G06Q20/0855

REDUCING AUTHENTICATION REQUIREMENTS FOR DATA TRANSMISSIONS
20180012225 · 2018-01-11 · ·

A method of reducing authentication requirements for data transmissions includes receiving a request for a data transmission between a sender and a receiver. The request includes an amount of data associated with the data transmission. An overall confidence level is determined between the receiver and the sender. A data transmission protection mechanism is selected based on the overall confidence level between the receiver and the sender. The data transmission is performed based on the selected data transmission protection mechanism.

Transaction-enabled systems and methods for resource acquisition for a fleet of machines

The present disclosure describes transaction-enabling systems and methods. A system can include a controller and a fleet of machines, each having at least one of a compute task requirement, a networking task requirement, and an energy consumption task requirement. The controller may include a resource requirement circuit to determine an amount of a resource for each of the machines to service the task requirement for each machine, a forward resource market circuit to access a forward resource market, and a resource distribution circuit to execute an aggregated transaction of the resource on the forward resource market.

Control method, controller, data structure, and power transaction system

Provided is a control method including: receiving, from first power equipment, first transaction data including, for example, transmitted power amount information indicating the amount of power transmitted to power accumulation equipment; obtaining, from the power accumulation equipment, received power information including, for example, received power amount information indicating the amount of power received from the first power equipment; verifying the first transaction data by referring to the received power information; executing a first consensus algorithm with second servers when the first transaction data is verified successfully; and recording a block including the first transaction data in a distributed ledger of a first server when the validity of the first transaction data is verified through the first consensus algorithm.

GENERATIVE ADVERSARIAL NETWORK MODEL TRAINING USING DISTRIBUTED LEDGER
20230004868 · 2023-01-05 ·

Embodiments are directed to the tracking of data in a generative adversarial network (GAN) model using a distributed ledger system, such as a blockchain. A learning platform implementing a classification model receives, from a third party, a set of data examples generated by a generator model. The set of data examples are processed by the classification model, which outputs a prediction for each data example indicating whether each data example is true or false. The distributed ledger keeps a record of data examples submitted to the learning platform, as well as of predictions determined by the classification model on the learning platform. The learning platform analyzes the records of the distributed ledger, and pairs the records corresponding to the submitted data examples and the generated predictions determined by the classification model, and determines if the predictions were correct. The classification model may then be updated based upon the prediction results.

Payment application based fund transfer
11568418 · 2023-01-31 · ·

Various embodiments are related to apparatuses and methods for enabling a sender to perform monetary transactions for a requestor. A sender can use, for example, a payment application associated with a payment processing system to perform a monetary transaction for a requestor. The payment processing system can send information related to the monetary transaction to, for example, a sender-requestor association component. When the monetary transaction is a deposit, the sender can receive funds for the deposit from the requestor. The platform can debit the requestor's financial account for the deposit amount and credit the sender's financial account with the debit account as a physical cash transaction occurs between the sender and the requestor.

Digital payment system
11568401 · 2023-01-31 · ·

A digital payment system for facilitating seamless transactions from a user system to a buyer system. The system includes a service provider system which further includes a service interaction component. The service interaction component is configured to collect predefined information about the user system and the associated user. The service provider system also includes a payment engine for processing payments digitally based on data worth associated with the data owned by the user and authorized for sharing by the service provider to the buyer system. The payment engine calculates a payable amount payable digitally by the user to the service provider based on a digital transactional value indicative of the data worth associated with the data owned by the user and authorized for sharing, among other things. The system further includes a pre-consenting system configured to facilitate user authorization.

Systems and methods for healthcare fees transparency and collections at the time of service
11568965 · 2023-01-31 · ·

An electronic healthcare system for delivering medical services is described. The electronic healthcare systems can includes modules for accessing patient electronic medical records and ordering medical services. In response to a medical service order, a cost estimation and notification module can receive information associated with the medical service order. The cost estimation and notification module can determine the patient cost responsibility and quickly notify the patient of the costs. The patient can use the determined cost information to decide whether to move forward with the ordered medical tests.

Systems and methods for use in facilitating network transactions

Systems and methods are provided for facilitating network transactions. One exemplary method includes receiving, from a terminal, a request for a conversion option for a transaction to a payment account, where the request includes a transaction amount for the transaction in a first currency and an identifier associated with the payment account. The exemplary method also includes determining a charge rate for the payment account for conversion of the transaction amount to a second currency, determining the conversion option for the transaction in the second currency based on at least a conversion rate and the charge rate, and transmitting the conversion option to the terminal in response to the request.

Wireless electric vehicle charging managed by a parking manager device
11565597 · 2023-01-31 · ·

A system for charging an electric vehicle having at least one power induction coil under control of a processor wirelessly charges an electric vehicle, wherein the at least one power induction coil is positioned in proximity to a parking location; and a parking manager device manages permissions for electric vehicles to park in one or more parking locations included in a parking zone associated with the parking manager device, wherein the parking manager also manages permissions for electric vehicles to charge via wireless charging while parked in the one or more parking locations, wherein the parking manager device has a unique address and the zone, parking locations, and charging stations associated with the parking manager device have associated unique sub-addresses associated with the parking manager device unique address.

OFFICE OF FOREIGN ASSETS CONTROL (OFAC) COMPLIANCE SYSTEM
20230019588 · 2023-01-19 ·

A computerized method produces an identity code to identify each subject stored in the computer systems connected to a computer network while protecting the privacy and confidentiality of the subject. A central computer system receives an identity code of a suspect of a financial crime and sends the identity code to all computer systems connected to the computer network. The computer systems that have the matched identity code send the requested information to the central computer system. As a result, law enforcement organizations can eliminate crimes and financial institutions can recover the money stolen from them. In addition, law enforcement organizations and financial institutions can identify money launderers that are missed by their anti-money laundering transactional monitoring systems.