Patent classifications
G06Q30/0619
Self-service lender portal
A self-service lender portal provides lenders with a suite of tools for interacting with a multi-lender architecture configured to provide loan applicants with automated pre-qualification and eligibility evaluation for multiple candidate lenders. The lender portal provides lenders with an interface for uploading rule sets defining lending and eligibility criteria, downloading operational data generated from processing loan applicant information, generating and managing security keys for encryption and decryption of sensitive data, and managing access policies for providing single sign-on by interfacing with the lender's own identity management systems.
Method and computer readable storage medium using commerce platform checkout pages for merchant transactions
A system and method for a commerce platform system conducting a transaction with a customer system of a merchant system. The method may include receiving, over a communications network from the customer system, a request to purchase a product offered for sale by the merchant system, the request to purchase the product generated within a user interface presented to the customer system by the merchant system. The method may also include redirecting the customer system to a payment page served by the commerce platform system, wherein the payment page presents the product of the merchant for purchase by the customer system. Furthermore, the method may include clearing, with one or more authorization network systems, the purchase of the product from the payment page by the customer system, and redirecting the customer system back to a second user interface provided to the customer system by the merchant system.
Searchable index encryption
Auditing data containing sensitive data are stored in a data structure comprising data objects. Each data object comprises one or more pairs of a name and a value. Pairs that are flagged or identified as containing sensitive data are partially encrypted; the value is encrypted using an asymmetric key and the name corresponding to the encrypted value remains unencrypted. Some pairs that are not flagged or identified as containing sensitive data are left unencrypted. Unencrypted data may be stored in the partially encrypted auditing data as plain text. The auditing data may be analyzed to generate business metrics and identify application errors. The auditing data may also be queried, and data objects containing unencrypted pairs and/or partially encrypted pairs may be returned based on matching unencrypted names and/or values to the data query.
Representing a contingent asset
A method includes an object owner computing entity issuing a digital record representing a contingent asset to a marketplace computing entity that identifies an asset authenticity computing entity. The method further includes the asset authenticity computing entity generating an authenticity indicator associated with the contingent asset and the marketplace computing entity determining that the authenticity indicator is the same as a lifecycle status indictor of the digital record. The method further includes the marketplace computing entity generating a smart contract to indicate availability of the contingent asset to include available terms and the authenticity indicator and obtaining a portion of a copy of an object distributed ledger. The method further includes the marketplace computing entity causing inclusion of a next block on the object distributed ledger that includes the smart contract to represent the contingent asset.
Representing a contingent asset
A method includes an object owner computing entity issuing a digital record representing a contingent asset to a marketplace computing entity that identifies an asset authenticity computing entity. The method further includes the asset authenticity computing entity generating an authenticity indicator associated with the contingent asset and the marketplace computing entity determining that the authenticity indicator is the same as a lifecycle status indictor of the digital record. The method further includes the marketplace computing entity generating a smart contract to indicate availability of the contingent asset to include available terms and the authenticity indicator and obtaining a portion of a copy of an object distributed ledger. The method further includes the marketplace computing entity causing inclusion of a next block on the object distributed ledger that includes the smart contract to represent the contingent asset.
DIFFERENT SPACE-LINKED METAVERSE PLATFORM SYSTEM
The present invention relates to a different space linked metaverse platform wherein, upon determining that an optimum means of increasing a real estate intrinsic value is activating air rights transactions of which active exercises of rights have been practically abandoned among private property, an explicit link with actual assets is presented as a means of overcoming a limit of virtual assets, the limit being incurred due to lack of links with the actual assets, and as a specific means, an air rights transaction market place is installed inside the metaverse platform and intrinsic values of real estate and virtual property are all enhanced through a reciprocal link sharing the virtual assets used in the metaverse platform as a payment means.
Overriding control of motorized transport unit systems, devices and methods
Some embodiments include apparatuses providing control over movement of motorized transport units at a retail facility, comprising: multiple self-propelled motorized transport units; a wireless communication network; and a central computer system, wherein the central computer system comprises: a transceiver; a control circuit; and a memory storing computer instructions that when executed cause the control circuit to: receive an override command, from a worker associated with the retail facility, to cause a first motorized transport unit of the multiple motorized transport units to implement one or more actions; confirm a valid authorization of the worker to override one or more operating limits of the first motorized transport unit; and override the one or more operating limits and communicate one or more instructions to the first motorized transport unit configured to cause the first motorized transport unit to implement the one or more actions in accordance with the override command.
METHOD AND SYSTEM FOR MAINTAINING INTEGRITY OF A USER’S LIFE STATE INFORMATION
A method for enabling a user to view information filtered to align with the user's life state includes enabling the user to register and become a member of an information delivery system. The user provides the information about the user's life state. This information may include at least demographic information, ethnic information, social information and psychological information. The user may grant partners permission to access the information about the user's life. The granting of the permissions is performed and controlled by the user and may be limited to some information about the user's life. The partners are also members of the information delivery system. The partners are evaluated using a set of criteria before they become members of the information delivery system. The partners may use the information about the user's life to filter its information according to the information about the user's life. The method also enables the partner to participate in a marketplace to procure the information about the user's life, to rate the user according to the user's behavior, and to enable search engines to filter search results according to the information about the user's life.
METHOD AND SYSTEM FOR CONTROLLING A GRAPHICAL USER INTERFACE BY TELEPHONE
A method and system for controlling a GUI on a user's network-connected device, the control being provided by a telephone call between the user and a speech recognition and speech synthesis system. An example of a restaurant ordering system is provided. The user calls a phone number and is guided through a verbal ordering process that includes one or more of: adding an item, deleting an item, changing quantities, changing sizes, and changing details of an item. The user's choices are added to a display so that a current status of the order is visible to the user. The GUI is updated as changes are made to the order. The GUI can also request additional information, upsell items, and show menus. The GUI aids the user in confirming that the order is correct. The system provides the final order to a restaurant for fulfillment.
Predictive Model for Key Item Classification and Fulfillment
An online system predicts key items for triggering a replacement workflow when determined to be unavailable. The online system receives, from a first client device associated with a first user, an order comprising a list of items to be obtained at the location by a second user. The online system applies a prediction model to the list of items to classify whether each item is a key item. Responsive to the prediction model classifying a first item as being a key item, the online system tags the first item as a key item. The online system transmits the list of items with the key item for display on a second client device associated with a second user. The online system receives a message from the second client device indicating that the key item is unavailable at the location. In response, the online system initiates a high-friction replacement workflow for the key item instead of a low-friction replacement workflow.