215 patents
Page 5 of 11
Utility
Embedded card reader security
2 May 23
Techniques described herein are directed to embedded card reader security.
Murat Cat, Murtaza Munaim, Gokhan Aydeniz, Conrad Rushing
Filed: 23 Feb 21
Utility
Geographically targeted, time-based promotions
2 May 23
Technology is disclosed for facilitating and processing cross-merchant promotions.
Zachary Brock, John Ryan Crepezzi, Bruce Bell
Filed: 29 May 20
Utility
Artificial intelligence based service recommendation
2 May 23
In one aspect, a method includes receiving merchant profile data describing attributes of merchants; generating, using one or more machine-trained models and the merchant profile data, a respective first profile for each merchant of the merchants; generating, using the one or more machine-trained models, a respective second profile for each of the plurality of merchant services using at least one type of description for each of the plurality of merchant services, wherein the respective first profile for each merchant and the respective second profile for each of the plurality of merchant services are numerically comparable; identifying a list of merchant service recommendations for at least one of the merchants using generated first profiles and second profiles; and configuring a merchant computing device of the at least one merchant with at least one merchant service selected by the merchant from the list of merchant service recommendations.
Stephane Fotso, Zaki Ali
Filed: 8 Jun 21
Utility
Data structure analytics for real-time recommendations
25 Apr 23
Techniques and arrangements for analyzing previous tickets of a customer at different merchants—specifying interactions of the customer at the different merchants—to determine subsequent recommendations to send to a particular merchant in real-time when the customer is located at the particular merchant.
Mathew Wilson, Derrick Huhn, Jonathan Andrew Wolter, Ryder Moody, Dan Simms
Filed: 31 Aug 20
Utility
Context-aware peer-to-peer transfers of items
25 Apr 23
In one embodiment, techniques include systems and methods for facilitating context-aware peer-to-peer transfers of items utilizing at least one of short-range wireless technologies embodied by user devices or device-accessible contact lists.
Aaron Y. Ng, Ayokunle Omojola, Jesse Wilson
Filed: 27 Oct 21
Utility
Encapsulation of payment accounts with nested tokens
25 Apr 23
A method for encapsulating transaction instrument information in a transaction includes storing, in association with a first transaction and by a processor of the primary transaction processor server, payment data associated with a payment instrument used to settle a cost of a first transaction.
Dennis Jarosch, Gillian May Lian Wee, Paul Abraham Botros, Michael Ward, Anusha Ramanujam, Julian Hua
Filed: 27 Sep 18
Utility
Lending products with different repayment mechanisms
18 Apr 23
Techniques described herein are directed to lending products with different repayment mechanisms.
Theodore Wenjung Mao, Jacquelyn Brosamer, Joshua Schwarzapel, Taylor Hunt
Filed: 2 Jul 20
Utility
Server-based order persistence and/or fulfillment
28 Mar 23
Sever-based order persistence and/or fulfillment is described herein.
Christopher Woodyard, Brad Seiler, Roshan Jhunja, Noah Batterson
Filed: 26 Apr 21
Utility
Power management for a computing system
21 Mar 23
The present application describes a power management system for controlling delivery of power to a plurality of processing elements.
Jeremy Wade
Filed: 11 Aug 22
Utility
Cash transaction machine
21 Mar 23
Introduced is a technology for withdrawing cash from a cash transaction machine (CTM) by use of a mobile payment application installed on a mobile device of a consumer user (“the CTM technology”).
Matthew W. Janiga
Filed: 3 Jun 19
Utility
Transaction object reader with analog and digital signal interface
21 Mar 23
A card reader includes a digital connector such as a Universal Serial Bus (USB) plug or an Apple® Lightning® plug.
Mani Razaghi, Joseph Laucks, Jeremy Martin
Filed: 28 Jun 21
Utility
Intelligent management of authorization requests
21 Mar 23
Intelligent management of authorization requests are described.
Christina Riechers, Michael Cormier, Zachary Margolis, Kyle Callender, Trevor Luong, Janaiah McClure
Filed: 30 Aug 21
Utility
Physical, logical separation of balances of funds
14 Mar 23
In particular embodiments, techniques include generating a user account for a user of a payment service.
Brian Grassadonia
Filed: 15 Nov 21
Utility
Selection of a financial account associated with a proxy object
7 Mar 23
A method and apparatus for selecting a financial account associated with a payment object based on fund availability are disclosed.
James Paul Thome, Kartik Lamba, Imran Sana Khan
Filed: 6 Mar 20
Utility
Payment transaction authentication system and method
28 Feb 23
This disclosure describes, in part, techniques for validating a money transfer request between a sender and a recipient via challenge questions.
Timothy Yip, Brian Mullins
Filed: 31 Mar 17
Utility
Creation and validation of a secure list of security certificates
28 Feb 23
Disclosed is a technique for verifying the validity of security certificates received by a mobile device.
Dino Dai Zovi, Eric Monti
Filed: 10 Dec 15
Utility
Machine learning for determining an API communication
28 Feb 23
In some examples, a payment processing system receives transaction information of transactions performed by a plurality of merchants.
Adam Jeremy Fern, Andrew Kimball, John Bryan Scott, Brian Boates
Filed: 21 Jan 21
Utility
Gift card management
21 Feb 23
This disclosure describes, in part, techniques for collecting item preferences of users at a centralized location and propagating these item preferences to users and merchants in an intelligent manner In some instances, the centralized location is a payment service that functions to both authorize payment instruments of users for costs of transactions conducted at the merchant, and collect and propagate the item preferences to the merchants and the users.
Daniel Hipschman, James F. Butts, III
Filed: 24 Aug 20
Utility
Using data analysis to connect merchants
21 Feb 23
Techniques and arrangements for performing data analysis in order to generate connections between merchants.
Ramy Bebawy, Philip Zigoris, Yongxue Qi, Yu-Shan Fung, Riley Crane
Filed: 7 Aug 20
Utility
Wireless beacon shopping experience
21 Feb 23
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for using wireless beacons to manage shopping lists.
Shuvo Chatterjee, Rishi Garg
Filed: 14 Dec 18