×

Purchasing data management method and system

  • US 9,727,851 B2
  • Filed: 11/26/2008
  • Issued: 08/08/2017
  • Est. Priority Date: 11/24/2008
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method comprising:

  • retrieving, by a computing system from an RFID tag, first identification data associated with a first buyer, wherein said first buyer is associated with a first purchase of a first product;

    automatically retrieving, by said computing system from a one dimensional barcode of said first product, first product data associated with said first product;

    comparing, by said computing system, said first product data to campaign data associated with a first campaign for obtaining customer loyalty rewards from a first entity associated with said first product;

    determining, by said computing system based on results of said comparing, that said first product is associated with said first campaign, wherein said determining comprises performing a verification test via usage of virtual secured collectors;

    generating, by said computing system in response to said determining, second identification data including a signature identifying a distributor and organism managing said purchasing campaign, wherein generating said second identification data comprises generating said second identification based on said first identification data, an identification code for said first product, a campaign code indicating that said first product is associated with said first campaign, and a date of purchase for said first product, and wherein generating said second identification data further comprises calculating said signature as follows;

    RSAencrypt(RSAencrypt(Hash(said second identification data),KprDistributor),KpuOrganism);

    generating, by said computing system, first encrypted data by encrypting said second identification data, wherein said generating said first encrypted data comprises;

    generating, by said computing system, an encrypted two dimensional bar code comprising said first encrypted data;

    adding, by said computing system to said two dimensional bar code, error correction codes associated with said first encrypted data;

    printing, by said computing system on a proof of purchase ticket for said first buyer, said two dimensional bar code comprising said error correction codes;

    reading, by said computing system via said error correction codes increasing a symbol strength of said two dimensional bar code, said two dimensional barcode from a damaged version of said proof of purchase ticket;

    transmitting, by said computing system to a location corresponding to said first buyer in said virtual secured collectors, said first encrypted data;

    retrieving, by said computing system from said virtual secured collectors, said first encrypted data and second encrypted data, wherein said second encrypted data comprises said first identification data, an identification code for a second product, a second campaign code indicating that a second product is associated with said first campaign, and a date of purchase for said second product;

    determining, by said computing system based on data included in said first encrypted data and said second encrypted data, that purchases defined in said first encrypted data and said second encrypted data exceed a predetermined criteria;

    generating, by said computing system based on said determining that said purchases defined in said first encrypted data and said second encrypted data exceed said predetermined criteria, credit data specifying cash credits associated with said first buyer for purchasing products associated with said first entity;

    retrieving, by said computing system, second identification data associated with a second buyer differing from said first buyer;

    retrieving, by said computing system from said virtual secured collectors, said first encrypted data;

    determining, by said computing system based on said second identification data and said first identification data in said first encrypted data, that said second buyer is not authorized to access said first encrypted data and said credit data;

    generating, by said computing system based on said determining that said second buyer is not authorized to access said first encrypted data and said credit data, alert data indicating that said second buyer is not authorized to access said first encrypted data and said credit data; and

    transmitting, by said computing system, said alert data to a store security department or a police department.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×