摘要:
Various embodiments herein each include at least one of systems, methods, data structures, and software for document image processing within a device such as a retail scanner. One such embodiment, in the form of a method, includes receiving a document image from an imaging device of a scanner and determining a type of the document represented in the document image. The document image may then be processed to obtain document metadata and the document image and metadata representative of the document metadata and document type are added to a data structure. This method may further include adding transaction-related metadata to the data structure. The data structure may then be stored on the scanner, transmitted via local communications link to a host device, transmitted via a network to a database for storage, or transmitted via a network to another system for one or both of processing and storage.
摘要:
Various embodiments herein each include at least one of systems, methods, data structures, and software for document image processing within a device such as a retail scanner. One such embodiment, in the form of a method, includes receiving a document image from an imaging device of a scanner and determining a type of the document represented in the document image. The document image may then be processed to obtain document metadata and the document image and metadata representative of the document metadata and document type are added to a data structure. This method may further include adding transaction-related metadata to the data structure. The data structure may then be stored on the scanner, transmitted via local communications link to a host device, transmitted via a network to a database for storage, or transmitted via a network to another system for one or both of processing and storage.
摘要:
Techniques for temporary access to enterprise networks are provided. Devices of customers are detected and authenticated for temporary enterprise network access to a facility of an enterprise when the customers are in a configurable geographic distance to that facility. Temporary access credentials for accessing select resources of the facility or enterprise network are pushed to the processing device upon successful authentication. When one or more terminating actions are detected, the temporary access credentials are revoked and access to the enterprise network ceases.
摘要:
Techniques for temporary access to enterprise networks are provided. Devices of customers are detected and authenticated for temporary enterprise network access to a facility of an enterprise when the customers are in a configurable geographic distance to that facility. Temporary access credentials for accessing select resources of the facility or enterprise network are pushed to the processing device upon successful authentication. When one or more terminating actions are detected, the temporary access credentials are revoked and access to the enterprise network ceases.
摘要:
Techniques for automated transactions are provided. A customer pre-stages a financial transaction with a financial service. Subsequently, the customer visits an ATM and automatically acquires a code from the ATM that is then sent to a mobile transaction service for verification and to identify the staged financial transaction. The ATM interacts with the customer via the mobile device and interacts with the financial service to complete the transaction for the customer at the ATM.
摘要:
Data is automatically collected; the data relevant to user attributes. That data is provided as factors for passive authenticating the user for access to a device and/or a resource. In an embodiment, the data is used to establish a profile or a pattern for the user.
摘要:
Techniques for automated transactions are provided. A customer uses a mobile device to interact with a self-service checkout device (SSCO) to perform a transaction. Initially, a unique barcode for the transaction is generated and displayed to the customer, via an attract screen of the SSCO. The mobile device scans the barcode (can be a QR code); this causes the mobile device to communicate with a remote server that identifies the customer. Preferences for the customer are retrieved and the transaction and features of the SSCO are configured based on the preferences. The transaction proceeds with the configured preferences.
摘要:
Sensors provide sensor data continuously from a device. The sensor data is continuously processed as factors to generate a confidence value for authentication. The confidence value is compared to a predetermined threshold value or predetermined range of values to determine whether a user is to be authenticated for access to one or more of: a device, a resource, and a transaction operation for a transaction.
摘要:
Techniques for automated transactions are provided. A customer uses a mobile device to interact with a self-service checkout device (SSCO) to perform a transaction. Initially, a unique barcode for the transaction is generated and displayed to the customer, via an attract screen of the SSCO. The mobile device scans the barcode (can be a QR code); this causes the mobile device to communicate with a remote server that identifies the customer. Preferences for the customer are retrieved and the transaction and features of the SSCO are configured based on the preferences. The transaction proceeds with the configured preferences.
摘要:
A system and method of securely delivering and verifying a mobile boarding pass which validates the mobile boarding pass. An example method includes receiving boarding pass data for a traveler, creating a digital certificate containing the boarding pass data, encrypting the digital certificate, encoding a series of different encrypted digital certificates into a series of different two-dimensional barcodes, providing the series of different two-dimensional barcodes to a mobile communication device of the traveler in advance of arrival at a security checkpoint, receiving decoded barcode data in one or more of the two-dimensional barcodes from a barcode reader at the security checkpoint, decrypting the decoded barcode data using the plurality of different tokens, and identifying a valid digital certificate containing boarding pass data in the decoded barcode data.