会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 91. 发明申请
    • Secure networked transaction system
    • US20060143119A1
    • 2006-06-29
    • US11246907
    • 2005-10-07
    • Scott KruegerDaniel Goodman
    • Scott KruegerDaniel Goodman
    • G06Q40/00
    • G06Q30/06G06Q20/02G06Q20/04G06Q20/10G06Q20/102G06Q20/12G06Q20/24G06Q20/3674G06Q20/382G06Q20/383G06Q20/385G06Q20/40G06Q20/401G06Q20/4012G06Q20/403G06Q40/00G06Q40/025
    • A method and system for approval by a verification computer of an online transaction between a user computer and a merchant computer over the Internet. The user computer transmits a transaction request to the merchant computer, which may include a product to be purchased and the payment amount. The merchant computer transmits to the verification computer a verification request including a first data string associated with the payment card (such as a debit card account number or a portion thereof) and the payment amount. The verification request is stored at the verification computer with a transaction identifier and a verification data string, which are also transmitted to the merchant computer. The merchant computer stores the verification data string as an expected verification data string and the transaction identifier, transmits the transaction identifier to the user computer, and the user computer transmits the transaction identifier to the verification computer. This may be accomplished by the merchant computer redirecting the web browser of the user computer to the verification computer. The user computer also transmits a second data string associated with the payment card (such as the PIN for the debit card) after being requested by the verification computer. The verification computer uses the transaction identifier received via the user computer to retrieve the verification request previously stored with that received transaction identifier, and then it performs a verification step by using the first data string associated with the payment card retrieved from storage and the second data string associated with the payment card received from the user computer to verify if the transaction should be approved, e.g. by determining if an account associated with the payment card is sufficient to cover the payment amount in the verification request. The verification computer will, upon successful verification that the transaction should be approved, transmit a verification approval message to the user computer, which includes the transaction identifier and the verification data string associated therewith as a confirmation verification data string, and the user computer transmits the verification approval message to the merchant computer. This may also be accomplished by the verification computer redirecting the web browser of the user computer to the merchant computer with the appropriate data. The merchant computer uses the transaction identifier in the verification approval message to retrieve an expected verification data string it had previously stored. The merchant computer then compares the expected verification data string with the confirmation verification data string from the verification approval message and indicates that the transaction has been approved if the comparison is positive.
    • 99. 发明授权
    • Momentary burst protocol for wireless communication
    • 用于无线通信的瞬时脉冲串协议
    • US07949317B2
    • 2011-05-24
    • US12030754
    • 2008-02-13
    • Scott KruegerGregory Lydon
    • Scott KruegerGregory Lydon
    • H04B1/04H04K3/00
    • H04W52/0209H04W52/0254H04W52/0274H04W52/286H04W52/34Y02D70/142Y02D70/144Y02D70/146
    • A method for communicating data using a “burst protocol” includes enabling power to transmitters and receivers when needed to balance power consumption with latency and unscheduled communication. A transmitter transmits a plurality of packets indicative of substantially the same payload. Power then may be disabled to the transmitter. A first predetermined time is determined to enable a receiver. A second predetermined time is determined to disable the receiver. Power then may be enabled to the receiver based on the first predetermined time. The payload is output in response to receiving one or more of the plurality of packets. Power to the receiver is disabled based on the second predetermined time.
    • 使用“脉冲串协议”传送数据的方法包括当需要时能够对发射机和接收机进行功率来平衡功率消耗与等待时间和非预定的通信。 发射机发送指示基本上相同有效载荷的多个分组。 发射机的功率可能被禁用。 确定第一预定时间以使接收机能够使用。 确定第二预定时间以禁用接收器。 可以基于第一预定时间向接收机启用功率。 响应于接收多个分组中的一个或多个分组而输出有效载荷。 基于第二预定时间禁用对接收机的电力。