Systems and Methods Facilitating Communication with Remote Computers
First Claim
1. A method utilizing a communications system, the system including a central computer, a first computer, a second, remote computer and a financial institution computer, the first computer comprising a reader, each of the computers communicating with a network, said method comprising:
- accessing the second, remote computer from the first computer;
launching on the first computer the reader to read an object comprising embedded, hidden data, the reader extracting identifying data from the embedded, hidden data;
accessing the central computer from the first computer to obtain a URL or pointer for the financial institution computer and a ticket, the URL or pointer being identified from the extracted identifying data;
passing the ticket from the first computer to the financial institution computer to obtain an authorization;
after receipt of the authorization, passing the authorization from the first computer to the second, remote computer; and
passing the authorization from the second, remote computer to the financial institution computer.
6 Assignments
0 Petitions
Accused Products
Abstract
A variety of systems and embodiments are disclosed. One embodiment provides a method including: maintaining a database including a plurality of records stored therein; obtaining first information derived from image or video data, the first information being derived remotely relative to performance of said method, the first information comprising a reduced-bit representation of the image or video data itself; determining whether the first information has been previously received with reference to at least the plurality of records stored in the database; and disregarding a request or action associated with the first information if the first information has been previously received. Of course, other combinations are provided and claimed as well.
93 Citations
19 Claims
-
1. A method utilizing a communications system, the system including a central computer, a first computer, a second, remote computer and a financial institution computer, the first computer comprising a reader, each of the computers communicating with a network, said method comprising:
-
accessing the second, remote computer from the first computer; launching on the first computer the reader to read an object comprising embedded, hidden data, the reader extracting identifying data from the embedded, hidden data; accessing the central computer from the first computer to obtain a URL or pointer for the financial institution computer and a ticket, the URL or pointer being identified from the extracted identifying data; passing the ticket from the first computer to the financial institution computer to obtain an authorization; after receipt of the authorization, passing the authorization from the first computer to the second, remote computer; and passing the authorization from the second, remote computer to the financial institution computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
maintaining a database including a plurality of records stored therein; obtaining first information derived from image or video data, the first information being derived remotely relative to performance of said method, the first information comprising a reduced-bit representation of the image or video data itself; determining whether the first information has been previously received with reference to at least the plurality of records stored in the database; disregarding a request or action associated with the first information if the first information has been previously received. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A method of determining an attack comprising:
-
obtaining data representing at least a human biometric; computing a first hash of obtained data; comparing the first hash with a plurality of stored hashes, the plurality of stored hashes comprising hashes corresponding to previously obtained data; and
identifying an attack if the first hash matches at least one hash of the plurality of hashes. - View Dependent Claims (16, 17, 18, 19)
-
Specification