Patent classifications
G06Q30/00
Inmate compliance monitor
The disclosure relates to systems and methods for compliance monitoring in a secure facility. A method can include generating, by a mobile radio frequency identification (RFID) device, data regarding a proximate stationary RFID device of stationary RFID devices situated about a correctional facility, the mobile RFID device associated with a user, and comparing, by a server, the generated data to compliance monitoring rules that govern actions to be performed by the personnel in monitoring offender behavior, each of the compliance monitoring rules including an associated timeframe in which an action of the compliance monitoring rule is to be performed, and generating, by the server, an alert to be provided to the mobile RFID device in response to determining a time associated with a compliance monitoring action has already expired or will expire in a specified amount of time.
Methods, systems, and devices for resolving advertisement space contention
Aspects of the subject disclosure may include, for example, embodiments for detecting a navigation application operating on a first communication device, and identifying a location of the first communication device. Further embodiments can include obtaining a first advertisement and a second advertisement according to the location of the first communication device as well as determining a first priority associated with the first advertisement and a second priority associated with the second advertisement. Additional embodiments can include determining the first priority is higher than the second priority resulting in a determination to present the first advertisement prior to the second advertisement, and providing the first advertisement, the second advertisement, and the determination to the first communication device. The first communication device presents the first advertisement within navigation content utilizing the navigation application prior to presenting the second advertisement within the navigation content based on the determination. Other embodiments are disclosed.
Security and fraud prevention techniques based on detection of a transaction card in an image
In some implementations, a transaction card security system may detect a transaction card in an image, and may perform image processing to identify one or more character sequences or one or more designs that appear on the transaction card. The one or more character sequences or the one or more designs may identify an institution associated with the transaction card and/or a cardholder associated with the transaction card. The transaction card security system may identify the institution or the cardholder associated with the transaction card based on the one or more character sequences or the one or more designs, and may perform one or more actions relating to security of the transaction card based on detecting the transaction card in the image and identifying the institution or the cardholder associated with the transaction card.
Systems and methods for providing utilities based on blockchain-specific populations of unique digital articles
Systems and methods to provide utilities based on blockchain-specific populations of unique digital articles in an online gaming platform are disclosed. Exemplary implementations may execute instances of a game; manage user accounts, including a first user account having a first account inventory that includes a first unique digital article; receive a first recordation request to record ownership of the first unique digital article on a first decentralized ledger; determine a size of a set or population of unique digital articles that include the first unique digital article; determine a fraction of the set or population of unique digital articles recorded on the first decentralized ledger; receive a first reward request for a first reward; compare the determined fraction with a threshold value; based on the comparison, provide either the first reward or else provide no award or a smaller award.
Systems and methods for improving a shopping experience within a retail store
Embodiments are provided for enhancing an in-store retail experience for a customer by facilitating search queries for products and services available for sale in a retail store. According to certain aspects, an electronic device may receive a search string associated with the retail store and transmit the search string to a server that may execute a corresponding search query. The server may send results from the search query to the electronic device, which may dynamically update an interface accessible by a user. The user may view the information and make appropriate selections.
Apparatus, method, and non-transitory computer storage medium for performing predictive inferences using multiple predictive models
Method, apparatus and computer program product for performing a cross-model predictive inference to generate a cross-model predictive output for a plurality of predictive inputs using a plurality of predictive models. For example, the apparatus includes at least one processor and at least one non-transitory memory including program code. The at least one non-transitory memory and the program code are configured to, with the at least one processor, obtain a model selection probability distribution which defines, for each predictive model, a respective selection probability score; obtain, for each predictive model, respective cross-model normalization data; for each predictive input, determine a cross-model predictive score; and determine, based on each determined cross-model predictive score, the cross-model predictive output.
Method and system for connecting and facilitating the machine-to-machine delivery of a gift that may or may not have monetary value
A computer-implemented method and system for facilitating a sending of a gift from a first machine to a second machine may include a processor of a computer server reviewing a first list of one or more names of people maintained in a computer database. The processor may review context information related to the one or more names to determine if a moment exists for sending a gift from a first machine to a second machine. Content providers may also request one or more gifts to be identified when a second machine is proximate to a content provider who may fulfill a gift.
Namespace-based system-user access of database platforms
A database platform authenticates a system user for access via an application to a database that is associated with a customer account of the database platform. The system user is a first object in a first account-level namespace of the customer account, and the first account-level namespace is distinct from a default account-level namespace of the customer account. The database platform sends, as the system user, a query to the database via the application. The database platform receives, as the system user, results of the query from the database, and stores, as the system user, the results of the query in a first-namespace stage, which is a second object in the first account-level namespace.
Registered applications for electronic devices
The subject technology provides a portion of the functionality of an application on an electronic device on which the application is not installed. The portion of the functionality of the application is provided by a clip of the application that can be obtained, installed, and launched on the user device, at the time the functionality is desired by a user, and without authenticating information for the user. The clip of the application can provide the user with access to a purchase function, an ordering function, or any other sub-function of the application. When the application itself is installed on the device, the clip of the application can be deleted while preserving access, by the application, to data generated on the device by the clip.
Method, medium, and system for reducing counterfeits online
Systems and methods change a user interface for the purpose of guiding a user in supplementing a product listing with an image to evidence the product's authenticity. Example embodiments include a machine-implemented method for accessing at least one database to retrieve an authenticity criterion mapped to a product and at least one reference image that depicts adequate detail of a product specimen to fulfill the authenticity criterion. The machine can further cause a user device to display the reference image to the user along with a suggestion that the user submit a candidate image depicting similar detail of the product. In some example embodiments, the method further includes retrieving the candidate image, confirming receipt of the candidate image, and displaying the candidate image, as well as adjusting a rank for a candidate specimen based on various factors.