
Utility
7iskv5ebkqy8wa9h25q6f8i6bx8fgpk 9iqxi7wm3vxtsmxyjy64j
28 Feb 23
Disclosed is a technique for verifying the validity of security certificates received by a mobile device.
Dino Dai Zovi, Eric Monti
Filed: 10 Dec 15
Utility
0vhker3md9 0ibsj45tqohyyzd5kyzv423jvy8em7ad
28 Feb 23
In some examples, a payment processing system receives transaction information of transactions performed by a plurality of merchants.
Adam Jeremy Fern, Andrew Kimball, John Bryan Scott, Brian Boates
Filed: 21 Jan 21