Abstract:
Mechanisms are disclosed herein for storing various records. Numerous keys and parties can access online repositories. These repositories contain a plurality of lockboxes, structured hierarchically and otherwise, providing public and private areas with varying levels of access. Some content of such lockboxes can be sharable. These lockboxes can be used not only to store diverse content, ranging from birth certificates to deeds and social security numbers, but they can also be accessed in a variety of ways. For example, keys to lockboxes can be made available by such events as the issuing of death certificates or birth certificates. Alternatively, keys can be issued according to various rules and heuristics stipulated by lockbox users. In either case, the plurality of lockboxes residing in repositories can be configured to provide centralized storage facilities that are secure and readily accessible from various computing devices.
Abstract:
Remote deposit of checks can be facilitated by a financial institution. A customer's general purpose computer and image capture device may be leveraged to capture an image of a check and deliver the image to financial institution electronics. Additional data for the transaction may be collected as necessary. The transaction can be automatically accomplished utilizing the images and data thus acquired.
Abstract:
Mechanisms for virtual banking are disclosed herein that provide experiences to users as if they were actually interacting with a branch office bank. For instance, virtual lockboxes are provided to users, and users can fill these lockboxes with the type of digital data that would traditionally be placed in a branch office bank lockbox. Birth certificates, social security numbers, wills, etc., can be uploaded from a user's remote computing device to a server associated with a bank. In another aspect, currency cards are disclosed that mimic cash withdrawal (or deposit) transactions users might engage in at typical branch offices. For example, users can download money from a bank server onto a currency card located at some remote location (or, alternatively, upload money from the card to the server, which would amount to a deposit being made to the bank).
Abstract:
Systems, methods and computer readable media can include prioritizing tasks associated with a group of users based on number of times the users have monitored the status of a task. In addition to the general system, systems, methods and computer readable media for task prioritizing, the tasks may be prioritized based on the number of users associated with a task, the importance of each user associated with a task, and the way the task was identified.
Abstract:
To deposit a negotiable instrument electronically, a digital image may be used. Systems and methods are described herein that facilitate the use of a digital camera to provide the digital image. A user may capture an image of a negotiable instrument to create a digital image. The digital image may be compressed and saved as a digital image file. The user may then transmit the digital image file to a financial institution, such as a bank, to deposit funds drawn from the account of the negotiable instrument into the user's account. A financial institution may receive digital image files created by a digital camera from account holders and process a deposit request using the digital image file.
Abstract:
Various embodiments are directed to a method of switching horizontal directional drilling procedures during bore path turning. Such methods can include identifying a hierarchal arrangement of a plurality of different boring procedures utilizing different boring techniques, the hierarchy arrangement representing boring procedures of increasing ability to bore through harder soil while changing a trajectory of a boring tool. Such methods can further include boring a first leg of a curved bore path using a boring tool connected to a drill rig by a drill string, the first leg being bored using a first boring procedure of the plurality of different boring procedures. Such methods can further include monitoring a plurality of boring parameters during boring of the first leg, the plurality of boring parameters comprising: torsional pressure of the drill string, rotational travel of the drill string, hydraulic pressure, and axial displacement. Such methods can further include switching from boring the first leg of the curved bore path using the first boring procedure to boring a second leg using a second boring procedure of the plurality of boring procedures, the switch based on one or more of the boring parameters deviating past a threshold.
Abstract:
Verification of remotely deposited checks may be conducted in a system or for electronically receiving check images from customers and automatically initiating a deposit of funds associated with such check. Verification may comprise analyzing an image to detecting a presence of signatures, e.g. a payor signature and an endorsement, on a received check image so as to validate a check. Verification may further comprise conducting “face recognition” of a received check image to verify it's authenticity and/or detecting MICR line indications that a check is no longer valid.
Abstract:
A security service determines whether to grant a user access to a resource. The service receives from the user a security term in an obscured form derived from a revealed form of the security term according to a predefined padding scheme known to the user and to the security service. The service applies the padding scheme to the received term to result in a de-padded security term and confirms that the de-padded security term matches the retrieved revealed security term. Additionally, the service confirms that the received term has not been previously employed within a predetermined frame of reference. Accordingly, if the received obscured security term is purloined and re-used within the predetermined frame of reference, the security service denies access to the resource.
Abstract:
Various mechanisms are provided herein for automated institutional processing of payments. For example, fund can be transferred from one party to another party by transfer of funds from a static account into a dynamically created transaction account. Such a transfer can have additional features, including the refunding of the transfer funds and revocation thereof. According to another example, insurance claims can be automatically processed by transferring funds when claims are filed (with or without evidentiary documents). Such transfers can then be validated afterwards. Thus, when claims are received, they can be quickly examined for the relevant fields, such as claim amount, and then the amount can be disbursed in a matter of minutes after receiving a claim submission. Such disbursement, moreover, can be governed according to various heuristics, including the trustworthiness of claimants and rules regarding maximum disbursement amounts.