Secured communication system and data model to facilitate authorization to access rental property
First Claim
1. A computer-implemented method comprising:
- under control of a server computing device configured with specific computer-executable instructions,receiving data from an inquirer representing an inquiry regarding a rental property, the data including identity data that identifies a traveler;
identifying a responder associated with the rental property;
establishing a data arrangement representing a messaging dialogue between the inquirer and the responder, the messaging dialogue including data representing exchange of electronic messages;
suppressing, by the server computing device, transmission of the identity data to the responder during the exchange of the electronic messages;
determining, based at least in part on the identity data and a comparison between content of the electronic messages and content of previously exchanged electronic messages, a degree of risk that the inquirer is fraudulently impersonating the traveler; and
transmitting data representing the degree of risk to the responder.
7 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments relate generally to electrical and electronic hardware, computer software and systems, wired and wireless network communications, and wearable computing devices for establishing a secure, closed-loop communication channel for authorizing access to rental properties. More specifically, a system, a device and a method are configured to facilitate authorization via secure communications between an inquiring entity and a responding entity to access a rental property. In one or more embodiments, a method can include establishing a data arrangement representing a messaging dialog between an inquirer and a responder. The messaging dialog may include data representing exchange of electronic messages. Further, the method may include suppressing transmission of the identity data of the inquirer and the responder during the exchange of the electronic messages to form secured messages, and generating anonymized transaction data representing authorization to access the rental property.
-
Citations
20 Claims
-
1. A computer-implemented method comprising:
under control of a server computing device configured with specific computer-executable instructions, receiving data from an inquirer representing an inquiry regarding a rental property, the data including identity data that identifies a traveler; identifying a responder associated with the rental property; establishing a data arrangement representing a messaging dialogue between the inquirer and the responder, the messaging dialogue including data representing exchange of electronic messages; suppressing, by the server computing device, transmission of the identity data to the responder during the exchange of the electronic messages; determining, based at least in part on the identity data and a comparison between content of the electronic messages and content of previously exchanged electronic messages, a degree of risk that the inquirer is fraudulently impersonating the traveler; and transmitting data representing the degree of risk to the responder. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
18. A device comprising:
-
a memory configured to store computer-executable instructions; a processor in communication with the memory, wherein the computer-executable instructions, when executed by the processor, configure the processor to at least; receive, from an inquirer, data representing an inquiry regarding a rental property, the data including identity data that identifies a traveler; identify a responder associated with the rental property; establish a data arrangement representing a messaging dialogue between the inquirer and the responder, the messaging dialogue including data representing exchange of electronic messages; suppress transmission of the identity data to the responder during the exchange of the electronic messages; determine, based at least in part on the identity data and a comparison between content of the electronic messages and content of at least one previously exchanged electronic message, a degree of risk that the inquirer is fraudulently impersonating the traveler; and transmit data representing the degree of risk to the responder. - View Dependent Claims (19, 20)
-
Specification