Patent classifications
G06Q2250/05
Validation of Freight Carrier Account Numbers in E-Commerce Orders
A method is provided that includes receiving, by a first device from a second device, a freight carrier for shipping a product and an account number for the freight carrier, validating, by the first device, the account number by communicating with a third device, and allowing, by the first device, completion of checkout on the second device in response to successfully validating the account number.
Methods and systems for data authentication services
Methods and systems for electronic document authentication are disclosed. In one aspect, a method of generating an electronic postmark includes receiving, via a server, a request message from an electronic network, the request message comprising request data including payload data and meta data, generating a timestamp in response to receiving the message, hashing the payload data to generate a payload hash, digitally signing the metadata, the payload hash, and the timestamp to generate a digital signature, generating a response message, the response message generated to comprise the metadata, the payload hash, the timestamp, and the digital signature; and transmitting the response message onto the electronic network.
METHODS AND SYSTEMS FOR DATA AUTHENTICATION SERVICES
Methods and systems for electronic document authentication are disclosed. In one aspect, a method of generating an electronic postmark includes receiving, via a server, a request message from an electronic network, the request message comprising request data including payload data and meta data, generating a timestamp in response to receiving the message, hashing the payload data to generate a payload hash, digitally signing the metadata, the payload hash, and the timestamp to generate a digital signature, generating a response message, the response message generated to comprise the metadata, the payload hash, the timestamp, and the digital signature; and transmitting the response message onto the electronic network.
Single secure environment session generating multiple indicia
Systems and methods which are adapted to generate multiple indicia in a single secure environment session are described. Embodiments provide for generation of a plurality of postage indicia in a single postage security device (PSD) transaction, whereby the PSD loads and unloads corresponding virtual PSD information a single time for generating the plurality of postage indicia (i.e., in a single secure environment session). The indicia generated in a same secure environment session according to embodiments of the invention may comprise a plurality of indicia requested by a same, single user. Additionally or alternatively, the indicia generated in the same secure environment session may comprise a plurality of indicia requested by multiple different users.
System and method for identifying and preventing on-line fraud
The present invention is directed to systems and methods which identify fraudulent situations during the transaction phase. In one embodiment, such detection is accomplished by monitoring for situations either outside the range of normal for the general population or outside the range of normal for this particular user. The normal range could be rule driven and, for example, could include size of a given purchase, frequency of purchases, identity of use equipment being utilized for the current transaction, etc. The rule could be relaxed or tightened, at least in part, based on the length of time that the user has been a customer and the user's past payment history. In one embodiment, device ids are used to detect fraudulent users. These device (or software) ids could, for example, be a “fingerprint” of the user's equipment, or a “cookie” previously downloaded to the user that identifies the user to the fulfillment system. In situations where fraud is detected downloading the value to the user is interrupted.
Systems and methods for protecting content when using a general purpose user interface application
Systems and methods which prevent or limit access to protected content (e.g., value bearing indicia (VBI)) by a general purpose user interface application (e.g., web browser) are shown. Embodiments implement techniques to avoid displaying protected content by a general purpose user interface application, or displaying protected content during a time in which a user does not have access to particular functions of the general purpose user interface application, to protect the content from various operations, such as repeated printing, electronic copying, etc. Data presentation formatting control in the form of style sheets may be utilized to control access to content. Additionally or alternatively, executable code or an executable object may be implemented within a page or other content to control access to content. Similarly, separate areas, such as windows or pages, may be utilized to control access to content.
System and Method for Generating Postage
A postage generating system and method that allows for the generation of postage without the use of a PSD, while still maintaining the necessary data integrity and non-repudiation aspects. The cryptographic and accounting functions are performed separately when an indicium is generated and reconciled to ensure that every transaction is properly accounted for and funds are deducted from the user's account. The cryptographic functions for an indicium are performed utilizing a cloud-based Hardware Security Module (HSM). Transaction records for indicium generated by an HSM are stored in a database. The accounting is performed by a transaction server, separate and remote from the HSM, to make updates to the client's account to account for generated indicia. An Integrity Monitor Server monitors the consistency of the transactions, i.e., that every transaction performed by an HSM is properly accounted for by the transaction server and funds are deducted from the user's account.
PARTIAL EXECUTION OF TRANSACTIONS IN PRIVATE DISTRIBUTED LEDGER NETWORKS
A method for partial execution of a transaction in a distributed ledger (DL) network. —Execution of a transaction is requested. —First results of a first execution of the transaction and subroutine information for the transaction are received. An execution plan for executing one or more subroutines of the transaction is determined based on the subroutine information. Execution of the transaction by a second DL node of a second participant is requested. —Second results of a second execution of the transaction at the second DL node are received; and validation of the transaction is performed based on bundled results that include the first results and the second results.
Methods and systems for data authentication services
Methods and systems for electronic document authentication are disclosed. In one aspect, a method of generating an electronic postmark includes receiving, via a server, a request message from an electronic network, the request message comprising request data including payload data and meta data, generating a timestamp in response to receiving the message, hashing the payload data to generate a payload hash, digitally signing the metadata, the payload hash, and the timestamp to generate a digital signature, generating a response message, the response message generated to comprise the metadata, the payload hash, the timestamp, and the digital signature; and transmitting the response message onto the electronic network.
Single secure environment session generating multiple indicia
Systems and methods which are adapted to generate multiple indicia in a single secure environment session are described. Embodiments provide for generation of a plurality of postage indicia in a single postage security device (PSD) transaction, whereby the PSD loads and unloads corresponding virtual PSD information a single time for generating the plurality of postage indicia (i.e., in a single secure environment session). The indicia generated in a same secure environment session according to embodiments of the invention may comprise a plurality of indicia requested by a same, single user. Additionally or alternatively, the indicia generated in the same secure environment session may comprise a plurality of indicia requested by multiple different users.