Secure transactions using customized webpages

ABSTRACT

A computer that dynamically generates a customized second document is described. During operation, the computer receives information specifying activation of a hosted field in a document associated with a third party, where the information specifies a willingness to receive one or more messages from the computer and specifies a telephone number. In response, the computer dynamically generates the customized second document that includes information about one or more transactions (such as one or more upcoming events) of interest to an individual associated with the telephone number. Then, the computer sends a message to an address corresponding to the telephone number, where the message includes a link to the customized second document. Next, when the computer receives information specifying activation of the link from an electronic device, the computer provides information specifying the customized second document to the electronic device for display on the electronic device.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.17/279,188, filed Mar. 24, 2021, which is a U.S. National Stage Entry ofPCT/US19/52847, filed Sep. 25, 2019, that claims the priority benefit ofU.S. Provisional Patent Application Ser. No. 62/737,315, filed Sep. 27,2018, the contents of each of which are herein incorporated by referencein their entireties.

BACKGROUND

The described embodiments relate, generally, to techniques forperforming transactions using dynamically generated customized webpages.

The ease of use and widespread availability of networks, such as theInternet, have made it much easier for people to perform onlinetransactions, such as purchasing products or services (which aresometimes referred to as ‘e-commerce’).

However, the popularity of such online transactions has resulted inincreased incidents of fraud and other criminal activity. This criminalbehavior undermines people's trust and, thus, constrains people'swillingness to conduct transactions via networks.

Moreover, many webpages or websites have largely static content that ispresented or served to all visitors. For example, visitors to aparticular web site may be steered to a common landing webpage.

While this one-size-fits-all approach is efficient and can be easilyscaled, it often results in a cumbersome user experience, as visitorsare forced to navigate through the content on a webpage or website in anattempt to find relevant or interesting information. Consequently, thenegative user experience associated with many webpages and websites alsorestricts use and, thus, people's willingness to conduct transactions.

SUMMARY

A first group of embodiments provides a computer for facilitatingtransactions. This computer includes an interface circuit that cancommunicate with an electronic device, memory that stores programinstructions, and a processor that can execute the program instructions.During operation, the computer receives information specifyingactivation of a hosted field in a document associated with a thirdparty, where the information specifies a willingness to receive one ormore messages from the computer and specifies a telephone number. Inresponse, the computer dynamically generates a customized seconddocument that includes information about one or more transactions (suchas one or more upcoming events or other purchasable tickets,merchandise, products, etc.) of interest to an individual associatedwith the telephone number. Then, the computer sends a message to anaddress corresponding to the telephone number, where the messageincludes a link to the customized second document. Next, when thecomputer receives information specifying activation of the link from anelectronic device, the computer provides information specifying thecustomized second document to the electronic device for display on theelectronic device.

Note that the document may be a third-party webpage. Moreover, themessage may include a Short Message Service (SMS) message. Furthermore,the customized second document may include a webpage.

Furthermore, the customized second document may allow completion of agiven transaction in the one or more transactions, such as purchasingone or more tickets to an upcoming event. Additionally, the computerprovides authentication information (such as an authentication cookie)to the electronic device to authenticate purchases. For example, apurchase request received by the computer from the electronic device andassociated with the customized second document may be rejected if theauthentication information is not stored on the electronic device. Notethat the authentication information may be valid for a predefined timeinterval. After this predefined time interval has elapsed, theauthentication information may expire.

In some embodiments, after receiving the information specifyingactivation of the hosted field, the computer may confirm that thetelephone number is included in a data structure prior to dynamicallygenerating the customized webpage. If the telephone number is includedin the data structure, the computer may proceed and dynamically generatethe customized second document. Otherwise, the computer may confirm thatthe individual wants to receive the one or more messages prior todynamically generating the customized second document.

Moreover, the one or more transactions of interest to the individual maybe associated with an entity (such as an event organizer), and theindividual may have a subscription with the entity.

Furthermore, when the computer receives a request message with apredefined code addressed to a second address corresponding to a secondtelephone number associated with the computer, the computer maydynamically generate a customized third document that includesinformation about one or more additional transactions of interest to theindividual associated with the telephone number. Then, the computer mayprovide a second message addressed to the address corresponding to thetelephone number, where the second message includes a link to thecustomized third document. Note that the code may include analphanumeric value.

Another embodiment provides a computer-readable storage medium for usewith the computer. This computer-readable storage medium includesprogram instructions for at least some of the operations performed bythe computer.

Another embodiment provides a method for dynamically generating acustomized document. This method includes at least some of theoperations performed by the computer.

A second group of embodiments provides a computer that injects a hostfield into a document associated with a third party.

Another embodiment provides a computer-readable storage medium for usewith the computer. This computer-readable storage medium includesprogram instructions for at least some of the operations performed bythe computer.

Another embodiment provides a method for injecting a host field into adocument associated with a third party. This method includes at leastsome of the operations performed by the computer.

This Summary is provided merely for purposes of illustrating someexemplary embodiments, so as to provide a basic understanding of someaspects of the subject matter described herein. Accordingly, it will beappreciated that the above-described features are merely examples andshould not be construed to narrow the scope or spirit of the subjectmatter described herein in any way. Other features, aspects, andadvantages of the subject matter described herein will become apparentfrom the following Detailed Description, Figures, and Claims.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 is a block diagram illustrating an example of a system withelectronic devices wirelessly communicating in accordance with anembodiment of the present disclosure.

FIG. 2 is a flow diagram illustrating an example method for dynamicallygenerating a customized document in accordance with an embodiment of thepresent disclosure.

FIG. 3 is a drawing illustrating example communication among theelectronic devices in FIG. 1 in accordance with an embodiment of thepresent disclosure.

FIG. 4 is a drawing illustrating an example of a continuous subscriberflow in accordance with an embodiment of the present disclosure.

FIG. 5 is a drawing illustrating an example of a secured environmentgenerator in accordance with an embodiment of the present disclosure.

FIG. 6 is a drawing illustrating an example of the secured environmentgenerator of FIG. 5 in accordance with an embodiment of the presentdisclosure.

FIG. 7 is a drawing illustrating an example of the secured environmentgenerator of FIG. 5 in accordance with an embodiment of the presentdisclosure.

FIG. 8 is a block diagram illustrating an example of one of theelectronic devices of FIG. 1 in accordance with an embodiment of thepresent disclosure.

Note that like reference numerals refer to corresponding partsthroughout the drawings. Moreover, multiple instances of the same partare designated by a common prefix separated from an instance number by adash.

DETAILED DESCRIPTION

A computer that dynamically generates a customized second document isdescribed. During operation, the computer receives informationspecifying activation of a hosted field in a document associated with athird party (or potential client), where the information specifies awillingness to receive one or more messages from the computer andspecifies a telephone number. In response, the computer dynamicallygenerates a customized second document that includes information aboutone or more transactions (such as one or more upcoming events) ofinterest to an individual (or potential subscriber customer) associatedwith the telephone number. Then, the computer sends a message to anaddress corresponding to the telephone number, where the messageincludes a link to the customized second document. Next, when thecomputer receives information specifying activation of the link from anelectronic device, the computer provides information specifying thecustomized second document to the electronic device for display on theelectronic device.

By providing the dynamically generated customized second document, thiscommunication technique facilitates secure performance of a giventransaction in the one or more transactions. Moreover, the dynamicallygenerated customized second document may include customized content thatis relevant to the individual (or potential subscriber customer). Thismay allow the individual (or potential subscriber customer) to directlyaccess information that is of interest to them. Consequently, thecommunication technique may simplify the user experience, therebyincreasing the likelihood that the individual (or potential subscribercustomer) conducts the given transaction. In the process, thecommunication technique may increase satisfaction of the individual (orpotential subscriber customer) and an entity associated with the one ormore transactions, such as an event organizer (or potential client).

In the discussion that follows, electronic devices and computers mayinclude radios or, more generally, network interfaces that communicatepackets or frames in accordance with one or more communicationprotocols, such as: an Institute of Electrical and Electronics Engineers(IEEE) 802.11 standard (which is sometimes referred to as ‘Wi-Fi®’ fromthe Wi-Fi® Alliance of Austin, Texas), Bluetooth™ (from the BluetoothSpecial Interest Group of Kirkland, Washington), a cellular-telephonecommunication protocol, another type of wireless interface, a wirednetwork communication protocol (e.g., Ethernet, Ethernet II or an IEEE802.3 standard, which are individually or collectively henceforthreferred to as ‘Ethernet’) and/or another network communicationprotocol. For example, the cellular-telephone communication protocol mayinclude or may be compatible with: a 2^(nd) generation or mobiletelecommunication technology, a 3^(rd) generation of mobiletelecommunications technology (such as a communication protocol thatcomplies with the International Mobile Telecommunications-2000specifications by the International Telecommunication Union of Geneva,Switzerland), a 4^(th) generation of mobile telecommunicationstechnology (such as a communication protocol that complies with theInternational Mobile Telecommunications Advanced specification by theInternational Telecommunication Union of Geneva, Switzerland), and/oranother cellular-telephone communication technique. In some embodiments,the communication protocol includes Long Term Evolution or LTE. However,a wide variety of communication protocols may be used. In addition, thecommunication may occur via a wide variety of frequency bands. In thediscussion that follows, Ethernet (which is sometimes referred to as a‘non-wireless communication technique’ or protocol) is used as anillustrative example.

Communication among electronic devices is shown in FIG. 1 , whichpresents a block diagram illustrating an example of a system 100 thatincludes electronic devices 110 (such as a computer, a portableelectronic device, a cellular telephone, a tablet computer, asmartwatch, a wearable device, etc.), computer 112 (such as acloud-based computer or server), and hosting computer 114 thatcommunicate with each other using wired (or non-wireless communication)via network 116 (such as the Internet) and/or optional wirelesscommunication via a cellular-telephone network 118 (e.g., via anoptional base station 120), a wireless local area network (e.g., via anoptional access point 122) and/or a another wireless communicationtechnique. Note that the optional access point 122 may provide access tonetwork 116, such as the Internet, via an Ethernet protocol, and may bea physical access point or a virtual or ‘software’ access point that isimplemented on a computer or an electronic device.

As described further below with reference to FIGS. 2-3 , computer 112may inject a hosted field into a document provided by hosting computer114. For example, computer 112 may provide, via network 116, the hostedfield for inclusion in a webpage associated with a third party (i.e.,that is other than a provider of the communication technique), and thatis provided, via network 116 and cellular-telephone network 118 (or theoptional access point 122), by hosting computer to one of electronicdevices 110 (such as electronic device 110-1). An application (such as aWeb browser) executed in an environment of electronic device 110-1 (suchas an operating system) may display the document. Note that the hostedfield may allow a user of electronic device 110-1 (who is sometimesreferred to as an ‘individual’) to indicate a willingness to receive oneor more messages from computer 112 and that specifies a telephone numberassociated with electronic device 110-1. Such user may be called asubscriber customer.

When the user or subscriber customer activates the hosted field andprovides the telephone number, electronic device 110-1 may provide, vianetwork 116 and cellular-telephone network 118 (or the optional accesspoint 122), information specifying activation of the hosted field in thedocument and the telephone number to hosting computer 114. In turn,hosting computer 114 may provide, via network 116, this information tocomputer 112.

After receiving the information specifying activation of the hostedfield in the document, computer 112 may dynamically generate acustomized second document (such as a webpage) that includes informationabout one or more transactions (such as one or more upcoming events) ofinterest to the individual or subscriber customer associated with thetelephone number. Then, computer 112 may send a message to an addresscorresponding to the telephone number, where the message includes a linkto the customized second document. For example, the message may be sentvia network 116 and cellular-telephone network 118 (or the optionalaccess point 122). Note that the message may include a Short MessageService (SMS) message (which is sometimes referred to as a ‘textmessage’).

Moreover, after receiving the message, electronic device 110-1 maydisplay the message. If the individual or subscriber customer activatesthe link, electronic device 110-1 may provide, via network 116 andcellular-telephone network 118 (or the optional access point 122),information specifying activation of the link to computer 112.

When computer 112 receives information specifying activation of the linkfrom electronic device 110-1, computer 112 may provide, via network 116and cellular-telephone network 118 (or the optional access point 122),information specifying the customized second document to electronicdevice 110-1 for display on the electronic device (such as by theapplication executing on electronic device 110-1). Furthermore, asdescribed further below, computer 112 may provide, via network 116 andcellular-telephone network 118 (or the optional access point 122),authentication information (such as an authentication cookie) toelectronic device 110-1 to authenticate completion of a giventransaction in the one or more transactions. Note that theauthentication information may be valid for a predefined time interval,such as 1 day, a week, or a month. After this predefined time intervalhas elapsed, the authentication information may expire.

Additionally, the customized second document may allow completion of thegiven transaction in the one or more transactions, such as purchasingone or more tickets to an upcoming event. For example, the individual orsubscriber customer may interact with the customized second document toprovide, via network 116 and cellular-telephone network 118 (or theoptional access point 122), to exchange information with computer 112 tocomplete the transaction As noted previously, a purchase requestreceived from electronic device 110-1 and associated with the customizedsecond document may be rejected by computer 112 if the authenticationinformation is not stored on electronic device 110-1.

In some embodiments, after receiving the information specifyingactivation of the hosted field, computer 112 may confirm that thetelephone number is included in a data structure (such as a datastructure with information about subscribers to a transaction service)prior to dynamically generating the customized webpage. For example, theone or more transactions of interest to the individual or subscribercustomer may be associated with an entity (such as an event organizeralso referred to herein as a client of the system), and the individualor subscriber may have a subscription with the entity or client. If thetelephone number is included in the data structure, computer 112 mayproceed and dynamically generate the customized second document.Otherwise, computer 112 may communicate, via network 116 andcellular-telephone network 118 (or the optional access point 122), withelectronic device 110-1 to confirm that the individual or subscribercustomer wants to receive the one or more messages prior to dynamicallygenerating the customized second document.

Moreover, the individual or subscriber customer may use electronicdevice 110-1 to request a dynamically generated customized thirddocument. For example, electronic device 110-1 may provide, via network116 and cellular-telephone network 118 (or the optional access point122), a request message with a predefined code (such as an alphanumericcode) addressed to a second address corresponding to a second telephonenumber associated with computer 112. In response, computer 112 maydynamically generate the customized third document that includesinformation about one or more additional transactions of interest to theindividual or subscriber customer associated with the telephone number.Then, computer 112 may provide, via network 116 and cellular-telephonenetwork 118 (or the optional access point 122), another messageaddressed to the address corresponding to the telephone number, wherethe other message includes a link to the customized third document.

In these ways, the communication techniques may be used to facilitatethe conducting of one or more transactions in a secure manner. Moreover,because an instance of the dynamically generated customized document istailored, at a particular time, to the specific interests of theindividual or subscriber customer, the content included in the instanceof the customized document may be more relevant to the individual orsubscriber customer and immediately actionable (without, e.g., requiringthat the individual navigate to content that may be of interest tothem). This capability may enhance the user experience of the individualor subscriber customer and may encourage the individual or subscribercustomer to perform one or more transactions. The communicationtechnique may enable a customer capture rate of greater than 10%, 15%,20%, 25%, or 30%. For example, the customer capture rate may be 14.5%.

As noted previously, in some embodiments, communication among componentsin system 100 involves wireless communication. During the wirelesscommunication, electronic devices 110, the optional base station 120and/or the optional access point 122 may: transmit advertising frames onwireless channels, detect one another by scanning wireless channels,establish wireless connections (for example, by transmitting associationrequests), and/or transmit and receive packets or frames (which mayinclude the association requests and/or additional information aspayloads). Moreover, during the wired communication, electronic devices110, computer 112, and/or the hosting computer 114 may receive packetsor frames using a wired communication technique or protocol (e.g.,Ethernet II or an IEEE 802.3 standard). In some embodiments, theoptional base station 118 and/or the optional access point 122 mayconvert packets or frames that are received using the wiredcommunication technique to a WLAN communication technique or protocol(such as an IEEE 802.11 standard or an LTE standard), and may wirelesslytransmit the packets or frames. Similarly, the optional base station 118and/or the optional access point 122 may: receive packets or framesusing the WLAN communication technique; convert the packets or frames tothe wired communication technique; and transmit the packets or frames.Thus, the optional base station 118 and/or the optional access point 122may perform the functions of an access point.

As described further below with reference to FIG. 8 , electronic devices110, computer 112, hosting computer 114, the optional base station 120and/or the optional access point 122 may include subsystems, such as: anetworking subsystem, a memory subsystem and a processor subsystem. Inaddition, electronic devices 110, computer 112, hosting computer 114,the optional base station 120 and/or the optional access point 122 mayinclude radios 124 in the networking subsystems. (Note that radios 124may be instances of the same radio or may be different from each other.)More generally, electronic devices 110, computer 112, hosting computer114, the optional base station 120 and/or the optional access point 122can include (or can be included within) any electronic devices with thenetworking subsystems that enable electronic devices 110, computer 112,hosting computer 114, the optional base station 120 and/or the optionalaccess point 122 to communicate with each other using wiredcommunication (e.g., a non-wireless communication technique) and/oroptional wireless communication. The optional wireless communication cancomprise transmitting advertisements on wireless channels to enableelectronic devices to make initial contact or detect each other,followed by exchanging subsequent data/management frames (such asassociation requests and responses) to establish a wireless connection,configure security options (e.g., Internet Protocol Security), andtransmit and receive packets or frames via the wireless connection, etc.

As can be seen in FIG. 1 , wireless signals 126 (represented by a jaggedline) are optionally transmitted from radio 124-1 in electronic device110-1. These wireless signals are optionally received by at least theoptional access point 122. Notably, electronic device 110-1 mayoptionally transmit packets. In turn, these packets may be optionallyreceived by a radio 124-2 in the optional access point 122. This mayallow electronic device 110-1 to wirelessly communicate information tothe optional access point 122. While FIG. 1 illustrates electronicdevice 110-1 transmitting packets, note that electronic device 110-1 mayalso receive packets from the optional access point 122.

In the described embodiments, processing of a packet or frame inelectronic devices 110, the optional base station 120 and/or theoptional access point 122 includes: receiving signals (such as wirelesssignals 126) with the packet or frame; decoding/extracting the packet orframe from the received signals to acquire the packet or frame; andprocessing the packet or frame to determine information contained in thepacket or frame.

Note that the communication among electronic devices 110, computer 112,the hosting computer 114, the optional base station 120 and/or theoptional access point 122 may be characterized by a variety ofperformance metrics, such as: a data rate, a data rate for successfulcommunication (which is sometimes referred to as a ‘throughput’), anerror rate (such as a retry or resend rate), a mean-square error ofequalized signals relative to an equalization target, intersymbolinterference, multipath interference, a signal-to-noise ratio, a widthof an eye pattern, a ratio of number of bytes successfully communicatedduring a time interval (such as 1-10 s) to an estimated maximum numberof bytes that can be communicated in the time interval (the latter ofwhich is sometimes referred to as the ‘capacity’ of a channel or link),and/or a ratio of an actual data rate to an estimated data rate (whichis sometimes referred to as ‘utilization’).

In these ways, the communication techniques may provide an efficient andsecure way for the individual to receive relevant content and to conductone or more transactions.

Although we describe the network environment shown in FIG. 1 as anexample, in alternative embodiments, different numbers or types ofelectronic devices may be present. For example, some embodimentscomprise more or fewer electronic devices. As another example, inanother embodiment, different electronic devices are transmitting and/orreceiving packets or frames. While electronic devices 110 and optionalaccess point 122 are illustrated with a single instance of radios 124,in other embodiments, electronic devices 110, optional access point 120and/or another component in system 100 may include multiple radios.

FIG. 2 presents a flow diagram illustrating example method 200 fordynamically generating a customized document, which may be performed bya computer (such as computer 112 in FIG. 1 ). During operation, thecomputer may receive information (operation 210) specifying activationof a hosted field in a document associated with a third party or client,where the information specifies a willingness to receive one or moremessages from the computer and specifies a telephone number. Note thatthe document may be a third-party or client webpage.

In response, the computer may dynamically generate a customized seconddocument (operation 212) that includes information about one or moretransactions (such as one or more upcoming events) of interest to anindividual or subscriber customer associated with the telephone number.Notably, the customized second document may include a webpage. In someembodiments, the one or more transactions of interest to the individualor subscriber customer may be associated with an entity (such as anevent organizer), and the individual or subscriber customer may have asubscription with the entity.

Then, the computer may send a message (operation 214) to an addresscorresponding to the telephone number, where the message includes a linkto the customized second document. For example, the message may includea Short Message Service (SMS) message.

Next, when the computer receives information (operation 216) specifyingactivation of the link from an electronic device, the computer mayprovide information (operation 218) specifying the customized seconddocument to the electronic device for display on the electronic device.

In some embodiments, the computer optionally performs one or moreadditional operations (operation 220). For example, the customizedsecond document may allow completion of a given transaction in the oneor more transactions, such as purchasing one or more tickets to anupcoming event. Consequently, the computer may selectively exchangeinformation with the electronic device to perform the given transaction.

Moreover, the computer may provide authentication information (such asan authentication cookie) to the electronic device to authenticatepurchases. For example, a purchase request received by the computer fromthe electronic device and associated with the customized second documentmay be rejected if the computer does not receive information thatindicates that the authentication information is stored on theelectronic device. Note that the authentication information may be validfor a predefined time interval. After this predefined time interval haselapsed, the authentication information may expire.

Furthermore, after receiving the information specifying activation ofthe hosted field (operation 210), the computer may confirm that thetelephone number is included in a data structure prior to dynamicallygenerating the customized webpage. If the telephone number is includedin the data structure, the computer may proceed and dynamically generatethe customized second document. Otherwise, the computer may confirm thatthe individual or subscriber customer wants to receive the one or moremessages prior to dynamically generating the customized second document.

Additionally, when the computer receives a request message with apredefined code addressed to a second address corresponding to a secondtelephone number associated with the computer, the computer maydynamically generate a customized third document that includesinformation about one or more additional transactions of interest to theindividual or subscriber customer associated with the telephone number.Then, the computer may provide a second message addressed to the addresscorresponding to the telephone number, where the second message includesa link to the customized third document. Note that the code may includean alphanumeric value.

In some embodiments of method 200, there may be additional or feweroperations. Moreover, there may be different operations. Furthermore,the order of the operations may be changed, and/or two or moreoperations may be combined into a single operation or performed at leastpartially in parallel.

FIG. 3 presents a drawing illustrating example communication betweencomputer 112, hosting computer 114, and electronic device 110-1. Duringthe communication, an interface circuit 316 in electronic device 110-1may provide information 314 specifying activation of the hosted field inthe document. For example, a user of electronic device 110-1 (such as anindividual) may use a user-interface device 310 (such as a keyboard, amouse, a touchpad, a touch-sensitive display, a voice interface, etc.)to activate 308 the hosted field in a webpage of the third party orclient. Then, a processor 312 in electronic device 110-1 may provideinformation 314 to interface circuit 316 with an instruction or acommand to communicate it to hosting computer 114.

After receiving information 314, hosting computer 114 may provide it tocomputer 112.

Then, after receiving information 314, an interface circuit 318 incomputer 112 may provide it to processor 320 in computer 112. Inresponse, processor 320 may dynamically generate a customized seconddocument 322 (such as a customized second webpage) that includesinformation about one or more transactions of interest to the individualor subscriber customer.

Furthermore, processor 322 may instruct 324 interface circuit 318 tosend a message 326 (such as an SMS message) to an address correspondingto the telephone number, where the message includes a link to thecustomized second document.

This message may be received by interface circuit 316, which may forwardit to processor 312 for display on a display 328 in electronic device110-1. Next, the individual or subscriber customer may useuser-interface device 310 to activate 330 the link. When this occurs,processor 312 may provide information 332 to interface circuit 316 withan instruction or a command to communicate it to computer 112.

When interface circuit 318 receives information 332 specifyingactivation of the link, interface circuit 318 may provide it toprocessor 320. In response, processor 320 may provide information 334specifying the customized second document 322 to interface circuit 318.In response, interface circuit 318 may provide information 334 toelectronic device 110-1.

After receiving information 334, interface circuit 316 may provide it toprocessor 312, which displays customized second document 322 on display328.

While FIG. 3 illustrates operations with single or double-sided arrowscorresponding, respectively, to unilateral or bilateral communication,in general a given operation in these drawings may involve unilateral orbilateral communication. Note that the communication between componentsin FIG. 3 may involve communication of one or more packets or frames.

Moreover, while the preceding discussion illustrates communication ofthe information specifying activation of the hosted field to computer112 via hosting computer 114, in other embodiments, electronic device110-1 communicates this information directly to computer 112.

Furthermore, while SMS messaging was used in the preceding discussion,different communication channels may be used in other embodiments, e.g.,email, Enhanced Messaging Service (EMS), and/or Multimedia MessagingService (MMS).

We now describe embodiments of the communication technique. In theseembodiments, a ‘client’ may be a third-party ticket provider or anythird-party service or event provider.

Note that the communication technique may not simply provide a marketingchannel for pre-existing content. Instead, the customized webpage (orwebsite) may be created de novo for each subscriber customer orindividual. A given subscriber customer cannot hit their webpage withouta specific link that is provided to the given subscriber customer.Because the webpage does not exist before the link is created andprovided to the given subscriber customer, there may not be another wayto access the customized webpage. If the link for the customized seconddocument is shared with a second individual, the second individual maybrowse content customized for the first individual but will beprohibited from accessing a profile of the first individual and/orexecuting a transaction unless the second individual subscribes andprovides his/her telephone number. In such a scenario, the 3P messageservice sends a new link to the second individual that is customized tothe second individual, the new link being customized to the secondindividual. The customized webpage may be curated for the givensubscriber customer (e.g., based on a specific industry, events,organizer, etc.). Moreover, the customized webpage may be updated basedon user habits, history, preferences, information from third-partyapplication programming interfaces (APIs), etc. The customized webpagemay pull in or incorporate additional events that may be of interest tothe given subscriber customer. In addition, the communication techniquemay provide controls and distribute payments. For example, computer 112(FIG. 1 ) may create a link that is associated with its own webpage andthat can be used to create or conduct a given transaction.

In the communication technique, an Amplify Decision Delivery Processor(ADDP) may use a data structure to match, update orders, parse downinformation, compile links (such as HTML links), and/or provideauthorization and financial information.

In some embodiments, when a client encounters the communicationtechnique, e.g., in an application, a continuous subscriber capture(CSC) input may be injected as an input into a purchase form. Moreover,when a client installs the application, computer 112 (FIG. 1 ) may haveaccess to information and, thus, the ability to sell a wide variety oftheir inventory.

Subsequently, when the given subscriber customer encounters a CSC input(and, more generally, a hosted field) in a webpage associated with aclient, they may select a box that indicates ‘yes’ they would like toreceive text messages. This ‘yes’ input may be provided to the ADDP,which may check whether a telephone number of the given subscribercustomer is included in the data structure.

If their telephone number is in the data structure, the ADDP may send atext message to the given subscriber customer with a link to thecustomized document showing events of interest. Note that if an eventorganizer or client has one event, the customized document or webpagemay only show one event. However, if the event organizer or client hasmany events, the customized document or webpage may show or includemultiple events.

Alternatively, if the given subscriber customer's telephone number isnot in the data structure, the ADDP may send a text message to the givensubscriber customer to confirm that they want to receive text messages.

Furthermore, one or more vaults with financial information may be copiedfor future payments when the given subscriber customer conducts atransaction via their customized webpage.

Additionally, the ADDP may create a ‘hot’ cookie that goes onto thegiven subscriber customer's electronic device (e.g., cellular telephone)for future payments. This cookie may expire, e.g., after 30 days. If thesubscriber customer attempts to use the cookie for a future payment butthe cookie expired, the subscriber customer may verify their telephonenumber via an alphanumeric value sent to their telephone number toreactivate the cookie (make it ‘hot’ again).

Note that the given subscriber customer can also access their userprofile via the link in the text message.

In some embodiments, the given subscriber customer can, at any time, getor receive a text message with a link to a customized webpage withevents and/or user preferences by sending a text message with, e.g., a5-digit short code to a telephone number associated with the ADDP. Forexample, the short code may be: an organizer name and/or a name of aprovider of the communication technique (such as ‘Amplify’).

The communication technique may address security flaws in existingapproaches (such as SIM-case swapping or fraudulent use of a link,etc.). Notably, these problems may be addressed by the use of the ‘hot’cookie stored on the given subscriber customer's cellular telephone,because a fraudulent user that does not have the ‘hot’ cookie will notbe able to access transaction information in the customized webpage orconduct a transaction when they activate the link. Thus, the ‘hot’cookie may make it very difficult to game the communication technique.In order to thwart SIM swapping, in some embodiments, the communicationtechnique may include a biometric authentication operation, such asfacial recognition or recognition of another biometric marker (e.g.,fingerprint recognition).

Furthermore, the ADDP may conduct reviews to verify/validate subscribercustomers and their information. For example, the ADDP may reviewsubscriber customer subscriptions (such as the event organizers orclient to which a given subscriber customer has subscriptions), customertelephone numbers, etc.

FIG. 4 presents a drawing illustrating an example of a continuoussubscriber customer flow 400, and FIGS. 5-7 presents drawingsillustrating an example of a secured environment generator 500. In someembodiments, the communication technique (which is sometimes referred toas ‘Amplify’) may be implemented in conjunction with a third-party API402. Notably, a custom integration implementation of Amplify 444 may beprovided to the third-party API 402. This may involve access to Amplify444 being made available inside the third-party API 402 platform to aclient (such as an event organizer) that installs a softwareimplementation of Amplify 444. Alternatively or additionally, the client404 may allow Amplify 444 to access their client platform. For example,the client 404 may provide access codes that enable the client to passan identifier of their third-party API platform to ADDP 410. As shown inFIG. 5 , this may enable the client to create a client keyword 504 (suchas an organizer word or short code) that can be texted (command 516 a)to a telephone number associated with the ADDP 410 (or computer 112 ofFIG. 1 ) in ADDP 410, which may result in the client becoming an ADDPclient. As an ADDP client, the client may gain access to the ADDP textmessaging capability via an Amplify 444 provider 3P messaging service514. Inventory, events, etc. associated with each client are associatedwith a vendor ID 518.

As shown in FIGS. 4-5 , as a result of becoming an ADDP client, ADDP 410may inject a CSC input 406 into client web-purchase forms generated bythe third-party API platform 402. This may enable the client 404 toallow their subscriber customers 408 to trigger the CSC input 406 tocommand 516 ADDP 410 to commence subscriber customer capture as anAmplify subscriber via a cellular telephone number 422 (which issometimes referred to as a ‘subscriber number’) input by a subscribercustomer 408 in client web-purchase forms generated by the third-partyAPI 402.

ADDP 410 may flag a subscriber customer identifier (ID) 412 to thethird-party API platform 402 for future reference and action. Forexample, ADDP may trigger the 3P messaging service 446 to send a textmessage with a unique e-commerce micro-website (e.g., a UEMWEB) abstractlink (which was generated by ADDP). This micro-website may includeclient ticket purchase opportunities for the subscriber customer.

When the subscriber customer 414 clicks or activates a UEMWEB link, theUEMWEB abstract unpacks 416 the client ticket purchase opportunitiesinside a Web browser on a cellular telephone of the subscriber customer.The UEMWEB may provide options to navigate through and choose tocommence an e-commerce transaction.

As shown in FIG. 5 , Amplify 444 may further send a message through the3P messaging service 520 to a subscriber customer number 442 associatedwith a client ID 524. The message may include an actionable item, e.g.,a link to purchase tickets or view a customized webpage, such that thesubscriber customer can send a command 516 b using the 3P service 526 toview the customized webpage or purchase tickets or etc. which is sent toAmplify 528 for fulfillment and payment services.

Note that ADDP 410 may be how the client 404, the customers 408 of theclient that become an Amplify subscriber, and Amplify 444 relate to eachother through a matrix of conditions, abstracts and ordering ofdecisions. For example, an input received from a CSC input 406 maycontain the third-party API platform identifier and the subscribercustomer telephone number. When the telephone number details areconfirmed, they may become a subscriber customer in a data structure ofADDP for future actions.

When checking the telephone number 418, the area code may be checked togeographically place and validate a location and area code of thetelephone number to validate the subscriber customer 420 and verify thatthe subscriber customer is a customer of Amplify. Moreover, if thetelephone number is a land line, it may be purged. However, if thetelephone number is a cellular-telephone number, continue.

Then, whether the telephone number is in a data structure 422 may bechecked to validate the subscriber customer 420. If yes, a check whetherthe customer is currently subscribed or unsubscribed to Amplify 444 fora current client may be performed. If yes 428, conditions are checkedand acted upon. However, if no, an opt-in verification message may besent 424. Note that conditional dependent occurrences 426 may includedetermining if an opt-in message 424 is needed.

When opt-in occurs, the customer becomes a subscriber 414. Notably, asubscriber customer 414 may be added to the Amplify data structure.Moreover, the subscriber customer 414 may be flagged to the client 412,and the client 404 thereafter may have access to the subscriber customer414.

During content delivery matching, the organization's attributes may bechecked, such as a type, industry, events, inventory, etc. Moreover,subscriber customer preferences may be checked via the third-party APIand/or a data structure of preferences/history, etc. Then, the relevantevent details are pulled through the third-party API for compiling ofabstracts. Next, the relevant content to be compiled in a packet isdecided 430, such as: which partner's events, which specific events,single event, events list, etc. This information may be curated viathird-party API(s). Furthermore, when the subscriber customerverification is checked, a trackable link is compiled 432. Additionally,the message may be sent to the subscriber customer 434. When thesubscriber customer interacts with the content, an order may be createdand updated 436 accordingly in line with subscriber customer actions andavailable inventory in tandem with third-party API checks.

During an Amplify security check and hold 438, the subscriber customermay: navigate to UEMWEB, undertake choosing ticket purchase options,provide financial information (such as credit-card details) in a UEMWEBpurchase form, and may activate a command to authorize 440 an e-commercetransaction. After ADDP receives a command, it may trigger the 3Pmessaging service to send a, e.g., 4-digit PIN code to subscribercustomer via MMS/SMS. This PIN code may be input into a purchase formduring authorization 440 to enable the subscriber customer to activate acommand to commence a, e.g., credit-card charge. This may triggerpayment processing 442.

During payment processing, a secured financial environment generator 500may: require a client ID 502, a client keyword 504, a client third-partyAPI platform identifier, and a subscriber customer telephone number 422to interoperate in order to drive encryption (such as UIE encryption),which allows an e-commerce transaction to commence. When theseoperations are confirmed and compiled, the secured financial environmentgenerator 500 may pass security checks, may provide authorization forthe transaction to continue, and may place a packet containing UIE andPIN into a subscriber customer verified link 512.

Moreover, the secured financial environment generator 510 may generate ahot cookie that may include information specifying the keyword, client,subscriber customer, and protocol, and may place it and activate it inthe purchase form, as shown in FIG. 6 . The hot cookie is stored locallyon the device of the subscriber customer for a defined period of time,as described elsewhere herein. Once the hot cookie is validated, anaccess link is generated 512 and sent through Amplify 530 to asubscriber customer number 534 associated with a client ID 536 using the3P messaging service 532 to allow account access 536 to complete apurchase. Validation of the hot cookie confirms the identity of theclient and further allows access 536 to complete a purchase.

Turning to FIGS. 6-7 . Once access is granted in FIG. 5 informationstored in the hot cookie allows commerce to be activated at 614.Information is input into a 2-factor authentication form (2FA Form) 616sent via 3P messaging service 618 from subscriber customer number 620associated with client ID 632. Once the form 616 is completed andtransmitted at command 634 via 3P messaging service 636 through Amplify638, the identity of the subscriber customer transmitting the form isconfirmed through the secure financial environment generator 510. Oncethe identity is confirmed using the hot cookie 622, the commerce isvalidated at 624, which may allow financial information (such ascredit-card charges) to process and pass authorization and processing.

This may trigger ADDP to deliver financial information (such ascredit-card details) to Vault 1 602 as well as Vault 2 604 based onpartnership requirements in certain payment abstract scenarios.Moreover, it may enable credit-card charges to be made and completedresulting in purchase confirmation and fulfillment 606. While this isoccurring, a hold may be placed on the credit card (or another financialvehicle) of the subscriber customer.

Next, ADDP may trigger the 3P messaging service 626 to send anotification (such as an SMS message) to the subscriber customer number628 associated with client ID 630 with a link to purchased tickets as aresult of a purchase confirmation and fulfillment details 606.

Furthermore, ADDP may manage updating inventory of the client via thethird-party API as a result of a purchase confirmation and fulfillment.ADDP may transfer credit-card charge receipts to one or more payees 610,612, such as the client if they are the merchant of record.Alternatively, the third-party API may push the delivery payment receiptto the client if they are the merchant of record.

We now describe embodiments of an electronic device, which may performthe communication technique. FIG. 8 presents a block diagram of anexample of an electronic device 800, such as one of: electronic devices110, computer 112, hosting computer 114, optional base station 120 oroptional access point 122. This electronic device includes processingsubsystem 810, memory subsystem 812, and networking subsystem 814.Processing subsystem 810 includes one or more devices configured toperform computational operations. For example, processing subsystem 810can include one or more microprocessors, application-specific integratedcircuits (ASICs), microcontrollers, programmable-logic devices, one ormore GPUs, and/or one or more digital signal processors (DSPs).

Memory subsystem 812 includes one or more devices for storing dataand/or instructions for processing subsystem 810 and networkingsubsystem 814. For example, memory subsystem 812 can include dynamicrandom-access memory (DRAM), static random-access memory (SRAM), aread-only memory (ROM), flash memory, and/or other types of memory. Insome embodiments, instructions for processing subsystem 810 in memorysubsystem 812 include: one or more program modules or sets ofinstructions (such as program instructions 822 or operating system 824),which may be executed by processing subsystem 810. For example, a ROMcan store programs, utilities or processes to be executed in anon-volatile manner. Further, for example, DRAM can provide volatiledata storage and may store instructions related to the operation ofelectronic device 800. Note that the one or more computer programs mayconstitute a computer-program mechanism, a computer-readable storagemedium, or software. Moreover, instructions in the various modules inmemory subsystem 812 may be implemented in: a high-level procedurallanguage, an object-oriented programming language, and/or in an assemblyor machine language. Furthermore, the programming language may becompiled or interpreted, e.g., configurable or configured (which may beused interchangeably in this discussion), to be executed by processingsubsystem 810. In some embodiments, the one or more computer programsare distributed over a network-coupled computer system so that the oneor more computer programs are stored and executed in a distributedmanner.

In addition, memory subsystem 812 can include mechanisms for controllingaccess to the memory. In some embodiments, memory subsystem 812 includesa memory hierarchy that comprises one or more caches coupled to a memoryin electronic device 800. In some of these embodiments, one or more ofthe caches is located in processing subsystem 810.

In some embodiments, memory subsystem 812 is coupled to one or morehigh-capacity mass-storage devices (not shown). For example, memorysubsystem 812 can be coupled to a magnetic or optical drive, asolid-state drive, or another type of mass-storage device. In theseembodiments, memory subsystem 812 can be used by electronic device 800as fast-access storage for often-used data, while the mass-storagedevice is used to store less frequently used data.

Networking subsystem 814 includes one or more devices configured tocouple to and communicate on a wired and/or wireless network (i.e., toperform network operations), including: control logic 816, an interfacecircuit 818 and a set of antennas 820 (or antenna elements) in anadaptive array that can be selectively turned on and/or off by controllogic 816 to create a variety of optional antenna patterns or ‘beampatterns.’ (While FIG. 8 includes set of antennas 820, in someembodiments electronic device 800 includes one or more nodes, such asnodes 808, e.g., a pad, which can be coupled to set of antennas 820.Thus, electronic device 800 may or may not include set of antennas 820.)For example, networking subsystem 814 can include a Bluetooth networkingsystem, a cellular networking system (e.g., a 3G/4G/5G network such asUMTS, LTE, etc.), a universal serial bus (USB) networking system, anetworking system based on the standards described in IEEE 802.9 (e.g.,a networking system), an Ethernet networking system, and/or anothernetworking system.

Networking subsystem 814 includes processors, controllers,radios/antennas, sockets/plugs, and/or other devices used for couplingto, communicating on, and handling data and events for each supportednetworking system. Note that mechanisms used for coupling to,communicating on, and handling data and events on the network for eachnetwork system are sometimes collectively referred to as a ‘networkinterface’ for the network system. Moreover, in some embodiments a‘network’ or a ‘connection’ between the electronic devices does not yetexist. Therefore, electronic device 800 may use the mechanisms innetworking subsystem 814 for performing simple wireless communicationbetween the electronic devices, e.g., transmitting advertising or beaconframes and/or scanning for advertising frames transmitted by otherelectronic devices.

Within electronic device 800, processing subsystem 810, memory subsystem812, and networking subsystem 814 are coupled together using bus 828that facilitates data transfer between these components. Bus 828 mayinclude an electrical, optical, and/or electro-optical connection thatthe subsystems can use to communicate commands and data among oneanother. Although only one bus 828 is shown for clarity, differentembodiments can include a different number or configuration ofelectrical, optical, and/or electro-optical connections among thesubsystems.

In some embodiments, electronic device 800 includes a display subsystem826 for displaying information on a display, which may include a displaydriver and the display, such as a liquid-crystal display, a multi-touchtouchscreen, etc. Display subsystem 826 may be controlled by processingsubsystem 810 to display information to a user.

Electronic device 800 can also include a user-input subsystem 830 thatallows a user of the electronic device 800 to interact with electronicdevice 800. For example, user-input subsystem 830 can take a variety offorms, such as: a button, keypad, dial, touch screen, audio inputinterface, etc.

Electronic device 800 can be (or can be included in) any electronicdevice with at least one network interface. For example, electronicdevice 800 may include: a cellular telephone or a smartphone, asmartwatch, a wearable device, a tablet computer, a laptop computer, anotebook computer, a personal or desktop computer, a netbook computer, amedia player device, an electronic book device, a smartwatch, a wearablecomputing device, a portable computing device, a consumer-electronicdevice, as well as any other type of electronic computing device havingwireless communication capability that can include communication via oneor more wireless communication protocols.

Although specific components are used to describe electronic device 800,in alternative embodiments, different components and/or subsystems maybe present in electronic device 800. For example, electronic device 800may include one or more additional processing subsystems, memorysubsystems, networking subsystems, and/or display subsystems.Additionally, one or more of the subsystems may not be present inelectronic device 800. Moreover, in some embodiments, electronic device800 may include one or more additional subsystems that are not shown inFIG. 8 . Also, although separate subsystems are shown in FIG. 8 , insome embodiments some or all of a given subsystem or component can beintegrated into one or more of the other subsystems or component(s) inelectronic device 800. For example, in some embodiments programinstructions 822 are included in operating system 824 and/or controllogic 816 is included in interface circuit 818.

Moreover, the circuits and components in electronic device 800 may beimplemented using any combination of analog and/or digital circuitry,including: bipolar, PMOS and/or NMOS gates or transistors. Furthermore,signals in these embodiments may include digital signals that haveapproximately discrete values and/or analog signals that have continuousvalues. Additionally, components and circuits may be single-ended ordifferential, and power supplies may be unipolar or bipolar.

An integrated circuit (which is sometimes referred to as a‘communication circuit’) may implement some or all of the functionalityof networking subsystem 814. This integrated circuit may includehardware and/or software mechanisms that are used for transmittingwireless signals from electronic device 800 and receiving signals atelectronic device 800 from other electronic devices. Aside from themechanisms herein described, radios are generally known in the art andhence are not described in detail. In general, networking subsystem 814and/or the integrated circuit can include any number of radios. Notethat the radios in multiple-radio embodiments function in a similar wayto the described single-radio embodiments.

In some embodiments, networking subsystem 814 and/or the integratedcircuit include a configuration mechanism (such as one or more hardwareand/or software mechanisms) that configures the radio(s) to transmitand/or receive on a given communication channel (e.g., a given carrierfrequency). For example, in some embodiments, the configurationmechanism can be used to switch the radio from monitoring and/ortransmitting on a given communication channel to monitoring and/ortransmitting on a different communication channel. (Note that‘monitoring’ as used herein comprises receiving signals from otherelectronic devices and possibly performing one or more processingoperations on the received signals).

In some embodiments, an output of a process for designing the integratedcircuit, or a portion of the integrated circuit, which includes one ormore of the circuits described herein may be a computer-readable mediumsuch as, for example, a magnetic tape or an optical or magnetic disk.The computer-readable medium may be encoded with data structures orother information describing circuitry that may be physicallyinstantiated as the integrated circuit or the portion of the integratedcircuit. Although various formats may be used for such encoding, thesedata structures are commonly written in: Caltech Intermediate Format(CIF), Calma GDS II Stream Format (GDSII) or Electronic DesignInterchange Format (EDIF). Those of skill in the art of integratedcircuit design can develop such data structures from schematic diagramsof the type detailed above and the corresponding descriptions and encodethe data structures on the computer-readable medium. Those of skill inthe art of integrated circuit fabrication can use such encoded data tofabricate integrated circuits that include one or more of the circuitsdescribed herein.

While some of the operations in the preceding embodiments wereimplemented in hardware or software, in general the operations in thepreceding embodiments can be implemented in a wide variety ofconfigurations and architectures. Therefore, some or all of theoperations in the preceding embodiments may be performed in hardware, insoftware or both. For example, at least some of the operations in thecommunication technique may be implemented using program instructions822, operating system 824 (such as a driver for interface circuit 818)or in firmware in interface circuit 818. Alternatively or additionally,at least some of the operations in the communication technique may beimplemented in a physical layer, such as hardware in interface circuit818.

One aspect of the present disclosure is directed to a computercomprising: an interface circuit configured to communicate with anelectronic device; a processor coupled to the network interface andmemory; and the memory configured to store program instructions. In anyof the preceding embodiments, when the program instructions are executedby the processor, they cause the computer to perform operationscomprising: receive information specifying activation of a hosted fieldin a document associated with a third party; in response to receivingthe information specifying the activation of the hosted field,dynamically generate a customized second document that includesinformation about one or more transactions of interest to an individualassociated with the telephone number; send a message to an addresscorresponding to the telephone number; and when the computer receivesinformation, associated with the electronic device associated with thetelephone number, which specifies activation of the link, provideinformation, intended for the electronic device, specifying thecustomized second document.

In any of the preceding embodiments, the information specifies awillingness to receive one or more messages from the computer andspecifies a telephone number.

In any of the preceding embodiments, the message comprises a link to thecustomized second document.

In any of the preceding embodiments, the document comprises a webpageassociated with a third party.

In any of the preceding embodiments, the message comprises a ShortMessage Service (SMS) message.

In any of the preceding embodiments, the customized second documentcomprises a webpage.

In any of the preceding embodiments, the customized second documentfacilitates completion of a given transaction in the one or moretransactions.

In any of the preceding embodiments, the operations comprise providingauthentication information intended for the electronic device toauthenticate the given transaction.

In any of the preceding embodiments, the given transaction is rejectedby the computer when the computer does not receive confirmation that theauthentication information is stored on the electronic device.

In any of the preceding embodiments, the authentication informationcomprises an authentication cookie.

In any of the preceding embodiments, the authentication information isvalid for a predefined time interval.

In any of the preceding embodiments, the operations comprise:determining, after receiving the information specifying activation ofthe hosted field, whether the telephone number is included in a datastructure prior to dynamically generating the customized webpage; whenthe telephone number is included in the data structure, proceeding anddynamically generating the customized second document; and otherwise,confirming that the individual wants to receive the one or more messagesprior to dynamically generating the customized second document.

In any of the preceding embodiments, the one or more transactions ofinterest to the individual are associated with an entity, and theindividual has a subscription with the entity.

In any of the preceding embodiments, the operations comprise: receivinga request message associated with the electronic device, wherein therequest message comprises predefined code addressed to a second addresscorresponding to a second telephone number associated with the computer;dynamically generating a customized third document that comprisesinformation about one or more additional transactions of interest to theindividual associated with the telephone number; and providing a secondmessage addressed to the address corresponding to the telephone number,wherein the second message comprises a link to the customized thirddocument.

Another aspect of the present disclosure relates to a non-transitorycomputer-readable storage medium for use in conjunction with a computer,the computer-readable storage medium storing program instructions that,when executed by the computer, cause the computer to carrying out one ormore operations. In any of the preceding embodiments, the operationscomprise: receiving information specifying activation of a hosted fieldin a document associated with a third party; in response to receivingthe information specifying the activation of the hosted field,dynamically generating a customized second document that includesinformation about one or more transactions of interest to an individualassociated with the telephone number; sending a message to an addresscorresponding to the telephone number; and when the computer receivesinformation, associated with an electronic device associated with thetelephone number, which specifies activation of the link, providinginformation, intended for the electronic device, specifying thecustomized second document.

In any of the preceding embodiments, the information specifies awillingness to receive one or more messages from the computer andspecifies a telephone number.

In any of the preceding embodiments, the message comprises a link to thecustomized second document.

In any of the preceding embodiments, the document comprises a webpageassociated with a third party.

In any of the preceding embodiments, the message comprises a ShortMessage Service (SMS) message.

In any of the preceding embodiments, the customized second documentcomprises a webpage.

In any of the preceding embodiments, the customized second documentfacilitates completion of a given transaction in the one or moretransactions.

In any of the preceding embodiments, the one or more operations compriseproviding authentication information intended for the electronic deviceto authenticate the given transaction.

In any of the preceding embodiments, the given transaction is rejectedby the computer when the computer does not receive confirmation that theauthentication information is stored on the electronic device.

In any of the preceding embodiments, the one or more operationscomprise: determining, after receiving the information specifyingactivation of the hosted field, whether the telephone number is includedin a data structure of prior to dynamically generating the customizedwebpage; when the telephone number is included in the data structure,proceeding and dynamically generating the customized second document;and otherwise, confirming that the individual wants to receive the oneor more messages prior to dynamically generating the customized seconddocument.

In any of the preceding embodiments, the one or more transactions ofinterest to the individual are associated with an entity, and theindividual has a subscription with the entity.

In any of the preceding embodiments, the one or more operationscomprise: receiving a request message associated with the electronicdevice, wherein the request message comprises predefined code addressedto a second address corresponding to a second telephone numberassociated with the computer; dynamically generating a customized thirddocument that comprises information about one or more additionaltransactions of interest to the individual associated with the telephonenumber; and providing a second message addressed to the addresscorresponding to the telephone number, wherein the second messagecomprises a link to the customized third document.

Another aspect of the present disclosure is directed to a method fordynamically generating a customized second document, the method beingperformed by a computer. In any of the preceding embodiments, the methodcomprises receiving information specifying activation of a hosted fieldin a document associated with a third party; in response to receivingthe information specifying the activation of the hosted field,dynamically generating the customized second document that includesinformation about one or more transactions of interest to an individualassociated with the telephone number; sending a message to an addresscorresponding to the telephone number; and when the computer receivesinformation, associated with an electronic device associated with thetelephone number, which specifies activation of the link, providinginformation, intended for the electronic device, specifying thecustomized second document.

In any of the preceding embodiments, the information specifies awillingness to receive one or more messages from the computer andspecifies a telephone number.

In any of the preceding embodiments, the message comprises a link to thecustomized second document.

While examples of numerical values are provided in the precedingdiscussion, in other embodiments different numerical values are used.Consequently, the numerical values provided are not intended to belimiting.

In the preceding description, we refer to ‘some embodiments.’ Note that‘some embodiments’ describes a subset of all of the possibleembodiments, but does not always specify the same subset of embodiments.

The foregoing description is intended to enable any person skilled inthe art to make and use the disclosure, and is provided in the contextof a particular application and its requirements. Moreover, theforegoing descriptions of embodiments of the present disclosure havebeen presented for purposes of illustration and description only. Theyare not intended to be exhaustive or to limit the present disclosure tothe forms disclosed. Accordingly, many modifications and variations willbe apparent to practitioners skilled in the art, and the generalprinciples defined herein may be applied to other embodiments andapplications without departing from the spirit and scope of the presentdisclosure. Additionally, the discussion of the preceding embodiments isnot intended to limit the present disclosure. Thus, the presentdisclosure is not intended to be limited to the embodiments shown, butis to be accorded the widest scope consistent with the principles andfeatures disclosed herein.

1. (canceled)
 2. A system comprising: a processor; and memory configured to store program instructions, wherein, when executed by the processor, the program instructions cause the processor to perform operations comprising: providing, to a third party, a subscriber customer identifier and a unique e-commerce micro-website link, wherein the unique e-commerce micro-website link comprises at least one secure transaction opportunity configured for provision to a subscriber associated with the subscriber customer identifier; receiving an indication of authorization to perform the at least one secure transaction opportunity; causing, based on the received indication of authorization, authentication information to be provided to the subscriber; receiving the authentication information from the subscriber associated with the subscriber customer identifier, generating, based on receiving the authentication information from the subscriber, a customized webpage that includes information about performing the at least one secure transaction opportunity, wherein the at least one secure transaction opportunity corresponds to an interest of the subscribe; and providing the customized webpage to the subscriber.
 3. The system of claim 2, wherein the authentication information comprises an authentication cookie configured to be stored on an electronic device associated with the subscriber and the customized webpage.
 4. The system of claim 2, wherein the customized webpage facilitates completion of at least one of the transaction opportunities.
 5. The system of claim 2, wherein the authentication information is valid for a predefined time interval.
 6. The system of claim 2, wherein the authentication information is a pin code.
 7. The system of claim 2, wherein the operations further comprise: determining whether the authentication information is included in a security data structure prior to generating the customized webpage; when the authentication information is included in the data structure, generating the customized webpage.
 8. The system of claim 2, wherein the third party is a third party ticket provider, a third party service provider, or an event provider.
 9. A non-transitory computer-readable storage medium for use in conjunction with a computer, the computer-readable storage medium storing program instructions that, when executed by the computer, cause the computer to carry out one or more operations comprising: providing, to a third party, a subscriber customer identifier and a unique e-commerce micro-website link, wherein the unique e-commerce micro-website link comprises at least one secure transaction opportunity configured for provision to a subscriber associated with the subscriber customer identifier; receiving an indication of authorization to perform the at least one secure transaction opportunity; causing, based on the received indication of authorization, authentication information to be provided to the subscriber; receiving the authentication information from the subscriber associated with the subscriber customer identifier, generating, based on receiving the authentication information from the subscriber, a customized webpage that includes information about performing the at least one secure transaction opportunity, wherein the at least one secure transaction opportunity corresponds to an interest of the subscribe; and providing the customized webpage to the subscriber.
 10. The non-transitory computer-readable storage medium of claim 9, wherein the authentication information comprises an authentication cookie configured to be stored on an electronic device associated with the subscriber and the customized webpage.
 11. The non-transitory computer-readable storage medium of claim 9, wherein the customized webpage facilitates completion of at least one of the transaction opportunities.
 12. The non-transitory computer-readable storage medium of claim 9, wherein the authentication information is valid for a predefined time interval.
 13. The non-transitory computer-readable storage medium of claim 9, wherein the authentication information is a pin code.
 14. The non-transitory computer-readable storage medium of claim 9, wherein the operations further comprise: determining whether the authentication information is included in a security data structure prior to generating the customized webpage; when the authentication information is included in the data structure, generating the customized webpage.
 15. The non-transitory computer-readable storage medium of claim 9, wherein the third party is a third party ticket provider, a third party service provider, or an event provider.
 16. A computer-implemented method for dynamically generating a customized second document, comprising: providing, to a third party, a subscriber customer identifier and a unique e-commerce micro-website link, wherein the unique e-commerce micro-website link comprises at least one secure transaction opportunity configured for provision to a subscriber associated with the subscriber customer identifier; receiving an indication of authorization to perform the at least one secure transaction opportunity; causing, based on the received indication of authorization, authentication information to be provided to the subscriber; receiving the authentication information from the subscriber associated with the subscriber customer identifier, generating, based on receiving the authentication information from the subscriber, a customized webpage that includes information about performing the at least one secure transaction opportunity, wherein the at least one secure transaction opportunity corresponds to an interest of the subscribe; and providing the customized webpage to the subscriber.
 17. The computer-implemented method of claim 16, wherein the authentication information comprises an authentication cookie configured to be stored on an electronic device associated with the subscriber and the customized webpage.
 18. The computer-implemented method of claim 16, wherein the customized webpage facilitates completion of at least one of the transaction opportunities.
 19. The computer-implemented method of claim 16, wherein the authentication information is a pin code.
 20. The computer-implemented method of claim 16, further comprising: determining whether the authentication information is included in a security data structure prior to generating the customized webpage; when the authentication information is included in the data structure, generating the customized webpage.
 21. The computer-implemented method of claim 16, wherein the third party is a third party ticket provider, a third party service provider, or an event provider. 