Patent classifications
G06Q20/4015
Systems and methods for aggregating transactions and optimization data related to energy and energy credits
Systems and methods for aggregating transactions and optimization data related to energy and energy credits include a transaction-enabling system including a resource requirement circuit structured to aggregate a resource requirement for a fleet of machines to perform a task, wherein the resource requirement comprises an energy credit requirement; a forward resource market circuit structured to access a forward market for energy; and a machine resource acquisition circuit structured to execute a transaction on the forward market for energy in response to the aggregated resource requirement.
System and method for adjusting a facility configuration based on detected conditions
Systems and methods for adjusting a facility configuration based on detected conditions are disclosed. An example system may include an energy and compute facility having a compute resource, and an energy source or an energy utilization requirement. The system may also include a controller having a facility description circuit to interpret detected conditions, and a facility configuration circuit to operate an adaptive learning system. The adaptive learning system is configured to adjust a facility configuration based on the detected conditions, wherein adjusting the facility configuration includes adjusting a utilization of the compute resource and at least one additional facility resource.
Transaction-enabled methods for providing provable access to a distributed ledger with a tokenized instruction set for a semiconductor fabrication process
Transaction-enabled methods for providing provable access to a distributed ledger with a tokenized instruction set for semiconductor fabrication processes are described. A method may include accessing a distributed ledger including an instruction set for a semiconductor fabrication process and tokenizing the instruction set. The method may further include interpreting an instruction set access request and, in response to the access request, providing a provable access to the instruction set. The method may further include providing commands to a production tool of the semiconductor fabrication process in response to the instruction set access request, and recording the transaction on the distributed ledger.
Booking management system
Secure authentication and delayed transaction processing for booking management systems is provided. Third-party services partner with booking management systems to aggregate and list offerings of the third-party services in a digestible display on a one-stop platform. A booking management system can manage the authentication of payment card information on behalf of any number of such third-party services. The booking management system can maintain and process authentication information associated with traveler payment cards, and provide virtual payment information to the third-party services for delayed transactions. The third-party services may later initiate the delayed transactions using the virtual payment information, without being required to perform authentication processing on the traveler payment card information maintained by the booking management system.
ESTABLISHING CONSENT FOR CARDLESS TRANSACTIONS USING SHORT-RANGE TRANSMISSION
In one aspect, a method includes automating, via an application running on a computing device, consent for cardless payment transactions upon a determination that a received signal strength indication satisfies a threshold; monitoring, while the application is running in a background on the computing device, received signal strength indications of other computing devices that are proximate to the computing device; determining, based on the monitoring and by the application, that a received signal strength indication associated with another computing device satisfies the threshold using an automatically enabled short-range wireless communication protocol; and causing, by the application and based on the received signal strength indication satisfying the threshold, the payment service to process a cardless payment transaction between another user associated with the other computing device and the user, wherein the consent for the cardless payment transaction is automatically provided based on the received signal strength indication satisfying the threshold.
Systems and methods for completing transactions via lockable boxes
A method performed by a processor of a provider computing system includes allowing an account holder at the provider to initiate a transaction with the provider remotely (e.g., via smartphone, online banking, etc.), by submitting a request for a specified transaction to be picked up in a lockbox at a provider's lockbox location. The pickup and completion of the account holder's requested transaction occurs at a lockbox location that has a plurality of lockboxes. The lockbox allows the account holder to access the facility at the account holder's leisure, both in time and location. The lockbox pickup service alleviates the uncertainty, fluctuating time cost, and inconvenient operating hours by allowing the account holder to request transactions with an easy to use interface resulting in a lockbox to be accordingly prepped so that the account holder can provide the proper authentication information and access the lockbox.
Windshield-mounted vehicle anti-theft apparatus and methods for using same
A vehicle theft-prevention system can include a plurality of sensors configured to sense measurements proximate to a vehicle and a body configured to secure to a window of the vehicle. The body can include a wireless transceiver and at least one computing device coupled to the plurality of sensors and the wireless transceiver. The at least one computing device can be configured to receive, via the wireless transceiver, an indication to enter an armed mode from an unarmed mode. The at least one computing device can be configured to, in response to the indication, transition to the armed mode, wherein transitioning to the armed mode comprises setting a configuration of at least one property of a subset of the plurality of sensors.
TRANSACTION-ENABLED METHODS FOR PROVIDING PROVABLE ACCESS TO A DISTRIBUTED LEDGER WITH A TOKENIZED INSTRUCTION SET
Transaction-enabled methods for providing provable access to a distributed ledger with a tokenized instruction set for polymer production processes are described. A method may include accessing a distributed ledger comprising an instruction set for a polymer production process and tokenizing the instruction set. The method may further include interpreting an instruction set access request and providing provable access to the instruction set. The method may further include providing commands to a production tool of the polymer production process and recording the transaction on the distributed ledger.
AUGMENTED REALITY VIRTUAL NUMBER GENERATION
Disclosed herein are system, method, and computer program product embodiments for generating and displaying virtual number information using augmented reality technology. Interaction with virtual number information may be provided via an augmented reality display in relation to a payment object that is detected within a real-time view of an augmented reality application. Exemplary operations of the augmented reality application include providing a real-time view via the mobile device, processing a payment object shown via the real-time view, generating a virtual number based on processing of the payment object, and utilizing the generated virtual number.
Self-service modular drop safes with deposit creation capability
Novel modular smart management devices in the form of drop safes include the modular components of a chassis, door and technology cabinet. The drop safes enable retailers to make cash deposits quickly and safely within or near their own facilities. Various technology, including RFID readers, RFID tags, and other equipment allow the drop safes to identify each deposited bag. Employees utilize specialized apps on their mobile devices to facilitate deposit creation and other tasks. Novel methodologies for accessing the drop safes for emptying employ single-use, time-expiration type authorization codes along with other security measures to minimize risk and to provide other benefits. Novel structures along with methodologies for replacing, on-site, modular components with auto-detection of functionality during initialization and re-initialization enables for efficient replacement and upgrading of components, including the upgrading of safes to provide additional functionality.