Patent application number | Description | Published |
20100162144 | Methods and Apparatus for User Interface Management in Point of Sale Applications - Systems and techniques for managing implementation of user interfaces and related elements of a point of sale application. A stencil is created to define aspects of a user interface to be used with on or more point of sale applications. A user interface defined by the stencil is integrated with a point of sale application model, with integration including establishing bindings between elements defined by the stencil and corresponding elements of the application and importing appropriate specific elements defined by the model to more generalized elements defined by the stencil. An integrated point of sale configuration is loaded to one or more point of sale stations for use in point of sale operations. | 06-24-2010 |
20120109826 | TECHNIQUES FOR CONDUCTING SINGLE OR LIMITED USE PURCHASES VIA A MOBILE DEVICE - A customer uses a mobile device to acquire a mobile app thereon. The mobile device is configured by a cloud-based service to escrow one or more card numbers mapped by a financial facility to the customer's primary account's number. Further security limitations can be configured into the mobile app by the cloud-based service. Subsequently, the customers uses the mobile app at a point-of-sale location to access one or more of the escrowed card numbers to make purchases; these purchases can be made while the mobile device lacks any connectivity to a network. | 05-03-2012 |
20140068248 | Learning a New Peripheral Using a Security Provisioning Manifest - A secure provisioning manifest used to authenticate and securely communicate with peripherals attached to a computer is provided with techniques to learn about a new peripheral not authorized to be attached to the computer and possibly gain authorization for the peripheral. A secure I/O module, that is separate from an operating system and transaction software executed by a processor of the computer, uses the secure provisioning manifest to authenticate and establish a secure encrypted session for communicating with each peripheral authorized to be attached to the computer. When an unauthorized peripheral is found, identifying information for the peripheral is transmitted to an enterprise provisioning server with a request to authorize the peripheral. | 03-06-2014 |
20140188732 | SECURE PROVISIONING MANIFEST FOR CONTROLLING PERIPHERALS ATTACHED TO A COMPUTER - There is provided a secure provisioning manifest used to authenticate and communicate with peripherals attached to a computer. A secure I/O module, that is separate from an operating system and transaction software executed by a processor of the computer, uses the secure provisioning manifest to establish a secure encrypted session for communicating with each peripheral attached to the computer when a peripheral is authenticated and able to establish a secure encrypted session. | 07-03-2014 |
20140241523 | Installable Secret Functions for a Peripheral - There is provided a pluggable secure device identity module (SDIM) attached to a peripheral where the SDIM includes one or more secret functions provided by a third party that are used by the peripheral to provide additional security features or functions that can only be authenticated by the third party. The peripheral is attached to a computer and a secure provisioning manifest is used to authenticate and communicate with the peripheral. The computer includes a processor that executes an operating system and transaction software. A secure I/O module, that has a processor and software that is separate and isolated from the processing environment of the computer, uses the secure provisioning manifest to authenticate the peripheral and then to establish a secure encrypted session for communicating with the peripheral. | 08-28-2014 |
20140281527 | Detecting Fraud Using Operational Parameters for a Peripheral - A secure provisioning manifest used to authenticate and securely communicate with peripherals attached to a computer is provided with techniques to withdraw the authentication and terminate the secure communications with any peripheral when operating parameters for the peripheral indicate that there is a security threat associated with the peripheral. A secure I/O module, that is separate from an operating system and transaction software executed by a processor of the computer, uses the secure provisioning manifest to establish a secure encrypted session for communicating with each peripheral attached to the computer when a peripheral is authenticated and able to establish a secure encrypted session. The secure I/O module uses current and known operating parameters for each peripheral to periodically determine if a peripheral has been compromised by a security threat. | 09-18-2014 |
20140338987 | Checkout Methods and Apparatus - Checkout techniques are described to address fraud reduction and prevention. As an example, a bypass fraud detection process determines when a customer may have attempted to bypass self-checkout security. | 11-20-2014 |
20150029339 | Whole Store Scanner - Video monitoring and tracking techniques are addressed to allow consumers to purchase items in a store with no need to checkout at a traditional checkout lane. A large number of cart check and shelf check cameras monitor additions to carts and removals from shelves along with knowledge of location and what is on a particular shelf are employed to analyze which products are selected for purchase. Customer analytic data, as well as, store inventory data are preferably also developed from the camera image data. | 01-29-2015 |
20150039456 | Method and Apparatus for Detecting Misidentification of Items Sold by Weight - A point of sale terminal that performs purchase transactions is presented. The point of sale terminal includes an optical code scanner and weigh scale device. The optical code scanner portion of the optical code scanner and weigh scale device continuously scans for an optical code while the weigh scale portion of the optical code scanner and weigh scale device weighs an item placed on the scale. When the point of sale terminal receives data for an optical code that is read during the time an item is being weighed, the point of sale terminal compares information from the optical code data to the identification data entered by an operator for the item being weighed. If the item information does not match, the point of sale terminal halts the current purchase transaction until a supervisor intervenes. | 02-05-2015 |