18063279. INTERFACE FOR MANAGEMENT OF RESOURCE TRANSFERS simplified abstract (Truist Bank)
Contents
- 1 INTERFACE FOR MANAGEMENT OF RESOURCE TRANSFERS
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 INTERFACE FOR MANAGEMENT OF RESOURCE TRANSFERS - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Key Features and Innovation
- 1.6 Potential Applications
- 1.7 Problems Solved
- 1.8 Benefits
- 1.9 Commercial Applications
- 1.10 Prior Art
- 1.11 Frequently Updated Research
- 1.12 Questions about Automated Resource Utilization Management and Monitoring Systems
- 1.13 Original Abstract Submitted
INTERFACE FOR MANAGEMENT OF RESOURCE TRANSFERS
Organization Name
Inventor(s)
Candice Mercer Roberts of Harrisburg NC (US)
Randy Eric Borth of Concord NC (US)
Ashok Kumar Mittal of Charlotte NC (US)
Surendra Nath Puduru of Raleigh NC (US)
Natalie Renee Stormer of Raleigh NC (US)
Reinaldo Gamaliel Rivera Colon of Raleigh NC (US)
Kelly Mosby Griffin of Matthews NC (US)
Jennifer Meredith Merten of Brookhaven GA (US)
Mary Margaret Mueller of Charlotte NC (US)
INTERFACE FOR MANAGEMENT OF RESOURCE TRANSFERS - A simplified explanation of the abstract
This abstract first appeared for US patent application 18063279 titled 'INTERFACE FOR MANAGEMENT OF RESOURCE TRANSFERS
Simplified Explanation
The patent application describes systems and methods for automating the management and monitoring of remote resource utilization activity. These systems process transfer instructions, data on past transfers, and end user attributes to generate notifications about current and future transfer activity, as well as optimize resource utilization securely.
- Automation of management and monitoring of remote resource utilization activity
- Processing of transfer instructions, past transfer data, and end user attributes
- Generation of notifications about current and future transfer activity
- Optimization of resource utilization securely
Key Features and Innovation
The innovation lies in the automation of managing and monitoring remote resource utilization activity by processing various data inputs to generate notifications and optimize resource utilization securely.
Potential Applications
This technology can be applied in various industries such as finance, healthcare, and telecommunications to efficiently manage and monitor resource utilization activities.
Problems Solved
This technology addresses the challenges of manual monitoring and management of remote resource utilization, ensuring efficient and secure transfer activities.
Benefits
The benefits of this technology include improved efficiency, enhanced security, and optimized resource utilization in remote transfer activities.
Commercial Applications
- Finance: Streamlining transfer activities and enhancing security in financial transactions
- Healthcare: Efficient management of patient data transfers while ensuring data security
- Telecommunications: Optimizing network resource utilization and enhancing data transfer security
Prior Art
Readers can explore prior art related to automated resource utilization management and monitoring systems in the fields of data processing, network security, and encryption technologies.
Frequently Updated Research
Stay updated on the latest research in automated resource utilization management and monitoring systems to understand advancements in data processing and security technologies.
Questions about Automated Resource Utilization Management and Monitoring Systems
How does this technology improve efficiency in resource utilization activities?
This technology automates the processing of transfer instructions and past transfer data to generate notifications, allowing for timely interventions and optimizations to enhance efficiency.
What are the potential security implications of using encryption and individual computing device authentication techniques in resource utilization management?
By employing encryption and individual computing device authentication techniques, this technology ensures secure transfer activities and protects sensitive data from unauthorized access.
Original Abstract Submitted
Disclosed are systems and methods that automate management and monitoring of remote resource utilization activity. The systems process incoming transfer instructions, data relating to prior resource transfers, and data relating to end user attributes and activities to generate notifications concerning relevant current transfer activity, expected future transfers, and modifications to optimize ongoing resource utilization and transfer activity. The systems allow resource utilization to be managed effectively, efficiently, and in a secure fashion using encryption and individual computing device authentication techniques.
- Truist Bank
- Candice Mercer Roberts of Harrisburg NC (US)
- Randy Eric Borth of Concord NC (US)
- Ashok Kumar Mittal of Charlotte NC (US)
- Surendra Nath Puduru of Raleigh NC (US)
- WeiJen Lu of Raleigh NC (US)
- Natalie Renee Stormer of Raleigh NC (US)
- Reinaldo Gamaliel Rivera Colon of Raleigh NC (US)
- Kelly Mosby Griffin of Matthews NC (US)
- Jennifer Meredith Merten of Brookhaven GA (US)
- Mary Margaret Mueller of Charlotte NC (US)
- G06Q10/0631
- G06F9/451
- G06N3/098
- CPC G06Q10/0631