H04L41/0293

Money transfer by use of a payment proxy
11887074 · 2024-01-30 · ·

In some examples, a payment service system receives a request to associate a proxy identifier with a user account of a charity. The proxy identifier is individually distinguishable from other proxy identifiers associated with user accounts of other users, and has a syntax including a symbol and a string of one or more characters. The symbol and the string are concatenated such that the symbol appears immediately before the string. The payment service system receives, via an application on a user device of a user, an input associated with the proxy identifier, and performs a database lookup to identify the user account associated with the proxy identifier. Information associated with the user account of the charity is presented via a user interface presented by the application. The user interface enables the user to donate funds from a financial account of the user to the user account of the charity.

MONEY TRANSFER IN A FORUM USING A PAYMENT PROXY

In particular embodiments, a method of transferring money by use of a payment proxy includes receiving a notification of an intent to initiate a monetary transaction in a message entered by a user of a communication platform, identified based on a determination of a particular context associated with content of the message. The method includes parsing the message to identify a unique payment proxy associated with a financial account having a syntax that includes a currency indicator and a string of characters. The method includes identifying a recipient financial account associated with the unique payment proxy. The method includes identifying a sender financial account based on the particular context associated with the content of the user message. The method includes initiating a transfer of a payment amount between the sender financial account and the recipient financial account associated with the unique payment proxy in accordance with the monetary transaction.

TIMESTAMP-BASED ASSOCIATION OF IDENTIFIERS
20240048434 · 2024-02-08 ·

Systems and methods for associating sessions of encrypted identifiers are provided. A collection of data packets received during one or more sessions within a time period may be retrieved. Each packet in the collection may be associated with a unique identifier of a respective session. An epoch time may be calculated for each of the retrieved data packets based on the determined skew and respective timestamp information of the data packet. It may be identified as to whether each of the calculated epoch times matches a previously calculated epoch time for a packet associated with a previous session or a session that has previously been associated with a selected session. The timestamp information may be associated with a browser identifier and subject to encryption/decryption by an identifier server or authorized parties.

Timestamp-based matching of identifiers
10491451 · 2019-11-26 · ·

Systems and methods for timestamp-based matching of identifiers are provided. Information may be stored in memory regarding a plurality of identifiers each unique to an associated website or to an associated browser. Stored information may further include one or more maps each associating a device identifier with at least one immutable browser identifier or mutable browser identifier. The device identifier may be unique to an associated computing device. Information may be received from a computing device that has used a browser to download a website, where the downloaded website includes a reference to a browser identifier specific to the downloaded website. The received information may be determined to include a timestamp and an internet protocol (IP) address. The timestamp and IP in the received information may further be determined to correspond to a computing device associated with one of the stored maps, where the corresponding computing device is identified by a corresponding device identifier. The stored map associated with the corresponding device identifier may be updated based on the referenced browser identifier.

METHODS FOR NETWORK MAINTENANCE

Methods, systems, and devices for network maintenance are described. A controller may receive an indication that the performance of a network device has decreased. The indication may include case identification data associated with the network device. The controller may request proactive network maintenance (PNM) data associated with the network device based on receiving the case identification data. The controller may transmit the PNM data to a machine learning (ML) engine. The ML engine may transmit, to the controller, an indication of a predetermined operation predicted to improve the performance of the network device. The controller may transmit the predetermined operation to a client device based on receiving the indication of the predetermined operation. The ML engine may receive feedback indicating whether an execution of the predetermined operation improved the performance of the network device. The ML engine may a training data set based on the feedback.

Method and system for a uniform resource identifier (URI) broker

A system provides the ability for developers to create and embed a URI in HTML, a document, or an application to invoke another application or functionality according to a URI scheme name. The invoked application does not natively react to URI selections. Rather, a URI Broker can redirect the URI selection to the desired application and conduct any pre-processing to allow the URI to invoke any application, even those that do not include URI capability.

Money transfer in a forum using a payment proxy

Described is a technology for executing financial transactions, e.g., payment transfers, by enabling a sender to trigger a money transfer by specifying, in any communication message, a payment proxy having a particular syntax, the syntax including a currency indicator preceding one or more alphanumeric characters. The payment proxy having the syntax indicates an intent of the sender to transfer money to a recipient associated with that payment proxy. The technology can include systems and methods of transferring money by use of a payment proxy within the context of a forum (e.g., social networking platform, microblog, blog, application, etc.). Messages of users in the forum can be monitored to detect for any user's intent to transfer money to a recipient. For example, forum messages can be parsed to identify the syntax carried by a user input in a forum message.

MONEY TRANSFER BY USE OF A PAYMENT PROXY
20240169328 · 2024-05-23 ·

In some examples, a system associates a first proxy identifier (ID) with a financial account of a user. The first proxy ID has a syntax including a symbol followed by a first string of one or more characters comprising at least one letter. The system generates a second proxy ID having the syntax including the symbol followed by a second string. The system associates the second proxy ID with the first proxy ID based on a configured rule that automatically allocates at least a portion of funds received via the second proxy ID to the financial account associated with the first proxy ID. Based on detecting the second proxy ID in a message, the system initiates a transfer of funds from a financial account of the sender of the message, and at least some of the transferred funds are transferred to the user's financial account based on the configured rule.

SERVICE FUNCTION CHAINING BASED ON MAC ADDRESSES
20190215268 · 2019-07-11 ·

An example, a computing system includes a processor, and a non-transitory medium storing instructions thereon. The instructions, when executed, cause the processor to: receive a packet comprising a machine access control (MAC) source address, and determine, based on a first field of bits of the source MAC address, a service function chain identifier corresponding to a service function chain for the packet. The instructions further cause the processor to: determine, based on a second field of bits of the MAC address, a service function index corresponding to a service function for the packet, determine, based on a third field of bits of the source MAC address, a tunnel identifier corresponding to a tunnel for the packet, and determine, based on a fourth field of bits of the source MAC address, an action value for the packet.

FRAMEWORK ACTUATOR INTEGRATION
20190187865 · 2019-06-20 ·

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for restricting user access to actuators and generating user interface presentations that include data received from the actuators when the user has access. One of the methods includes receiving, by an applications manager component of an application platform in a cloud computing environment, a request by a user to access application information of an application deployed by an application framework installed on the application platform in the cloud computing environment. The application framework determines, using a token obtained for the user, that the user has permission to access one or more actuators of the application. The application framework generates a data element for the particular actuator and provides the data element for the particular actuator to the applications manager component. The applications manager component generates a user interface presentation that includes the data element.