Abstract: According to one embodiment, a radio communication apparatus includes a radio communicator, a storage, and a controller. The radio communicator is configured to perform close proximity wireless communication or near field wireless communication with other radio communication apparatus. The storage is configured to store data, setting parameters associated with the data, and an application. The controller is configured to execute the application and control a transmission and reception of the data performed by the radio communicator on the basis of the application. The application can be set to a read-only mode by an operation of a user. The setting parameters include transfer permission information. The controller checks whether or not a user is an authorized user of the radio communication apparatus, when the user is the authorized user, the controller executes the application and thereby activates the radio communicator.
Abstract: A method of image processing within an image acquisition device comprises: acquiring an image including one or more face regions and identifying one or more eye-iris regions within the one or more face regions. The one or more eye-iris regions are analyzed to identify any eye-iris region comprising an eye-iris pattern of sufficient quality to pose a risk of biometrically identifying a person within the image. Responsive to identifying any such eye-iris region, a respective substitute eye-iris region comprising an eye-iris pattern sufficiently distinct from the identified eye-iris pattern to avoid identifying the person within the image is determined, and the identified eye-iris region is replaced with the substitute eye-iris region in the original image.
Abstract: A credit card reader is attached to a mobile device to process credit card transactions at the point of sale. A user of the credit card reader slides an authenticator card through the credit card reader to activate the credit card reader. Accordingly, the credit card reader may compare data stored in the authenticator card to an expected value for the data to determine whether the user is authorized to utilize the credit card reader. If there is a match, the credit card reader displays a unique password, known to the user, which the user can use to verify that the credit card reader is authentic. Further, if there is a match, the credit card reader may allow the user to process credit card transactions through the credit card reader.
Abstract: In an embodiment, a server registers first and seconds client applications on the same client device. The first client application on a client device obtains, from the server or some other source, application-to-application communicative information for facilitating communication between the first and second client applications. Based on the application-to-application communicative information, the first client application configures a given registration request message that includes (i) a request for renewing the first client application's registration with the server, and (ii) a request for renewing the second client application's registration with the same server, and transmits the given registration request message to the server. The server renews the registrations for the first and second client applications in response to the given registration request message.
Type:
Grant
Filed:
March 5, 2013
Date of Patent:
December 29, 2015
Assignee:
QUALCOMM INCORPORATED
Inventors:
Vijay A. Suryavanshi, Mark A. Maggenti, Mohammed Ataur Rahman Shuman
Abstract: There is disclosed a technique for use in providing an assessment of authentication requests. In one embodiment, the technique comprises receiving an authentication request with post-authentication feedback and an authentication request with no post-authentication feedback. In the same embodiment, the post-authentication feedback can include a marking indicating that the request is one of a genuine or fraudulent status after review by an analyst. If a request does not possess a post-authentication feedback then it is considered genuine status. The technique can then assign the status of the requests to a distinctive attribute associated with the requests before performing a computation which produces a computational result that is indicative of the risk associated with the distinctive attribute.
Type:
Grant
Filed:
June 27, 2013
Date of Patent:
December 8, 2015
Assignee:
EMC Corporation
Inventors:
Ido Zilberberg, Lior Asher, Marcelo Blatt, Alex Zaslavsky
Abstract: In one implementation, a processing system receives a request from a client device to access a user account of the user. In response to receiving the request, the processing system transmits credential data, which corresponds to a credential and which indicates client device data to transmit in response to receiving the credential data. The processing system receives the client device data from the client device, identifies an issuer of the credential, and transmits the client device data to the issuer of the credential.
Abstract: Methods and systems consistent with the present invention provide a cross channel fulfillment system that enables consumers to purchase and receive items using different transmission mediums. The fulfillment system is a centralized distribution system that maintains information relating to consumers and has access to multiple transmission mediums. Specifically, the fulfillment system contains a database of consumer contact information relating to each transmission medium. The fulfillment system uses a remote device to provide information to consumers. The remote device transmits and receives broadcast messages including information relating to purchasable items. The fulfillment system may deliver a purchased item to the consumer using a medium different from that used to purchase the item.
Abstract: A client computer system receives a file that is at least partially encrypted. The client computer also receives a file manager and user input. In response to the user input matching data stored in an encrypted user profile, the client computer uses the file manager to decrypt the file based on a key stored in the encrypted user profile. The file is unusable if copied to another client computer, and the file manager manages usage of the file based on one or more terms of usage.
Type:
Grant
Filed:
September 13, 2013
Date of Patent:
October 20, 2015
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION
Abstract: The optimization system monitors a mobile phone user's behavior in response to an offer for a reward and determines a good level for a product promotion. The determination may be made based upon the user's current response, past response patterns to various reward levels or a correlation between a user's behavior and the behavior corresponding to a class of users. The system can determine an offer level that maximizes the return on the profit or revenue from a potential purchase for which the offer applies.
Abstract: A system, methods, and apparatuses are provided for valuation and exchange of stored value assets, information of value, and the transfer of value to or among individuals. The exchanged assets may be of a similar nature, e.g., music files exchanged for other music files, and exchange or trade of information such as rewards value or a restaurant coupon. The exchanged assets may also be other dissimilar assets exchanged between individuals and/or entities. The exchange may be initiated in numerous ways such as after completing a review, exchanging or trading a gift card, a prepaid card, a reward card, a coupon, a ticket, a pass, and/or the like when in proximity to a specific location or a location of some type or category, and/or exchanging or trading of other assets between individuals based on one or more constraints such as time, location, need, desire for the assets, and/or proximity.
Type:
Grant
Filed:
April 17, 2012
Date of Patent:
September 15, 2015
Assignee:
Proctor Consulting, LLC
Inventors:
James A. Proctor, Jr., Maria Elena Tripoli, James A. Proctor, III
Abstract: A method and a system to protect information are provided. For example, a system comprises a parser to parse user interface information to be included within a user interface to be displayed to a user by an information display application. The parser also identifies at least one field, within the user interface, to receive user information from a user. A detection module is provided to determine whether the user interface information is associated with fraudulent activity. A form fill module, in response to determining that the user interface is associated with fraudulent activity, provides a warning indicia in or over the at least one field, when the user interface is presented to a user by the display application. The form fill module may also disable the functionality of a user display application to automatically form fill the identified fields.
Abstract: The present disclosure relates to a method and system for one-way data transmission from an open network to a closed network. A data transmission controller on an open network provides a data stream to first, second, and third transmitter nodes on the open network. The first and second transmitter nodes transmit the data stream to corresponding receiver nodes on a closed network. The third transmitter node transmits the data stream to a receiver node on the open network. Data transmission verification is performed at both the open network and the closed network.
Type:
Grant
Filed:
May 23, 2014
Date of Patent:
September 8, 2015
Assignee:
The United States of America as represented by the Secretary of the Navy
Abstract: An identity authentication system includes a storage unit, a display character set generation unit, a display unit and a password authentication unit. An identity authentication method includes the following steps: generating the dynamic display character sets; inputting a dynamic input code; and comparing the dynamic input code with the user password. This invention can improve the security of identity authentication and is convenient to use.
Abstract: The environment around mobile phone handset 10 is judged according to the number of other mobile phone handsets present near mobile phone handset 10 and the registration status of the nearby telephones. Then, the display sequence of function names on a function selection screen is changed according to the environment. As a result, functions deemed likely to be selected by the user based on the environment surrounding mobile phone handset 10 may be displayed at positions where they may be selected with fewer operations. In this way, the number of operations required of the user for selecting any of multiple functions may be reduced.
Abstract: Readily available mobile computing devices and electronic display signs that are associated with particular locations are used to provide enhanced location specific services to customers in a secure manner. A customer at enterprise premises can access the available services published by the enterprise by capturing information from an electronic display sign using an authentic mobile computing device application. Non-reproducible content is displayed on the electronic display signs to enable authentication of a mobile computing device application, where the mobile computing device application once authenticated acts as a trusted end point to publish the enterprise services. Hardware investment for the enterprise is reduced, and shortcomings of existing network based location specific services are overcome.
Abstract: A data sharing platform can be used to implement a method for allowing at least one entity which makes payments with a payment network to share transaction data. A database containing the transaction data from the at least one entity which makes payments with the payment network is maintained. A user interface is provided, which presents the at least one entity which makes payments with the payment network with at least one selection providing consent to sharing of at least a portion of the transaction data with at least one third party. The consent from the at least one entity which makes payments with the payment network is obtained, via the at least one selection. Interfacing takes place with the at least one third party to share the at least portion of the transaction data.
Type:
Grant
Filed:
September 19, 2012
Date of Patent:
July 28, 2015
Assignee:
MASTERCARD INTERNATIONAL INCORPORATED PURCHASE
Abstract: Various techniques are provided for the gifting between multiple electronic devices of media content provided by an online digital media provider. An offer and acceptance of a selected gift file is accomplished between a gifter device and a receiving giftee device using a near-field communication (NFC) connection. If a connection to the online provider is available, the gifter device may transmit a gift request by which the gifter's account is charged for the gift file. Thereafter, a gift file created using DRM keys associated with the giftee's account may be downloaded to the giftee device. If a network connection is unavailable, the giftee device may transfer a locked gift file and a corresponding gift license to the giftee device using a peer-to-peer connection. The giftee device may authenticate the license and unlock the gift file once a connection to the online provider is available.
Type:
Grant
Filed:
September 30, 2008
Date of Patent:
June 30, 2015
Assignee:
Apple Inc.
Inventors:
Gloria Lin, Amir Mahmood Mikhak, Taido Lantz Nakajima, Sean Anthony Mayo, Michael Rosenblatt, Andrew Hodge
Abstract: A system and method for monitoring the performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance metric information associated with processing a request for an original resource and any embedded resource. The processing device uses the processed performance metric information to determine a set of service providers for alternatively hosting, processing, and/or transmitting at least a portion of the original resource and/or any embedded resources. In some embodiments, in making such a determination, the processing device assesses performance metric information collected and associated with subsequent resource requests for the original resource and any embedded resources using each of a variety of alternative set(s) of service providers.
Type:
Grant
Filed:
January 10, 2014
Date of Patent:
June 30, 2015
Assignee:
Amazon Technologies, Inc.
Inventors:
Mark S. Baumback, David William Bettis, Jonathan A. Jenkins
Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for identifying documents related to a person, deriving behavior and personality trait metrics from analyzing the documents for information relevant to assessing behavior and personality of the person, and determine a trustworthiness score or compatibility score of the person based on the behavior and personality trait metrics using a scoring system.
Type:
Grant
Filed:
September 16, 2014
Date of Patent:
June 30, 2015
Assignee:
TROOLY INC.
Inventors:
Sarabjit Singh Baveja, Anish Das Sarma, Nilesh Dalvi
Abstract: According to one aspect, the subject matter described herein includes a method for secure near field communication (NFC) of a non-secure memory element payload. The method includes receiving, at an NFC enabled mobile device and from a content provider, a payload. The method also includes storing the received payload in a non-secure memory element of the NFC enabled mobile device. The method further includes transferring the stored payload from the non-secure memory element of the NFC enabled mobile device to a secure memory element of the NFC enabled mobile device, wherein transferring the stored payload includes loading the stored payload into a secure reloadable payload instance. The method further includes establishing a NFC link between the NFC enabled mobile device and an NFC reader. The method further includes communicating, via the NFC link, the transferred payload from the secure reloadable payload instance to the NFC reader.
Type:
Grant
Filed:
September 14, 2011
Date of Patent:
June 30, 2015
Assignee:
MASTERCARD INTERNATIONAL INCORPORATED
Inventors:
Mohammad Khan, Philippe Martin, Pradeep Kumar, Jean-Christophe Raynon, Kaushik Roy, Roshan Vijayshankar
Abstract: Methods and systems of authenticating electronic identification (ID) documents may provide for receiving a decryption key and an encrypted ID document from a certificate authority server at a mobile device, wherein the encrypted ID document includes a read only document having a photograph of an individual. Additionally, the decryption key may be applied to the encrypted ID document to obtain a decryption result in response to a display request. The decryption result can be output via a display of the mobile device, wherein the encrypted ID document can be sent to a challenge terminal if a challenge request is received.
Type:
Grant
Filed:
July 3, 2012
Date of Patent:
June 16, 2015
Assignee:
International Business Machines Corporation
Abstract: A computer implemented method to exchange virtual goods in a virtual environment includes receiving funds at a trading platform from a buyer. The buyer is provided with a first secret that the buyer can decrypt and a second secret that the buyer cannot decrypt. The buyer is authenticated to a seller using the first secret. A virtual item is delivered from the seller to the buyer in response to authenticating. The buyer delivers to the seller the second secret for decryption by the seller. The seller is authenticated at the trading platform with the second secret. The seller is supplied with the funds.
Abstract: To facilitate conducting a financial transaction via wireless communication between an electronic device and another electronic device, the electronic device determines a unique transaction identifier for the financial transaction based on financial-account information communicated to the other electronic device. The financial-account information specifies a financial account that is used to pay for the financial transaction. Moreover, the unique transaction identifier may be capable of being independently computed by one or more other entities associated with the financial transaction (such as a counterparty in the financial transaction or a payment network that processes payment for the financial transaction) based on the financial-account information communicated by the portable electronic device.
Type:
Application
Filed:
September 2, 2014
Publication date:
May 21, 2015
Inventors:
George R. Dicker, Christopher B. Sharp, Ahmer A. Khan, Yousuf H. Vaid, Glen W. Steele, Christopher D. Adams, David T. Haggerty
Abstract: Systems, methods, and devices for providing and managing electronic event tickets are provided. For example, a device for managing an electronic event ticket may include a processor configured to run an electronic ticket management application, a memory device configured to store data associated with the electronic ticket management application, an electronic display configured to display at least a portion of the data associated with the electronic ticket management application, and an input/output interface configured to receive an electronic ticket and the data associated with the electronic ticket for management by the electronic ticket management application. The electronic ticket management application may be configured to enable the electronic device to gain entry to an event and to obtain at least one other event-related benefit after the electronic ticket is received by the input/output interface.
Abstract: An interface module configured to provide codes to be used in determining an availability status of service points, wherein the module receives status data from a secure transaction system and selects a predetermined code or generates a code in accordance with predefined syntax, the code indicative of the availability of the service points and relays the selected code to a retail customer queue management system for determining the availability of a service point.
Abstract: A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication device. The mobile application is hosted on the mobile communication device through the server as a Software as a Service (SaaS). The method further includes transmitting data associated with the mobile application between the mobile communication device and the server, in which transmission of the data between the mobile communication device and the server is monitored through the server.
Abstract: A wireless financial transaction instrument, such as a card, has a magnetic stripe, a display, and an on-board power supply, such as a battery, and is usable with a dual capture point of sale terminal. Information is received by such a terminal from the card wirelessly, and also from the magnetic stripe, and the data received contactlessly is preferably used to verify that read from the stripe. The display can display the account number on command, or to display a current balance, or amount of credit remaining, or any combination of these items of information.
Type:
Application
Filed:
January 5, 2015
Publication date:
May 7, 2015
Inventors:
David S. Bonalle, Michael D. Donovan, Sherrie G. Jackson, Scott Glen Paylor, Medina J. Senghore, Tracey R. Thomas
Abstract: A method and system for conducting an online payment transaction through a point of sale device. The method includes receiving input from a user selecting an item for purchase through the point of sale device; calculating a total purchase amount for the item in response to a request from the user to purchase the item; and sending payment authorization for the total purchase amount from the point of sale device to a payment entity, in which the payment authorization is sent to the payment entity via a mobile communication device of the user. The method further includes receiving a result of the payment authorization from the payment entity through the mobile communication device; and completing the payment transaction based on the result of the payment authorization.
Abstract: A method can include transmitting a plurality of encodings to a given computing device in a commercial transaction. The method can also include transmitting information characterizing an entity associated with the given computing device to another computing device in the commercial transaction. The method can further include transmitting a particular encoding of the plurality of encodings to the other computing device in the commercial transaction.
Abstract: A user interacts with content received from a remote server; content (e.g. feeds from social networking sites, advertisements) is received over a wireless network at a mobile telephone, which then automatically displays a specific item of the content on the mobile telephone, without the user explicitly requesting the display of that specific item of content. In response to the user selecting or highlighting the displayed specific item of content, the mobile telephone lists multiple options that, if individually selected, each initiate an associated action that corresponds to a particular way of responding to or interacting with the specific item of content.
Type:
Grant
Filed:
February 11, 2008
Date of Patent:
April 28, 2015
Assignee:
Critical Path Data Limited
Inventors:
Lei Bramley, Russell Bulmer, Andrew Tiller, Neil Pepper, Graham French, Owen Day
Abstract: Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, and include a method for fraud prevention. A method includes receiving registration information for a user, including identities of the user and an authenticating device and a payment source identifier, and storing the registration information. A payment authorization request relating to a transaction purported to be by the user and including the payment source identifier is received. Using the payment source identifier, the identity of the user and the authenticating device is retrieved. A communication is provided to the user including transaction information. The message is delivered to the user at the authenticating device. The method also includes receiving (and subsequently forwarding) either a payment authorization or a payment repudiation responsive to the communication from the user by way of the authenticating device.
Abstract: Preventing fraud during an offline transaction by encoding a randomly-generated card verification code onto a smart card. The verification code is transmitted to a contactless device during each transaction, wherein it is cross-referenced with the account number to ensure presence of the card. Also, every transaction record is signed by an access key resident on the contactless device and certified by a signing key resident on a remote system. Funds may be deposited onto the card when the contactless device creates a deposit request, signs the request using an access key and transmits it to the remote system, which in turn processes the request and certifies it with a signing key. Funds may be withdrawn when the contactless device creates a withdrawal record and signs it using an access key. The remote system verifies the signatures and certifies the records using a signing key when the records are later transmitted.
Type:
Grant
Filed:
February 29, 2012
Date of Patent:
April 28, 2015
Assignee:
Google Inc.
Inventors:
Fan Jiang, Malgorzata Monika Lisowiec, Michael William Springer, Aneto Pablo Okonkwo, Patrick Pui Wah Leung
Abstract: Methods and apparatus to obtain transaction information are described. One example method includes conducting a transaction using a proximity-based communication link, storing information related to the transaction in a database of a mobile device, identifying a service based on the information, querying the service from the mobile device, wherein the query is based on the information, and obtaining detail of the transaction from the service based on the information. Other implementations are possible.
Abstract: A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication device. The mobile application is hosted on the mobile communication device through the server as a Software as a Service (SaaS). The method further includes transmitting data associated with the mobile application between the mobile communication device and the server, in which transmission of the data between the mobile communication device and the server is monitored through the server.
Abstract: A system and method for execution of financial and data transactions includes a point-of-sale device configured to execute a transaction in which at least one good or service is sold to an individual having a card with a storage medium encoding a card number. The transaction is completed after said point-of-sale device receives a data transmission authorizing said transaction. The point-of-sale device is configured to communicate via the Internet with a first computing system. The first computing system stores a set of instructions that cause the first computing system to evaluate the transaction to determine whether the transaction is to be authorized, and to send a transmission authorizing the transaction via the open network to said point-of-sale device.
Type:
Grant
Filed:
March 18, 2013
Date of Patent:
April 21, 2015
Assignee:
American Express Travel Related Services Company, Inc.
Abstract: A device, system, and method for conducting a secure transaction over a network includes receiving from a user, being issued a stored-value financial instrument, a dollar amount to be associated to the stored-value financial instrument, communicating the dollar amount to a debit agent residing on a network processing and communication device, receiving at the debit agent a selection of a non-integrated financial institution selected from a list that includes at least one non-integrated financial institution, receiving at the debit agent a financial-institution user-identifier from the user, communicating the financial-institution user-identifier from the debit agent to the selected non-integrated financial institution, participating in a user-free electronic dialogue between the debit agent and the selected non-integrated financial institution, the dialogue including a request to transfer funds from the selected non-integrated financial institution, and transferring, with the debit agent, the funds from the s
Type:
Grant
Filed:
September 10, 2012
Date of Patent:
April 21, 2015
Assignee:
Mazooma Technical Services, Inc.
Inventors:
Qun Chen, Kenneth James Emerson, Edward Vincent O'Meara
Abstract: A method and system for conducting an online payment transaction through a point of sale device. The method includes receiving input from a user selecting an item for purchase through the point of sale device; calculating a total purchase amount for the item in response to a request from the user to purchase the item; and sending payment authorization for the total purchase amount from the point of sale device to a payment entity, in which the payment authorization is sent to the payment entity via a mobile communication device of the user. The method further includes receiving a result of the payment authorization from the payment entity through the mobile communication device; and completing the payment transaction based on the result of the payment authorization.
Abstract: A method and system for allowing the setting of reservations and the pre-authorization of credit to purchase a desired service for which a reservation is made. A customer accesses a reservation system that is integrated with a credit authorization system. The customer may make a reservation and substantially simultaneously become pre-authorized to pay for services to be provided at the reservation by one of any number of credit providers. Pre-authorized credit and reservation information is then supplied to the service provider in advance of services being provided, expediting the overall transaction time and allowing for a secure and cardless transaction procedure. The reservation and preauthorization information are typically stored upon the reservation system and then passed to the point-of-sale systems, but other types of input/output storage devices could be used to perform this function.
Abstract: A method of iris scanning and proximity sensing, which includes receiving and photographing an iris in the iris scanning mode of the subject computer, laptop, mobile device or tablet, smartphone or i-phone; sensing for the available amount of necessary light and whether the iris is within the desired range to ensure proper acquisition of the sample. The iris is then photographed. The method provides for recognizing the iris utilizing the previously photographed iris image and converting the photographed iris image to an encrypted mathematical value, which will then be stored within the acquiring electronic device such as computer, laptop, smartphone; i-phone; mobile device or tablet, to be compared for future reference against any subject photographed iris. If any subsequently photographed iris matches the encrypted mathematical stored image, access to the device is granted. If the subsequently photographed iris does not match the encrypted mathematical stored image, access is denied.
Abstract: Wireless personal area network (Zigbee, Bluetooth, UWB) and wireless identification technologies (Near Field Communication (NFC), Radio Frequency Identification (RFID)) are implemented in particular client server functions and communications. Connected with an Authentication Server, a wireless HUB authenticates user identification and provides the user with access to secure data communication with a wireless terminal such as a cellular phone or a PDA. A Location Server provides user locations via methods such as RSSI, TDOA, and GPS and sends location information to a Center Control Server and the Authentication Server. With location information, the Center Control Server initiates and optimizes secure information processes and coordinates the functions of servers and user terminals.
Type:
Grant
Filed:
September 14, 2012
Date of Patent:
April 7, 2015
Assignee:
Virginia Innovation Sciences, Inc
Inventors:
Tiejun Wang, Guang Zeng, Tiehong Wang, Ning Wang
Abstract: The invention relates to a method for securing IP connections with a combinatory connection of a communication network of a first network operator with a communication network of at least one second network operator using the Session Initiation Protocol, SIP. This method is based on the fact that portions of an SIP message, but at least the information necessary for the combinatory connection of the networks, is transmitted in encrypted form between a transmission channel of the first network operator and a reception channel of the second network operator.
Abstract: Methods and systems for virtual checking are described. A virtual check is created by a payor's device and then sent to the payee's device. The payee can be another mobile device. The virtual check has many of the same features as a regular, paper check plus additional features only available in digital form. In an example, the data can be encrypted by either the banks key or the payor's key. Further encryption can occur between the payor's device and the payee's device, which can connect on a peer-to-peer network. The check can be an image with tag data. In an example, data can be encoded into the image itself. The virtual check can include populated data that cannot be changed by the payee. In an example, the virtual check application of the payee can automatically perform a funds availability check.
Abstract: Provided are computer implemented methods and systems for messaging, calling, and one-touch payments via mobile and wearable devices. An exemplary system comprises a processor and a database in communication with the processor. The processor is configured to provide an integrated interface for selection of an activity mode. The activity mode includes a messaging mode, a calling mode, and a one-touch payment mode. The processor is further configured to receive the selection of the activity mode via the integrated interface from a user. If the messaging mode is selected, a message from the user is received and sent to a recipient via a data network. If the calling mode is selected, a data network call is initiated on a call request of the user. If the one-touch payment mode is selected, a payment request is transmitted to a financial organization.
Type:
Grant
Filed:
November 27, 2014
Date of Patent:
March 24, 2015
Inventors:
Tiger T G Zhou, Dylan T X Zhou, Andrew H B Zhou
Abstract: Mechanisms are provided for collecting configuration data from components of a managed computing system environment. A portion of code is obtained, in a data processing system, from a data collection system that does not have security credentials to allow the data collection system to directly access to the managed computing system environment. The portion of code is executed by the data processing system using security credentials maintained in the data processing system. Executing the portion of code causes the data processing system to access the managed computing system environment and collect configuration data from the managed computing system environment. The data processing system, via the portion of code, provides the configuration data collected from the managed computing system to the data collection system which stores the collected configuration data in a data storage.
Type:
Grant
Filed:
June 29, 2012
Date of Patent:
March 24, 2015
Assignee:
International Business Machines Corporation
Inventors:
Joel W. Branch, Michael E. Nidd, Ruediger Rissmann
Abstract: A method and system for providing procurement services to customer companies. A user profile for each user, in a computer database, specifies: (i) each user is authorized by a first customer company of the customer companies to access procurement resources and the procurement services for purchasing items and (ii) the first customer company and a first company group of related customer companies. Access to volume discounts with respect to vendors is provided to all customer companies in the first company group. Companies are authorized to have access to and share each procurement resource, by providing a resource profile specifying for each procurement resource a set of customer companies authorized for accessing and sharing each procurement resource to be shared among the users. Access to the procurement resources is controlled resources based on: the first company group, the first customer company, and the resource profile for each procurement resource.
Type:
Grant
Filed:
January 7, 2014
Date of Patent:
March 24, 2015
Assignee:
International Business Machines Corporation
Inventors:
Susan B. Cirulli, Robert M. Evans, Gerald R. Robinson, Sherry L. Wilson
Abstract: A method and system for bringing together online and offline advertising uses anonymous links that are associated with consumer data. The anonymous links allow processing without personally identifiable information (PII) in a secure environment. Data is matched using the anonymous links, and further using identifiers that are encrypted for use in connection with individual match distribution partners. The method and system allows a marketer to utilize offline data to precisely target advertisements without the use of PII, and to perform analytics concerning the use of the online advertisements to more precisely determine the effectiveness of multichannel marketing efforts.
Type:
Application
Filed:
September 5, 2014
Publication date:
March 19, 2015
Inventors:
Thierry Roullier, Dana S. Robbins, Linda Young, Scott Jones, Mike Zuckerman
Abstract: A micropayment system and method is presented for a payor U to establish payment to payee M for a transaction T, which typically has a very low value TV. The micropayment scheme minimizes the bank's processing costs, while at the same time eliminating the need for users and merchants to interact in order to determine whether a given micropayment should be selected for payment. In one embodiment, the micropayment scheme includes time constraints, which require that an electronic check C for the transaction T be presented to a bank B for payment within a predetermined time/date interval. In another embodiment, the micropayment scheme includes a selective deposit protocol, which guarantees that a user is never charged in excess of what he actually spends, even within a probabilistic framework. In another embodiment, the micropayment scheme includes a deferred selection protocol, which provides the bank with control and flexibility over the payment selection process.
Abstract: A method of conducting secure electronic credit payments to a payment acquirer using a credit payment unit, comprising of a smart card, a portable card reader device and a mobile phone, and a payment server. The method is based on using a unique reader key in the card reader device to encrypt all the sensitive smart card information communicated to the payment server, and thus being able to use an unsecure mobile phone to communicate with the payment server. The payment server then completes the transaction with the payment acquirer over a secure line.
Abstract: The invention relates to a method and an arrangement for concealing the true identity of a user in a communications system comprising a first user equipment having a first characteristic identifier, a second user equipment having a second characteristic identifier, a service network serving the first and the second user equipment. The method according to the invention comprises: requesting a virtual identifier by means of the first user equipment; establishing the virtual identifier for the first user equipment; linking the virtual identifier of the first user equipment to the first characteristic identifier of the first user equipment and using the virtual identifier of the first user equipment for communication between the first and the second user equipment.