G06Q50/265

Transport request processing device, method and storage medium

A transportation request processing device includes: a memory; and a processor coupled to the memory, and configured to: receive, from a terminal of an orderer, a transportation request to transport a target person or object to a destination by a vehicle traveling by remote driving and to deliver the target person or object to a recipient, divide a task corresponding to the transportation request into a remote driving task of causing the vehicle to travel by remote driving, and a safety check task of checking a periphery of the vehicle when delivering the target person or object to the recipient at the destination, and transmit information of the remote driving task to a first terminal of a first contractor who will undertake the remote driving task, and transmit information of the safety check task to a second terminal of a second contractor who will undertake the safety check task.

Native-feature silent coercion alarm

Apparatus and methods for providing protection from economic exploitation. The apparatus and methods may include a platform for tagging a social security number and/or other suitable identification number. The system may allow a person associated with a social security number to automatically flag and deny any product or service request associated with the social security number. The alarms are “silent,” because the alarm may initiate an institution internal process in which the customer interaction with the institution follows a normal diligence process until an intervention can be effectively executed on behalf of the customer. This reduces the likelihood of a reaction from the customer's associate prior to completing the diligence process. A system may provide the customer with an opportunity to electronically activate an alarm by typing keystrokes on a card reader keypad or interacting with a physical sensor on the reader, on the card, or the like.

Pre-data breach monitoring

A method for providing pre-data breach monitoring provides information to businesses that is useful to predict portions of the company data that may not be secured well enough and other risks associated with data breaches, such as employees that may not be trustworthy.

Computer-based systems configured to detect fraudulent activities related to card-transacting devices and methods of use thereof
11568349 · 2023-01-31 ·

Systems and methods of detecting fraudulent activity including skimmers adapted to compromise transacting devices such as automated teller machines (ATMs) are disclosed. In one embodiment, an exemplary computer-implemented method may comprise determining that a subject device has a risk level higher than a risk threshold, providing a push notification to a mobile device proximal to the subject device, executing a software application executed by the mobile device for gathering information and transmitting feedback regarding the subject device, and providing an incentive, upon receipt of the feedback, to, for example, an account or device associated with an individual involved with the feedback or interaction with the device.

Social distancing methods and devices

The embodiments disclose a method including providing an aerial drone coupled wirelessly to a social distancing application on a user digital device, wherein the drone is coupled to solar cell panels for recharging its batteries, providing a strobe light coupled to the drone for signaling an S.O.S. automatically in emergency situations, cellular communication device coupled to the drone for transmitting and receiving messages from the social distancing application, wherein the drone includes a cellular signal strength sensor to automatically move to a location to boost cellular signal strength, and providing at least one camera for capturing images and videos during user directed reconnaissance, drone sensors to detect and measure aerosols including biologics and DNA in an area, electromagnetic fields, barometric pressure, humidity, ambient temperature, wind speed and direction, detection and identification devices to detect unnatural sounds, to analyze and identify manmade, animal and environmental objects and conditions using computer vision.

Systems and methods for identifying and activating emergency response assets

Described herein are systems, devices, methods, and media for activating emergency response assets in response to emergency alerts.

Facilitation of conditional do not resuscitate orders

This disclosure describes a solution to enable more useful and responsive methods for a person's wishes for resuscitation actions to be canceled or discontinued in the event of a medical event. In this solution, a person can record their do not resuscitate (DNR) wishes with more specificity. For instance, they can specify conditions for treatment or non-treatment in the event of a medical emergency that would otherwise call for live-saving procedures or the use of an automated external defibrillator (AED) device. Conditional DNR data can be recorded in an electronic device (e.g., emergency pendant or smart watch, or in an electronic device) implanted within or on the person's body. This data can also be stored in a database accessible via a network.

Devices, systems, and methods for real time surveillance of audio streams and uses therefore

Various examples are provided for surveillance of an audio stream. In one example, a method includes identifying presence or absence of a sound type of interest at a location during a time period; selecting the sound type from a library of sound type information to provide a collection of sound type information; incorporating the collection on a device proximate to the location; acquiring an audio stream from the location by the device to provide a locational audio stream; analyzing the locational audio stream to determine whether a sound type in the collection is present in the audio stream; and generating a notification to a user or computer if a sound type in the collection is present. The device can acquire and process the audio stream. In another example, a bulk sound type information library can be generated by identifying sound types of interest including them based upon a confidence level.

Automated dispute resolution system
20230237505 · 2023-07-27 ·

Disclosed herein provides an automated dispute resolution system in data communication with a user device comprising: a memory and a processor, the processor configured to receive identification information, scale a risk of misidentification; record a communication in the memory, together with a timestamp; receive input to components of a matter; collect information on the matter; establish a prediction based on a type of dispute resolution and one or more attributes; create an action item; identify a solution; and present the solution to the matter parties. Further disclosed herein provides a method, comprising: receiving identification information, scaling a risk of misidentification; recording a communication in the memory, together with a timestamp; receiving input to components of a matter; collecting information on the matter; establishing a prediction based on a type of dispute resolution and one or more attributes; creating an action item; identifying a solution; and presenting the solution to the matter parties.

SYSTEM AND METHOD FOR DETERMINING AN INTERIM LIFE SAFETY MEASURE (ILSM) FOR ONE OR MORE SMOKE COMPARTMENTS IN A FACILITY
20230237607 · 2023-07-27 ·

A system and method for determining an interim life safety measure (ILSM) for one or more smoke compartments in the facility is disclosed. The system analyzes potential risk factors associated with individuals in one or more smoke compartments of facility, based on type of smoke compartments. Further, the system classifies assets associated with smoke compartments into risk levels, based on asset classes and/or location environment associated assets comprising risk levels. Additionally, system assigns risk assessment scores to inspection points corresponding to classified assets. Furthermore, the system determines ILSMs. The ILSM is health and safety measure to protect individuals at facility. Additionally, system creates maintenance work orders and/or corrective work orders, based on determined ILSMs. Further, system outputs, to user device, notifications corresponding to status of created maintenance work orders and/or corrective work orders. The notifications inform user to provide instructions for creating order and inform user to monitor status.