SMART FACTORY APPLICATION INTEGRATION
    1.
    发明申请

    公开(公告)号:US20190075180A1

    公开(公告)日:2019-03-07

    申请号:US15695083

    申请日:2017-09-05

    Abstract: Systems and methods for selectively enforcing business logic on a plurality of applications have been provided. The system architecture may include one or more systems of record and a plurality of applications running on a plurality of client machines. A smart factory may store customer data and associated logic obtained from a system of record. The logic may include rules governing use of the customer data in an application user interface. The smart factory may transmit the rules to the plurality of applications. Each application may include an application integrator configured to receive the rules and execute an update to enforce the rules on an application user interface. In addition, the smart factory customer data may be accessed by the applications to prevent repeated calls to the systems of record for commonly used information.

    Smart factory application integration

    公开(公告)号:US10805416B2

    公开(公告)日:2020-10-13

    申请号:US16569807

    申请日:2019-09-13

    Abstract: Systems and methods for selectively enforcing business logic on a plurality of applications have been provided. The system architecture may include one or more systems of record and a plurality of applications running on a plurality of client machines. A smart factory may store customer data and associated logic obtained from a system of record. The logic may include rules governing use of the customer data in an application user interface. The smart factory may transmit the rules to the plurality of applications. Each application may include an application integrator configured to receive the rules and execute an update to enforce the rules on an application user interface. In addition, the smart factory customer data may be accessed by the applications to prevent repeated calls to the systems of record for commonly used information.

    SMART FACTORY APPLICATION INTEGRATION
    3.
    发明申请

    公开(公告)号:US20200007640A1

    公开(公告)日:2020-01-02

    申请号:US16569803

    申请日:2019-09-13

    Abstract: Systems and methods for selectively enforcing business logic on a plurality of applications have been provided. The system architecture may include one or more systems of record and a plurality of applications running on a plurality of client machines. A smart factory may store customer data and associated logic obtained from a system of record. The logic may include rules governing use of the customer data in an application user interface. The smart factory may transmit the rules to the plurality of applications. Each application may include an application integrator configured to receive the rules and execute an update to enforce the rules on an application user interface. In addition, the smart factory customer data may be accessed by the applications to prevent repeated calls to the systems of record for commonly used information.

    SYSTEMS, METHODS, AND APPARATUSES FOR DETECTING USER ACCOUNT MISAPPROPRIATION ATTEMPTS USING ARTIFICIAL INTELLIGENCE IN AN ELECTRONIC NETWORK

    公开(公告)号:US20250013724A1

    公开(公告)日:2025-01-09

    申请号:US18218244

    申请日:2023-07-05

    Abstract: Systems, computer program products, and methods are described herein for detecting user account misappropriation attempts using artificial intelligence (AI) in an electronic network. The present invention is configured to access a user account database, wherein the user account database comprises at least one user account data; identify a current data transmission associated with a user account, wherein the user account is associated with the user account database; apply the current data transmission to a user account misappropriation AI engine; determine, by the user account misappropriation AI engine, a misappropriation likelihood of the current data transmission; generate a user account report based on the current data transmission and the misappropriation likelihood, the user account report comprising a user account identifier associated with the user account; and generate, based on the misappropriation likelihood, a misappropriation attempt attribute for the current data transmission.

    SYSTEMS AND METHODS FOR IMAGE AUTHENTICATED DATA TRANSFERS BETWEEN ELECTRONIC DEVICES IN A DISTRIBUTED NETWORK

    公开(公告)号:US20250023730A1

    公开(公告)日:2025-01-16

    申请号:US18219838

    申请日:2023-07-10

    Abstract: Systems, methods, and computer program products are provided herein for image authenticated data transfers between electronic devices in a distributed network. An example method includes receiving a request for data transfer from a first user device associated with a first user that defines one or more data transfer parameters and determining a second user associated with the data transfer request based upon the one or more data transfer parameters. The method also includes determining a verifiable image object associated with the second user that includes at least a digital representation of the second user. The method further includes authenticating the data transfer between the first user device and a second user device associated with the second user in response to an authentication operation by the first user based upon the verifiable image object.

    System for implementing contactless authentication

    公开(公告)号:US11295549B1

    公开(公告)日:2022-04-05

    申请号:US17060133

    申请日:2020-10-01

    Abstract: Systems, computer program products, and methods are described herein for implementing contactless authentication. The present invention is configured to receive a contactless resource transfer interaction by a user using a resource transfer instrument at a resource transfer terminal; retrieve, from the resource transfer instrument, a unique code associated with one or more fingerprint patterns of the user; receive a pattern associated with the contactless resource transfer interaction; determine that the unique code associated with the one or more fingerprint patterns of the user matches one or more pre-registered unique codes associated with the one or more fingerprint patterns of the user; determine that the pattern associated with the contactless resource transfer interaction matches one or more pre-registered patterns associated with one or more authorized contactless resource transfer interactions; and authorize an execution of the resource transfer interaction.

Patent Agency Ranking