-
公开(公告)号:US20240013326A1
公开(公告)日:2024-01-11
申请号:US18371136
申请日:2023-09-21
CPC分类号: G06Q50/18 , G06F21/32 , G06F21/335
摘要: Aspects of the disclosure relate to using secure authentication tokens to grant power of attorney. A computing platform may receive user input indicating a task and requesting that a power of attorney be granted to an individual. The computing platform may generate an authority token granting the individual the power of attorney to perform the task, and may send the authority token, along with task information indicating the task, to the individual. The computing platform may receive a validation request including the authority token and the task information. Based on successful validation, the computing platform may send validation information to an event processing system. After receiving confirmation that the task has been performed by the individual, the computing platform may update dashboard information to indicate that the task has been completed, which may cause the user device to display a dashboard indicating completion of the task.
-
公开(公告)号:US20200162477A1
公开(公告)日:2020-05-21
申请号:US16192625
申请日:2018-11-15
发明人: Manu J. Kurian , Michael S. Karafotis , Paul G. Roscoe , Saritha P. Vrittamani , Jo-Ann Taylor , Srinivasa D. Madireddi , Timothy L. Atwell , Crystal M. Sundaramoorthy
IPC分类号: H04L29/06
摘要: A system that includes a tagging engine and a routing engine. The tagging engine is configured to link a data element with an access control tag. The tagging engine is configured to apply context rules to the access control tag array based on the content of the data element to change the access control tag value for one or more of the access control tags. The tagging engine sends the data element with the access control tag array to a target network node within an end user group. The routing engine is configured to identify an access control tag value in the access control tag array corresponding with the end user group and to forward the data element to the target network node in response to determining that the access control value is greater than or equal to the access control level associated with the end user group.
-
公开(公告)号:US20200065459A1
公开(公告)日:2020-02-27
申请号:US16106259
申请日:2018-08-21
发明人: Keesara Himabindu , Jayachandra Varma , Crystal M. Sundaramoorthy , Gilbert M. Gatchalian , Manu Kurian , Kevin A. Delson , Saritha Prasad Vrittamani , Angela Cain
摘要: Systems for dynamic authentication are provided. In some examples, a system may receive a request to process an event. In some examples, the request to process the event may include additional details associated with the event. The system may initiate dynamic authentication functions and may retrieve data from a plurality of sources. In some examples, the data from the plurality of sources may be analyzed using machine learning to dynamically generate authentication data, such as one or more authentication questions. The system may also generate one or more corresponding responses or answers to the one or more authentication questions. In some examples, the one or more authentication questions may be transmitted to a user device or other device and may be displayed to the user. The user may provide authentication response data that may be analyzed by the system to determine whether it matches the generated response or answer. If so, the user may be authenticated and/or the event may be processed.
-
公开(公告)号:US12062102B2
公开(公告)日:2024-08-13
申请号:US18371136
申请日:2023-09-21
CPC分类号: G06Q50/18 , G06F21/32 , G06F21/335
摘要: Aspects of the disclosure relate to using secure authentication tokens to grant power of attorney. A computing platform may receive user input indicating a task and requesting that a power of attorney be granted to an individual. The computing platform may generate an authority token granting the individual the power of attorney to perform the task, and may send the authority token, along with task information indicating the task, to the individual. The computing platform may receive a validation request including the authority token and the task information. Based on successful validation, the computing platform may send validation information to an event processing system. After receiving confirmation that the task has been performed by the individual, the computing platform may update dashboard information to indicate that the task has been completed, which may cause the user device to display a dashboard indicating completion of the task.
-
公开(公告)号:US11823092B2
公开(公告)日:2023-11-21
申请号:US17898582
申请日:2022-08-30
CPC分类号: G06Q50/18 , G06F21/32 , G06F21/335
摘要: Aspects of the disclosure relate to using secure authentication tokens to grant power of attorney. A computing platform may receive user input indicating a task and requesting that a power of attorney be granted to an individual. The computing platform may generate an authority token granting the individual the power of attorney to perform the task, and may send the authority token, along with task information indicating the task, to the individual. The computing platform may receive a validation request including the authority token and the task information. Based on successful validation, the computing platform may send validation information to an event processing system. After receiving confirmation that the task has been performed by the individual, the computing platform may update dashboard information to indicate that the task has been completed, which may cause the user device to display a dashboard indicating completion of the task.
-
公开(公告)号:US10915613B2
公开(公告)日:2021-02-09
申请号:US16106259
申请日:2018-08-21
发明人: Keesara Himabindu , Jayachandra Varma , Crystal M. Sundaramoorthy , Gilbert M. Gatchalian , Manu Kurian , Kevin A. Delson , Saritha Prasad Vrittamani , Angela Cain
摘要: Systems for dynamic authentication are provided. In some examples, a system may receive a request to process an event. In some examples, the request to process the event may include additional details associated with the event. The system may initiate dynamic authentication functions and may retrieve data from a plurality of sources. In some examples, the data from the plurality of sources may be analyzed using machine learning to dynamically generate authentication data, such as one or more authentication questions. The system may also generate one or more corresponding responses or answers to the one or more authentication questions. In some examples, the one or more authentication questions may be transmitted to a user device or other device and may be displayed to the user. The user may provide authentication response data that may be analyzed by the system to determine whether it matches the generated response or answer. If so, the user may be authenticated and/or the event may be processed.
-
公开(公告)号:US20210012393A1
公开(公告)日:2021-01-14
申请号:US16505894
申请日:2019-07-09
摘要: A method for evaluating an entity's net worth via a plurality of smart sensors is provided. The method may include determining a range of base-line values for each characteristic associated with a plurality of physical assets. Each physical asset may be coupled to one of the smart sensors. The method may include monitoring periodically to determine a measurable characteristic value for each characteristic and comparing each measured characteristic value to a stored range of base-line values for the characteristic. When a change is detected and is outside the range of base-line values, the method may include transmitting the change from to an edge computing device and modifying a stored monetary base value of each physical asset based on the change. The method may further include generating a total net value of the plurality of physical assets by combining the modified monetary base value of each physical asset.
-
公开(公告)号:US11651373B2
公开(公告)日:2023-05-16
申请号:US16448076
申请日:2019-06-21
CPC分类号: G06Q20/4016 , G06F16/1805 , H04L9/0643 , H04L67/01 , H04L9/50
摘要: A bottom-up hierarchical computer network architecture is provided. The architecture may include a central server. The architecture may also include a plurality of edge nodes that may be coupled to the central server. At least a first one of the edge nodes may be configured to process a transaction, compile data associated with the transaction, and store the data as a master dataset in the first edge node. The architecture may also include a data administration module. The data administration module may be configured to compare the master dataset in the first edge node to transactional data in the central server. When the transactional data in the central server is inconsistent with the master dataset in the first edge node, the data administration module may be configured to update the transactional data in the central server to be consistent with the master dataset in the first edge node.
-
公开(公告)号:US11558397B2
公开(公告)日:2023-01-17
申请号:US17011936
申请日:2020-09-03
发明人: Manu J. Kurian , Michael S. Karafotis , Paul G. Roscoe , Saritha P. Vrittamani , Jo-Ann Taylor , Srinivasa D. Madireddi , Timothy L. Atwell , Crystal M. Sundaramoorthy
IPC分类号: H04L9/40
摘要: A system that includes a tagging engine and a routing engine. The tagging engine is configured to link a data element with an access control tag. The tagging engine is configured to apply context rules to the access control tag array based on the content of the data element to change the access control tag value for one or more of the access control tags. The tagging engine sends the data element with the access control tag array to a target network node within an end user group. The routing engine is configured to identify an access control tag value in the access control tag array corresponding with the end user group and to forward the data element to the target network node in response to determining that the access control value is greater than or equal to the access control level associated with the end user group.
-
公开(公告)号:US11429972B2
公开(公告)日:2022-08-30
申请号:US16446960
申请日:2019-06-20
摘要: This disclosure describes an edge-node computing system that provides streamlined access to secured products/services based on data captured by one or more sensors. The captured data may include unsolicited authenticators. Edge-nodes may process the captured data and perform a plurality of pre-authentication routines. A consensus protocol executed by the edge-nodes may establish a threshold pre-authentication of a customer based on the plurality of pre-authentication routines. Edge-nodes may configure an automated teller machine (“ATM”) to provide the customer access to the ATM based on the threshold pre-authentication. The edge-nodes may configure the ATM to allow the customer to use a contactless authentication method to access the ATM.
-
-
-
-
-
-
-
-
-