Class / Patent application number | Description | Number of patent applications / Date published |
705074000 | Anonymous user system | 6 |
20080243704 | Method and apparatus for certified secondary market inventory management - A certified secondary market inventory platform maintains a certified catalog of items for sale on a secondary market. Certified items are tracked by the platform and have a verified chain of custody between the manufacturer and the current owner. The certified catalog of items is presented anonymously, such that current owners of certified items are not revealed to potential buyers. Anonymity also extends to fulfillment, with shipment of a certified item to a buyer being performed without revealing the buyer and the current owner to each other. Verification of the chain of custody may, for example, include evidence such as a goods-received note corresponding to a shipment of the certified item from the manufacturer to the current owner, or a shipping notification from the manufacturer. A physical audit may also be conducted in association with publication of the certified catalog of items, as a pre-requisite for such publication. | 10-02-2008 |
20100241571 | SYSTEM AND METHOD FOR CARDLESS SECURE ON-LINE CREDIT CARD/DEBIT CARD PURCHASING - The invention is a system and method for cardless secure on-line purchasing using a credit/debit card. There is provided an on-line purchaser executing an on-line purchase with an on-line vendor having a credit/debit card payment screen. There is also at least one on-line credit/debit card service provider having an interface with the on-line purchaser the said on-line vendor. An e-authentication and credential service provider has an interface with the on-line purchaser and said at least one on-line credit/debit card service provider and provides means for secure on-line purchasing on a subscription basis by providing anonymity to the on-line purchase by hiding credit/debit card data during the on-line purchase making the purchase invisible to identity thieves and hackers. | 09-23-2010 |
20120203702 | APPARATUS AND METHOD FOR SECURING BANKCARD NUMBERS IN BANKCARDS AND DATABASES FOR PROTECTION AGAINST IDENTITY THEFT - Apparatus and method of securing bankcard data with an aliasing function that aliasing an original bank card number, having fields of a bank code, a serial number, and an expiration date, into an aliased bankcard number having substantially the same format. The aliasing function uses a heuristic algorithm for deriving an aliased bankcard number. The heuristic algorithm is referenced by a reference number in a database that stores a large number of heuristic algorithms. The reference number is appended to the aliased card number. The aliased card number with the reference number is encoded on a payment card substrate. | 08-09-2012 |
20140136422 | METHODS AND SYSTEMS FOR DATA SERVICES - A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. | 05-15-2014 |
20140207689 | SECURE PAYMENT AND BILLING METHOD USING MOBILE PHONE NUMBER OR ACCOUNT - A system, method and computer program product for processing payments for goods or services, including a payment processor that receives a payment request from a merchant for goods or services and that includes a mobile phone number or mobile phone account of a user, sends a payment authorization request text message to the mobile phone requesting payment authorization, and receives a payment authorization text message from the mobile phone authorizing or not authorizing the payment. If the payment is authorized, the payment processor pays the merchant and charges the mobile phone account for the payment. If the payment is not authorized or if the payment is not received within a predetermined period of time, the payment processor declines to pay the merchant for the goods or services. | 07-24-2014 |
20160140544 | SYSTEMS AND METHODS FOR EFFECTIVELY ANONYMIZING CONSUMER TRANSACTION DATA - Systems and methods are described that anonymized consumer transaction data in such manner to prevent de-anonymization to reveal personally identifiable information (PII) of the consumers. The process includes selecting particular consumer transaction data, generating a dictionary of items, generating consumer groups, matching consumer transaction data for each consumer to a group, forming modifiable consumer transaction histories, and quantifying a similarity between consumer groups. In some embodiments, the process includes discarding consumer groups that contain less than a threshold number of consumers, selecting at least one consumer group that contains at least a threshold number of consumers as the anonymized consumer transaction dataset, and providing the anonymized consumer transaction dataset to a third party for analysis. | 05-19-2016 |