Mobile payments using point-of-sale infrastructure

    公开(公告)号:US10366385B1

    公开(公告)日:2019-07-30

    申请号:US15494387

    申请日:2017-04-21

    Abstract: Existing infrastructure for processing credit card transactions at point-of-sale (POS) devices is leveraged to provide secure and convenient payment with a mobile device. A mobile transaction infrastructure that is integrated with the credit card interchange network receives information from the mobile device and passes this information to a gateway provider or a payment processor. By combining information from both the mobile device and the POS device, this backend infrastructure can uniquely identify a transaction and appropriately charge an account associated with the user of the mobile device. The transaction may be matched with the mobile device be based on location, time, transaction charge, and/or other factors.

    Tamper detection for hardware devices

    公开(公告)号:US09876645B1

    公开(公告)日:2018-01-23

    申请号:US14624480

    申请日:2015-02-17

    Abstract: A manufacturer of computing equipment may generate a signature for computing equipment by measuring various attributes of the computing equipment, such as the impedance across circuits included in the computing equipment. Verification equipment may be provided to a recipient of the computing equipment. The verification equipment may be configured to generate a signature of the computing equipment over a physical connection between the verification equipment and the computing equipment. A determination may be made whether the computing equipment has been tamper with based at least in part on the signature generated by the manufacturer and the signature generated by the recipient.

    Rule evaluation based on precomputed results
    4.
    发明授权
    Rule evaluation based on precomputed results 有权
    基于预先计算结果的规则评估

    公开(公告)号:US09563845B1

    公开(公告)日:2017-02-07

    申请号:US14297014

    申请日:2014-06-05

    Abstract: Techniques are described for employing precomputed results of applying rules to content items, the rules applicable to determine whether content items may be electronically published. On receiving a request for a content item, rules applicable to the content item may be identified. A datastore of precomputed results of rule application may be accessed to determine whether the datastore includes a result of applying a current or previous version of each rule. If the datastore includes a current result, the current result may be employed in determine whether the content item may be presented. If the datastore includes a previous result, the previous result may be so employed. If the datastore includes a previous result or no appropriate result, a job may be queued to calculate the current result asynchronously relative to the request for the content item.

    Abstract translation: 描述了使用将规则应用于内容项的预计算结果的技术,适用于确定内容项目是否可以被电子发布的规则。 在接收对内容项目的请求时,可以识别适用于内容项目的规则。 可以访问规则应用的预计算结果的数据存储区以确定数据存储是否包括应用每个规则的当前版本或先前版本的结果。 如果数据存储区包括当前结果,则可以使用当前结果来确定是否可以呈现内容项目。 如果数据存储包含先前的结果,则可能会使用以前的结果。 如果数据存储包含先前的结果或没有适当的结果,则作业可能被排队,以相对于内容项的请求异步计算当前结果。

    Secure execution and transformation techniques for computing executables

    公开(公告)号:US10262161B1

    公开(公告)日:2019-04-16

    申请号:US14580023

    申请日:2014-12-22

    Abstract: Techniques described and suggested herein include the use of transformation parameters, such as mathematical and/or cryptographic operations, to permute various aspects of executables so as to control executable code authorized to run on one or more hosts. For example, a set of transformation parameters, such as a mathematical operation and a specified value upon which the mathematical operation may operate, are associated with a host or group of hosts. The set of transformation parameters may be applied to one or more runtime-related numerical locations associated with an executable that is intended to run on the specified hosts. At runtime, appropriately encoded executables are decoded by the specified hosts and operate normally, while differently encoded or unencoded executables are inoperable by the specified hosts.

    Tamper detection for hardware devices

    公开(公告)号:US10243747B2

    公开(公告)日:2019-03-26

    申请号:US15874822

    申请日:2018-01-18

    Abstract: A manufacturer of computing equipment may generate a signature for computing equipment by measuring various attributes of the computing equipment, such as the impedance across circuits included in the computing equipment. Verification equipment may be provided to a recipient of the computing equipment. The verification equipment may be configured to generate a signature of the computing equipment over a physical connection between the verification equipment and the computing equipment. A determination may be made whether the computing equipment has been tamper with based at least in part on the signature generated by the manufacturer and the signature generated by the recipient.

    TAMPER DETECTION FOR HARDWARE DEVICES
    9.
    发明申请

    公开(公告)号:US20180159690A1

    公开(公告)日:2018-06-07

    申请号:US15874822

    申请日:2018-01-18

    Abstract: A manufacturer of computing equipment may generate a signature for computing equipment by measuring various attributes of the computing equipment, such as the impedance across circuits included in the computing equipment. Verification equipment may be provided to a recipient of the computing equipment. The verification equipment may be configured to generate a signature of the computing equipment over a physical connection between the verification equipment and the computing equipment. A determination may be made whether the computing equipment has been tamper with based at least in part on the signature generated by the manufacturer and the signature generated by the recipient.

Patent Agency Ranking