摘要:
An East-West casino offers two or more gambling games in which one is a poker game using a traditional Western deck of cards and another is a poker game based upon a new Chinese Poker Deck of cards.
摘要:
A data packet can be dynamically stored in a magnetic strip by an encoder of an electronic card and subsequently transferred to a money source after it is read by a standard magnetic stripe reader as part of a verification process of a payment card transaction. A computer contained on the electronic card can run diagnostic tests and send the results to the money source as part of the data packet. One diagnostic test monitors the battery life of the electronic card to permit the money source to replace the electronic card before its battery runs out of useful life. The data packet can also contain data input into the electronic card by the user, such as a customization variable.
摘要:
An electronic card that can function as an anonymous credit card or banking card for use on or off the Internet utilizes a magnetic storage medium affixed to the card that can be read by a standard magnetic stripe reader. An encoder generates a data packet that is stored in a designated portion of the magnetic storage medium, which can be a magnetic stripe. The data packet can contain a personal coupon and an alias. A computer or microprocessor generates the personal coupon after a Personal Identification Number is input into the card.
摘要:
The System includes an Alarm Unit and a separate Alert Unit. The Alarm Unit is securely affixed to the parcel before the parcel is left at the delivery site, and the Alert Unit is placed at a secure site that is within radio range of the delivery site. The Alarm Unit is armed by the deliveryman upon depositing the parcel at the delivery site, and arming of the Alarm Unit results in the transmission of messages verifying to the seller or delivery agent that delivery has taken place and notifying the purchaser or intended recipient that the parcel has arrived. Movement of the parcel after it has been deposited at the delivery site and has been armed results in messages being transmitted to the shipping agent and to the intended recipient announcing that the parcel has been stolen. Such unauthorized movement of the parcel also activates a very loud audible alarm affixed to the parcel and activates a tracking beacon in or on the parcel, permitting the whereabouts of the parcel to be determined or tracked. The intended recipient of the parcel, after being notified of its delivery can disarm the Alarm Unit by inserting a secret number into a keypad on the Alarm Unit and then pressing a disarm button. Upon being disarmed, the Alarm Unit generates a signal that causes the Alert Unit to notify the seller and the delivery agent that an authorized person has taken possession of the parcel, thereby verifying receipt.
摘要:
A user can customize use of a payment card, which can be an electronic card, by selecting either a first or a second user key as a selected user key. The selected user key is entered into a card number generator that uses it and a user sequence number to generate a user payment card number that differs for each transaction through use of an algorithm. Multiple payment card transactions can be handled differently depending upon which user key is chosen as the selected user key. Different user keys can be used for different accounts, different types of transactions, or to classify the transactions. A user can receive one bill, or multiple bills. Different levels of privacy can be accorded to transactions that use different user keys. A user may pay the issuer for increased security, or the user may be paid by the issuer to allow transaction data to be distributed to third parties.
摘要:
A system and method for pseudo cash transactions allows a portion of the pseudo cash to be refunded through use of a credit back indicator which is used by a record adjuster to adjust the file associated with a pseudo cash unit which can then be accessed by the user with a user identifier to obtain a refund or credit.
摘要:
Methods in which an encrypted transaction validation code is received which positively identifies a first transaction for a first entity, the first entity having a first entity identifier, and the first transaction is electronically verified as being valid by use of the first entity identifier and the validation code. The first entity identifier can be transferred as an account number and the validation code transferred to the money source in a non-account data field. A money source can validate the validation code by duplicating the encryption process used to create the validation code and by then comparing the result to the validation code received. The validation code can be, at least in part, encrypted, and a money source can validate the validation code by duplicating a validation code encryption process and by then comparing the result to the validation code received.
摘要:
A method for implementing an anonymous face to face or Mail Order Telephone Order credit card transaction by a user who has established a user account associated with a fictitious name. The user generates a valid personal charge number by executing an algorithm in a computer affixed to the electronic credit card that uses a user key and a card number as input variables. A merchant is provided with the valid personal charge number and the fictitious name that is submitted for approval to a credit approval center. The electronic credit card is sized such that a standard magnetic stripe reader can read it.
摘要:
Totally anonymous or effectively anonymous cash-like transactions are accomplished by using a pseudo cash data package converter for inserting a user key into a pseudo cash preliminary data packet through the use of a user insertion key to generate a pseudo cash unit with a fixed monetary value that can be used to purchase goods or services via the Internet. A pseudo cash repository facilitates the cash-like transactions and maintains a record of the pseudo cash units and their fixed monetary value. Depending upon the level of anonymity selected by a purchaser, the pseudo cash repository can either transmit pseudo cash preliminary data packets or pseudo cash units to a first entity. If the first entity loses an effectively anonymous pseudo cash preliminary data packet, it can be replaced by the pseudo cash repository without risk of loss.
摘要:
An East-West casino offers two or more gambling games in which at least one game involves a Feng Shui element of chance and the other involves either a game based upon a new Chinese Poker Deck of cards or a video slot machine having a carousel in which two or more wheels rotate in opposite directions and a random event associated with the two or more wheels is used in connection with a payout or bonus round of the video slot machine. The game involving a Feng Shui element of chance can be a Yin-Yang roulette game or a video slot machine or a Feng Shui keno machine while a game based upon the Chinese Poker Deck may be a poker game and the casino itself may be a website. The video slot machine can use a carousel in which two or more wheels rotating in opposite directions.