Patent classifications
G06Q30/0619
USER-ENABLED MOBILE SCHEDULING DIRECT TIME APPLICATION
A system and process within a mobile device and/or social media application of coordinating, scheduling and booking people to connect and have live face to face streaming meet -and-greets through the application. A network connected server maintains a database and information to Facilitate the buying and selling of direct air time between specific users within the application. Wherein Users can go on and offer time available for a live meet-and-greet and other users can then go on and book and schedule time from the said time available. The application can also be used to schedule and pay for the meet-and-greet time, facilitating live meet-and-greets via the application.
Offering a requested unavailable item
Techniques for offering an item that may be otherwise unavailable from an electronic marketplace may be provided. For example, based on receiving information about the item from a consumer, a template describing the item may be generated. Information based on the template may be transmitted to subscribed merchants and may allow one or more of the subscribed merchants to offer the item. If an offer is received, a data exchange between a corresponding merchant and the consumer may be facilitated. The data exchange may allow the merchant to offer the item to the consumer.
Method And System For Detecting Fraud
A system and method for detecting fraud when facilitating a payment transaction over a global wide area network. The method comprises receiving a sale information, receiving a payment information from a buyer, and analyzing a transaction information for fraud. If the analyzing indicates fraud, an enhanced transaction information is communicated to a human for fraud analysis. In one embodiment, the method comprises performing rule-based analyses to determine whether the transaction appears to be fraudulent. Rule-based analyses may include suspect data rules and velocity rules. Velocity rules generally determine whether there has been excessive activity that may lead to a conclusion that the transaction may be fraudulent. Suspect data rules are used to determine whether the billing, shipping, selling addresses, telephone numbers, and account numbers, and other data are in a syntactically correct format and whether they exist. In one embodiment, the method further comprises performing simple screening of the transaction information. In one embodiment, the method further comprises seeking approval from a third party such as a financial institution based on the payment information. The method may be implemented as part of a system that includes personal computers, server computers, and other personal computing devices, some of which may communicate over the Internet, and others which may communicate via dedicated communication lines.
Combining communication contents
When a communication message notification initiated by a current communication window is received, a correlation relationship between a party participating in a communication and K communication subjects that belong to a same user system which acts as another party participating in the communication is obtained respectively. The K communication subjects that belong to the same user system have a common principal account and each communication subject has a corresponding child account. Alternatively, the K communication subjects use a same account and logs in different communication tools in the same system. K1. According to the correlation relationship, historical communication contents between the party participating in the communication and the K communication subjects are obtained respectively. The historical communication contents are combined. The combined communication contents are saved and displayed. The present techniques avoid the tedious and overdue problem of manually combining the communication contents.
Negotiation platform in an online environment
A method and a system for providing a negotiation platform in the event that a listing fails by becoming inactive without the offering being sold are provided. For example, a negotiation eligibility detector may detect a failed listing of an offering. The listing may be associated with a first user and a first offer. A potential buyer detector may identify at least one potential buyer based on a user action associated with the failed listing. A negotiation manager may be in communication with the negotiation eligibility detector and the potential buyer detector. In response to the detecting of the failed listing and the identifying of the potential buyers, the negotiation manager may transmit a request to the at least one potential buyer for a second offer associated with the failed listing.
Identity verification and authentication
In one embodiment, receiving, at a first computing device associated with a social-networking system and from a second computing device, a first request to verify an identity of a user of the social-networking system; sending, by the first computing device and to a mobile device associated with the user, a second request for information about the user; receiving, at the first computing device and from the mobile device, the information about the user; determining, by the first computing device, a confidence score indicating a probability that the identity of the user is true based on the information about the user received from the mobile device and information available to the social-networking system; and sending, by the first computing device and to the second computing device, the confidence score.
Method for Assisted Order Handling Via the Internet
The invention relates to a method for enabling order handling via the Internet, wherein the method is performed in a computer system comprising at least a client, an ordering server and an agent server connected to the Internet, each of the client, the ordering server and the agent server comprising at least one processor and a memory storing one or more programs for execution by the at least one processor. The invention discloses a method comprising: capturing at least a part of the contents of a website retrieved by a web browser on the client from the ordering server; transferring the captured contents to the agent server; deriving object information from the captured contents on the agent server to identify an object to be ordered; controlling the ordering server by the agent server to order the object.
FLEXIBLE FORMAT ENCRYPTION
Encryption is performed at the field level within a data object, in response to an encryption indicator. Encrypted fields are nulled or zeroed out and the encrypted values are stored in encryption metadata with a path identifying the locations of the encrypted fields. An encrypted data key is appended with a decryption identifier and stored in the encryption metadata. The encrypted data object may be reformatted while encrypted. The encrypted data key is extracted from the encryption metadata and the decryption identifier is used to identify a master key used to decrypt the encrypted data key. The data key is used to decrypt the encrypted values and the decrypted values are stored in the fields identified by the paths.
INTELLIGENT PREPROCESSING ROUTING TO DECISIONING SERVICES
The system and methods described herein allow users to give their applicant information when seeking to purchase a good with financing from multiple potential lenders, and may be pre-screened by one or more rule sets implemented by a marketplace client in an eligibility analysis to ultimately submit applicant information to a subset of the multiple potential lenders which are found to be suitable for lending to an applicant based on the applicant information, wherein lender microservices are then run in a jailed, firewalled, and self-contained, autonomous environment, and the results of said lender microservices are reported to the user and may be used to change the one or more rule sets implemented by the marketplace client for future pre-screening of applicants.
Apparatus and method of monitoring product placement within a shopping facility
Methods and apparatuses are provided for use in monitoring product placement within a shopping facility. Some embodiments provide an apparatus configured to determine product placement conditions within a shopping facility, comprising: a transceiver configured to wirelessly receive communications; a product monitoring control circuit coupled with the transceiver; a memory coupled with the control circuit and storing computer instructions that when executed by the control circuit cause the control circuit to: obtain a composite three-dimensional (3D) scan mapping corresponding to at least a select area of the shopping facility and based on a series of 3D scan data; evaluate the 3D scan mapping to identify multiple product depth distances; and identify, from the evaluation of the 3D scan mapping, when one or more of the multiple product depth distances is greater than a predefined depth distance threshold from the reference offset distance of the product support structure.