CPC G06Q 20/02 (2013.01) [G06Q 20/308 (2020.05); G06Q 20/401 (2013.01)] | 16 Claims |
1. A computer-implemented method, comprising:
registering a user device and a first internet-of-things (IOT) device for use in a transaction-by-proxy service;
configuring the user device to control the first IOT device by utilizing the registration of the user device as a control device and the registration of the IOT device as non-control device;
utilizing a device identifier and an application programming interface identifier for each device during the registration of the user device and the first IOT device;
collecting behavior-related data associated with a user of the user device and the first IOT device;
generating an access hub for the user to utilize the transaction-by-proxy service, the access hub being configured to allow the user to access and control the transaction-by-proxy service; and
using the behavior-related data as part of the transaction-by-proxy service to generate a transaction-by-proxy at the first IOT device on behalf of the user of the user device, wherein in order to determine whether to approve a request for the transaction-by-proxy, a transaction-by-proxy accuracy score is compared to a transaction-by-proxy accuracy threshold.
|