G06Q20/383

AN INTEGRATED END TO END SYSTEM AND METHOD FOR ACCIDENT AND MEDICAL EMERGENCY RESPONSE
20230230189 · 2023-07-20 ·

An integrated end to end system and method for accident and medical emergency response are disclosed. The system includes a registration subsystem configured to register one or more entities, an emergency determining subsystem configured to determine one or more emergencies, a healthcare service selection subsystem configured to enable the one or more affected users to select one or more healthcare, a healthcare service provider connecting subsystem configured to connect the one or more healthcare service providers to the one or more affected users, a referral subsystem configured to refer the one or more affected users from one or more rural areas (a primary health centre) to a secondary health centre and from the secondary health centre to a tertiary health centre, a payment receiving subsystem configured to receive a payment from the one or more affected users via the payment card shared within a family as a family tree profile.

SYSTEMS AND METHODS FOR MATCHING TOKENIZED ACCOUNTS BETWEEN ANONYMOUS PARTIES
20230230061 · 2023-07-20 ·

Systems and methods that allow fulfilment of a transaction wherein a first party initiates the transaction, for example, at a point-of-sale device, and a tokenized account of an anonymous second party is identified as an account optimal for completing the transaction. The tokenized account of the anonymous second party is identified based on the transaction information. The tokenized account of the anonymous second party is matched to complete the transaction for reasons including a financial advantage or incentive associated with the tokenized account of the anonymous second party and not available to the first party at the time of the transaction. This financial advantage may be shared between both parties. The tokenized account of the anonymous second party may receive a financial benefit or other valuable consideration for completing the transaction. The tokenized account of the anonymous second party is reimbursed for costs associated with completing the transaction.

OFFICE OF FOREIGN ASSETS CONTROL (OFAC) COMPLIANCE SYSTEM
20230019588 · 2023-01-19 ·

A computerized method produces an identity code to identify each subject stored in the computer systems connected to a computer network while protecting the privacy and confidentiality of the subject. A central computer system receives an identity code of a suspect of a financial crime and sends the identity code to all computer systems connected to the computer network. The computer systems that have the matched identity code send the requested information to the central computer system. As a result, law enforcement organizations can eliminate crimes and financial institutions can recover the money stolen from them. In addition, law enforcement organizations and financial institutions can identify money launderers that are missed by their anti-money laundering transactional monitoring systems.

Identity protection system

A central computer system transforms identification information of a consumer into an identity code that hides the identification information and stores it with contact information of a consumer's computer system. When a computer system on the network of the central computer system conducts a transaction with a subject who uses the identity code of the consumer, the central computer system contacts the consumer's computer system so that the consumer can stop the transaction if it is not authorized. Because only the identity code is used to protect the consumer, the original identification information of the consumer is fully protected.

PERSONAL DATA WALLET
20230015523 · 2023-01-19 ·

Methods and systems are presented for providing a secured electronic transaction processing framework that enables online service providers to process electronic transactions for users while allowing the users to retain control over their user data. The secured electronic transaction processing framework includes a data access system configured to dynamically access user data, that is stored on user devices and controlled by users, on an as-needed basis. When a service provider server receives a request for processing a transaction through a user account, the service provider serer may use the data access system to dynamically obtain user data required for processing the transaction from a wallet application of a user device. The wallet application may include data access policies that specify data access settings for different service providers. After processing the transaction using the user data, the service provider server may remove the user data.

Method, system, and computer program product for processing a payment transaction via a proxy guarantor

A method for processing a payment transaction via a proxy guarantor includes: receiving a transaction request between a user and a merchant including payment device data associated with a payment device of the user of a payment type not accepted by the merchant, and an indicator causing the payment transaction to be processed as a proxy guarantor transaction; identifying a guarantor associated with the user having a payment device of a payment type accepted by the merchant; communicating an authorization request to an issuer system associated with the guarantor to cause the issuer system of the guarantor to authorize the payment transaction; receiving an authorization response from the issuer system of the guarantor, the authorization response including a payment transaction approval indicator; and communicating a settlement request to an issuer system of the user.

Method and system to facilitate gamified arbitration of smart contracts
11699202 · 2023-07-11 ·

Disclosed herein is a system to facilitate gamified arbitration of smart contracts. Further, the system includes a communication device configured for receiving a smart contract data associated with a disputed smart contract from an external system, transmitting an arbitration request to a plurality of arbitrator devices to arbitrate the disputed smart contract, receiving an acceptance of the arbitration request from two or more arbitrator devices in the plurality of arbitrator devices, receiving an arbitration stake from the two or more arbitrator accounts associated with the two or more arbitrator devices, transmitting the smart contract data to the two or more arbitrator devices, and receiving an arbitration result from the two or more arbitrator devices, and a processing device configured for allocating the security deposit fund amongst the plurality of participants and the two or more arbitrators corresponding to the two or more arbitrator devices based on the arbitration result.

Systems and methods for privacy-preserving inventory matching

Systems and methods for privacy-preserving inventory matching are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for inventory matching may include: (1) receiving, from each of a plurality of clients, a masked submission comprising an identification of at least one security to buy or sell and a desired quantity to buy or sell; (2) aggregating the masked submissions resulting in a sum of the desired quantities to buy or sell; (3) matching at least two of the clients to conduct a transaction based on aggregation and their respective masked submissions; and (4) conducing the transaction between the matched clients.

System and method for matching patrons, servers, and restaurants within the food service industry
11699122 · 2023-07-11 · ·

A system and method of combining table management software and customer experience skills by generating profiles of patrons, servers, and restaurants by using machine learning algorithms on and location data in those profiles to build more intimate relationships between patrons, food service establishments, and food service professionals. Trait matching provides optimized matchmaking between patrons and servers who share certain commonalities or affinities while also balancing the table management operations. Machine learning algorithms may be used to identify patterns of commonality that would not otherwise be recognized. This system allows patrons to choose servers at an establishment over a plurality of electronic devices by using the cluster analysis results. It provides servers more lateral work experience between participating restaurants, and restaurants more power to operate smoothly and build highly cohesive teams.

SYSTEM AND METHOD FOR OBFUSCATING TRANSACTION INFORMATION

A computer-implemented method for anonymizing online transaction details may include performing a process to generate an identifier (ID) and reference address for a user, and receiving a request for transaction processing from an e-commerce server. The request may include first data including: information associated with a purchase of a product to be delivered to the user; the identifier; and the reference address. The method may further include: in response to the request, determining whether the ID and reference address are included in the request, and if so, obtaining the accurate address and shipping rate rules; applying, based on the first data and the accurate address, the shipping rate rules to determine accurate shipping rate cost information associated with delivering the product to the accurate address; performing an anonymizing process on the accurate information to obtain anonymous shipping rate information, and transmitting the anonymous shipping rate information to the e-commerce server.