G06Q30/0225

Isolating And Reinstating Nodes In A Distributed Ledger Using Proof Of Innocence
20230050048 · 2023-02-16 ·

Aspects of the disclosure relate to isolating and reinstating nodes in a distributed ledger using proof of innocence. In some embodiments, a first plug-in embedded with the blockchain network may monitor consumer-initiated transactions submitted to an enterprise organization node to determine the legitimacy of each consumer-initiated transaction. The first plug-in may identify consumer-initiated transactions associated with malicious activity and may flag the consumer node for further analysis. A second plug-in may identify and analyze the consumer-initiated transactions associated with the consumer node to determine a proof of innocence value associated with the consumer node. The first plug-in may isolate the consumer node from the distributed ledger if the proof of innocence value exceeds a proof of innocence threshold. Alternatively, the first plug-in may permit the consumer node to remain within the distributed ledger if the proof of innocence value falls below the proof of innocence threshold.

Proxy objects for tracking processing of electronic coupon codes

Systems/techniques for facilitating proxy objects for tracking processing of electronic coupon codes are provided. In various embodiments, a system can determine that a browser is performing a checkout on a frontend website. In various aspects, the system can cause the frontend website to instruct the web browser to transmit a validation request to a backend server, wherein the validation request identifies a coupon code and requests that the backend server determine whether the coupon code is applicable to the checkout. In various instances, the system can cause the web browser to append a proxy object to the validation request, wherein the proxy object fetches, during execution of the validation request by the backend server, an execution status of the validation request. In various cases, the system can receive, from the proxy object, the execution status and can initiate one or more electronic actions based on the execution status.

Systems and methods for providing promotion sharing among consumers
11710146 · 2023-07-25 · ·

Systems, apparatus, and methods for providing promotion sharing between consumers are discussed herein. Some embodiments may include a system including circuitry configured to generate an incentive token for a promotion of a merchant. The incentive token may be associated with a first consumer account and provided to a first consumer device associated with the first consumer account for sharing with other consumers. Upon receiving the incentive token form a second consumer device associated with a second consumer account, the circuitry may be configured to enable the second consumer account to receive an incentive value of the incentive token if various conditions are satisfied. For example, the second consumer may be asked to purchase the promotion, create a new consumer account, or the like.

COUPON VALIDATION AND FRAUD MITIGATION

A method for preventing fraud in incentive transactions is provided that includes receiving metadata from a brand manufacturer for an incentive associated with a selected product, the metadata including a product identifier and a redemption rule. The method includes requesting a host to create a record in a distributed ledger for the incentive using the metadata, providing the incentive to a consumer via a mobile device, assigning a public address to the incentive, receiving from the host a first private key associated with the public address in the record, providing the first private key to the consumer, and receiving a second private key indicative of a redemption of the incentive at a retailer. The method includes validating redemption of the incentive and recording the redemption of the incentive at a retailer in the distributed ledger record when the redemption of the incentive is validated. A system to perform the above method is also provided.

Method for delivering music content to a smart phone
11706270 · 2023-07-18 · ·

A method of distributing media content using mobile communication devices including providing media access cards which promote selected media content to users of such devices whereby a user may access a web server associated with the media access cards and download application software enabling access to selected media content via a mobile device, the media access cards including a machine readable identification number code that identifies media content associated with the card whereby the application software facilitates reading and transmitting the code to a web server via the mobile device, receiving the identification number with the web server and using the identification number to locate a table value in a database wherein a plurality of media access cards identification numbers are associated with a media content table value, using the table value to identify media codes associated with the selected content server which transmits media to the mobile device.

Reducing false positive fraud alerts for online financial transactions

In a method of preventing fraudulent online financial transactions, a request to authorize an online, financial transaction may be received, where the transaction is associated with a debit or credit card account. A computing device at which information associated with the debit or credit card account was entered for the transaction may be identified, and a first geographic location at which the computing device resides may be determined. Based upon geolocation data indicating one or more geographic locations of the authorized cardholder, it may be determined that the authorized cardholder was at a second geographic location at a time of the transaction. If the second geographic location does not correspond to the first geographic location, the financial transaction may be prevented from being executed.

Encryption of digital incentive tokens within images
11551253 · 2023-01-10 · ·

Embedding of digital incentive tokens within a digital image can occur cryptographically using a public key in some embodiments. An encrypted digital incentive token may be embedded within a digital image, including a variety of encrypted information. The digital image with the embedded digital incentive token may be sent to users via delivery mechanisms such as direct webpage embedding, email, text message, and social media sharing. An image recipient may be able to view the image and also take additional action including gaining access to the embedded digital incentive token. Digital incentive tokens can be embedded by altering image metadata so that the image itself is not changed in some embodiments, but data associated with the image is changed to identify the token. Pixel data can be altered to reflect a token for an image. Digital incentive tokens can also be tracked through different platforms to determine usage.

TARGETED REAL-TIME OFFERS LEVERAGING SERIALIZED QR CODES
20230214872 · 2023-07-06 ·

The subject matter of this disclosure relates to a method and a system for providing and managing post-purchase rebates and other commercial offers. An example method includes: receiving a notification indicating that a consumer has purchased a product at a store and is requesting a discount for the product, wherein the notification is received in response to a client device of the consumer scanning a QR code on the product; determining that the client device scanned the QR code when the client device was outside of a physical boundary for the store; confirming that the consumer has purchased the product; and providing the consumer with the discount.

Product authentication system

A method and system for authenticating a variety of consumer products is provided. The system includes a plurality of near field communication (NFC) tags configured for coupling to a variety of consumer products, the tags programmed to provide identifying data associated with a single consumer product to an NFC-capable mobile computing device, the NFC having a structure that detects opening of the consumer product, a central database for storing said data, a server communicably connected to a communications network and configured to access the database, and a mobile application executing on a mobile computing device, configured to read said identifying data from the NFC tag and communicate said identifying data to the server.

Identifier-based coupon distribution

A client device detects a QR code (or NFC tag). The client device decodes the QR code. The client device determines that the data encoded within the QR code includes a URL. Based on the URL, the client device sends a first request to a first server identified by the URL. In response to the first request, the client device receives from the first server data configured to cause the client device to display, to a user of the client device, at least one of: a video or an interactive web page. Responsive to the data encoded in the QR code, the client device sends to a coupon server: identification data associated with a user of the client device, and a request for the coupon server to distribute a digital coupon for an offer associated with an identifier encoded within the QR code to an account associated with the user.