SYSTEMS AND METHODS FOR DEBT MANAGEMENT WITH SPENDING RECOMMENDATION

    公开(公告)号:US20230093371A1

    公开(公告)日:2023-03-23

    申请号:US18057522

    申请日:2022-11-21

    IPC分类号: G06Q40/02 G06N20/00 G06Q20/32

    摘要: A computer-implemented method may include: receiving financial information regarding a user; categorizing transaction information of the user based on the financial information; displaying the categorized transaction information of the user; receiving information regarding at least one financial preference and at least one transaction preference of the user; training a machine learning engine based on the at least one financial preference and at least one transaction preference of the user to determine one or more activities available to the user; calculating, for each of the one or more activities available to the user, an estimated influence on the at least one financial preference; displaying the estimated influence on the at least one financial preference based on a user selected one of the one or more activities available to the user; filtering the one or more activities available to the user with a positive estimated influence to the at least one financial preference; and presenting a recommendation of action relating to the one of the one or more activities available to the user, wherein the recommendation of action relating to the one of the one or more activities available to the user is presented by at least one of voice notification, application notification, tactile notification, or graphic notification.

    SYSTEM AND TECHNIQUES FOR DIGITAL DATA LINEAGE VERIFICATION

    公开(公告)号:US20230050601A1

    公开(公告)日:2023-02-16

    申请号:US17979257

    申请日:2022-11-02

    摘要: Disclosed are examples for providing functions to receive a media file to be stored in a media repository. In the examples, a location in the media repository may be assigned to the media file. A media file address in a blockchain platform may be assigned to the media file. Metadata including the assigned location in the media repository and the assigned media file address in the blockchain platform may be added to the media file. A media file hash value may be generated by applying a hash function to the media file including the metadata. The media file hash value may be included in a message and uploaded to the assigned media file address in the blockchain platform as a transaction in the blockchain. An indication that the media file is uploaded to the media repository may be delivered to a subscriber device from which the media file was received.

    METHODS AND SYSTEMS FOR APPLICATION PROGRAM INTERFACE CALL MANAGEMENT

    公开(公告)号:US20220276908A1

    公开(公告)日:2022-09-01

    申请号:US17664319

    申请日:2022-05-20

    IPC分类号: G06F9/54 G06F9/50

    摘要: Disclosed are systems and methods for application program interface (API) call management. For example a method may include obtaining API call information for one or more API endpoints, the API call information including a number of API calls to the one or more API endpoints; obtaining resource utilization (RU) information, the RU information including project RU information for one or more projects; analyzing the API call information and the RU information to obtain API cost information, the API cost information including cost per API call for the one or more API endpoints; and managing subsequent API calls to the one or more API endpoints based on the cost per API call.

    SYSTEM AND METHOD FOR HASH VALUE CONFIRMATION OF ELECTRONIC COMMUNICATIONS

    公开(公告)号:US20220239493A1

    公开(公告)日:2022-07-28

    申请号:US17159709

    申请日:2021-01-27

    IPC分类号: H04L9/32 H04L9/08 H04W4/80

    摘要: Systems, methods, and computer-readable storage media for ensuring electronic communications have not been intercepted and manipulated. An exemplary device generates a public/private pair of keys, and transmits the public key to another device with information about the data to be shared. The second device encrypts associated data, while also executing a hash function on at least a portion of the data. The first device receives the encrypted data, decrypts it, and verifies its accuracy using a third party. The third party also executes the hash function on the data received from the first device, and transmits the output of that hash function to the first device. Both the first device and second devices and display the hash values, allowing users to visually determine if the data has been manipulated during the transaction.