Patent classifications
G06Q50/32
SYSTEM AND METHOD FOR PROVIDING REAL-TIME TRACKING OF ITEMS IN A DISTRIBUTION NETWORK
Systems and methods of processing items. Items in a distribution network or process may be scanned at every handling point in the distribution network, and each scan is recorded in a central repository. The scan information can be used to generate real-time access to data, analytical tools, predictive tools, and tracking reports.
GENERATING AND UTILIZING PROVISIONING TEMPLATES TO PROVISION VOICE, VIDEO, AND DATA COMMUNICATION SERVICES
The technologies described herein are generally directed to provisioning services from a network. For example, a method described herein can include facilitating receiving a provisioning request for a network provisioning task. Further, the method can include, based on the network provisioning task, selecting a logical provisioning template to facilitate a performance of the network provisioning task. Further, based on the logical provisioning template, the method can include identifying a programming object comprising logical commands for the performance of the network provisioning task. The method can include, executing the logical commands of the programming object to control service implementation equipment to perform the network provisioning task.
SYSTEM AND METHOD FOR PERFORMING DYNAMIC EXPOSURE ANALYSIS BASED ON QUANTUM SIMULATIONS
A system for performing dynamic exposure analysis typically includes a classical computer apparatus and a quantum optimizer in communication with the classical computer apparatus. The classical computer apparatus is configured for gathering data from one or more data sources, processing the gathered data, via an artificial intelligence engine, to determine a change to an exposure rating, converting the gathered data into at least one matrix, converting the at least one matrix to at least one Qubit sequence, and transmitting the at least one Qubit sequence to a quantum optimizer. The quantum optimizer upon receiving the at least Qubit sequence, generates at least one random number based on one or more parameters stored in a configuration repository, computes the at least one Qubit sequence and the at least one random number to generate a real-time exposure rating, and transmits the real-time exposure rating to exposure analysis application.
Methods and systems for data authentication services
Methods and systems for electronic document authentication are disclosed. In one aspect, a method of generating an electronic postmark includes receiving, via a server, a request message from an electronic network, the request message comprising request data including payload data and meta data, generating a timestamp in response to receiving the message, hashing the payload data to generate a payload hash, digitally signing the metadata, the payload hash, and the timestamp to generate a digital signature, generating a response message, the response message generated to comprise the metadata, the payload hash, the timestamp, and the digital signature; and transmitting the response message onto the electronic network.
Methods and systems for data authentication services
Methods and systems for electronic document authentication are disclosed. In one aspect, a method of generating an electronic postmark includes receiving, via a server, a request message from an electronic network, the request message comprising request data including payload data and meta data, generating a timestamp in response to receiving the message, hashing the payload data to generate a payload hash, digitally signing the metadata, the payload hash, and the timestamp to generate a digital signature, generating a response message, the response message generated to comprise the metadata, the payload hash, the timestamp, and the digital signature; and transmitting the response message onto the electronic network.
SYSTEM AND METHOD FOR PHONE PRIVACY
According to various embodiments, a cellular architecture for enhanced privacy regarding identity and location of a computing device is disclosed. The architecture includes a next generation core (NGC). The NGC includes an authentication server function (AUSF) configured to determine whether the computing device contains a valid subscriber identity module (SIM) card, and a user plane function (UPF) configured to allow a computing device to connect to the Internet. The architecture further includes a gateway connected to the UPF, the gateway configured to authenticate the computing device while hiding the identity of the computing device by verifying authentication tokens that represent units of access.
MOBILE DEVICE ROAMING OPTIMIZATION AND OPERATION
A method, system, and computer program product for implementing mobile device roaming optimization is provided. The method includes receiving a selection for services associated with a first mobile device provider for activation during travel to a location associated with mobile device roaming attributes with respect to a mobile device of a user. A blockchain structure and a hash masking sensitive data of the user are generated. It is detected that the user and mobile device have traveled to the location and access to the blockchain structure is enabled. Roaming usage attributes of the mobile device are determined. Subsequently, operational functionality of the mobile device at the geographical location is enabled via roaming usage of a network of the second mobile device provider and second hash of consumption related information compliant with data residency is transmitted to the first mobile device provider to facilitate resolution of disputes across entities.
ROUTING A DATA PROCESSING TRANSACTION BASED ON MACHINE LEARNING
According to certain embodiments, a routing system comprises a memory operable to store historical data associated with a plurality of previous data processing transactions and a processor operably coupled to a network interface and the memory. The processor is configured to obtain the historical data associated with the plurality of previous data processing transactions transacted using a first routing between a first computing system and a second computing system and determine a pattern based on the historical data, the pattern determined based on machine learning. The processor is further configured to associate the pattern with a second routing between the first computing system and the second computing system, determine an upcoming data processing transaction corresponding to the pattern, and use the second routing to transact the upcoming data processing transaction.
Recovery support apparatus, recovery support method and program
A recovery support apparatus includes an index value calculation means which calculates a predetermined index value with respect to a recovery work sequence on the basis of the recovery work sequence indicating a work procedure for recovery from an abnormality that has occurred in an apparatus group constituting a communication network, and an output means which outputs the index value calculated by the index value calculation means to a predetermined output destination.
Recovery support apparatus, recovery support method and program
A recovery support apparatus includes an index value calculation means which calculates a predetermined index value with respect to a recovery work sequence on the basis of the recovery work sequence indicating a work procedure for recovery from an abnormality that has occurred in an apparatus group constituting a communication network, and an output means which outputs the index value calculated by the index value calculation means to a predetermined output destination.