G06Q30/0615

Systems and methods for a commerce platform coordinating transactions within third party applications

A method and apparatus for a commerce platform coordinating a purchase of a product sold by a merchant system through a third party application are described. The method may include receiving a notification from the third party application requesting to purchase a product from within the third party application, wherein the notification comprises an identifier for the product and an identifier for the merchant system that sells the product. The method may also include a product checkout interface having an appearance consistent with an appearance of a user interface of the third party application, and transmitting the product checkout interface generated by the commerce platform to a user device executing the third party application causing the third party application to render the product checkout interface within at least a portion of the user interface of the third party application.

SYSTEM AND METHOD FOR CONFIDENTIALLY ISSUING AND MANAGING DELIVERY WAYBILL USING VIRTUAL PERSONAL INFORMATION MATCHED WITH CREDIT CARD INFORMATION

Disclosed are a system and method for confidentially issuing and managing a delivery waybill that enables a customer to order and receive merchandise without inputting actual personal information of the customer every time in every online shopping mall providing merchandise that the customer wishes to purchase and that is capable of preventing the leakage of the personal information of the customer, which may occur in an online shopping mall, a merchandise supply company, etc., wherein virtual personal information, rather than the actual personal information of the customer, is used in the online shopping mall, and access account information, a customer order number, and order status information are confirmed in order to prevent illegal issuance of a delivery waybill, whereby the system for confidentially issuing and managing the delivery waybill can be operated in an independent and safe manner.

TRADING GOODS BASED ON IMAGE PROCESSING FOR INTEREST, EMOTION AND AFFINITY DETECTION

A system for trading goods over a computer network based on image processing includes an image processor that analyzes a picture received from a user to build a description of entities in the picture and correlations among the entities, a description interpreter that analyzes the description to determine an underlying message in the picture and detect information regarding the user's interests, emotions and affinities to goods and services, wherein the information is stored with the user's profile, the user's list of items to trade, and the user's past transaction history, and a trade matching component that uses the user's profile and produces a ranked list of other users with items to trade, or intermediary trade steps, when another user initiates a new trading transaction.

METHOD FOR PROCESSING AT LEAST ONE PIECE OF PAYMENT MEANS DATA, CORRESPONDING PAYMENT TERMINAL AND COMPUTER PROGRAM
20190156388 · 2019-05-23 ·

A method for processing at least one piece of payment method data, implemented within a payment terminal having a secured processor and a secured processing memory. Such a method includes: obtaining at least one piece of data representing a payment method used to carry out a transaction, called a piece of payment method data; anonymizing the piece of payment method data, delivering a piece of current anonymous identification data; and transmitting the piece of current anonymous identification data to an application for processing loyalty data.

LOCATION-BASED OBFUSCATION OF USER INFORMATION
20190139114 · 2019-05-09 ·

A device is provided to receive, from a first device, a request for a product or service, determine a first geographic location of the first device, and identify a second device that is located in a geographic region associated with the first geographic location. The second device may be associated with a user that is capable of providing the product or service. The device may provide, to the first device, information regarding a second geographic location of the second device. The information may specify an obfuscated second geographic location without revealing the second geographic location. The device may also receive, from the first device, an instruction to provide the request to the second device, provide the request to the second device, receive an acceptance of the request from the second device, and provide, to the second device, data indicating the first geographic location of the first device.

TECHNOLOGIES FOR FACILITATING THE SAFE AND ANONYMOUS TRANSPORT OF GOODS BETWEEN A BUYER AND SELLER
20190087777 · 2019-03-21 ·

A method for electronically facilitating the facilitating the safe and anonymous transport of goods between a buyer and seller according to one embodiment includes determining a buyer's location and a seller's location, scheduling transport of the item from the seller's location to the buyer's location, determining a driver for transport of the item based on a description of the item and a pool of active drivers within a threshold proximity of the seller's location, monitoring for fluctuations in an estimated time of arrival of driver at each of the seller's location and the buyer's location based on a real-time geographical location of the driver, and transmitting a notification in response to a determination that the estimated time of arrival has deviated by at least a threshold amount.

SYSTEMS AND METHODS FOR ANONYMIZED VALIDATION AND LOGIN

A method for facilitating anonymized interactions and/or identifying or validating a user via a virtual number may include: receiving a login request from a user device associated with a user that identifies the user via a virtual number; in response to receiving the login request, determining whether the virtual interaction item number is valid; in response to determining that it is valid: validating the login request; and identifying an entity associated with the virtual number; receiving from the user device, an interaction-completion request; in response to receiving the interaction-completion request, transmitting a user information request to the entity associated with the virtual number; receiving a reply to the user-information request from the entity; and in response to receiving the reply, completing the interaction-completion request using the reply.

Synthesizing user transactional data for de-identifying sensitive information

As described herein, a system, method, and computer program are provided for synthesizing user transactional data for de-identifying sensitive information. In use, transactional data of a plurality of users is identified. Additionally, the plurality of users are clustered based on the transactional data, to form groups of users having transactional data representing similar transactional behavior. Further, synthesized transactional data is generated for the users in each group by: identifying a subset of the transactional data that corresponds to the users in each group, shuffling the transactional data in the subset across the users in each group, and perturbing portions of the shuffled transactional data.

Trading goods based on image processing for interest, emotion and affinity detection

A system for trading goods over a computer network based on image processing includes an image processor that analyzes a picture received from a user to build a description of entities in the picture and correlations among the entities, a description interpreter that analyzes the description to determine an underlying message in the picture and detect information regarding the user's interests, emotions and affinities to goods and services, wherein the information is stored with the user's profile, the user's list of items to trade, and the user's past transaction history, and a trade matching component that uses the user's profile and produces a ranked list of other users with items to trade, or intermediary trade steps, when another user initiates a new trading transaction.

SECURE PROXY SERVICE

A system is configured to receive a network resource request from a user device configured with a browsing application, wherein the request includes identification data associated with the user device. The system transmits, to a network resource provider, a request for the network resource, wherein the request transmitted to the network resource provider excludes identification data included in the request received from the user device. The system receives from the network resource provider a response, including a document comprising a field configured to receive payment information for an item purchase. The system receives from the browsing application an indication that an anonymous payment instrument, associated with a first entity different than the user, is to be used to purchase a first item at a first price. The system causes information regarding the anonymous payment instrument to be provided to the network resource provider.