Connected device-triggered failure analysis

    公开(公告)号:US10325312B2

    公开(公告)日:2019-06-18

    申请号:US15271853

    申请日:2016-09-21

    Abstract: The present disclosure involves systems and computer implemented methods for performing a failure analysis on a device monitored by at least one connected device, where in response to a determination of an impending failure, at least one corrective action is determined and suggested to the user of the monitored device. In one example, operations include monitoring operations of at least one monitored device using at least one connected device, determining a projected life span of the at least one monitored device based on the monitored operations, and, if the projected life span of the monitored device is less than a threshold amount, determining a corrective action to perform. A proposal can be generated for presentation based on the corrective action. The proposal may be based on the estimated cost of the determined corrective action and an analysis of an account.

    BRANCH RECOMMENDATION
    53.
    发明申请

    公开(公告)号:US20190114703A1

    公开(公告)日:2019-04-18

    申请号:US16212808

    申请日:2018-12-07

    Abstract: A method and system for recommending a physical location at which to complete an electronic activity are disclosed. In some examples, initiation of the electronic activity by a user at a first physical location is detected, that the electronic activity is to be completed at a physical location different from the first physical location is determined, one or more portions of the electronic activity that remain incomplete are determined, a second physical location at which to complete the one or more incomplete portions of the electronic activity is identified, and information about the electronic activity is provided to the second physical location. In some examples, the identification of the second physical location is based on at least characteristics of the electronic activity, the user, and/or the second physical location.

    SECURING DATA VIA MULTI-LAYER TOKENS
    56.
    发明申请

    公开(公告)号:US20170134168A1

    公开(公告)日:2017-05-11

    申请号:US15283861

    申请日:2016-10-03

    Abstract: A message processing server includes a memory and a message processor. The message processor is configured to receive first data; save an identifier in association with a first-layer access restriction indicator and a first key, generate a first encrypted layer by encrypting the first data with the first key, and generate a token from the identifier and the first encrypted layer; receive second data and the token; recover the identifier and the first encrypted layer from the token; confirm that the identifier was saved in the memory in association with the first indicator; save the identifier in association with a second-layer access restriction indicator and a second key, generate a second encrypted layer by encrypting the first encrypted layer and the second data with the second key, and regenerate the token from the identifier and the second encrypted layer.

    Resource Allocation Control Based on Connected Devices
    57.
    发明申请
    Resource Allocation Control Based on Connected Devices 审中-公开
    基于连接设备的资源分配控制

    公开(公告)号:US20160338072A1

    公开(公告)日:2016-11-17

    申请号:US15152286

    申请日:2016-05-11

    Abstract: The present disclosure involves systems and computer implemented methods for implementing a resource allocation and adjusting resource usage and spending based on information received from a plurality of network-connected devices. One example method includes identifying a new connected device replacing an existing device associated with a resource allocation, the resource allocation defining an expected resource usage for a plurality of devices (including the existing device), obtaining historical resource usage information associated with the existing device, identifying the existing device's operational parameters, and determining an expected resource usage for the new connected device after replacement. A change in the expected resource usage in the resource allocation is calculated based on the obtained historical resource usage information associated with the existing device and the expected resource usage amount for the new connected device. The master resource allocation is then updated based on the calculated change.

    Abstract translation: 本公开涉及用于实现资源分配的系统和计算机实现的方法,并且基于从多个网络连接的设备接收的信息来调整资源使用和支出。 一个示例性方法包括识别替换与资源分配相关联的现有设备的新连接设备,所述资源分配定义多个设备(包括现有设备)的预期资源使用,获得与现有设备相关联的历史资源使用信息, 识别现有设备的操作参数,以及在更换后确定新连接设备的预期资源使用情况。 基于获得的与现有设备相关联的历史资源使用信息和新连接设备的预期资源使用量,计算资源分配中预期资源使用量的变化。 然后根据计算的更改更新主资源分配。

    Validating encrypted data from a multi-layer token

    公开(公告)号:US11481778B2

    公开(公告)日:2022-10-25

    申请号:US15286734

    申请日:2016-10-06

    Abstract: A message processing server includes a message processor and a database of multi-layer tokens. Each token in the database includes a plurality of encrypted data layers. The first layer includes a first data pointer. A primary layer includes the first layer and identifies a reference data value. The message processor receives from a communications device an authentication request identifying a first data value, validates the authentication request from the first data value and the reference data value configured in one of the multi-layer tokens, receives a first authorization message including a first cryptographic key, derives a first decrypted data layer from the first cryptographic key and the first encrypted data layer of the one multi-layer token, and validates the first data pointer by receiving confirmation of the first data pointer pointing to a database entry comprising a second data value less than the reference data value.

Patent Agency Ranking