US-12620020-B2 - Applying provisional resource utilization thresholds
Abstract
Disclosed are systems and methods for automatically applying resource utilization thresholds. The systems and methods allow resource utilization to be managed effectively, efficiently, and in a secure fashion. The system can utilization artificial intelligence technology to enhance the accuracy and customization of resource utilization thresholds by properly classifying resource utilization demands and applying threshold limitations directed to particular classifications of resource utilizations.
Inventors
- Barath Jayaraman
Assignees
- TRUIST BANK
Dates
- Publication Date
- 20260505
- Application Date
- 20221021
Claims (12)
- 1 . A system for automated application of utilization thresholds comprising a network computing device, a terminal computing device, and a user computing device, wherein the network computing device, the terminal computing device, and the user computing device each comprise one or more integrated software applications that perform the operations comprising: (a) initiating a remote utilization demand through operations comprising (i) decoding a digital certificate received from a user computing device utilizing a shared key to create a received device identifier, (ii) comparing the received device identifier to a known device identifier stored to a network database, (iii) when the received device identifier matches the known device identifier, generating a remote utilization demand comprising utilization demand data, wherein the utilization demand data comprises (A) utilization value data, and (B) utilization demand time code data, and (iv) transmitting the remote utilization demand to the network computing device; (b) receiving by a Resource Monitor software service running on the network computing device (i) the remote utilization demand, (ii) utilization demand metrics stored to a Utilization Demand Metrics database, wherein the utilization demand metrics comprise (A) utilization duration data, and (B) utilization threshold data, and (iii) availability database records stored to a Resource Database, wherein each availability data record comprises (A) resource value data, and (B) utilization event time code data; (c) executing a utilization threshold analysis by the Resource Monitor software service comprising the operations of (i) generating a threshold evaluation set of availability database records that includes availability database records having utilization event time code data that falls within a duration represented by the utilization duration data, (ii) generating current utilization data by aggregating the utilization value data with the resource value data for availability database records within the threshold evaluation set, and (iii) determining whether the aggregated utilization value data and resource value data exceeds the utilization threshold data; (d) generating by the network computing device, a utilization threshold message, (i) wherein the utilization threshold message comprises a demand fail command if the current utilization data exceeds utilization threshold data, and wherein (ii) the utilization threshold message comprises a demand pass command if the current utilization data does not exceed the utilization threshold data; and (e) transmitting the utilization threshold message to the terminal computing device for display to a user, wherein (i) when the terminal computing device receives a demand fail command, the terminal computing device transmits a message to the user computing device, wherein the message includes display data comprising content data for display by the user computing device, wherein the content data indicates that the utilization threshold data was exceeded and the remote utilization demand failed, and (ii) when the terminal computing device receives a demand pass command, the terminal computing device transmits a message to the user computing device, wherein the demand pass command has display data comprising content data for display by the user computing device, wherein the content data indicates that the utilization threshold data was not exceeded and the remote utilization demand passed.
- 2 . The system for automated application of utilization thresholds of claim 1 , wherein: (a) the terminal computing device generates terminal data that comprises a terminal source categorization code; (b) the Resource Monitor software service receives the terminal source categorization code from the terminal computing device; (c) the availability database records received by the Resource Monitor software service further comprise resource categorization data; (d) the utilization threshold data comprises utilization category threshold data; and (e) executing the utilization threshold analysis comprises the further operations of generating the threshold evaluation set by identifying and including only availability database records having resource categorization data that corresponds to the terminal source categorization code.
- 3 . The system for automated application of utilization thresholds of claim 1 , wherein: (a) the remote utilization demand comprises a utilization demand account identifier received from the user computing device; (b) the availability database records received by the Resource Monitor software service further comprise a available account identifier; (c) the utilization demand metrics further comprise utilization threshold account identifier data associated with the utilization threshold data, where the utilization threshold account identifier data identifies one or more user accounts; (d) the Resource Monitor software service performs the further operations of determining whether the utilization demand account identifier matches at least one user account identified by the utilization threshold account identifier data; and (e) executing the utilization threshold analysis comprises the further operations of generating the threshold evaluation set by identifying and including only availability database records having an available account identifier that matches at least one user account identified by the utilization threshold account identifier data.
- 4 . The system for automated application of utilization thresholds of claim 1 , wherein: (a) when the terminal computing device receives a demand fail command, the terminal computing device displays a message on a digital display device indicating that the remote utilization demand failed; and (b) when the terminal computing device receives a demand pass command, the terminal computing device displays a message on the digital display device indicating that the remote utilization demand passed.
- 5 . A system for automated application of utilization thresholds comprising a network computing device, a terminal computing device, and a user computing device comprising a processor, wherein the network computing device, the terminal computing device, and the user computing device each comprise one or more integrated software applications that perform the operations comprising: (a) initiating a remote utilization demand through operations comprising (i) decoding a digital certificate received from a user computing device utilizing a shared key to create a received device identifier, (ii) comparing the received device identifier to a known device identifier stored to a network database, (iii) receiving system configuration data from the user computing device, (iv) comparing the system configuration data against known values stored to an identity management service database on a provider computing system, (v) when the received device identifier matches the known device identifier and when the system configuration data received from the user computing device matches the known values, generating a remote utilization demand comprising utilization demand data, wherein the utilization demand data comprises (A) utilization value data, and (B) utilization demand time code data, and (vi) transmitting the remote utilization demand to the network computing device; (b) receiving by a Resource Monitor software service running on the network computing device (i) the remote utilization demand, (ii) utilization demand metrics stored to a Utilization Demand Metrics database, wherein the utilization demand metrics comprise (A) utilization duration data, and (B) utilization threshold data, and (iii) availability database records stored to a Resource Database, wherein each availability data record comprises (A) resource value data, and (B) utilization event time code data; (c) executing a utilization threshold analysis by the Resource Monitor software service comprising the operations of (i) generating a threshold evaluation set of availability database records that includes availability database records having utilization event time code data that falls within a duration represented by the utilization duration data, (ii) generating current utilization data by aggregating the utilization value data with the resource value data for availability database records within the threshold evaluation set, and (iii) determining whether the aggregated utilization value data and resource value data exceeds the utilization threshold data; (d) generating by the network computing device, a utilization threshold message, (i) wherein the utilization threshold message comprises a demand fail command if the current utilization data exceeds utilization threshold data, and wherein (ii) the utilization threshold message comprises a demand pass command if the current utilization data does not exceed the utilization threshold data; and (e) transmitting the utilization threshold message to the terminal computing device for display to a user.
- 6 . The system for automated application of utilization thresholds of claim 5 , wherein (i) the user computing device further comprises an integrated private encryption key, and (ii) the processor utilizes the private key to encode the digital certificate transmitted by the user computing device.
- 7 . The system for automated application of utilization thresholds of claim 1 , wherein initiating a remote utilization demand comprises the further operations of: (a) receiving authentication data transmitted by the user computing device; and (b) comparing the authentication data against known values stored to an identity management service database on the provider computing system.
- 8 . A system for automated application of utilization thresholds comprising a network computing device and a terminal computing device, wherein the network computing device and the terminal computing device each comprise one or more integrated software applications that perform the operations comprising: (a) receiving by the network computing device, a remote utilization demand comprising utilization demand data, wherein the utilization demand data comprises (A) utilization value data, and (B) utilization demand time code data; (b) receiving by a Resource Monitor software service running on the network computing device (i) the remote utilization demand, (ii) utilization demand metrics comprising (A) utilization duration data, and (B) utilization threshold data, and (iii) availability database records, wherein each availability data record comprises (A) resource value data, and (B) utilization event time code data; (c) executing a utilization threshold analysis by the Resource Monitor software service comprising the operations of (i) generating current utilization data by aggregating the utilization value data with the resource value data for availability database records having utilization event time code data that falls within a duration represented by the utilization duration data, and (ii) determining whether the aggregated value data exceeds the utilization threshold data; (d) generating by the network computing device, a utilization threshold message, (i) wherein the utilization threshold message comprises a demand fail command if the current utilization data exceeds utilization threshold data, and wherein (ii) the utilization threshold message comprises a demand pass command if the current utilization data does not exceed the utilization threshold data; and (e) transmitting the utilization threshold message to the terminal computing device for display to a user, wherein (i) when the terminal computing device receives a demand fail command, the terminal computing device transmits a message to the user computing device having display data comprising content data for display by the user computing device, wherein the content data indicates that the utilization threshold data was exceeded and the remote utilization demand failed, and (ii) when the terminal computing device receives a demand pass command, the terminal computing device transmits a message to the user computing device having display data comprising content data for display by the user computing device, wherein the content data indicates that the utilization threshold data was not exceeded and the remote utilization demand passed.
- 9 . The system for automated application of utilization thresholds of claim 8 , wherein: (a) the Resource Monitor software service receives a terminal source categorization code from the terminal computing device, (b) the availability database records received by the Resource Monitor software service further comprise resource categorization data; (c) the utilization threshold data comprises utilization category threshold data; and (d) executing the utilization threshold analysis comprises the further operations of generating a threshold evaluation set by identifying and aggregating resource value data from only availability database records having resource categorization data that corresponds to the terminal source categorization code.
- 10 . The system for automated application of utilization thresholds of claim 8 , wherein: (a) the remote utilization demand comprises a utilization demand account identifier received from the user computing device; (b) the availability database records received by the Resource Monitor software service further comprise a available account identifier; (c) the utilization demand metrics further comprise utilization threshold account identifier data associated with the utilization threshold data, where the utilization threshold account identifier data identifies one or more user accounts; (d) the Resource Monitor software service performs the further operations of determining whether the utilization demand account identifier matches at least one user account identified by the utilization threshold account identifier data; and (e) executing the utilization threshold analysis comprises the further operations of generating the threshold evaluation set by identifying and including only availability database records having an available account identifier that matches at least one user account identified by the utilization threshold account identifier data.
- 11 . The system for automated application of utilization thresholds of claim 8 , wherein: (a) when the terminal computing device receives a demand fail command, the terminal computing device displays a message on a digital display device indicating that the remote utilization demand failed; and (b) when the terminal computing device receives a demand pass command, the terminal computing device displays a message on the digital display device indicating that the remote utilization demand passed.
- 12 . A system for automated application of utilization thresholds comprising a network computing device and a terminal computing device, and a user computing device comprising a processor and an integrated private encryption key, wherein the network computing device and the terminal computing device each comprise one or more integrated software applications that perform the operations comprising: (a) initiating a remote utilization demand through operations that comprise (i) the processor utilizes the private key to encode a digital certificate transmitted by the user computing device, (ii) decoding a digital certificate received from a user computing device utilizing a shared key to create a received device identifier, (iii) comparing the received device identifier to a known device identifier stored to a network database, (iv) when the received device identifier matches the known device identifier, generating a remote utilization demand comprising utilization demand data, wherein the utilization demand data comprises (A) utilization value data, and (B) utilization demand time code data, and (v) transmitting the remote utilization demand to the network computing device; (b) receiving by the network computing device, a remote utilization demand comprising utilization demand data, wherein the utilization demand data comprises (A) utilization value data, and (B) utilization demand time code data; (c) receiving by a Resource Monitor software service running on the network computing device (i) terminal data that comprises administrator identifier data generated by the terminal computing device, (ii) the remote utilization demand, (iii) utilization demand metrics comprising (A) utilization duration data, and (B) utilization threshold data, and (iv) availability database records, wherein each availability data record comprises (A) resource value data, and (B) utilization event time code data, and (C) transaction data; (d) executing a utilization threshold analysis by the Resource Monitor software service comprising the operations of (i) generating a threshold evaluation set by identifying and including only availability database records having transaction data that corresponds to the terminal administrator data, (ii) generating current utilization data by aggregating the utilization value data within the threshold evaluation set having the resource value data with event time code data that falls within a duration represented by the utilization duration data, (iii) determining whether the aggregated value data exceeds the utilization threshold data; (e) generating by the network computing device, a utilization threshold message, (i) wherein the utilization threshold message comprises a demand fail command if the current utilization data exceeds utilization threshold data, and wherein (ii) the utilization threshold message comprises a demand pass command if the current utilization data does not exceed the utilization threshold data; and (iii) transmitting the utilization threshold message to the terminal computing device for display to a user.
Description
TECHNICAL FIELD AND BACKGROUND The present invention relates generally to the field of effective and efficient management of distributed resource utilization, and more particularly, systems and methods for establishing, applying, and managing provisional utilization demand metrics that are customizable according to the needs of individual users. Individual users often desire to monitor and limit resource utilization over time to ensure future resource requirements are met effectively and efficiently. Monitoring and managing resource utilization, however, can be time consuming and challenging. Resource utilization typically occurs over significant time periods (e.g., days or weeks), is distributed across multiple locations (e.g., a user's residential network or external third-party terminals), and is dedicated for varying purposes (e.g., accomplishing work-related or personal tasks, among others). Resource availability must be frequently monitored, and lapses in monitoring typically result in over-utilization errors. Further, resource requirements are typically dynamic and change over time such that flat, static monitoring metrics do not accommodate the needs of individual systems users. To address the drawbacks of traditional techniques for managing resource utilization, disclosed herein are systems and methods that allow users to establish, apply, and manage utilization demand metrics that are customizable to individual users. The systems further allow resource utilization to be managed effectively, efficiently, and in a secure fashion using encryption and individual computing device authentication techniques. Moreover, some embodiments permit users to establish and apply utilization metrics created using artificial intelligence techniques that enhance the accuracy and customization of such metrics. SUMMARY According to one embodiment, a system for creating and applying resource utilization thresholds includes a network computing device, such as a server, that is operated by a provider. The system also includes a user computing device that can be a personal computer, cellular smart phone, or a “smart card” that includes an integrated microprocessor, memory, and software. The system further includes a terminal computing device operated by a third party and that interacts with the user computing device to implement a resource utilization transaction. The network computing device, terminal computing device, and user computing device each comprise one or more integrated software applications that perform operations to implement the current technology. As part of processing a resource utilization request, or demand, the user computing device and/or the user must be verified to ensure authenticity and security. The terminal computing device verifies the user computing device by receiving a certificate of authority from the user computing device that is encrypted using an encryption key stored by the user computing device. The terminal computing device decodes, or decrypts, the certificate authority using a public key, and the resulting data, called a received device identifier, can be confirmed by comparison to known values for the received device identifier. Once verified, the system generates a remote utilization demand, which is a request to utilize resources as part of a transaction between the user and the third party administering or operating the terminal computing device. The remote utilization demand includes utilization value data (i.e., a quantitative measure of resources that are the subject of the demand) and utilization demand time code data (i.e., a time and date corresponding to the remote utilization demand). The remote utilization demand is transmitted to the network computing device. A Resource Monitor software application running on the network computing device receives the remote utilization demand and retrieves utilization demand metrics stored to a Utilization Demand Metrics database, which is data relating to resource utilization thresholds placed upon individual user's requests to utilize resources. The utilization demand metrics include, without limitation, (i) utilization duration data representing a period of time over which resource utilization thresholds are applied, and (ii) utilization threshold data, which are quantitative limits placed on resource utilization. The Resource Monitor software application also retrieves or receives availability database records stored to a Resource Database on the provider network device. The availability database records include data relating to prior transactions that utilized resources, such as (i) resource value data (i.e., a quantitative measure of resources consumed by a transaction), (ii) utilization event time code data (i.e., the date and time of a transaction that utilized resources), (iii) an available account identifier (i.e., a user account number or other designation where the user account serves as a repository of resources), (iv) a u