Patent classifications
G06Q20/384
System and Method for Organization and Verification of Live Events
A system and method for organizing events, confirming guests to attend events and verifying attendance at events. The system and method includes receiving from a first user information regarding an in-person event hosted by said user, confirming attendees to said event, and verification of attendance at the event utilizing mobile device geo-location and proximity detection. The system and method may include a payment and rating system for users based on verification of duration of attendance at events.
Gift Transaction System Architecture
A system architecture of a gift transaction system is disclosed. The gift transaction system can include a buyer interface module, a recipient interface module, a merchant backend interface module, a store front interface module, a curation module, a reminder module, an analytics module, or a media plug-in interface module. A method of operating the gift transaction system under the system architecture includes: providing an embedded widget on a website to determine gift intent to initiate a gift transaction by a buyer account for a recipient account; generating a gift buyer interface for a first client device to personalize a gift package including a gift item; generating a gift recipient interface for a second client device to customize the gift package; and communicating with a merchant backend system
Platform for Providing Customizable User Brand Experiences, Sponsorship Junctions, and Conversion Attribution
A computer-readable medium that, when executed on a server, establishes processes for providing a brand sponsorship environment, the processes including providing a computer-implemented platform establishing a sponsorship junction involving, in case 1, a set of trigger-monitorable activities defined by a set of sponsoring brands or, in case 2, a subset of the trigger-monitorable activities defined by the set of sponsoring brands.
Digital user identity verification
Verification of user identities is an important aspect of computer and network security. In some instances, a first user may attempt to engage with a second user via a web application, mobile phone app, or other software without necessary knowing that the identity of a second user is accurate. The computer security problem of identity verification may be particularly acute when the only contact information is an email address, phone number, or other electronic identifier that can potentially change ownership (e.g. a person may get a new phone number, someone might purchase an Internet domain and thus change ownership of an email address, etc.) This disclosure and claims relate to techniques that allow for enhanced security by verifying an identity of a user via specific prompts and interactions provided via software. Particular credentials may be required in order to verify user identity, including biometrics and other specific required responses.
Systems and Methods for Digitally Signed Contracts with Verifiable Credentials
A method for seamlessly and automatically granting tailored permission for use and transference of internet data between databases with comprehensive consent is described. The method employs a graph language such as JSON-LD to integrate and employ cryptographically signed Information Sharing Agreements (ISAs) between parties. Data is serialized to be easily transferred between databases when appropriate permission is obtained. Granular data exchange under usage control contacts can be automated among any number of parties on the internet. As such, the method provides a means by which users may control not only what may be done with their data, but to what entity or entities the data may be transferred. Advertisements may then be served to the user according to his or her preferences as defined within a web or desktop app, which is then applied to all related ad publishers publishing to the domains visited by the user.
Systems, Methods, and Devices to Map and/or Provide an Interface to a Distributed Ledger
In one implementation, a method comprises: receiving, on a computing device, a search term for a search engine; and mapping to a distributed ledger based at least on the search term, wherein the distributed ledger is stored on one or more servers coupled to the computing device over one or more computer networks, and wherein the distributed ledger corresponds to augmented data associated with the search term.
Crowd-Sourced Activity Processing
Users form custom-defined communities for performing a defined activity amongst themselves. An actor defines the activity and restrictions associated with the activity. Members of the community place requests for the actor to perform member-specific actions during the activity on behalf of the members. The actor performs the activity with the member-specific actions and arranges procurement of results associated with each of the members. The actor and the members may also settle up with one another at least upon procurement. The activity is crowd sourced within the custom-defined community, thereby reducing the need for the members to each individually perform the activity.
Systems and methods for preferring payments using a social background check
Systems and methods are described for facilitating payments and transactions using social background checks. Such systems and methods may use social networks with both individual members communicating over a network to a social authentication computing system. The authentication of transactions associated financial institutions are determined through the use of relationship measures based on social media interactions. Transactions and services available to a user are determined based on a measure of social identity through the use of social media platforms. Available contact and interaction data from one or more social media platforms is leveraged to analyze a level of trust that a transaction is not a consequence of fraudulent activity. Transactions that have a low level of risk of being a consequence of fraudulent activity are benefited through faster transaction times and other improvements.
Complex system for information processing
An information processing method, a server, a mobile terminal, and a storage medium, to trigger value transfer through chat information, and improve a conversion rate of a social platform are discussed. An embodiment provides an information processing method. The method may include receiving, by a server, a value packet transmitting instruction, the value packet transmitting instruction being transmitted after a key word extracted from chat information by a first mobile terminal is matched with a key word library. The method may further include transmitting, by the server, value packet transfer information to a second mobile terminal.
SMART RETAIL ANALYTICS AND COMMERCIAL MESSAGING
A real-time fraud prevention system enables merchants and commercial organizations on-line to assess and protect themselves from high-risk users. A centralized database is configured to build and store dossiers of user devices and behaviors collected from subscriber websites in real-time. Real, low-risk users have webpage click navigation behaviors that are assumed to be very different than those of fraudsters. Individual user devices are distinguished from others by hundreds of points of user-device configuration data each independently maintains. A client agent provokes user devices to volunteer configuration data when a user visits respective webpages at independent websites. A collection of comprehensive dossiers of user devices is organized by their identifying information, and used calculating a fraud score in real-time. Each corresponding website is thereby assisted in deciding whether to allow a proposed transaction to be concluded with the particular user and their device.