Abstract:
The present disclosure involves systems and methods for automatically analyzing available data exchange terms based on an analysis and comparison of available terms, where some of the terms may be unavailable in the current data exchange context based on the user and counter party to the data exchange. One example system includes a memory and a processor. Operations performed by the processor can include receiving a data exchange request associated with a set of information and an identifier. A set of contextual information associated with the received request can be determined. Options associated with the identifier, each associated with a set of terms, can be loaded from a storage device. A subset of viable options can be determined from the options based on the set of information and the contextual information, and a particular option from the subset can be selected for use in executing the received data exchange request.
Abstract:
The present disclosure involves systems, software, and computer-implemented methods for implementing a data transfer control based on information received from connected devices. In one instance, operations include loading an expected usage amount for a group of connected devices. Signals representing actual usage amounts associated with the group are received from at least device in the group. The actual usage amounts can be compared to the expected usage amount. An authorization of at least one payment-related action associated with the at least one group of connected devices is automatically transmitted to a payment system in response to determining that the usage amount is less than or equal to the expected amount, and at least one instruction to perform a corrective action associated with the group is automatically transmitted to at least one connected device of the group in response to determining that the actual amount exceeds the expected amount.
Abstract:
The present disclosure involves systems and computer implemented methods for performing a connected device-based property evaluation. In one example, operations include identifying a property associated with an initial price and collecting information about the property by receiving information from one or more connected devices associated with the property. The one or more connected devices can each have a sensor for monitoring a condition within the property, and can providing information about the condition to the connected device, where the information is associated with a current status of the identified property. At least one action to be performed at the property based on the collected information is determined, with each action corresponding to an element at the property. An aggregate set of cost information associated with each determined action is determined and combined with the initial price to determine a modified purchase price. The modified price is then presented.
Abstract:
The disclosed embodiments include computerized systems and methods for generating secured blockchain-based ledger data structures that track occurrences of events across fragmented and geographically dispersed lines-of-business of an enterprise. In one instance, an apparatus associated with a rules authority of the secured blockchain-based ledger may detect an occurrence of a triggering event, and may access and decrypt a set of rules hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key. The apparatus may identify a rule associated with the detected event, and perform one or more operations consistent with the rule, including a disbursement of various rewards to employees in response to customer-specific interactions with the enterprise. The disclosed embodiments provide a rules process for aggregating mutually incompatible enterprise data that specifies the events, and for tracking the events in uniform data structures accessible across the enterprise.
Abstract:
The disclosed embodiments include computerized methods and systems that facilitate automate trade-order entry and execution based on social media messaging. In one embodiment, an apparatus may receive, from a social-networking service, social media data that includes various social media messages associated with social-networking accounts of various users. The apparatus may detect an occurrence of a predetermined element of content within a first social media message associated with a social networking account of a first user, and may extract data identifying at least one parameter of an action from the first social media message. The apparatus may generate proposed transaction parameters that include the at least one extracted action parameter, and in response to a confirmation of the proposed transaction parameters, the apparatus may generate one or more electronic commands to initiate a performance of the action in accordance with the confirmed transaction parameters.
Abstract:
The present disclosure involves systems and computer implemented methods for implementing a resource allocation. One example method is performed by identifying a resource allocation associated with the device hub, the resource allocation defining an expected resource usage associated with a connected device and a non-connected device. Resource usage information associated with the connected device is monitored, where usage information associated with the non-connected device is calculated based on a difference between a total resource usage identified by the device hub and the resource usage information associated with the connected device. The resource usage information is compared to the resource allocation, and in response to the comparison and a determination that the non-connected device exceeded the resource allocation associated with the non-connected device, an adjustment in operation for the connected device associated with the device hub is calculated. An instruction is transmitted to the connected device to perform the calculated adjustment.
Abstract:
A method of credential-based electronic payment processing involves a credential processing server receiving from a mobile communications device a payment initiation request for initiating payment with a payment terminal, and providing the mobile communications device with a mode authorization for an authorized communications mode for the mobile communications device to provide the payment terminal with a payment pre-authorization credential. The payment pre-authorization credential is uniquely associated with a financial account and pre-authorizes electronic payment from the financial account. The credential processing server receives from the payment terminal a payment clearing request that identifies a payment amount and includes the payment pre-authorization credential. The credential processing server determines particulars of the financial account from the payment pre-authorization credential, and effects settlement of the electronic payment by forwarding over a payment network a settlement request message identifying the payment amount and the financial account particulars.
Abstract:
Methods and devices for provisioning a secure application on an electronic device with first issuer data for a first issuer are described. In an embodiment, the provisioning system receives and stores first issuer records. The example provisioning system receives a provisioning request to provision the secure application with the first issuer data. The provisioning request includes identifying information. The example provisioning system evaluates the provisioning request based on at least one of the first issuer evaluation criteria, the first issuer records and the identifying information in the provisioning request. When the provisioning request satisfies the first issuer evaluation criteria, the example provisioning system generates a signal using the communication module to provide the first issuer data to the electronic device to provision the secure application on the electronic device.
Abstract:
A payment processing server generates an asymmetric cryptographic key pair, over one secure communications channel providing a mobile device with one cryptographic key of the cryptographic key pair, and saves another cryptographic key of the cryptographic key pair in a pending transaction database in unique association with a single-use payment number and a financial account. The server encrypts the payment number, which does not identify the financial account, with the another cryptographic key and provides the mobile device with the encrypted payment number over another secure communications channel distinct from the one secure communications channel. The server receives from a payment terminal a payment completion request that includes the encrypted payment number decrypted with the one cryptographic key. The payment processing server queries the pending transaction database with the decrypted payment number to identify the associated financial account, and effects completion of the transaction using the identified financial account.
Abstract:
A message processing server includes a message processor and a database of multi-layer tokens. Each token in the database includes a plurality of encrypted data layers. The first layer includes the second layer and a first pointer. The second layer includes a second pointer. The message processor is configured to receive a first authorization message including a first cryptographic key and a second value; decrypt the first layer of one of the tokens with the first key; validate the first pointer by receiving confirmation of the first pointer pointing to a database entry comprising the second value; receive a second authorization message including a second cryptographic key and a third value; decrypt the second layer of the token with the second key; and validate the second pointer by receiving confirmation of the second pointer pointing to a database entry comprising a maximum data value not less than the third value.