Patent classifications
G06Q20/4014
SYSTEM AND METHOD FOR USING A BLOCKCHAIN TO MANAGE MEDICAL TRANSACTIONS BETWEEN ENTITIES IN A HEALTHCARE ECOSYSTEM
A method for performing a medical transaction using a hyperledger, the method including receiving, from a computing device associated with a medical personnel entity, a request to perform the medical transaction between the medical personnel entity and a patient entity, where the medical personnel entity is associated with a medical personnel node and the patient entity is associated with a patient node, and a respective copy of the hyperledger is maintained at both the medical personnel node and the patient node. The method includes identifying a transaction in the hyperledger that stores an authorizing credential of the medical personnel entity, determining whether to allow the medical transaction to be performed based on at least the authorizing credential of the medical personnel entity, and responsive to determining to allow the medical transaction to be performed, updating the respective copy of the hyperledger with the medical transaction.
POINT OF DONATION LENDING SYSTEM AND METHOD FOR FACILITATING CHARITABLE DONATIONS
A point of donation lending system for facilitating charitable donations is disclosed. The system provides essential funds to non-profit organizations for helping the poor, needy, hungry, and disadvantaged worldwide. The plurality of modules comprises an NPO registration module, configured to register one or more organization via a plurality of organization details for implementing a donation feature. The plurality of modules further comprises a donation integration module, configured to create a donation page of each of one or more registered organization for a donor to pay. Further, the created donation page is integrated with the system for the donor access. The system facilitates integration of loan facilities for donations via a donor registration module. The plurality of modules enables the donor to track the loan payment, whereby on loan approval the third-party loan provider organization directly transfer the loan to the chosen NPOs.
CONSENTED IDENTITY AS A SERVICE
A server includes an identity certainty model, which has permutation ensembled weights. The server receives a plurality of data access consent receipts from an external consent repository. Based on the data access consent receipts, the server retrieves a plurality of data types from one or more data providers. The server executes the identity certainty model on the data types. The server performs an ID resolution operation on the data types. Using data outputs produced by the ID resolution operation, the server calculates metrics from the ID resolution operation. A weighting of the data outputs produced by the metrics calculations is performed using the permutation ensembled weights. An identity protection score and a risk score are determined based on the weighted data outputs. An optimization operation is performed on the identity protection score and the risk score to determine an identity certainty score.
TRUST ROOT SYSTEM FOR VERIFICATION OF USER CONSENTS
A server includes a consent repository and a consent management interface. The consent repository is configured to store data and one or more existing consent receipts. A method performed by the server includes receiving a customer ID that corresponds to a customer. The customer ID is matched to a universal ID stored on the server. Financial account data associated with a financial account of the customer is retrieved from a financial institution associated with the customer. Furthermore, a consent request data submission is received from an external computing device. The consent request data submission includes one or more data access consents. In addition, a consent request is transmitted to the consent management interface. The consent request includes the one or more data access consents. Additionally, the consent request is digitally signed by the server and stored in the consent repository as a new consent receipt.
ELECTRONIC SYSTEM FOR AUTOMATICALLY GENERATING RESOURCE DISTRIBUTIONS BASED ON SMS-BASED INSTRUCTIONS USING MACHINE LEARNING
Systems, computer program products, and methods are described herein for automatically generating resource distributions. The present invention may be configured to receive a text-based instruction and parse, using a machine learning model, the text-based instruction to generate a structured resource distribution including predicted distribution elements. The present invention may be configured to generate, based on the structured resource distribution, a resource distribution. In some embodiments, the text-based instruction may include an email message, an SMS message, recorded speech converted to text, text input to a chat function, text recognized in an image, and/or the like.
Systems and Methods for Sanction Management
Systems and methods for sanction management are disclosed. In one embodiment a method may include a server: (1) receiving a transaction from a transaction source; (2) receiving decisioning on a sanction status of the transaction; (3) storing the transaction and the decisioning for the transaction in an active database; and (4) moving the transaction and decisioning for the transaction to an archive database after a first period of time. According to another embodiment, a method may include a server: (1) receiving an inquiry for a transaction that has a sanction status; (2) querying an active database for the transaction; (3) querying an archive database for the transaction in response to the transaction not being located in the active database; (4) retrieving the transaction and decisioning for the transaction from the archive database into the active database; and (5) presenting the transaction and decisioning for the transaction on an interface.
AUTHENTICATION SYSTEM AND METHOD
The invention relates to a computer-implemented system and method for authenticating a customer of a business. The method may include the steps of: receiving from the customer at least one item of identifying information; confirming the identity of the customer; generating a token that represents an active session in which the customer interacts with one or more systems or personnel at the business; conducting a first set of communications between the customer and a first system of the business; inquiring with the customer as to whether the customer desires to transfer the active session to a second system at the business or to a third party system; and transferring the active session using the token to the second system or the third party system. The method may also comprise the steps of retrieving background information on the customer to assist a representative of the business in assisting the customer.
Enhanced feedback exposure for merchants based on transaction metadata
Methods, systems, and apparatuses are described herein for the direct sharing and use of transaction data separately from transaction authorization processes. Transaction metadata associated with a transaction may be received and validated. Authorization information corresponding to the transaction may be received. The degree to which the transaction metadata is tested may be based on a predicted time of receipt of the authorization information. The transaction metadata and authorization information may be correlated. A computing device may determine whether to authorize the financial transaction based on the authorization information and the correlated transaction metadata. All or portions of the transaction metadata may be provided to one or more users after the transaction has been authorized or denied.
SYSTEM AND METHOD TO MANAGEMENT A CRYPTOGRAPHIC BANKING NETWORK
The present solution relates to a system and methods to management a network where participate at least a bank, at least a client, and at least a regulatory body, whereas a series of operating protocols of said network, comprising; the creation of a cryptographic asset mirror of cryptocurrency, a management interactive node of said cryptographic asset. A crypto-assets clearance chamber for this solution is also disclosed.
Point-of-interest-based anti-vehicle theft systems and processes for using the same
A sensing device can include at least one sensor, positioning circuitry, a transceiver, and a computing device in communication with the at least one sensor, the positioning circuitry, and the transceiver. The computing device can determine a location of a vehicle via the positioning circuitry. The computing device can determine that a point of interest (POI) associated with a predefined category of POIs corresponds to the location. The computing device, via the transceiver, can determine that a person is moving away from the vehicle based on a measurement associated with a remote device. The computing device can enter into an armed mode in response to the determinations. The computing device can detect an intrusion into a vehicle while in the armed mode based at least in part on measurements from the at least one sensor. The computing device can generate an alarm in response to the intrusion.