Selecting ecosystem features for inclusion in operational tiers of a multi-domain ecosystem platform for secure personalized transactions
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06Q-020/36
G06Q-020/20
G06Q-020/32
G06Q-010/06
G06Q-030/06
G06Q-040/02
출원번호
US-0096711
(2013-12-04)
등록번호
US-10026079
(2018-07-17)
발명자
/ 주소
Desai, Mehul
Pitroda, Satyan G.
Maniar, Nehal
출원인 / 주소
MASTERCARD MOBILE TRANSACTIONS SOLUTIONS, INC.
대리인 / 주소
GTC Law Group PC & Affiliates
인용정보
피인용 횟수 :
0인용 특허 :
113
초록▼
Selecting ecosystem features for inclusion in operational tiers includes taking a reference implementation of a specific application adapted to operate in a multi-domain computing ecosystem and, using a computer, breaking down the reference implementation into service related components, determining
Selecting ecosystem features for inclusion in operational tiers includes taking a reference implementation of a specific application adapted to operate in a multi-domain computing ecosystem and, using a computer, breaking down the reference implementation into service related components, determining ecosystem participants for the reference implementation, and using a feature allocation engine to configure operational features that enable one of the service related components.
대표청구항▼
1. A method of automating configuration of servers and mobile clients as new participants in a multi-domain ecosystem comprising: taking a data structure of a reference implementation of a specific server-executable application operating across a client device and a server, the application using eac
1. A method of automating configuration of servers and mobile clients as new participants in a multi-domain ecosystem comprising: taking a data structure of a reference implementation of a specific server-executable application operating across a client device and a server, the application using each of a service tier, a personalization tier, and an enablement tier in a multi-domain computing ecosystem;using heuristics in an analysis of the data structure, the analysis performed by a computer to automatically break down the reference implementation into ecosystem configurable features selected from the list consisting of: service requirements, customer requirements, end-user requirements, regulatory mandates, regulatory guidelines, security mandates, security guidelines, security requirements, trust models, economic models, business logic, business workflow, commonality with other services, operational factors, design factors, technology factors, devices, platforms, projected technology evolution, and operating constraints;automatically determining with a networked computing device participants for the reference implementation selected from the list consisting of: end users, network providers, merchants, service providers, transaction instrument acquirers, transaction instrument issuers, widget providers, wallet providers, and trusted service managers;analyzing the broken down ecosystem configurable features of the reference implementation in view of service provider requirements for participating in the multi-domain ecosystem, thereby automatically establishing multi-domain ecosystem feature configuration parameters for effecting the implementation of each of the service tier, the enabling tier, and the personalization tier for at least a server of the service provider and at least one target mobile client device; andconfiguring a server of a new networked computing participant in the ecosystem with a service tier module that performs server-side transaction functions, the service tier module being configured based on the analyzed broken down features of the reference implementation, the configuring occurring over a network through which the participants in the ecosystem perform secure personalized transactions;configuring the new networked computing participant server further with a personalization tier module that performs server-side personalization of mobile device executable modules that upon execution by the mobile device enables a mobile device participant to perform secure personalized transactions with the newly configured server, the personalization tier being configured based on the analyzed broken down features of the reference implementation and occurring over the network through which the participants in the ecosystem perform secure personalized transactions, andconfiguring, over the network through which the participants in the ecosystem perform secure personalized transactions, the new networked computing participant server yet further with an enabling tier module, the enabling tier module being configured based on the analyzed broken down features of the reference implementation, the configured enabling tier providing device independence to the configured service tier module and the configured personalization tier module via at least one Application Programming Interface. 2. The method of claim 1, wherein the reference implementation is accessed by a server in a software development environment preparing each of the personalization, service, and enablement tiers. 3. The method of claim 1, wherein the reference implementation comprises an application selected from the list of reference applications consisting of finance, retail, health, and government. 4. The method of claim 1, wherein enablement tier set of operational features for the client device are selected from a client enablement feature list consisting of: user interface interpretation engine, business execution environment, widget lifecycle management, wallet lifecycle management, and over-the-air (OTA) transaction patterns. 5. The method of claim 1, wherein enablement tier set of operational features for a server are selected from a server enablement feature list consisting of: wallet management, stateful transaction engine, object lifecycle management, channel specific communication, multi-domain security policy and risk management, and over-the-air provisioning. 6. The method of claim 1, wherein service tier set of operational features for a client are selected from a client enablement feature list consisting of client side workflows, transaction service-specific templates, wallet instruments that facilitate mapping to real-world instruments, transaction-specific data, and authentication scheme trust models. 7. The method of claim 1, wherein the service tier set of operational features for a client are selected from a library of common ecosystem services that are used to implement a plurality of business use cases. 8. The method of claim 1, wherein service tier set of operational features for a server are selected from a library of business-specific components and associated service templates comprising wallet services, wallet lifecycle management services, and payment token management services. 9. The method of claim 1, wherein configuring a service tier for a server comprises configuring a plurality of service tier units that correspond with the specific application, comprising configuring a client-side workflow that supports various transaction services of a use case unit, configuring an electronic instrument or token unit, and a trust model unit. 10. The method of claim 1, wherein configuring a personalization tier for a client comprises configuring at least one of a wallet and a widget. 11. The method of claim 1, wherein personalization tier set of operational features for a client are selected from the client personalization feature list consisting of wallet services, privileged APIs, personal identification number size, exit confirmation, and handset-specific features. 12. The method of claim 1, wherein personalization tier set of operational features for a server are selected from the server personalization feature list consisting of wallet communication, widget content formatting, wallet application access to services, customization of parameters exposed to the user, and interfacing to third party services. 13. A method comprising: taking a reference implementation of a specific application operating in a multi-domain computing ecosystem;using a server to apply a set of rules that govern use of services by participants of the ecosystem to: break down the reference implementation into components selected from the list consisting of: service requirements, customer requirements, end-user requirements, regulatory mandates, regulatory guidelines, security mandates, security guidelines, security requirements, trust models, economic models, business logic, business workflow, commonality with other services, operational factors, design factors, technology factors, target devices, platforms, projected technology evolution, and operating constraints, wherein automatically breaking down the reference implementation is based, in least in part, on one or more of analytics and heuristics and is performed using an expert engine the operation of which is based, at least in part, on artificial intelligence; anddetermine with a server participants for the reference implementation selected from the list consisting of: end users, network providers, merchants, service providers, transaction instrument acquirers, transaction instrument issuers, widget providers, wallet providers, and trusted service managers; andconfiguring a server of a new networked computing participant in the ecosystem with a service tier module that performs server-side transaction functions, the service tier module being configured based on the broken down components of the reference implementation, the configuring occurring over a network through which the participants in the ecosystem perform secure personalized transactions;configuring the new networked computing participant server further with a personalization tier module that performs server-side personalization of mobile device executable modules that upon execution by the mobile device enables a mobile device participant to perform secure personalized transactions with the newly configured server, the personalization tier being configured based on the broken down components of the reference implementation and occurring over the network through which the participants in the ecosystem perform secure personalized transactions, andconfiguring, over the network through which the participants in the ecosystem perform secure personalized transactions, the new networked computing participant server yet further with an enabling tier module, the enabling tier module being configured based on the broken down components of the reference implementation, the configured enabling tier providing device independence to the configured service tier module and the configured personalization tier module via at least one Application Programming Interface. 14. The method of claim 13, wherein the reference implementation is accessed by a server in a software development environment preparing each of the personalization, service, and enablement tiers. 15. The method of claim 13, wherein the reference implementation comprises an application selected from the list of reference applications consisting of finance, retail, health, and government. 16. The method of claim 13, wherein the set of rules further govern at least two participant behaviors selected from the list consisting of: accessing services, removal, cross-participant cooperation, acquiring customers, supporting customers, capturing user and transaction data, use of captured data, and monetizing captured data.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (113)
Pitroda, Satyan G.; Desai, Mehul, Administering a plurality of accounts for a client.
Wary, M. Jean-Philippe, Authentication process including setting up a secure channel between a subscriber and a service provider accessible through a telecommunications operator.
Matsuyama,Shinako; Ishibashi,Yoshihito; Futamura,Ichiro; Kon,Masashi; Watanabe,Hideaki, Content distribution system, content distribution method, information processing apparatus, and program providing medium.
Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Hollis Lloyd L. (Cary NC) Lennon Richard E. (Woodstock NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Oseas J, Cryptographic communication security for multiple domain networks.
Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Smith John L. (Woodstock NY) Tuchman Walter L. (Woodstock NY), Cryptographic file security for single domain networks.
Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven cond.
Peitrucha, Jr., Stanislaus; Nenninger, Brian W.; Myers, Kenneth L.; Shedlick, Matthew T.; Radziewicz, Scott L.; Austin, Andre M.; Youm, Julie Hae Jung; Rowan, James R.; Tully, Rick D.; Lucas, Arnaud; Blanchard, Albert J.; Bragg, Robert M.; Gutierrez, Miguel J.; Moskosky, James P.; Meyers, John W., Method and apparatus for facilitating electronic acquisition and maintenance of goods and services via the internet.
Walker, Jay S.; Tedesco, Daniel E.; Tulley, Stephen C.; Packes, Jr., John M.; O'Shea, Deirdre; Bemer, Keith; Jorasch, James A.; Alderucci, Dean P., Method and apparatus for providing cross-benefits based on a customer activity.
Bouricius Willard G. (Katonah NY) Stuckert Paul E. (Katonah NY), Method and apparatus for secure message transmission for use in electronic funds transfer systems.
Hennige Hartmut (23 Packman Lane ; Home Green Kirk Ella Hull HU10 7TH N. Humberside GB3), Method and device for simplifying the use of a plurality of credit cards, or the like.
Anderson Michael W. ; Hargreaves David ; Hoellig Susan M. ; Johnson Drew S. ; Mischel Blaine D., Method and system for gathering and analyzing consumer purchasing information based on product and consumer clustering.
Robertson, James A.; Greene, William S.; Wille, Andrew N., Method and system for implementing a databus in a global ecosystem of interrelated services.
Petri Heinonen FI; Mikko Terho FI; Matti Marttila FI; Markku Rautiola FI, Method for using applications in a mobile station, a mobile station, and a system for effecting payments.
Low Colin,GBX ; Seaborne Andrew Franklin,GBX ; Bouthors Nicolas,FRX ; Beyschlag Ulf,FRX ; Raguideau Nicolas,FRX, Method of making available content resources to users of a telephone network.
Harrison, Allen Ray; Oney, Bruce Alan; Challappa, Murli; White, James H., Method, apparatus and system for providing product advisory information for a web-based sales application.
Ozaki, Toru; Mizutani, Masami; Sasaki, Shigeru, Portable communication device and system using the portable communication device and attachment for a portable communication device.
Maes Stephane Herman ; Sedivy Jan,CSX, Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security.
Thomas Michael W. ; Allard James E. ; Howard Michael ; Chung Sophia ; Ferroni Cameron ; Henbenthal Douglas C. ; Ludeman John ; Stebbens Kim ; Sanders ; II Henry L. ; Treadwell ; III David R., System and method for administering a meta database as an integral component of an information server.
Merrien, Lionel; Carrara, Jean-Louis; Bebic, Youri; Miller, Paul, System and method for creating a trusted network capable of facilitating secure open network transactions using batch credentials.
Bensoussan, Pierre; De Jaegere, Antoine, System and method for instant consolidation, enrichment, delegation and reporting in a multidimensional database.
Eschelbeck, Gerhard; Villa, Andrea, System and method for providing trustworthy network security concern communication in an active security management environment.
Williams Humphrey ; Hughes Kevin ; Parmar Bipinkumar G., System, method and article of manufacture for network electronic authorization utilizing an authorization instrument.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Cheng,Ray C. H.; Van Oorschot,Paul C.; Hillier,Stephen William, Systems and methods providing interactions between multiple servers and an end use device.
Pitroda Satyan G. (1480 Golden Bell Ct. Downers Grove IL 60515), Universal electronic transaction card including receipt storage and system and methods of conducting electronic transact.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.