G06Q10/00

AIRCRAFT NON-PERIODIC MAINTENANCE SCHEDULING SYSTEM

A system aggregates data related to a non-conformance system in an aircraft and allocates resources to repairing the non-conformance condition. The system includes a service bus that receives and distributes the non-conformance condition and an optimizer tool that generates repair alternatives. The optimizer tool allows dynamic reconfiguration of rules to activate and deactivate or change a weight of individual rules in a rule set.

METHODS AND SYSTEMS FOR ALERTING USERS REGARDING AVAILABILITY OF UNCONSUMED CONTENT
20180007155 · 2018-01-04 ·

Methods and systems are described for a media guidance application that limits the incentive for authorized users to share content with unauthorized users, while still allowing users to access content virtually anywhere. Specifically, the media guidance application allows an authorized user to receive only a portion of a media asset that he or she is authorized to access on a different device, after a designated time period, and/or when the remaining portion of the media asset is inaccessible.

SECURE ANONYMOUS TRANSACTION APPARATUSES, METHODS AND SYSTEMS
20180012147 · 2018-01-11 ·

The SECURE ANONYMOUS TRANSACTION APPARATUSES, METHODS AND SYSTEMS (“SAT”) transform hardware-verified user authentication requests via SAT components into secure transaction notifications. In one implementation, the SAT obtains a secure anonymous transaction user authentication request. The SAT verifies the authenticity of a user, using the secure anonymous transaction user authentication request. The SAT obtains an authenticated purchase order, in response to which it generates a one-time anonymous card account. Using the one-time card account, the SAT generates an anonymized purchase order for a merchant, and provides the anonymized purchase order. On obtaining a purchase notification for the anonymized purchase order, the SAT provides real-time notification for a user of the purchase notification. Also, on obtaining notification of a shipment related to the anonymized purchase order to an anonymized address, the SAT generates an order to re-route the shipment from the anonymized address to an actual shipment address of the user.

SECURE ANONYMOUS TRANSACTION APPARATUSES, METHODS AND SYSTEMS
20180012147 · 2018-01-11 ·

The SECURE ANONYMOUS TRANSACTION APPARATUSES, METHODS AND SYSTEMS (“SAT”) transform hardware-verified user authentication requests via SAT components into secure transaction notifications. In one implementation, the SAT obtains a secure anonymous transaction user authentication request. The SAT verifies the authenticity of a user, using the secure anonymous transaction user authentication request. The SAT obtains an authenticated purchase order, in response to which it generates a one-time anonymous card account. Using the one-time card account, the SAT generates an anonymized purchase order for a merchant, and provides the anonymized purchase order. On obtaining a purchase notification for the anonymized purchase order, the SAT provides real-time notification for a user of the purchase notification. Also, on obtaining notification of a shipment related to the anonymized purchase order to an anonymized address, the SAT generates an order to re-route the shipment from the anonymized address to an actual shipment address of the user.

SYSTEMS AND METHODS FOR MONITORING USE OF PERSONAL PROTECTIVE EQUIPMENT

A personal protective equipment (PPE) monitoring system is disclosed that includes a set of wireless transmitting devices and a mobile application executable on a mobile device. The mobile device receives a wireless signal from a transmitting device associated with a workstation and determines the type of workstation based on an identifier included in the wireless signal. The mobile device also receives wireless signals from transmitting devices attached to PPE items located in proximity to the mobile device and determines the types of PPE items based on respective identifiers included in the wireless signals. The mobile application determines PPE items required to operate equipment at the workstation and further determines whether the set of detected PPE items includes all of the required PPE items. The mobile application generates a user interface that indicates the presence or absence of each required PPE item and displays the UI on the mobile device.

Entity-specific data-centric trust mediation
11710051 · 2023-07-25 ·

Establishing event-specific trust through data-centric mediation by: generating a mediated covenant of association as an instance of trust among a plurality of entities at an association layer of a multi-layer computer security system; constructing a security model enforceable by the multi-layer computer security system that expresses node-node semantic relationships as links among nodes of the model representing protectable computing resources; and producing an event-specific security model via informatic convolution of elements of the covenant with elements of the security model, so that the event-specific security model is operable to constrain a computing action among computing resources represented by the plurality of entities.

Entity-specific data-centric trust mediation
11710051 · 2023-07-25 ·

Establishing event-specific trust through data-centric mediation by: generating a mediated covenant of association as an instance of trust among a plurality of entities at an association layer of a multi-layer computer security system; constructing a security model enforceable by the multi-layer computer security system that expresses node-node semantic relationships as links among nodes of the model representing protectable computing resources; and producing an event-specific security model via informatic convolution of elements of the covenant with elements of the security model, so that the event-specific security model is operable to constrain a computing action among computing resources represented by the plurality of entities.

Machine-learned partial ticket value prediction
11710143 · 2023-07-25 · ·

A ticket exchange server is configured to distribute tickets to an event based on predicted attendance. The ticket exchange server accesses a set of training data describing statistics of and attendance during a historical event for a plurality of historical events. Using the training data, the ticket exchange server trains a machine-learned model, which is configured to predict a likelihood of a seat at a stadium being vacant during an event based on real-time statistics. During an event at the stadium, the ticket exchange server detects a vacant seat associated with a first ticket of a first user. The ticket exchange server determines a value of a second ticket for the vacant seat at least in part by applying the machine-learned model to real-time statistics of the event and distributes the second ticket to a second user.

Methods and devices for unmanned aerial vehicle based site inspection and scale rendered analysis
11710415 · 2023-07-25 · ·

Various embodiments of the present technology generally relate to unmanned aerial vehicle (UAV) scale rendered analysis, orthomosaic, and 3D mapping and landing platform systems. More specifically, some embodiments relate to systems, methods, and means for the collection and processing of images captured during a UAV flight sequence. In some embodiments, the UAV landing platform retrieves flight information and initial map information over a unidirectional virtual private network from a multitenant cloud-based scheduling application. The UAV landing platform sends the initial map information to a UAV over a WiFi, Bluetooth, or radio frequency network and initiates a drone flight sequence once the drone flight sequence has been approved by a local user. The UAV landing platform receives property image data from a UAV after a UAV flight sequence has ended and transmits the received property image data back to the cloud application.

Methods, systems, and devices for caching and managing medical image files

Disclosed herein are methods, systems, and devices for solving the problem of caching large medical images during workflow. In one embodiment, a method is implemented on at least one computing device. The method includes receiving a source medical image file from a first remote device; caching the source medical image file in local memory; determining relevant medical image data, first non-relevant medical image data, and second non-relevant medical image data within the source medical image file; removing the second non-relevant medical image data to create a memory reduced medical image file; storing the memory reduced medical image file in the local memory; and transmitting the memory reduced medical image file to a second remote device.