Abstract:
An apparatus for use in a digital messaging system includes a storage device and a processor coupled to the storage device. The storage device storing software instructions for controlling the processor that when executed by the processor configured the processor to: generate a master private and public key pair; associate the master private and public key pair with a first certificate; and derive at least one domain-specific key from the one of the master private and public key pair. The first certificate is registered to a group comprising a plurality of domains. The domain-specific key is associated with one of the plurality of domains.
Abstract:
A method and system for recommending a physical location at which to complete an electronic activity are disclosed. In some examples, initiation of the electronic activity by a user at a first physical location is detected, that the electronic activity is to be completed at a physical location different from the first physical location is determined, one or more portions of the electronic activity that remain incomplete are determined, a second physical location at which to complete the one or more incomplete portions of the electronic activity is identified, and information about the electronic activity is provided to the second physical location. In some examples, the identification of the second physical location is based on at least characteristics of the electronic activity, the user, and/or the second physical location.
Abstract:
An apparatus for use in electronic document control includes a storage device a processor coupled to the storage device. The storage device storing software instructions for controlling the processor that when executed by the processor configure the processor to: receive a signal representing data including an original document, append a unique identifier to the original document to generate a modified document, generate a hash value of the modified document, and transmit the hash value corresponding to the modified document to an electronic distributed ledger.
Abstract:
The disclosed embodiments include methods and systems for accessing computation resources, such as information-technology (IT) assets, in an open environment. In certain aspects, an IT system may provide an online portal that presents an IT self-serve store of IT assets that a user may select for access or use. The IT system may, for example, determine that the selected IT assets comply with one or more compliance and permissioning policies, and based on the determination, may assemble the selected IT assets to generate or “spin-up” instances of applications executable by various hardware platforms. The IT system may also establish an enterprise data provisioning platform that maintains data, reporting, and analytical assets in formats accessible to devices and application instances executing across the enterprise, and that provisions the data, reporting, and analytical assets in a timely, accurate, and consistent manner.
Abstract:
A method and system are provided for processing an interaction request. The method includes detecting the interaction request in a first interaction session using a first interaction channel between a request initiator and a request service provider, assigning an identifier to the interaction request, determining a task associated with the interaction request, and obtaining context data of a plurality of other interaction sessions associated with the identifier. The plurality of other interaction sessions occurs proximal in time with the first interaction session. The context data is related to activity of the request initiator. The method also includes associating a subset of the context data with the interaction request. The subset of the context data is the context data of the plurality of other interaction sessions that are related to the task. The method also includes generating an interaction response using the subset of the context data.
Abstract:
The disclosed embodiments include methods and systems for providing information-technology (IT) assets in an open environment. In certain aspects, an IT system may provide an online portal that presents an IT self-serve store of IT assets that a user may select for access or use. The IT system may, for example, determine that the selected IT assets comply with one or more compliance and permissioning policies, and based on the determination, may assemble the selected IT assets to generate or “spin-up” instances of applications executable by various hardware platforms. The IT system may also perform processes that perform automated operations relating to certain IT assets, such as testing, modeling, recommendations, etc.
Abstract:
The present disclosure involves systems, software, and computer implemented methods for sending payment requests to one or more persons or entities based on images in which the persons or entities appear. In one example, the process may include identifying an image associated with a payment request, the identified image containing at least one recipient associated with the payment request, and wherein the payment request includes a value, analyzing the identified image to identify the at least one potential recipient of the payment request, identifying contact information associated with the at least one identified recipient of the payment request, and sending the payment request to the at least one identified recipient of the payment request via a destination associated with the identified contact information.
Abstract:
The disclosed embodiments include methods and systems for providing a notification relating to a geographical boundary based on monitored sensor data collected by networked devices. The disclosed embodiments include, for example, a method for receiving, by one or more processors, a request to establish a first boundary around a first location. The method may also include monitoring, by the one or more processors, one or more triggering devices. The method may also include calculating, by the one or more processors, a first boundary extent delimiting the geographical area of the first boundary based on one or more boundary extent parameters. The method may also include detecting, by the one or more processors, whether at least one of the one or more triggering devices is located within the first boundary extent. The method may also include, when the at least one of the one or more triggering devices is detected within the first boundary extent, sending, by the one or more processors, a notification to a client device based on the determining.
Abstract:
A processor receives a signal representing data including event information detailing an event involving an entity having a registered ownership interest in a product and loads a portion of a distributed electronic ledger for tracking ownership information associated with the product. The distributed electronic ledger includes, within a block thereof and associated with the product, an event trigger list including entity data associated with each entity having a registered ownership interest in the product and a rules engine including rules associated with event triggers in the event trigger list. The processor determines whether a triggering event corresponding to the event is stored in the event trigger list and, when the event has a corresponding triggering event, determines the associated rule within the rules engine. The processor updates and saves the distributed electronic ledger by performing an action specified by the determined associated rule.
Abstract:
The disclosed embodiments include computerized systems and methods that generate secured blockchain-based ledger structures that facilitate event-based control of tracked assets. In one embodiment, an apparatus associated with a centralized authority of the secured blockchain-based ledger may detect an occurrence of a triggering event, and may access and decrypt a set of rules hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key. The apparatus may identify a rule associated with the detected event, and perform one or more operations consistent with the rule. In some aspects, the detected event may correspond to a dispute involving one or more terms or conditions of a contractual agreement between a first party and one or more second parties, and the performed operations may resolve the dispute.