Patent classifications
G06Q20/29
SYSTEMS, METHODS, AND MEDIA FOR PAY-PER-ACCESS MICROPAYMENT-BASED WEB BROWSING AND SERVER APPLICATIONS
Disclosed are systems, media, and methods for providing pay-per-access micropayment-based web browsing and server applications. In one aspect, disclosed herein are computer-implemented systems comprising a digital processing device comprising at least one processor, an operating system configured to perform executable instructions, a memory, and a computer program including instructions executable by the digital processing device to create a pay-per-access micropayment-based server application.
SYSTEM AND METHOD FOR THE AUTOMATIC GENERATION AND MEDIATION OF A PERSONALIZED MICRO INSURANCE POLICY OFFER
A computer-implemented system and method for automatic generation and mediation of a personalized, short term insurance policy offer is disclosed. The method enables users to identify a service or activity within the system, and request, receive, and accept personalized, short-term accident insurance policy offers covering the identified activity or service. Users of the system and method can identify, request, receive and accept said insurance policy offers through a user interface. The system and method combines information about an identified service or activity; information about the user; and information provided by insurance providers; in order to mediate a direct, personalized offer from insurance companies to the user.
Monetizing Downloadable Files Based On Resolving Custodianship Thereof To Referring Publisher And Presentation Of Monetized Content In A Modal Overlay Contemporaneously With Download
The monetization of downloadable files associated with a custodial host site based on resolving custodianship to a referrer publisher with subsequent presentation of monetized content within a modal overlay is disclosed. A request from a client device has a resource identifier and a referrer publisher identifier. The request for the downloadable file is evaluated against one or more publisher and custodianship policy rules, which relate to a file extension of the downloadable file, a format of the resource identifier, a custodial domain on which the downloadable file is stored, and a referral domain as specified in the referrer publisher identifier. When custodianship is resolved, a modal overlay on which monetized content is incorporated is presented on the client device. The modal overlay is concurrently displayed with the transfer of the downloadable file to the client device.
SYSTEMS AND METHODS FOR TAKE-OUT ORDER ANALYTICS
Systems and methods for take-out order management and analysis. In an embodiment, for each of a plurality of restaurants, an interactive menu associated with the restaurant is provided to a plurality of users, a plurality of orders are received from the plurality of users, and the plurality of orders are sent to the restaurant. Order information related to the plurality of orders and the plurality of users is stored in at least one database, and analyzed.
LOTTERY TRANSACTION MECHANISMS
A number of mechanisms can reduce transaction costs and increase the economic viability of a number of products. A combination instant lottery ticket and debit card makes it possible to issue prepaid debit cards having a relatively low monetary value. A combination on-line ticket or receipt and debit card can automate the prize paying process, simplifying the retailer's responsibilities while reducing the potential for fraud. Various cash flow and authentication techniques, such as age and location verification, nano payment methods and spam filters based on these mechanisms are also described. Instant lottery tickets, and in particular, losing tickets, can be provided with a small residual value by placing account information on the ticket. In another version, a lottery ticket can be combined with a payment card that operates as a closed payment system whereby the payment card can only be used with a specified vendor.
CRYPTOGRAPHICALLY ASSURED ZERO-KNOWLEDGE CLOUD SERVICES FOR ELEMENTAL TRANSACTIONS
A trusted network based service running on a server, for example as a cloud server, includes receiving a request from a first user device and a second user device. The request includes one or more inputs to perform a stateless transaction based on combinational logic. An output of the combinational logic is a function of only the one or more inputs. Based upon the request, a program is selected from a set of a plurality of programs using zero-knowledge verifiable computing to carry out the transaction. The program is executed using zero-knowledge verifiable computing. The execution of the program out the transaction based on combinational logic with the one or more inputs using a zero-knowledge protocol to ensure privacy of the first user device and the second user device. The output of the combinational logic along with proof from the zero-knowledge protocol that the combinational logic was executed without alteration.
CONTEXT-AWARE PEER-TO-PEER TRANSFERS OF ITEMS
In one embodiment, techniques include systems and methods for facilitating context-aware peer-to-peer transfers of items utilizing at least one of short-range wireless technologies embodied by user devices or device-accessible contact lists. After receiving a request to transfer an item, a server can cause a device of a first peer user to detect devices of second peer users in the proximity of the device of the first peer user using short-range wireless technology. Based at least in part on the detected nearby devices or a contact list of the first peer user stored by the device of the first peer user, a second peer user to receive the item is determined. Upon receiving confirmation of authorization to transfer the item, requested and provided via an electronic message between the respective devices and the server, the item is disassociated from the first peer user and associated with the second peer user.
VIRTUAL MARKETPLACE FOR DISTRIBUTED TOOLS IN AN ENTERPRISE ENVIRONMENT
A distributed tool virtual marketplace may offer end users the ability to acquire tools that are compatible with an enterprise operating system platform. The virtual marketplace may determine one or more tools that are implemented on the enterprise operating system platform. The enterprise operating system platform may be provided to the end user by an operator of the marketplace. The tools including a tool that may be used for evaluating a performance of an entity. The virtual marketplace may further ascertain data that are processed or generated by the tools that are implemented on the enterprise operating system platform. The virtual marketplace may additionally determine functionalities that are used or provided by the tools. Accordingly, the distributed tool virtual marketplace may provide a recommendation of associated tools from the distributed tool virtual marketplace that have at least one dependency relationship with the tools.
Synchronous split payment transaction management
A software- and/or hardware-based transaction manager that reflects the application program interface(s) and/or system(s) for establishing sessions used to commit to, rollback and/or execute multiple payments made pursuant to a single financial transaction. This is accomplished by sharing sessions through co-browsing, or by continuous event logging and maintaining synchronous payments across a group of users in order to support the lifecycle of each individual payment and session along with completion responsibility of the overall transaction.
SITUATIONAL AWARENESS SYSTEM SECURITY FEATURES
Security features a situational awareness system using location tracking information including requiring a security identifier, such as a password or a bio identifier, as a condition to providing situational awareness information. The system may also restrict situational awareness information to data pertaining to members that have creating a permission setting or responded to an “opt-in” prompt authorizing data from their profile to be included in the situational awareness information. Situational awareness information may also be denied to requesters identified as public offenders in a public offender database. Situational awareness information may also be restricted by access rules specified in a security rule base, such as rules related to enrollment and rules related to the age of the requester and the age of a demographic profile of interest identified in the situational awareness request.