G06Q30/00

Automatically adjusting order fulfillment due to offline ordering

A server receives an order request from a consumer device where the order request is be provisioned to a recipient at a later time and where the recipient is required to be physically present receive the order. The order request also includes a request location and a request time. As a function of the information, the method determines an estimated time to complete the order request. The method further sends a confirmation request to the consumer device requesting a confirmation response within a predetermined time. After an expiration of the predetermined time, the method completes a transaction for the order request and receives the confirmation response from the consumer device after the expiration of the predetermined time. The method sends a notification to the consumer device indicating the estimated time to complete the order request for the recipient to receive the order request.

Modification of transaction fees

A method implemented on an electronic computing device includes receiving a request for an automated teller machine (ATM) transaction from an ATM. Authentication credentials are received of a customer of the ATM. The authentication credentials are associated with the request for the ATM transaction. A notification is received of a failure to execute the ATM transaction at the ATM. In response to the receiving a notification of the failure, a fee modification is issued to the customer of the ATM. The fee modification permits modification of a transaction fee associated with a subsequent ATM transaction at an alternative ATM.

Beacon-based management of queues

Methods and systems disclosed herein utilize location signals received from beacons and other indoor positioning systems along with an application program on customer devices for better management of customer traffic in physical queues and virtual queues, specifically in environments such as airports, food courts, shopping malls, and amusement parks. These methods and systems also provide a customer with a token for his place in the queue on his mobile device, so he is free to continue with his activities until it is time for him to acquire a product or a service.

Method, medium, and system to optimize revenue using a bid reservation system

A method for evaluating bids for the purchase of inventory items to optimize bid-generated revenue. The method comprises receiving a bid for an inventory item, the bid comprising a bid price, a specific inventory item that is to be purchased, and a number of inventory items to be purchased. The bid is input into a machine learning algorithm as are features associated with the inventory item and information associated with the bid. The machine learning algorithm analyzes the bid and generates an output to accept or decline the bid. Responsive to that output the bidder is advised whether the bid was accepted or declined.

SERVICE MANAGEMENT USING USER EXPERIENCE METRICS

A method, system, and computer usable program product to determine a first mood of the user, where the first mood is based on a characteristic of the user at a first time during the providing of an online service and to determine a second mood of the user, where the second mood is based on a characteristic of the user at a second time during the providing of the online service. The first mood of the user and the second mood of the user are compared to determine a delta or change in mood of the user.

MANAGEMENT SYSTEM FOR POINT OF CARE TESTING

The present invention relates to a method and system for quality compliance, system and operator verification, and process management for point of care biological sample testing systems used in hospitals and other medical delivery environments. Specifically, the present invention may be directed to a computing device configured to generate a plurality of attributes configured to assess a competency level of an operator to operate at least one sample testing instrument, obtain operator derived data pertaining to the operator's ability to operate the at least one sample testing instrument, and determine a competency level of the operator for the at least one sample testing instrument based the plurality of attributes and the operator derived data.

DATABASE SHARING SYSTEM

Systems and techniques for sharing healthcare fraud data are described herein. Healthcare fraud detection schemes and/or fraud data may be automatically shared, investigated, enabled, and/or used by entities. A healthcare fraud detection scheme may be enabled on different entities comprising different computing systems to combat similar healthcare fraud threats, instances, and/or attacks. Healthcare fraud detection schemes and/or fraud data may be modified to redact sensitive information and/or configured through access controls for sharing.

METHOD FOR AUTHENTICATION AND ASSURING COMPLIANCE OF DEVICES ACCESSING EXTERNAL SERVICES
20180005250 · 2018-01-04 ·

Systems and methods are described for determining whether an electronic computing device complies with the security policy for a network. The invention includes receiving an electronic request signal including an electronically encoded request to allow an electronically encoded process operating on an electronic processor of the electronic computer device to establish electronic communication with a specific target electronic device or service operating on the electronic communications and data network; receiving electronically encoded information about the identity of the electronically encoded process, the electronic computing device, or the use of the electronic computing device; receiving electronically encoded policy elements for the security policy; receiving electronically encoded information about the compliance of the electronic computing device; receiving electronically encoded information related to the identity of the principal of the electronic computing device; and determining whether the electronic computing device complies with the security policy.

APPLICATION CUSTOMIZATION USING A CUSTOMIZATION FILE
20180004376 · 2018-01-04 · ·

Techniques and systems for receiving and using a customization file are provided, including a computing device, a method, or a computer-program product. For example, a method may include receiving a customization file that includes customized content for customizing a communication interface overlay. The method may further include accessing native application code and executing the native application code to run a native application. The method may further include accessing a compiled set of code that is separate from the native application code. The compiled set of code is accessible by the native application code. The method may further include executing the compiled set of code, wherein a default file of the compiled set of code provides a native communication interface overlay, wherein the native communication interface overlay is overlaid over a graphical interface of the native application, and wherein the native communication interface overlay allows communication with a resource of a third-party. The method may further include executing the received customization file, wherein executing the received customization file customizes the compiled set of code, and wherein the customized compiled set of code customizes the native communication interface overlay to provide a customized communication interface overlay.

APPLICATION CUSTOMIZATION USING A CUSTOMIZATION FILE
20180004376 · 2018-01-04 · ·

Techniques and systems for receiving and using a customization file are provided, including a computing device, a method, or a computer-program product. For example, a method may include receiving a customization file that includes customized content for customizing a communication interface overlay. The method may further include accessing native application code and executing the native application code to run a native application. The method may further include accessing a compiled set of code that is separate from the native application code. The compiled set of code is accessible by the native application code. The method may further include executing the compiled set of code, wherein a default file of the compiled set of code provides a native communication interface overlay, wherein the native communication interface overlay is overlaid over a graphical interface of the native application, and wherein the native communication interface overlay allows communication with a resource of a third-party. The method may further include executing the received customization file, wherein executing the received customization file customizes the compiled set of code, and wherein the customized compiled set of code customizes the native communication interface overlay to provide a customized communication interface overlay.