G06Q2250/10

DIGITAL COUPONS FOR SECURITY SERVICE OF COMMUNICATIONS SYSTEM
20230034908 · 2023-02-02 ·

A method performed by a security system of a 5G network to protect against cyberattacks on a personalized basis. The security system can identify a cybersecurity threat to a wireless device based on contextual information relating to the wireless device, a user preference, or a call detail record. The security system can determine a one-time fee to charge the user in exchange for protecting the wireless device against the cybersecurity threat, generate an coupon to protect the wireless device against the cybersecurity threat, and send the coupon to the wireless device based at least in part on the contextual information relating to the wireless device and the user preference. When the security system receives an indication that the coupon was redeemed, responds by deploying a network asset to protect the wireless device against the cybersecurity threat.

Short-paid reconciliation systems and methods
11620687 · 2023-04-04 · ·

Systems and methods are provided for enabling third parties, such as authorized vendors, to reconcile short-paid adjustment requests initiated by service providers such as, for example, the United States Postal Service, in response to customer non- or underpayment for services rendered. In an embodiment, a method includes the steps of storing a short-paid adjustment request from an initiator, identifying a source for the short-paid adjustment request, generating a request to a VBI meter system for a short-paid adjustment request based on the source identified, storing the VBI meter system response to the short-paid adjustment request, and generating a file to the initiator based on the VBI meter system response.

Short-paid reconciliation systems and methods
11651397 · 2023-05-16 · ·

Systems and methods are provided for enabling third parties, such as authorized vendors, to reconcile short-paid adjustment requests initiated by service providers such as, for example, the United States Postal Service, in response to customer non- or underpayment for services rendered. In an embodiment, a method includes the steps of storing a short-paid adjustment request from an initiator, identifying a source for the short-paid adjustment request, generating a request to a VBI meter system for a short-paid adjustment request based on the source identified, storing the VBI meter system response to the short-paid adjustment request, and generating a file to the initiator based on the VBI meter system response.

METHOD AND APPARATUS FOR DYNAMIC INTERCHANGE PRICING

Methods and systems for dynamically determining interchange fees. In an embodiment, an acquirer computer transmits a payment card account authorization request to a payment processing network, and receives an authorization response authorizing the transaction and comprising a spending history indication reflecting a compilation of spending history data of a group of payment card accounts that qualify for dynamic interchange rate setting. The acquirer computer then stores the spending history indication, transmits the authorization response to a merchant processing system computer, receives a clearing file from the merchant processing system computer, determines that an interchange rate depends on the spending history indication, selects an interchange rate from an interchange rate selection database based on the spending history indication, calculates an interchange fee based on the interchange rate, and transmits the clearing file and the interchange fee to the payment network for clearing of the transaction.

Digital on-demand coupons for security service of communications system
11496522 · 2022-11-08 · ·

A method performed by a security system of a 5G network to protect against cyberattacks on a personalized basis. The security system can identify a cybersecurity threat to a wireless device based on contextual information relating to the wireless device, a user preference, or a call detail record. The security system can determine a one-time fee to charge the user in exchange for protecting the wireless device against the cybersecurity threat, generate an on-demand coupon to protect the wireless device against the cybersecurity threat, and send the on-demand coupon to the wireless device based at least in part on the contextual information relating to the wireless device and the user preference. When the security system receives an indication that the on-demand coupon was redeemed, responds by deploying a network asset to protect the wireless device against the cybersecurity threat.

SYSTEMS, METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR MANAGING AND PROVIDING FORMULAIC RATES

An apparatus is provided for generating formulaic rates. The apparatus may include at least one memory and a processor(s) configured to define a first formula(s) in a row(s) of a database to calculate a first shipping rate value for a first type of shipping rate, among plural types of shipping rates, associated with a first rate identifier. The processor is further configured to define content in the row to analyze a predecessor rate identifier(s) of a previously generated source. The processor is also configured to detect a second shipping rate value corresponding to the predecessor rate identifier. The second shipping rate value is associated with a second type of shipping rate. The processor is further configured to determine the first shipping rate value for the first type of shipping rate based on calculating the formula using the second shipping rate value. Corresponding computer program products and methods are also provided.

System and method for secure sharing of postal services

An approach for facilitating sharing of postal services is disclosed. In some implementations, a request to authorize access for a first account to one or more postal services of a second account may be received. The authorization request may include a first identifier associated with the first account and a second identifier associated with the second account. A message may be generated based on the first identifier, the second identifier, and/or other information. The generated message may be provided to a cryptographic platform. An integrity code associated with the first account and the second account may be received from the cryptographic platform in response to providing the generated message. The integrity code may be configured to enable the first account to access the one or more postal services of the second account.

System and Method for Localized Postage Generation
20220147910 · 2022-05-12 · ·

There are provided systems and methods for localized postage generation. The system including one or more processors in communication with a data storage, the system in communication with a postal server for registration, the one or more processors configured to execute: a postage module to receive from a user funds for postage to be added to a postage ledger, the funds for postage communicated to a postal service and added to an affiliated ledger; an input module to receive a request for postage from a user, the request including one or more parameters; a request module to deduct the associated funds from the postage ledger; and an indicia module to generate and output one or more indicia, the indicia including an encoded alphanumerical value that incorporates identifying information, the indicia being scannable by the postal service such that the associated funds are deducted from the affiliated ledger based on the identifying information.

DIGITAL ON-DEMAND COUPONS FOR SECURITY SERVICE OF COMMUNICATIONS SYSTEM
20220103596 · 2022-03-31 ·

A method performed by a security system of a 5G network to protect against cyberattacks on a personalized basis. The security system can identify a cybersecurity threat to a wireless device based on contextual information relating to the wireless device, a user preference, or a call detail record. The security system can determine a one-time fee to charge the user in exchange for protecting the wireless device against the cybersecurity threat, generate an on-demand coupon to protect the wireless device against the cybersecurity threat, and send the on-demand coupon to the wireless device based at least in part on the contextual information relating to the wireless device and the user preference. When the security system receives an indication that the on-demand coupon was redeemed, responds by deploying a network asset to protect the wireless device against the cybersecurity threat.

SHORT-PAID RECONCILIATION SYSTEMS AND METHODS
20200279306 · 2020-09-03 ·

Systems and methods are provided for enabling third parties, such as authorized vendors, to reconcile short-paid adjustment requests initiated by service providers such as, for example, the United States Postal Service, in response to customer non- or underpayment for services rendered. In an embodiment, a method includes the steps of storing a short-paid adjustment request from an initiator, identifying a source for the short-paid adjustment request, generating a request to a VBI meter system for a short-paid adjustment request based on the source identified, storing the VBI meter system response to the short-paid adjustment request, and generating a file to the initiator based on the VBI meter system response.