Patent classifications
G06Q20/4015
Systems and methods for forward market purchase of machine resources
Systems and methods for forward market purchase of machine resources are disclosed. An example transaction-enabling system may include a fleet of machines, each one of the fleet of machines having a resource requirement comprising at least one of a plurality of machine-related resources and a controller. The controller may include an intelligent agent circuit to aggregate data for the plurality of machine-related resources from at least one data source comprising an external data source or an internal data source; an expert system circuit to configure a purchase of at least one of the plurality of machine-related resources; and a machine resource acquisition circuit to automatically solicit the configured purchase of the at least one of the plurality of machine-related resources in a forward market for at least one resource of the plurality of machine-related resources.
Facility level transaction-enabling systems and methods for provisioning and resource allocation
The present disclosure describes transaction-enabling systems and methods. A system can include a facility having a core task and a controller. The controller may include a facility description circuit to interpret historical facility parameter values and corresponding outcome values. A facility prediction circuit operates an adaptive learning system to train a facility resource allocation circuit in response to the historical facility parameter values and corresponding outcome values. The facility description circuit further interprets a plurality of present state facility parameter values and the trained facility resource allocation circuit adjusts facility resource values in response.
ADAPTIVE AUTHENTICATION
Systems and techniques for an adaptive authentication system are described herein. In an example, an adaptive authentication system is adapted to receive a request at a first entity from a second entity for secure data of a user, where the second entity is remote from the first entity. The adaptive authentication system may be further adapted to transmit a prompt to a user device associated with the user for authentication of the user and authentication of the request. The adaptive authentication system may be further adapted to receive a response to the prompt and authenticate the user and the request based on the response. The adaptive authentication system may be further adapted to transmit the secure data of the user to the second entity.
COMPENSATION MANAGEMENT SYSTEM FOR RULES-BASED BEHAVIOR
A method for managing and providing compensation between devices in order to encourage positive behavior is disclosed. The system is operable to receive a request for providing compensation to a user account and is further operable to fulfil the request, track the compensation transfer, and provide historical data of the transfer based on geographic location. The geographic locations preferably include multiple tiers of permissions that are managed by multiple governing entities.
METHODS AND SYSTEMS FOR AUTHENTICATION FOR HIGH-RISK COMMUNICATIONS
An authentication method includes assigning a risk status to a request received from a remote interaction system, transmitting a notification communication to a device associated with the request, monitoring interaction data from an interaction network, and identifying, from the monitored interaction data, authentication interaction information, the authentication interaction information including a coded sequence and a predetermined authentication identifier. The authentication method also includes comparing the coded sequence in the authentication interaction information to an expected coded sequence and transmitting a verification communication after determining the coded sequence in the authentication interaction information matches the expected coded sequence.
Systems and methods for distributing personally identifiable information across geographic boundaries
Systems, methods, and computer-readable storage media configured to facilitate execution of transactions via a money transfer network are disclosed. During execution of the transactions, tokenized identity information may be utilized when exchanging transaction data between geographically distributed nodes of the money transfer network and the transactions are recorded to a distributed ledger maintained by the nodes. Smart contracts may be utilized to digitally sign transactions at various stages of transaction processing, such as at different stages of regulatory compliance validation and to authenticate the validity of the requested transaction (e.g., prevent double-spends). Utilizing tokenized identity information may reduce the likelihood that personally identifiable information (PII data) is obtained by or inadvertently provided to unauthorized third parties or systems. Additionally, the distributed ledger may record information in immutable records, thereby increasing the reliability and trustworthiness (e.g., for auditing purposes) of the data stored on the distributed ledger.
FINANCIAL TRANSACTION SYSTEM AND METHOD
A financial transaction method can include creating a token correlated to a financial account. The method can also include storing the correlation between the token and the financial account in a token database. The method can also include transmitting the token to a mobile computing device operating an application. The method can also include displaying the token on a display of the mobile computing device. The method can also include receiving, over a public network, the token and data associated with a first financial transaction. The method can also include confirming identity between the token transmitted to the mobile computing device and the token received from the secondary computing device. The method can also include transmitting over the public network, approval of the first financial transaction to the secondary computing device in response to the confirming.
FRAUD PREVENTION SYSTEMS AND METHODS FOR SELECTIVELY GENERATING VIRTUAL ACCOUNT NUMBERS
Disclosed embodiments may include a method that includes receiving first identifying information associated with a first user from a computing device; determining a score based on the first identifying information; determining whether the score is less than a threshold; pseudo-randomly generate and transmit a one-time use number to the computing device when the score is less than the threshold. When the score is greater than or equal to the threshold, the method may include transmitting, to the computing device, second instructions prompting the first user to provide second identifying information. Responsive to receiving the second identifying information of the first user, the method may include determining that the second identifying information matches stored second identifying information. Responsive to the second identifying information matching stored second identifying information, the method may include pseudo-randomly generate and transmit the one-time use number to the computing device.
SYSTEMS AND METHODS FOR DETECTING HUMAN PRESENCE NEAR A TRANSACTION KIOSK
Disclosed embodiments may include a system that may receive first level authentication data from a first user, identify a first user device associated with the first user, and determine whether a current location of the first user device is within a predetermined proximity of a first computing device. In response to the determination, the system may detect one or more objects within the predetermined proximity of the first computing device using the one or more positional sensors. The system may determine that at least one of the one or more objects is associated with a human, and in response, trigger a security measure. The system may transmit an indication of the triggered security measure to the first computing device, and may transmit instructions to the first user device configured to cause the first user device to provide an alert to the first user.
System and method for secure delivery system
A secure delivery system according to various aspects of the present technology comprises a transport box having a storage space, an environmental control unit, a plurality of electrical contacts, and a deployable receiving tray responsive to automated delivery systems. The transport box fits within an interior space of a delivery box having a GPS receiver that provides a geographic delivery location of the delivery box. The delivery box comprises a plurality of corresponding electrical contacts configured to be coupled to the electrical contacts of the transport box to provide power to the transport box. The delivery box may further comprise an electronic lock that is responsive to a delivery box controller circuit configured to operate the electronic lock.