CPC G06Q 10/0631 (2013.01) [H04L 63/08 (2013.01)] | 20 Claims |
1. A computer implemented method for secure resource allocation, the method comprising:
obtaining, at a resource allocation system, information from a qualifying entity regarding a second entity from a first device associated with the qualifying entity;
determining, by the resource allocation system, a set of historical data describing historical resource management of the second entity from a database;
analyzing, using a trained-learning algorithm, the set of historical data to weigh items of the set of historical data to create a weighted set of historical data;
determining, by the resource allocation system, a set of resource management pre-committal parameters for the second entity based on the weighted set of historical data;
receiving, at the resource allocation system, a request for a resource allocation on behalf of the second entity from the qualifying entity, the request for a resource allocation including a set of resource allocation parameters;
determining, by the resource allocation system, a resource allocation offer for the second entity, including offer parameters based upon the resource management pre-committal parameters and the resource allocation parameters, the resource allocation offer including a plurality of inter-dependent offer parameters;
sending, from the resource allocation system, a notification to a first entity in response to a notification initiation from the qualifying entity, the notification prompting the first entity to install a resource allocation system application on a second device, wherein the second device is associated with or owned by the first entity, wherein the second entity is an organization and the first entity is at least one of an agent or an employee of the second entity and is authorized to bind the second entity, and wherein the first entity is not employed by or an agent of the qualifying entity;
causing installation of the resource allocation system application on the second device associated with or owned by the first entity;
authenticating, in a first security protocol, the first entity by:
validating a credential, wherein validating the credential includes capturing information from the credential and submitting the information from the credential to a third-party database for verification of the information; and
comparing a captured image of the first entity on the second device to an image of the first entity on the validated credential;
creating a user profile for the first entity in response to the authenticating;
verifying, in a second security protocol, that the first entity is authorized to act on behalf of and bind the second entity, wherein verifying the first entity includes sending a verification request to a third device, separate from the first device and the second device, the third device associated with or owned by an authorized representative associated with the second entity, the verification request requesting that the authorized representative associated with the second entity attest that the first entity is the at least one of an agent or employee of the second entity and is authorized to bind the second entity, wherein the verification request includes:
generating, using the resource allocation system, a digital authorization;
transmitting, using the resource allocation system, the digital authorization to the third device to be digitally signed by the authorized representative; and
receiving the digitally signed authorization from the third device;
responsive to receiving the digitally signed authorization from the third device, linking at least one of: the information obtained from the qualifying entity regarding the second entity, the set of historical data, the set of resource management pre-committal parameters, the request for a resource allocation, or the resource allocation offer to the user profile for the first entity;
receiving an acceptance of the resource allocation offer from the first entity on behalf of the second entity, the acceptance including a selection of ones of the plurality of inter-dependent offer parameters, and wherein the acceptance is made by the first entity on the second device associated with or owned by the first entity; and
causing a resource to be allocated for the second entity based on the accepted resource allocation offer by the first entity on behalf of the second entity.
|