G06Q30/00

System, method, and computer program for providing similar product recommendations for non-merchant publishers based on publisher preferences

The present disclosure relates to a system, method, and computer program for automatically providing similar product recommendations for sold-out products promoted on non-merchant publisher sites, wherein the similar product recommendations are filtered for publisher preferences. A computer system with a product database provides a platform that enables non-merchant publishers to search products in the database, create call-to-actions on publisher sites for products in the database, and automatically receive similar product recommendations when end users of the publisher sites attempt to purchase promoted products that are now sold out. Once a publisher creates a call-to-action for a product that subsequently becomes sold out, similar product recommendations are provided without requiring any action on the publisher's part to change the publisher's site. Similar product recommendations are tailored to each publisher to account for publisher preferences. Publisher preferences may be learned by the system based on publisher behavior or inputted by each publisher.

Systems and methods for listing an item
11568471 · 2023-01-31 · ·

Pursuant to some embodiments, systems, methods, apparatus and computer program code are provided to create a listing data record which include analyzing an item data record to identify item details, a user, and at least a first listing rule, determining that a degree of demand for the item exceeds a threshold, determining that the at least first listing rule is satisfied, and converting the item data record into a listing data record allowing the listing record to be viewed by a plurality of users interested in the item. The item details may be obtained from a point of sale device or a user device operated by the user.

Native-feature silent coercion alarm

Apparatus and methods for providing protection from economic exploitation. The apparatus and methods may include a platform for tagging a social security number and/or other suitable identification number. The system may allow a person associated with a social security number to automatically flag and deny any product or service request associated with the social security number. The alarms are “silent,” because the alarm may initiate an institution internal process in which the customer interaction with the institution follows a normal diligence process until an intervention can be effectively executed on behalf of the customer. This reduces the likelihood of a reaction from the customer's associate prior to completing the diligence process. A system may provide the customer with an opportunity to electronically activate an alarm by typing keystrokes on a card reader keypad or interacting with a physical sensor on the reader, on the card, or the like.

Payment systems and methods for in-store and online purchases
11568409 · 2023-01-31 ·

Systems and methods for implementing payments or mobile payments. In an aspect of in-store purchase, a merchant sends a payment amount and merchant account info to transaction center. A buyer sends a code and buyer account info to transaction center. The code represents the merchant. In an aspect of online purchase, an e-commerce merchant provides options for a buyer to use names other than a first name plus a surname. In one embodiment, a buyer submits a shortened name or nickname for online purchases when a given payment service is used as a payment method.

Filtering cross reads among radio frequency identification (RFID) enabled readers and systems and methods for use thereof

Radio frequency identification (RFID) enabled readers and systems and methods for filtering cross reads of RFID tags and use thereof. The systems and methods may be configured to operate with mobile and/or fixed RFID readers. The systems and methods may provide for claim based filtering of cross reads based upon adjusting operating powers of RFID readers and/or antenna. The systems and methods may also be configured to apply weights to claims thereby providing efficient and/or accurate filtering of cross reads. The systems and methods may also provide for a database that may also be presented to a user to illustrate locations of inventory at any point in time or over a period of time, or to facilitate the ability of a user to physically locate inventory to be acted upon.

Pre-data breach monitoring

A method for providing pre-data breach monitoring provides information to businesses that is useful to predict portions of the company data that may not be secured well enough and other risks associated with data breaches, such as employees that may not be trustworthy.

Systems and methods for automatically populating ecommerce cart
11715148 · 2023-08-01 · ·

A method for automatically populating an ecommerce cart is disclosed. The method includes receiving a request to add a product item to a shopping cart of an ecommerce shopping environment. The method includes adding the product item to the shopping cart. The method includes updating, responsive to adding the product item, a shopping cart status. The method includes determining a failure of the shopping cart status to satisfy a purchasing criteria associated with the ecommerce shopping environment. The method includes selecting, responsive to determining the failure, an additional product item based on information associated with an user account. The method includes adding the additional product item to the shopping cart.

Computer-based systems configured to detect fraudulent activities related to card-transacting devices and methods of use thereof
11568349 · 2023-01-31 ·

Systems and methods of detecting fraudulent activity including skimmers adapted to compromise transacting devices such as automated teller machines (ATMs) are disclosed. In one embodiment, an exemplary computer-implemented method may comprise determining that a subject device has a risk level higher than a risk threshold, providing a push notification to a mobile device proximal to the subject device, executing a software application executed by the mobile device for gathering information and transmitting feedback regarding the subject device, and providing an incentive, upon receipt of the feedback, to, for example, an account or device associated with an individual involved with the feedback or interaction with the device.

Systems and methods for customized electronic communications

The present disclosure relates to systems and methods customizing electronic communications. A future event associated with a first user may be determined, and a second user that is associated with the first user may be identified. A plurality of communications involving the first user and the second user may be analyzed. A selection rule may be applied based on the analyzed plurality of communications, the selection rule identifying content from the database. Content from the database may be selected based on the application of the selection rule. An electronic message may be provided to the first user identifying the future event, and the selected content may be provided to the first user.

Systems and methods for customized electronic communications

The present disclosure relates to systems and methods customizing electronic communications. A future event associated with a first user may be determined, and a second user that is associated with the first user may be identified. A plurality of communications involving the first user and the second user may be analyzed. A selection rule may be applied based on the analyzed plurality of communications, the selection rule identifying content from the database. Content from the database may be selected based on the application of the selection rule. An electronic message may be provided to the first user identifying the future event, and the selected content may be provided to the first user.