System for creation of alternative path to resource acquisition
First Claim
1. A system for establishing access protocols for access to a resource across a dispersed Internet protocol capable network connecting devices electrically attached to the network, the system comprising:
- at least one memory storing a resource prediction application;
at least one processing device operatively coupled to the memory device, wherein the at least one processing device is configured to execute computer-readable program code to;
determine resource utilization profile associated with a user, wherein the resource utilization profile comprises information associated with one or more resources allocated to the user across the dispersed network;
continuously monitor the resource utilization profile of the user to track the use of the one or more resources allocated to the user over a predetermine period of time;
determine one or more elevated usage instances based on at least continuously monitoring the resource utilization profile of the user;
predict, via the resource prediction application, that at least one of the one or more elevated usage instances is scheduled to occur;
determine one or more resources across the dispersed network for the user for processing during the at least one of the one or more elevated usage instances;
initiate a control path connection on a network layer between one or more computing devices attached to the dispersed network and at least one distributed server;
receive, from a user computing device, an indication from a user to access a resource, wherein the resource is associated with the one or more resources, wherein the user computing device is associated with the one or more computing devices, wherein the resource is associated with a predetermined threshold authorization level required to access the resource;
transmit control signals configured to cause a display device of the user computing device to display a first user interface on the user computing device, wherein the first user interface further comprises an option for the user to establish an authorization profile;
receive, via the first user interface, a user acknowledgement to establish the authorization profile;
determine one or more access paths associated with an authorization model to enable the user to establish the authorization profile;
transmit control signals configured to cause a display device of the user computing device to display a second user interface on the user computing device, wherein the second user interface comprises the one or more access paths associated with the authorization model to enable the user to establish the authorization profile;
determine an authorization level associated with the authorization profile;
determine that the authorization level associated with the authorization profile is greater than a predetermined threshold authorization level required to access the resource; and
reallocate the resource to the user based on at least determining that the authorization level associated with the authorization profile is greater than a predetermined threshold authorization level required to access the resource.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, computer program products, and methods are described herein for access to a resource across a dispersed Internet protocol capable network connecting devices electrically attached to the network. The present invention is configured to receive an indication from a user to access a resource; display a first user interface on the user computing device, wherein the first user interface further comprises an option for the user to establish an authorization profile; receive a user acknowledgement to establish the authorization profile; determine one or more access paths associated with an authorization model to enable the user to establish the authorization profile; and display a second user interface on the user computing device, wherein the second user interface comprises the one or more access paths associated with the authorization model to enable the user to establish the authorization profile.
-
Citations
20 Claims
-
1. A system for establishing access protocols for access to a resource across a dispersed Internet protocol capable network connecting devices electrically attached to the network, the system comprising:
-
at least one memory storing a resource prediction application; at least one processing device operatively coupled to the memory device, wherein the at least one processing device is configured to execute computer-readable program code to; determine resource utilization profile associated with a user, wherein the resource utilization profile comprises information associated with one or more resources allocated to the user across the dispersed network; continuously monitor the resource utilization profile of the user to track the use of the one or more resources allocated to the user over a predetermine period of time; determine one or more elevated usage instances based on at least continuously monitoring the resource utilization profile of the user; predict, via the resource prediction application, that at least one of the one or more elevated usage instances is scheduled to occur; determine one or more resources across the dispersed network for the user for processing during the at least one of the one or more elevated usage instances; initiate a control path connection on a network layer between one or more computing devices attached to the dispersed network and at least one distributed server; receive, from a user computing device, an indication from a user to access a resource, wherein the resource is associated with the one or more resources, wherein the user computing device is associated with the one or more computing devices, wherein the resource is associated with a predetermined threshold authorization level required to access the resource; transmit control signals configured to cause a display device of the user computing device to display a first user interface on the user computing device, wherein the first user interface further comprises an option for the user to establish an authorization profile; receive, via the first user interface, a user acknowledgement to establish the authorization profile; determine one or more access paths associated with an authorization model to enable the user to establish the authorization profile; transmit control signals configured to cause a display device of the user computing device to display a second user interface on the user computing device, wherein the second user interface comprises the one or more access paths associated with the authorization model to enable the user to establish the authorization profile; determine an authorization level associated with the authorization profile; determine that the authorization level associated with the authorization profile is greater than a predetermined threshold authorization level required to access the resource; and reallocate the resource to the user based on at least determining that the authorization level associated with the authorization profile is greater than a predetermined threshold authorization level required to access the resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computerized method for establishing access protocols for access to a resource across a dispersed Internet protocol capable network connecting devices electrically attached to the network, the method comprising:
-
determining, using a computing device processor, resource utilization profile associated with a user, wherein the resource utilization profile comprises information associated with one or more resources allocated to the user across the dispersed network; continuously monitoring, using a computing device processor, the resource utilization profile of the user to track the use of the one or more resources allocated to the user over a predetermine period of time; determining, using a computing device processor, one or more elevated usage instances based on at least continuously monitoring the resource utilization profile of the user; predicting, using a computing device processor, that at least one of the one or more elevated usage instances is scheduled to occur; determining, using a computing device processor, one or more resources across the dispersed network for the user for processing during the at least one of the one or more elevated usage instances; initiating, using a computing device processor, a control path connection on a network layer between one or more computing devices attached to the dispersed network and at least one distributed server; receiving, from a user computing device, an indication from a user to access a resource, wherein the resource is associated with the one or more resources, wherein the user computing device is associated with the one or more computing devices, wherein the resource is associated with a predetermined threshold authorization level required to access the resource; transmitting, using a computing device processor, control signals configured to cause a display device of the user computing device to display a first user interface on the user computing device, wherein the first user interface further comprises an option for the user to establish an authorization profile; receiving, via the first user interface, a user acknowledgement to establish the authorization profile; determining, using a computing device processor, one or more access paths associated with an authorization model to enable the user to establish the authorization profile; transmitting, using a computing device processor, control signals configured to cause a display device of the user computing device to display a second user interface on the user computing device, wherein the second user interface comprises the one or more access paths associated with the authorization model to enable the user to establish the authorization profile; determining, using a computing device processor, an authorization level associated with the authorization profile; determining, using a computing device processor, that the authorization level associated with the authorization profile is greater than a predetermined threshold authorization level required to access the resource; and reallocating, using a computing device processor, the resource to the user based on at least determining that the authorization level associated with the authorization profile is greater than a predetermined threshold authorization level required to access the resource. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A computer program product for establishing access protocols for access to a resource across a dispersed Internet protocol capable network connecting devices electrically attached to the network, the computer program product comprising a non-transitory computer-readable medium comprising code causing a first apparatus to:
-
determine resource utilization profile associated with a user, wherein the resource utilization profile comprises information associated with one or more resources allocated to the user across the dispersed network; continuously monitor the resource utilization profile of the user to track the use of the one or more resources allocated to the user over a predetermine period of time; determine one or more elevated usage instances based on at least continuously monitoring the resource utilization profile of the user; predict, via the resource prediction application, that at least one of the one or more elevated usage instances is scheduled to occur; determine one or more resources across the dispersed network for the user for processing during the at least one of the one or more elevated usage instances; initiate a control path connection on a network layer between one or more computing devices attached to the dispersed network and at least one distributed server; receive, from a user computing device, an indication from a user to access a resource, wherein the resource is associated with the one or more resources, wherein the user computing device is associated with the one or more computing devices, wherein the resource is associated with a predetermined threshold authorization level required to access the resource; transmit control signals configured to cause a display device of the user computing device to display a first user interface on the user computing device, wherein the first user interface further comprises an option for the user to establish an authorization profile; receive, via the first user interface, a user acknowledgement to establish the authorization profile; determine one or more access paths associated with an authorization model to enable the user to establish the authorization profile; transmit control signals configured to cause a display device of the user computing device to display a second user interface on the user computing device, wherein the second user interface comprises the one or more access paths associated with the authorization model to enable the user to establish the authorization profile; determine an authorization level associated with the authorization profile; determine that the authorization level associated with the authorization profile is greater than a predetermined threshold authorization level required to access the resource; and reallocate the resource to the user based on at least determining that the authorization level associated with the authorization profile is greater than a predetermined threshold authorization level required to access the resource. - View Dependent Claims (17, 18, 19, 20)
-
Specification