G06Q20/14

Decentralized systems and methods for transferring information between subsystems of communication networks

Systems and methods which utilize one or more social networking systems when creating, funding, and/or notifying a party of a transaction are provided. In accordance with one aspect, a money transfer transaction may be staged by a user whereupon a link corresponding to the staged transaction may be posted to one or more social networking services in order to allow for multiple users to access and fund the staged transaction. Additionally, in some aspects a user of a social networking service may generate a comment or post which then automatically triggers the staging of a money transfer transaction. Moreover, social networking services may be utilized to provide various notifications regarding money transfer transactions.

Coordinating transactions for domain names administered using a domain name portfolio

A method for coordinating transactions for domain names to register a plurality of domain names with a domain name portfolio stored in a storage, such that each of the domain names in a plurality of domain names belongs to only the domain name portfolio as a unique member of the domain name portfolio; associate a portfolio account with the domain name portfolio, the portfolio account configured for managing a pool of funds available for use in payment of the transactions for said each of the domain names of the plurality of domain names; receive credit payment instructions attributed to the portfolio account, the credit payment instructions containing a credit payment amount; record the credit payment amount against the pool of funds in order to increase a level of the pool of funds; receive debit payment instructions associated with a domain name of the domain name portfolio and domain name transaction information associated with the transaction for the domain name; record the debit payment amount against the pool of funds in order to decrease the level of the pool of funds; and generate and send a periodic report over the network detailing the level of the pool of funds and the transaction applied against two or more of the domain names as members of the domain name portfolio.

SYSTEMS AND METHODS FOR DETECTING AND REPORTING ANOMALIES IN UTILITY METERS

Systems and methods for utility intervention are disclosed. The method of utility intervention includes: (i) obtaining utility data from a utility data repository; (ii) detecting, using at least one type of anomaly-detecting module, at least one utility anomaly and a location address; (iii) calculating an amount of financial savings for the utility anomaly if the utility anomaly was remedied or addressed; (iv) computing a certainty score for the utility anomaly; (v) conveying information about the type of utility anomaly, and the location address of the utility anomaly; and (vi) displaying, on a display screen of a client device, a map depicting a geographical area that identifies, using a flag icon, the location address on the map of the utility anomaly, the type of the utility anomaly, a certainty score for the utility anomaly, and/or an amount of financial savings associated with the utility anomaly.

SYSTEMS AND METHODS FOR DETECTING AND REPORTING ANOMALIES IN UTILITY METERS

Systems and methods for utility intervention are disclosed. The method of utility intervention includes: (i) obtaining utility data from a utility data repository; (ii) detecting, using at least one type of anomaly-detecting module, at least one utility anomaly and a location address; (iii) calculating an amount of financial savings for the utility anomaly if the utility anomaly was remedied or addressed; (iv) computing a certainty score for the utility anomaly; (v) conveying information about the type of utility anomaly, and the location address of the utility anomaly; and (vi) displaying, on a display screen of a client device, a map depicting a geographical area that identifies, using a flag icon, the location address on the map of the utility anomaly, the type of the utility anomaly, a certainty score for the utility anomaly, and/or an amount of financial savings associated with the utility anomaly.

System and Method for Purchasing Wireless Battery Charge for Electronic Devices
20230023108 · 2023-01-26 ·

The present invention relates to a smartphone battery wireless charging system and application. The wireless charging application enables customers to purchase battery charge by paying a fee. The requested battery charge is provided wirelessly over-the-air using Wi-Fi by wireless charging base stations or using IoT devices and more. A server determines the battery capacity of the battery of a smartphone and based on the battery charge purchase request, battery charge is transmitted to the smartphone in the form of waves which are received by the smartphone and is converted into electric charge to recharge the battery. A user can pay a fee to receive, for example, 25%, 50%, 75%, or 100% battery charge. The charging of the phone is provided without an external connector thereby enabling individuals to use their phone for extended periods of time without running out of battery charge.

Printing device functionality based on consumption and payment

Examples for determining printing device functionality based on consumption and payment are described herein. In some examples, signals indicative of an amount of utilized print consumable by a printing device and signals indicative of payment for the amount of utilized print consumable are received at a computing device. Signals to cause the printing device to alter a functionality based on the signals indicative of an amount of utilized print consumable and the signals indicative of payment for the amount of utilized print consumable are transmitted by the computing device.

System and method for secure, trustful internet interactions
11562084 · 2023-01-24 ·

A system and method for the creation of an atomic internet platform and system is herein presented. Within the atomic internet users, content providers, and event managers may create content or user atoms each of which has a trust history and trust history tail. The atomic internet facilitates direct interaction between atoms of any type and provides curation of information, content, and other data in a trustless environment. Browsing and searching as well as payment and value exchange are facilitated in the atomic internet in a secure fashion based upon an examination of the trust history tail and trust history. The trust history is built over time based upon interactions between atoms and a trust history tail and accumulated trust history transactions are indicative of level of trust based upon the length of the trust history tail and accumulated trust history of transactions.

System and method for secure, trustful internet interactions
11562084 · 2023-01-24 ·

A system and method for the creation of an atomic internet platform and system is herein presented. Within the atomic internet users, content providers, and event managers may create content or user atoms each of which has a trust history and trust history tail. The atomic internet facilitates direct interaction between atoms of any type and provides curation of information, content, and other data in a trustless environment. Browsing and searching as well as payment and value exchange are facilitated in the atomic internet in a secure fashion based upon an examination of the trust history tail and trust history. The trust history is built over time based upon interactions between atoms and a trust history tail and accumulated trust history transactions are indicative of level of trust based upon the length of the trust history tail and accumulated trust history of transactions.

High accuracy geo-location system and method for mobile payment

Location polygons are defined along traffic lanes and parking spaces to facilitate determination of the location of a vehicle relative to features associated with the location polygons. The location polygons are used, in one application, to identity entrance and exit of a special toll lane along a roadway, and to ensure that the vehicle properly enters and exits the tolling lane.

Automatic invoice notification

Introduced here is a technology for automatic notification of an invoice for a customer based on identification of a customer identifier included in transaction data received from a point-of-sale (POS) system of a particular merchant (“the invoice technology”). The notification can include a promotion to provide an incentive to the customer to pay the invoice. The notification can be presented on a display of the POS system. Alternatively, the notification can be presented in a receipt for the transaction conducted at the POS system, where that receipt can be transmitted for display at a user device of the customer. For example, the receipt can be in the form of an email message or a text message. Upon notification of the invoice, the customer can submit a payment for that invoice (“invoice payment”) in exchange for the promotion.