Patent classifications
G06Q30/0615
ONLINE PAYMENT SYSTEM
A system and method for facilitating an online transaction between a customer and a merchant, wherein receipt of an input from a merchant server defining a specified payment transaction causes a link generation module to generate a URL link uniquely associated with an online data capture resource for the specified transaction, such that activation of said link by a customer device facilitates a data capture process causing payment data to be provided to a payment module for completion of said specified financial transaction via a payment service provider.
Electronic marketplace drop shipping
Systems and methods which provide for order fulfilment using drop shipping from participating suppliers in an electronic marketplace are described. A drop shipping management system may utilize various rules and information regarding merchants, suppliers, items, etc. in facilitating electronic marketplace drop shipping. Drop shipping management systems may, for example, utilize merchant drop ship rules with respect to merchant drop ship information for determining whether drop shipping is to be provided for a merchant with respect to one or more items in the electronic marketplace. Further, drop shipping management systems may utilize supplier drop ship rules with respect to supplier drop ship information in determining a supplier to provide drop shipping with respect to one or more items in the electronic marketplace. Drop shipping management of embodiments provides a many-to-many drop shipping solution in which multiple merchants are connected to multiple drop ship suppliers in an electronic marketplace environment.
DEVICE FOR TRIGGERING A PROCESS
A computing device for triggering a process comprises a control unit which is configured to perform the following steps: Receiving a request signal from a first remote computing device, the request signal requesting the triggering of the process, including a first identifier representing a registered user of a digital communication platform, and including a second identifier representing another registered user of the digital communication platform; Retrieving from a database a set of database entries subject to location data or a subset thereof assigned to the second identifier; Transmitting a response signal to the first remote computing device, the response signal including the retrieved set of database entries; Receiving a confirmation signal from the first remote computing device, the confirmation signal including a database entry selected from the retrieved set of database entries; and Transmitting a trigger signal to a second remote computing device assigned to the selected database entry, for triggering the process, the trigger signal including the selected database entry and the location data.
Obfuscated service provider identity during client selection
A method for matching a client with a service provider is provided. The method includes receiving a request for a service from a client device, selecting one or more service providers based on the location indicated for the service, comparing the request to one or more profiles for the one or more service providers and to available services times, generating at least one bid for the service based on the one or more profiles, and sending the at least one bid to the client device. Sending the at least one bid includes obfuscating, to the client device, the identity of the one or more service providers corresponding to the at least one bid. The method also includes receiving from the client device a selection of one of the at least one bids and sending to the client device the specific identity of the one or more service providers.
Automatically detecting unauthorized re-identification
The present disclosure provides systems and methods for automatically detecting third-party re-identification of anonymized computing devices. The method includes retrieving a log of content items provided to anonymized computing devices identifying a first content item provided to a plurality of anonymized computing devices within a first predetermined time period; for each anonymized computing device of the plurality of anonymized computing devices, generating a set of identifications of second content items retrieved by the anonymized computing device prior to receiving the first content item within a second predetermined time period; determining that signals or combinations of signals with a highest predictive ability between a first set of identifications and a second set of identifications exceeds a threshold; identifying a provider of the first content item; and if the signals or combinations of signals with the highest predictive ability exceeds the threshold, preventing, transmission of a request of an anonymized computing device for a content item to the identified provider.
SUGGESTIVE SELLING ON A PRODUCT TREE BASED MULTI-LEVEL MARKETING SYSTEM
The present disclosure is directed to a system and method to allow sellers of products to establish individual products in a multilevel marketing (MLM) commission system, where the product is offered and sold to a first purchaser—who then actively by requesting a code, or passively, through the purchase of the product, becomes a user of the commission system. This user is provided a code such that the code may be passed onto followers of the registered user. The registered user will be allowed to advertise the product to a second purchaser and the second purchaser will be allowed to purchase the product and provide advertisements to other purchasers. Commissions paid to respective downline purchasers for a single product may be limited by a preset number of defined levels. After a product is purchased, commissions are paid out to each respective purchaser according to the commission plan. The system records which products are most often purchased together. Users and sellers of products may receive information on which products are most often purchased together and may receive techniques or advice on how to effectively sell the products together.
METHOD FOR INCORPORATING A BLOCKCHAIN IN A MULTI-LEVEL MARKETING SYSTEM
Methods consistent with the present disclosure allow purchasers of a product to become a product distributor as part a multi-level marketing (MLM) organization. Once a person has purchased an item (a product or service) via their user device, they may be allowed to share information associated with the item with other user devices. Data that identifies commissions paid to user distributors of an MLM organization may be secured at chains of data blocks that store encrypted data, each data block may be secured with a unique key. Several computers may communicate with each other when products are sold by members of an MLM organization. A third party network computer may send information to a “blockchain computer” that stores commission data and a computer that administrates functions of the MLM system may communicate with the blockchain computer when product sale commissions are identified and distributed.
CREATING A COMMUNITY FROM DATA
Methods consistent with the present disclosure allow purchasers of a product to become a product distributor as part a multi-level marketing (MLM) organization. Once a person has purchased an item (a product or service) via their user device, they may be allowed to share information associated with the item with other user devices. These other user devices may be devices owned by members of a same social media group and the information shared with these other user devices may include materials that promote the sale of specific products. New users may be sent invitations to join an existing social media group, existing users may be sent invitations to join new or other social media groups, or both new users and existing users may be sent invitations to join particular groups based on these users being associated with a similar set of demographic data.
Anonymization of user data for privacy across distributed computing systems
Systems, methods, and computer-readable media are disclosed for systems and methods for anonymization of user data for privacy across distributed computing systems. Example methods may include determining, by a first computer system, a request for content to present at a user device, wherein the request for content is associated with a user account, determining a first search query associated with the user account, and determining a first keyword associated with the first search query. Some methods may include generating a first hash value for the first keyword, sending the first hash value to a second computer system for identification of first content for presentation at the user device, and causing the second computer system to send the first content to the user device for presentation, wherein the first computer system does not receive the first content.
CONFIDENTIAL ASSET TRANSACTION SYSTEM
A system is provided for controlling privacy in an exchange of an asset. The system receives an offer query of an offeror that includes an offeror reveal condition, an asset identifier of the asset, and offeror terms of exchange. The system accesses an offeree reveal condition and offeree terms of exchange for the asset. The system determines whether the offeror reveal condition and the offeree reveal condition are satisfied and determines whether the offeror terms of exchange and the offeree terms of exchange are satisfied. When the offeror reveal condition, the offeree reveal condition, the offeror terms of exchange, and the offeree terms of exchange are satisfied, the system reveals the offeror to the offeree and the offeree to the offeror.