Abstract:
The present disclosure involves systems and computer implemented methods for generating a virtual or augmented reality-based oversight system of business processes at a location remote from where the business process is executed. In one example, system operations include identifying a process-based operation performed at a physical first location, where the operation is associated with a request for oversight from a remote second location. A current state of the operation at the first location is identified, and at least one input source at the first location is identified. A simulation of the current state of the operation at the first location incorporating input from the input source(s) is generated for presentation at the second location. An action performed at the first location in the current state of the operation is identified, and the second location is then transmitted a request to authorize the identified action.
Abstract:
The present disclosure relates to systems and computer-implemented methods for implementing a resource allocation and adjusting resource usage and spending based on information received from a plurality of network-connected devices. One example method is performed by identifying a master resource allocation associated with a plurality of connected devices and monitoring, at a device hub, resource usage information associated with at least one connected device. The device hub compares the monitored resource usage information associated with the at least one connected device to the master resource allocation for the plurality of connected devices, and, in response to the comparison, calculates at least one adjustment in operation for a particular connected device from the plurality of connected devices based on the monitored resource usage information. The device hub then transmits an instruction to perform the at least one calculated adjustment in operation to the particular connected device associated with the adjustment.
Abstract:
The disclosed embodiments include computerized methods and systems that enable users to delegate a functionality of a mobile application through pre-loaded tokens. In one aspect, the disclosed embodiments may temporarily delegate or “loan” financial products loaded into a mobile wallet of a user to other eligible users. For example, the disclosed embodiments may receive, from a first user, a request to delegate a financial product to a second user to complete purchase transactions. In response to the received request, the disclosed embodiments may identify one or more temporal or financial conditions on the delegation, and may generate a corresponding mobile wallet token for transmission to a second user device. The second user device may, for example, process the mobile wallet token and establish the delegated financial provide in the second user's mobile wallet in accordance with the at least one of the temporal or financial conditions.
Abstract:
A method of effecting an incentive transaction involves a computer server receiving a notification message that identifies a financial transaction. The server is in communication with a database of incentive plans, each comprising a plan definition that defines an incentive transaction. Each plan is associated with plan participants by participant identifiers. Each participant identifier is uniquely associated with their plan participant. The notification message includes a product code and the participant identifier of one plan participant. The server identifies an incentive plan applicable to the financial transaction from a correlation with the participant identifier, determines an incentive amount from the product code and the incentive plan definition of the applicable incentive plan, and initiates the incentive transaction for the incentive amount with a first financial account associated with the one plan participant and with a second financial account associated with another of the plan participants of the applicable incentive plan.
Abstract:
The disclosed embodiments include methods and systems that provide secure data transmission between networked computing systems by obfuscating sensitive customer account data with placeholder account data generated in real-time and without customer intervention. The disclosed embodiments may include a computerized device that monitors user input to detect an initiation of a purchase transaction at a merchant, and upon detection of the initiated purchase transaction, may obtain a placeholder account suitable for use in the purchase transaction and capable of masking a user's sensitive account information without user intervention. In some instances, a system of a financial institution may activate and fund the placeholder account in real time and in an amount consistent with a transaction amount of the purchase transaction. Devices consistent with the disclosed embodiments may request execution of the initiated purchase transaction in accordance with the activated and funded placeholder account.
Abstract:
The disclosed embodiments include computerized systems and methods for generating secured block-chain-based ledger data structures that track subdivide ownership and usage of one or more assets, such as Internet-connected devices. In one instance, an apparatus associated with a rules authority of the secured block-chain-based ledger may detect an occurrence of a triggering event related to at least one of partial ownership interests in the assets, and may access and decrypt a set of rules hashed into the secured block-chain-based ledger using a confidentially-held master cryptographic key. The apparatus may identify a rule associated with the detected event, and perform one or more operations consistent with the rule, including a generation of additional data blocks reflecting a change in at least one of the partial ownership interests, and additionally or alternatively, processes that adaptively monitor a compliance of one or more partial owners with an imposed usage restriction.
Abstract:
The disclosed embodiments include methods and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction. The method may also include providing, by the one or more processors, the validation information to the authentication network.
Abstract:
The disclosed embodiments include computerized systems and methods that generate secured blockchain-based ledger structures that facilitate event-based control of tracked assets. In one embodiment, an apparatus associated with a rules authority of the secured blockchain-based ledger may obtain data indicative of an initiated transfer of funds between parties, and may access and decrypt a set of restrictions imposed on the initiated transfer and a set of rules associated with the restrictions, which may hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key. The apparatus may determine that the initiated transfer violates at least one of the restrictions, and may perform operations consistent with at least one of the rules associated with the at least one violated restriction.
Abstract:
The present disclosure involves systems and computer implemented methods for implementing a resource allocation and adjusting resource usage and spending based on information received from a plurality of network-connected devices. One example method includes identifying a new connected device replacing an existing device associated with a resource allocation, the resource allocation defining an expected resource usage for a plurality of devices (including the existing device), obtaining historical resource usage information associated with the existing device, identifying the existing device's operational parameters, and determining an expected resource usage for the new connected device after replacement. A change in the expected resource usage in the resource allocation is calculated based on the obtained historical resource usage information associated with the existing device and the expected resource usage amount for the new connected device. The master resource allocation is then updated based on the calculated change.
Abstract:
The present disclosure involves systems and computer implemented methods for implementing a resource allocation. One example method is performed by identifying a resource allocation associated with the device hub, the resource allocation defining an expected resource usage associated with a connected device and a non-connected device. Resource usage information associated with the connected device is monitored, where usage information associated with the non-connected device is calculated based on a difference between a total resource usage identified by the device hub and the resource usage information associated with the connected device. The resource usage information is compared to the resource allocation, and in response to the comparison and a determination that the non-connected device exceeded the resource allocation associated with the non-connected device, an adjustment in operation for the connected device associated with the device hub is calculated. An instruction is transmitted to the connected device to perform the calculated adjustment.