Purchasing data management method and system
First Claim
1. A method comprising:
- retrieving, by a computing system from an RFID tag, first identification data associated with a first buyer, wherein said first buyer is associated with a first purchase of a first product;
automatically retrieving, by said computing system from a one dimensional barcode of said first product, first product data associated with said first product;
comparing, by said computing system, said first product data to campaign data associated with a first campaign for obtaining customer loyalty rewards from a first entity associated with said first product;
determining, by said computing system based on results of said comparing, that said first product is associated with said first campaign, wherein said determining comprises performing a verification test via usage of virtual secured collectors;
generating, by said computing system in response to said determining, second identification data including a signature identifying a distributor and organism managing said purchasing campaign, wherein generating said second identification data comprises generating said second identification based on said first identification data, an identification code for said first product, a campaign code indicating that said first product is associated with said first campaign, and a date of purchase for said first product, and wherein generating said second identification data further comprises calculating said signature as follows;
RSAencrypt(RSAencrypt(Hash(said second identification data),KprDistributor),KpuOrganism);
generating, by said computing system, first encrypted data by encrypting said second identification data, wherein said generating said first encrypted data comprises;
generating, by said computing system, an encrypted two dimensional bar code comprising said first encrypted data;
adding, by said computing system to said two dimensional bar code, error correction codes associated with said first encrypted data;
printing, by said computing system on a proof of purchase ticket for said first buyer, said two dimensional bar code comprising said error correction codes;
reading, by said computing system via said error correction codes increasing a symbol strength of said two dimensional bar code, said two dimensional barcode from a damaged version of said proof of purchase ticket;
transmitting, by said computing system to a location corresponding to said first buyer in said virtual secured collectors, said first encrypted data;
retrieving, by said computing system from said virtual secured collectors, said first encrypted data and second encrypted data, wherein said second encrypted data comprises said first identification data, an identification code for a second product, a second campaign code indicating that a second product is associated with said first campaign, and a date of purchase for said second product;
determining, by said computing system based on data included in said first encrypted data and said second encrypted data, that purchases defined in said first encrypted data and said second encrypted data exceed a predetermined criteria;
generating, by said computing system based on said determining that said purchases defined in said first encrypted data and said second encrypted data exceed said predetermined criteria, credit data specifying cash credits associated with said first buyer for purchasing products associated with said first entity;
retrieving, by said computing system, second identification data associated with a second buyer differing from said first buyer;
retrieving, by said computing system from said virtual secured collectors, said first encrypted data;
determining, by said computing system based on said second identification data and said first identification data in said first encrypted data, that said second buyer is not authorized to access said first encrypted data and said credit data;
generating, by said computing system based on said determining that said second buyer is not authorized to access said first encrypted data and said credit data, alert data indicating that said second buyer is not authorized to access said first encrypted data and said credit data; and
transmitting, by said computing system, said alert data to a store security department or a police department.
2 Assignments
0 Petitions
Accused Products
Abstract
A data management method and system. The method includes retrieving by a computing system, first identification data associated with a buyer of a product. The computing system retrieves product data associated with the product. The product data is compared to campaign data associated with a campaign. The campaign is associated with an entity associated with the product. The computing system determines that the product is associated with the campaign. The computing system generates second identification data comprising the first identification data, an identification code for the product, a campaign code indicating that the product is associated with the campaign, and a date of purchase for the product. The computing system generates encrypted data comprising the second identification data in an encrypted format. The encrypted data is transmitted to a secure database system.
16 Citations
6 Claims
-
1. A method comprising:
-
retrieving, by a computing system from an RFID tag, first identification data associated with a first buyer, wherein said first buyer is associated with a first purchase of a first product; automatically retrieving, by said computing system from a one dimensional barcode of said first product, first product data associated with said first product; comparing, by said computing system, said first product data to campaign data associated with a first campaign for obtaining customer loyalty rewards from a first entity associated with said first product; determining, by said computing system based on results of said comparing, that said first product is associated with said first campaign, wherein said determining comprises performing a verification test via usage of virtual secured collectors; generating, by said computing system in response to said determining, second identification data including a signature identifying a distributor and organism managing said purchasing campaign, wherein generating said second identification data comprises generating said second identification based on said first identification data, an identification code for said first product, a campaign code indicating that said first product is associated with said first campaign, and a date of purchase for said first product, and wherein generating said second identification data further comprises calculating said signature as follows; RSAencrypt(RSAencrypt(Hash(said second identification data),KprDistributor),KpuOrganism); generating, by said computing system, first encrypted data by encrypting said second identification data, wherein said generating said first encrypted data comprises; generating, by said computing system, an encrypted two dimensional bar code comprising said first encrypted data; adding, by said computing system to said two dimensional bar code, error correction codes associated with said first encrypted data; printing, by said computing system on a proof of purchase ticket for said first buyer, said two dimensional bar code comprising said error correction codes; reading, by said computing system via said error correction codes increasing a symbol strength of said two dimensional bar code, said two dimensional barcode from a damaged version of said proof of purchase ticket; transmitting, by said computing system to a location corresponding to said first buyer in said virtual secured collectors, said first encrypted data; retrieving, by said computing system from said virtual secured collectors, said first encrypted data and second encrypted data, wherein said second encrypted data comprises said first identification data, an identification code for a second product, a second campaign code indicating that a second product is associated with said first campaign, and a date of purchase for said second product; determining, by said computing system based on data included in said first encrypted data and said second encrypted data, that purchases defined in said first encrypted data and said second encrypted data exceed a predetermined criteria; generating, by said computing system based on said determining that said purchases defined in said first encrypted data and said second encrypted data exceed said predetermined criteria, credit data specifying cash credits associated with said first buyer for purchasing products associated with said first entity; retrieving, by said computing system, second identification data associated with a second buyer differing from said first buyer; retrieving, by said computing system from said virtual secured collectors, said first encrypted data; determining, by said computing system based on said second identification data and said first identification data in said first encrypted data, that said second buyer is not authorized to access said first encrypted data and said credit data; generating, by said computing system based on said determining that said second buyer is not authorized to access said first encrypted data and said credit data, alert data indicating that said second buyer is not authorized to access said first encrypted data and said credit data; and transmitting, by said computing system, said alert data to a store security department or a police department. - View Dependent Claims (2)
-
-
3. A computing system comprising a computer processor and a computer-readable memory coupled to said computer processor, said memory comprising instructions that when executed by the computer processor, cause the computer processor to perform the steps of:
-
retrieving from an RFID tag, first identification data associated with a first buyer, wherein said first buyer is associated with a first purchase of a first product; automatically retrieving, from a one dimensional barcode of said first product, first product data associated with said first product; comparing said first product data to campaign data associated with a first campaign for obtaining customer loyalty rewards from a first entity associated with said first product; determining, based on results of said comparing, that said first product is associated with said first campaign, wherein said determining comprises performing a verification test via usage of virtual secured collectors; generating, in response to said determining, second identification data including a signature identifying a distributor and organism managing said purchasing campaign, wherein generating said second identification data comprises generating said second identification based on said first identification data, an identification code for said first product, a campaign code indicating that said first product is associated with said first campaign, and a date of purchase for said first product, and wherein generating said second identification data further comprises calculating said signature as follows; RSAencrypt(RSAencrypt(Hash(said second identification data), KprDistributor), KpuOrganism); generating first encrypted data by encrypting said second identification data, wherein said generating said first encrypted data comprises; generating an encrypted two dimensional bar code comprising said first encrypted data; adding, to said two dimensional bar code, error correction codes associated with said first encrypted data; printing, on a proof of purchase ticket for said first buyer, said two dimensional bar code comprising said error correction codes; reading, via said error correction codes increasing a symbol strength of said two dimensional bar code, said two dimensional barcode from a damaged version of said proof of purchase ticket; transmitting, to a location corresponding to said first buyer in said virtual secured collectors said first encrypted data; retrieving, from said virtual secured collectors, said first encrypted data and second encrypted data, wherein said second encrypted data comprises said first identification data, an identification code for a second product, a second campaign code indicating that a second product is associated with said first campaign, and a date of purchase for said second product; determining, based on data included in said first encrypted data and said second encrypted data, that purchases defined in said first encrypted data and said second encrypted data exceed a predetermined criteria; generating, based on said determining that said purchases defined in said first encrypted data and said second encrypted data exceed said predetermined criteria, credit data specifying cash credits associated with said first buyer for purchasing products associated with said first entity; retrieving second identification data associated with a second buyer differing from said first buyer; retrieving, from said virtual secured collectors, said first encrypted data; determining, based on said second identification data and said first identification data in said first encrypted data, that said second buyer is not authorized to access said first encrypted data and said credit data; generating, based on said determining that said second buyer is not authorized to access said first encrypted data and said credit data, alert data indicating that said second buyer is not authorized to access said first encrypted data and said credit data; and transmitting said alert data to a store security department or a police department. - View Dependent Claims (4, 5)
-
-
6. A computer program product, comprising computer readable hardware storing a computer readable program code, said computer readable program code comprising an algorithm that when executed by a computer processor of a computing system causes the computer processor to perform the steps of:
-
retrieving from an RFID tag, first identification data associated with a first buyer, wherein said first buyer is associated with a first purchase of a first product; automatically retrieving from a one dimensional barcode of said first product, first product data associated with said first product; comparing said first product data to campaign data associated with a first campaign for obtaining customer loyalty rewards from a first entity associated with said first product; determining, based on results of said comparing, that said first product is associated with said first campaign, wherein said determining comprises performing a verification test via usage of virtual secured collectors; generating, in response to said determining, second identification data including a signature identifying a distributor and organism managing said purchasing campaign, wherein generating said second identification data comprises generating said second identification based on said first identification data, an identification code for said first product, a campaign code indicating that said first product is associated with said first campaign, and a date of purchase for said first product, and wherein generating said second identification data further comprises calculating said signature as follows; RSAencrypt(RSAencrypt(Hash(said second identification data),KprDistributor),KpuOrganism); generating first encrypted data by encrypting said second identification data, wherein said generating said first encrypted data comprises; generating an encrypted two dimensional bar code comprising said first encrypted data; adding, to said two dimensional bar code, error correction codes associated with said first encrypted data; printing, on a proof of purchase ticket for said first buyer, said two dimensional bar code comprising said error correction codes; reading, via said error correction codes increasing a symbol strength of said two dimensional bar code, said two dimensional barcode from a damaged version of said proof of purchase ticket; transmitting, to a location corresponding to said first buyer in said virtual secured collectors, said first encrypted data; retrieving, from said virtual secured collectors, said first encrypted data and second encrypted data, wherein said second encrypted data comprises said first identification data, an identification code for a second product, a second campaign code indicating that a second product is associated with said first campaign, and a date of purchase for said second product; determining, based on data included in said first encrypted data and said second encrypted data, that purchases defined in said first encrypted data and said second encrypted data exceed a predetermined criteria; generating, based on said determining that said purchases defined in said first encrypted data and said second encrypted data exceed said predetermined criteria, credit data specifying cash credits associated with said first buyer for purchasing products associated with said first entity; retrieving second identification data associated with a second buyer differing from said first buyer; retrieving, from said virtual secured collectors, said first encrypted data; determining, based on said second identification data and said first identification data in said first encrypted data, that said second buyer is not authorized to access said first encrypted data and said credit data; generating, based on said determining that said second buyer is not authorized to access said first encrypted data and said credit data, alert data indicating that said second buyer is not authorized to access said first encrypted data and said credit data; and transmitting said alert data to a store security department or a police department.
-
Specification