18063279. INTERFACE FOR MANAGEMENT OF RESOURCE TRANSFERS simplified abstract (Truist Bank)

From WikiPatents
Revision as of 08:56, 14 June 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

INTERFACE FOR MANAGEMENT OF RESOURCE TRANSFERS

Organization Name

Truist Bank

Inventor(s)

Candice Mercer Roberts of Harrisburg NC (US)

Randy Eric Borth of Concord NC (US)

Ashok Kumar Mittal of Charlotte NC (US)

Surendra Nath Puduru of Raleigh NC (US)

WeiJen Lu of Raleigh NC (US)

Natalie Renee Stormer of Raleigh NC (US)

Reinaldo Gamaliel Rivera Colon of Raleigh NC (US)

Kelly Mosby Griffin of Matthews NC (US)

Jennifer Meredith Merten of Brookhaven GA (US)

Mary Margaret Mueller of Charlotte NC (US)

INTERFACE FOR MANAGEMENT OF RESOURCE TRANSFERS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18063279 titled 'INTERFACE FOR MANAGEMENT OF RESOURCE TRANSFERS

Simplified Explanation

The patent application describes systems and methods for automating the management and monitoring of remote resource utilization activity. These systems process transfer instructions, data on past transfers, and end user attributes to generate notifications about current and future transfer activity, as well as optimize resource utilization securely.

  • Automation of management and monitoring of remote resource utilization activity
  • Processing of transfer instructions, past transfer data, and end user attributes
  • Generation of notifications about current and future transfer activity
  • Optimization of resource utilization securely

Key Features and Innovation

The innovation lies in the automation of managing and monitoring remote resource utilization activity by processing various data inputs to generate notifications and optimize resource utilization securely.

Potential Applications

This technology can be applied in various industries such as finance, healthcare, and telecommunications to efficiently manage and monitor resource utilization activities.

Problems Solved

This technology addresses the challenges of manual monitoring and management of remote resource utilization, ensuring efficient and secure transfer activities.

Benefits

The benefits of this technology include improved efficiency, enhanced security, and optimized resource utilization in remote transfer activities.

Commercial Applications

  • Finance: Streamlining transfer activities and enhancing security in financial transactions
  • Healthcare: Efficient management of patient data transfers while ensuring data security
  • Telecommunications: Optimizing network resource utilization and enhancing data transfer security

Prior Art

Readers can explore prior art related to automated resource utilization management and monitoring systems in the fields of data processing, network security, and encryption technologies.

Frequently Updated Research

Stay updated on the latest research in automated resource utilization management and monitoring systems to understand advancements in data processing and security technologies.

Questions about Automated Resource Utilization Management and Monitoring Systems

How does this technology improve efficiency in resource utilization activities?

This technology automates the processing of transfer instructions and past transfer data to generate notifications, allowing for timely interventions and optimizations to enhance efficiency.

What are the potential security implications of using encryption and individual computing device authentication techniques in resource utilization management?

By employing encryption and individual computing device authentication techniques, this technology ensures secure transfer activities and protects sensitive data from unauthorized access.


Original Abstract Submitted

Disclosed are systems and methods that automate management and monitoring of remote resource utilization activity. The systems process incoming transfer instructions, data relating to prior resource transfers, and data relating to end user attributes and activities to generate notifications concerning relevant current transfer activity, expected future transfers, and modifications to optimize ongoing resource utilization and transfer activity. The systems allow resource utilization to be managed effectively, efficiently, and in a secure fashion using encryption and individual computing device authentication techniques.