×

Secure coupon distribution

  • US 8,775,245 B2
  • Filed: 02/11/2010
  • Issued: 07/08/2014
  • Est. Priority Date: 02/11/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • providing for an entity that is not a user, using one or more computers, a first location identifier for use on a first public-facing webpage to the entity, and a non-public location identifier that points to a token generator configured in the one or more computers, the first location identifier pointing to a second webpage that includes a link identifier indicative of a discount certificate to be printed;

    receiving from a server of the entity that is not a user a token request at the token generator identified by the non-public location identifier, using the one or more computers, the token request comprising the non-public location identifier, the link identifier and a key for the discount certificate that is stored in one or more databases, and at least a user identifier associated with the user;

    verifying the key for the discount certificate, using the one or more computers;

    generating, if the key for the discount certificate is verified, using the one or more computers, a particular token in response to the token request and determining a generation time when the particular token was generated and storing or having stored that generation time in the one or more databases, wherein the token generator generates the particular token based at least in part upon the user identifier;

    passing the particular token back to the entity that is not a user, whereupon the particular token is appended to the first location identifier;

    receiving a print request to print the discount certificate, the print request comprising the first location identifier with the appended particular token;

    accessing, using the one or more computers, the generation time stored in the one or more databases and determining whether a threshold time has expired; and

    verifying, using the one or more computers, the user identifier; and

    authorizing the print request only if the first location identifier has appended thereto, the particular token that was generated in response to the token request, and the threshold time for the token has not expired relative to the time when the token was generated.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×