Patent classifications
H04L2101/37
NON-TRANSITORY COMPUTER READABLE MEDIUM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD
A non-transitory computer readable medium storing a program causing a computer to execute a process: the process comprising: performing a first utilization permission process for an authorized user; and performing a second utilization permission process for a guest user, the second utilization permission process comprising: acquiring user identification information input by the guest user; inquiring, of a directory service that retains information of a member of an organization, whether the user identification information acquired by the acquiring is registered; and permitting the guest user who inputs the user identification information to use the system within a range of a utilization authority, which is different between a case where a response indicating that the user identification information is registered is received and a case where a response indicating that the user identification information is not registered is received, in response to the inquiry.
Scalable, secure, efficient, and adaptable distributed digital ledger transaction network
The present disclosure relates to systems, methods, and non-transitory computer readable storage media for implementing a scalable, secure, efficient, and adaptable distributed digital ledger transaction network. Indeed, the disclosed systems can reduce storage and processing requirements, improve security of implementing computing devices and underlying digital assets, accommodate a wide variety of different digital programs (or “smart contracts”), and scale to accommodate billions of users and associated digital transactions. For example, the disclosed systems can utilize a host of features that improve storage, account/address management, digital transaction execution, consensus, and synchronization processes. The disclosed systems can also utilize a new programming language that improves efficiency and security of the distributed digital ledger transaction network.
PROCESSING BENEFIT ELIGIBILITY DATA
A provider of a service (e.g., a medical service) submits a request for authorization to bill for the service (e.g., a request for authorization to bill an insurance company of the recipient of the service). The recipient of the request (e.g., a medical services clearinghouse) informs a fraud prevention of the request. The fraud prevention communicates (e.g., by text message or email) with a computing device (e.g., a cell phone or desktop computer) associated with the recipient of the service to determine if the request is legitimate. If the request is not legitimate, the clearinghouse, the insurance company, the medical service provider or any suitable combination thereof is notified of the issue. By taking action on this notification, benefit eligibility fraud is avoided.
Order Management Systems And Methods
Example order management systems and methods are described. In one implementation, a catalog ingestion system receives data associated with multiple products offered by multiple brands. A commerce management system receives a customer order from a customer. The customer order includes at least a portion of the multiple products offered by the multiple brands. The commerce management system splits the customer order into multiple brand orders such that each brand order is associated with products in the customer order from a particular brand. An integration platform fulfills the brand orders by submitting the brand orders to the associated brands.
Systems and methods for controlling electronic message transmissions
Methods and systems for controlling electronic message transmission are described. An example method may include: receiving, via a network, an error report generated based on a response from a recipient email server responsive to an attempt to send a message to an email address associated with the recipient email server, the error report indicating that the attempt to send the message was rejected by the recipient email server; adding the email address to a block list, wherein any subsequent attempt to send messages to the email address is blocked based on the email address being in the block list; and removing the email address from the block list after a defined period of time.
Asset search and discovery system using graph data structures
In a search and database system, a graph generator builds a graph, comprising nodes and edges, and stores that graph in a database or other data structure and uses a repeated extending and culling process to build the graph. From that storage, the graph can be used to generate displays for users interested in learning about the graph and/or for performing queries and the like on that graph data.
SCALABLE, SECURE, EFFICIENT, AND ADAPTABLE DISTRIBUTED DIGITAL LEDGER TRANSACTION NETWORK
The present disclosure relates to systems, methods, and non-transitory computer readable storage media for implementing a scalable, secure, efficient, and adaptable distributed digital ledger transaction network. Indeed, the disclosed systems can reduce storage and processing requirements, improve security of implementing computing devices and underlying digital assets, accommodate a wide variety of different digital programs (or “smart contracts”), and scale to accommodate billions of users and associated digital transactions. For example, the disclosed systems can utilize a host of features that improve storage, account/address management, digital transaction execution, consensus, and synchronization processes. The disclosed systems can also utilize a new programming language that improves efficiency and security of the distributed digital ledger transaction network.
Systems and methods of determining node metrics for assigning node profiles to categories based on field-value pairs and electronic activities
The present disclosure relates to a method for determining node metrics based on node field-value pairs and electronic activities. The method includes identifying a first node profile. The method includes identifying a plurality of electronic activities associated with the first node profile. The method includes identifying a first group of node profiles of a first category with a predetermined event. The method includes selecting a second group of node profiles. The method includes parsing the plurality of electronic activities to identify creation timestamps and participant characteristics of the electronic activities. The method includes generating an input array based on the timestamps and the participant characteristics. The method includes generating, for each of the second group of node profiles, a respective array. The method includes determining a probability score indicating a likelihood that the node profile belongs to the first category.
System, method, and apparatus for virtualizing digital assistants
A system and method for providing anonymous communications from a user to a called party includes obtaining a dedicated phone number and creating a user account for the user and assigning the dedicated phone number to the user account. A provider account is created for a digital assistant using the dedicated phone number and the digital assistant is preprogrammed with the user account. The digital assistant is also preprogrammed with a skill for recognizing a specific utterance (e.g. “Call”). Connectivity is provided between the digital assistant and the Internet, for example, using a wireless access point. The digital assistant listens for the specific utterance and, upon recognizing the specific utterance followed by an identification of the called party, the digital assistant initiates a voice call through the Internet to the called party.
VERIFICATION ASSOCIATED WITH A DOMAIN NAME
Verification associated with a domain name is performed using a hierarchical domain name system. A domain name system query comprising the domain name is transmitted via a network. A response to the domain name system query is received via the network. The response comprises first data. Input data is received via the network. A hash function is used to map the input data received via the network to second data. The second data comprises hashed data. A result of a verification associated with the domain name is determined based on a comparison involving the first data and the second data.