Abstract:
A decryption module is enabled on one or more authorized devices. A user's financial account information is encrypted using a card verification number, or some secret known to the user and replicated onto the authorized devices. The user requests processing of a financial transaction using the previously-encrypted financial account information. The authorized device retrieves the encrypted financial account information and prompts the user to enter the card verification number (or other secret known to the user that was used to encrypt the financial account information). The decryption module decrypts the financial account information using the card verification number entered by the user, and the decrypted financial account information resembles a valid credit card or debit card number and will pass a Luhn test. The decrypted financial account information is transmitted to process the financial transaction initiated by the user.
Abstract:
A non-transitory computer-readable storage medium may include instructions stored thereon. When executed, the instructions may cause a portable computing device to prompt a user to activate a data saving feature based on a previous user having activated the data saving feature. The instructions may be configured to cause the portable computing device to accept login credentials from a first user, activate the data saving feature in response to input from the first user during a session associated with the first user, log the first user out, after logging the first user out, accept login credentials from a second user, and based on activating the data saving feature during the session associated with the first user, prompt the second user to activate the data saving feature during a session associated with the second user.
Abstract:
A decryption module is enabled on one or more authorized devices. A user's financial account information is encrypted using a card verification number, or some secret known to the user and replicated onto the authorized devices. The user requests processing of a financial transaction using the previously-encrypted financial account information. The authorized device retrieves the encrypted financial account information and prompts the user to enter the card verification number (or other secret known to the user that was used to encrypt the financial account information). The decryption module decrypts the financial account information using the card verification number entered by the user, and the decrypted financial account information resembles a valid credit card or debit card number and will pass a Luhn test. The decrypted financial account information is transmitted to process the financial transaction initiated by the user.
Abstract:
A non-transitory computer-readable storage medium may include instructions stored thereon. When executed, the instructions may cause a portable computing device to prompt a user to activate a data saving feature based on a previous user having activated the data saving feature. The instructions may be configured to cause the portable computing device to accept login credentials from a first user, activate the data saving feature in response to input from the first user during a session associated with the first user, log the first user out, after logging the first user out, accept login credentials from a second user, and based on activating the data saving feature during the session associated with the first user, prompt the second user to activate the data saving feature during a session associated with the second user.
Abstract:
A non-transitory computer-readable storage medium may include instructions stored thereon. When executed, the instructions may cause a portable computing device to activate a data saving feature in response to determining that the portable computing device is in a limited data environment. The instructions may be configured to cause the portable computing device to at least determine that the portable computing device is in the limited data environment, and based on the determining that the portable computing device is in the limited data environment, prompt a user to activate the data saving feature.
Abstract:
Providing state information to a server includes accessing a document object model (DOM) for a web application, the DOM corresponding to a tree structure which represents a first state of the web application. An indication of the first state of the web application is provided to a server based on the DOM. A determination is made that a predetermined event has occurred at the system, the predetermined event indicating that a second state of the web application, different than the first state of the web application, is to be provided to the server. In response to the determination, an indication of the second state of the web application, corresponding to an updated version of the DOM, is provided to the server.
Abstract:
A non-transitory computer-readable storage medium may include instructions stored thereon. When executed, the instructions may cause a portable computing device to activate a data saving feature in response to determining that the portable computing device is in a limited data environment. The instructions may be configured to cause the portable computing device to at least determine that the portable computing device is in the limited data environment, and based on the determining that the portable computing device is in the limited data environment, prompt a user to activate the data saving feature.