To improve processing of the multi-event time-series data, information about each event type is aggregated for a group of time bins, such that an event bin embedding represents the occurring events of that type in the time bin. The event bin embedding may be based on an aggregated event value summarizing the values of that event type in the bin and a count of those events. The event bin embeddings across event types and time bins may be combined with an embedding for static data about the data instance and a representation token for input to an encoder. The encoder may apply an event-focused sublayer and a time-focused sublayer that attend to respective dimensions of the encoder. The model may be initially trained with self-supervised learning with time and event masking and then fine-tuned for particular applications.
Computational systems and methods are provided to automatically assess residual characteristics of an existing machine learning model to identify and determine suboptimal pockets and augmentation strategies. A computing system, device and method for optimizing a machine learning model for performing predictions is provided. The computing device performs sub-optimal pocket identification on an existing machine learning algorithm by residual analysis to calculate an error. The computing device utilizes the residual as a target for an ensemble tree model and automatically generates a set of interpretable rules from the tree based ensemble model that contribute to the suboptimal pockets. The rules indicating relationships between features and interactions as well as values for the sub-optimal pockets. The computing device determines optimizations for improving the machine learning model based on the interpretable computer-implemented rules.
One example method includes obtaining, based on network activity related to an object deployed within a networked environment, a number of threat events for the object and a corresponding set of severity scores. An aggregate risk score can be generated for the object based on the number of threat events and the corresponding severity scores. The aggregate risk score can be refined based on at least one weighting parameter to obtain an intermediate score. The intermediate score can be scaled, using a scaling function, to obtain an overall risk score that represents a value within a predefined numerical range. Access of the object to system resources can be controlled based on whether the overall risk score exceeds the predetermined risk threshold value, with access being allowed when the overall risk score exceeds the predetermined threshold and access being restricted when the overall risk score does not exceed the predetermined threshold.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
4.
DYNAMIC MODIFICATION OF DISPLAYED INTERFACE ELEMENTS BASED ON CONTEXTUAL DATA
The disclosed embodiments include computer-implemented systems and processes that dynamically and selectively modify portions of a displayed interface to include interface elements that, when selected by a user through a single provided input, initiate a performance of a data exchange in accordance with parameter values consistent with prior initiated data exchanges. For example, a communications device may display, on a display unit, a first interface element representative of a first data exchange and may receive expected values of parameters that characterize the second data exchange. When a determined parameter value is consistent with the expected parameter values, the communications device may modify the first interface element and present, on the display unit, the modified first interface element and a second interface element within the interface. Upon selection of the second interface element, the communications device may initiate the second data exchange in accordance with the expected parameter values.
A computer-implemented method is disclosed. The method includes: receiving an authentication request to authenticate a first entity to a service; in response to receiving the authentication request: generating a message for requesting the first entity to initiate a transfer of resources from a first data record; and transmitting the message to a first server that requires user authentication for the first entity to access the message; and generating a response to the authentication request based on a completion status of the requested transfer.
Computing platforms, methods, and storage media for providing multi-channel authentication are disclosed. Exemplary implementations may: receive, from a plurality of system access channels, authentication data related to a plurality of data transfers and to a plurality of users; consolidate the authentication data from the plurality of access channels to generate a set of consolidated authentication data; and generate a user interface, based on the set of consolidated authentication data, to enable execution of a centrally-provided authentication function at a selected system access channel for a selected user initiating a data transfer. An authentication hub according to an implementation may provide a common authentication experience and improved authentication for the plurality of access channels, which may include a telephone contact center, an in-person or branch location, and online services such as web-based or app-based.
There is provided a computer implemented method, system and device for automatically generating a machine learning model for forecasting a likelihood of compromise in one or more transaction devices and subsequently triggering performing an action on one or more related computing devices based on a potentially compromised transaction device.
A system, method, and memory for handling real-time transactional events is disclosed. The exemplary system a processor to detect and add an event to a queue and identify an associated event type. Event types can require downstream processing by at least one provider. The processor decomposes the event into tasks by comparison to event types which associate downstream provider requirements to tasks and routes. One or more routes are assigned to the tasks, each route defined by at least one processor of a plurality of processors. One or more routes are defined by transmitting a request for downstream processing to the at least one provider. The processor, upon detecting incomplete performance of the one or more routes, either updates the tasks associated with the incomplete route, or marks the event associated with the route as incomplete in the queue.
G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
9.
SYSTEM AND METHOD FOR GENERATING DATA TRANSFER RECOMMENDATIONS
A server computer system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to analyze historical data transfers within one or more resource accounts to generate a data budget; receive a signal indicating a data transfer request; analyze the data transfer request and, based on the data budget, determine an affordability of the data transfer; responsive to determining that the data transfer is not affordable from one of the resource accounts, generate one or more recommendations to afford the data transfer; and send, via the communications module and to a computing device, a signal causing the computing device to display a notification that includes the one or more recommendations to afford the data transfer.
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
10.
System And Method for Implementing Micro-Application Environments
A system, method, and computer readable medium for implementing micro-application environments is disclosed. The exemplary method includes providing a browser container (“browser”), and providing at least one micro-application for operating within the browser. The method includes providing a plug-in for the browser. The plug-in configured to listen to events originating in, or push events to, the at least one micro-application. The method includes storing, via the plug-in, documentation of events that each of the at least one micro-application subscribes to. The method includes determining, via the plug-in, occurrence of a first event, the first event being subscribed to by the at least one micro-application, and in response to determining the occurrence, generating, via the plug-in, a message to the at least one micro-application based on the event. The method includes executing, via the at least one micro-application, a new action in response to receiving the message.
Methods and computer systems for managing access to resources in a computing environment. Detecting a projected overload condition from a projected demand for a resource. Identifying a server associated with a resource demand scheduled to be fulfilled prior to the projected overload condition. Generating a rescheduling request to reschedule the resource demand until after the projected overload condition. Sending the rescheduling request to the identified server. Providing access to the resource at a rescheduled time.
A method may include: detecting a predicted resource availability condition associated with a first account by determining that an accumulated resource amount associated with a resource transfer expected to be scheduled to occur at a future time is expected to be available; in response to detecting the predicted resource availability condition, providing a selectable interface feature on a computing device, the selectable interface feature configured for inputting an early access instruction to request immediate release of at least a portion of the accumulated resource amount; receiving the early access instruction; and in response to receiving the early access instruction, sending a request-to-transfer message to a second account, the second account identified as being associated with the resource transfer expected to be scheduled to occur, the request-to-transfer message requesting a transfer of an amount of resources that is less than or equal to the accumulated resource amount.
Computing platforms, methods, and storage media for providing third party access to a co-branded product in a system are disclosed. In an example, a system may receive, at a system of a first entity, registration information of a user registered with a second entity. The system may comprise a record associating the user with a co-branded product jointly provided by the first entity and the second entity. The system may validate, using at least one hardware processor, the registration information at the system based on the record. The system may initiate, using the at least one processor, in response to a successful validation of the registration information, a new user session having a co-branded product session identifier where the new user session provides access to the user to the co-branded product in the system.
A computer-implemented method is disclosed. The method includes: detecting a trigger condition associated with a data record based on monitoring data record operations in connection with the data record; in response to detecting the trigger condition, generating a first message object for the data record, the first message object being associated with at least one compatible access channel; storing the first message object in a memory, the first message object being stored in association with a set of one or more message objects for the data record, wherein the first set defines an order for the one or more message objects; detecting a data record operation via a first access channel; retrieving, from the memory, at least one message object of the set that is associated with the first access channel; and causing the at least one message object to be delivered via the first access channel.
Computing platforms, methods, and storage media for performing an information technology security risk assessment are disclosed. Exemplary implementations may: provide a tool assessment interface for receiving model data associated with a software tool; obtain the model data for the software tool; perform a software tool risk assessment based on the model data and independent from the tool-specific functionality data; generate a model-based risk determination based on the software tool risk assessment; and output the model-based risk determination via the tool assessment interface. Exemplary implementations may use model data to perform a software tool risk assessment, rather than a model assessment, without requiring disclosure of confidential functionality details associated with the software tool, such as relating to artificial intelligence or machine learning. Exemplary implementations may pre-populate a first set of data in the interface and prompt a vendor to obtain a vendor-provided second set of model data via the interface.
A computer-implemented method is disclosed. The method includes: obtaining historical operations data for a resource account, the historical operations data identifying account operations performed by a user in connection with the resource account; generating display data for a graphical user interface for accessing the resource account, the display data including user interface elements associated with a first set of highest priority account operations that are selected based on the historical operations data for the resource account; obtaining user engagement data representing user interaction with the graphical user interface, the user engagement data identifying at least one account operation; identifying a second set of highest priority account operations based on the user engagement data; generating updated display data for the graphical user interface associated with the second set of highest priority account operations; and providing, to a client device for display thereon, the updated display data.
A computer server system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to obtain an indication of scheduled access to a first node class of a shared resource; determine that a second node class of the shared resource is available; and schedule access to the second node class of the shared resource in place of the scheduled access to the first node class of the shared resource.
The disclosed embodiments include computer-implemented processes that, using a distributed notarized ledger, constrain an ability of multiple parties to simultaneously, or near simultaneously, update or modify elements of reference data maintained within a centralized data store. For example, an apparatus may receive, from a first computing system, a request to modify reference data maintained at a second computing system. The apparatus may approve the first requested modification to the reference data based on a notarization criterion maintained within an element of a notarized distributed ledger, and perform operations that record notarization data characterizing the approved modification within an additional element of the notarized distributed ledger. The apparatus may also transmit the notarization data to the first computing system, and the notarization data causing an application program executed by the first computing system to modify local reference data in accordance with the notarization data.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
A computer-implemented method is disclosed. The method includes: receiving an initiation request for a data transfer associated with a terminal; determining that a resource external to the first logical storage area should be accessed to complete the data transfer; in response to determining that the resource external to the first logical storage area should be accessed to complete the data transfer, triggering a query message to an electronic device accessible to an entity associated with the first logical storage area, the query message prompting for an instruction to access the resource external to the first logical storage area to complete the transfer; receiving, from the electronic device, an instruction to access the resource external to the first logical storage area to complete the transfer; and in response to receiving the instruction, effecting the transfer using the resource external to the first logical storage area.
A computer-implemented method is disclosed. The method includes: sending, to a plurality of computing devices, an invitation containing a link to access a first electronic document in a first state; detecting a change in state of the first electronic document from the first state to a second state; identifying a first subset of the computing devices including devices that did not provide any indication of approval for the first electronic document and devices that have already received requests for updated approvals for the first electronic document; sending, to a second subset of the computing devices that are not included in the first subset, requests to provide indications of approval for the first electronic document in the second state; and responsive to receiving indications of approval for the first electronic document from computing devices of the second subset, generating a locked form of the first electronic document in the second state.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 16/176 - Support for shared access to files; File sharing support
G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
21.
SYSTEMS AND METHODS FOR PROVIDING PRODUCT RECOMMENDATIONS
A processor-implemented method is disclosed. The method includes: receiving input representing a request to connect a data record associated with a value transfer card with a first social networking account on a social networking platform, the request including authentication information for the first social networking account; transmitting, to a computing system associated with the social networking platform, a request to obtain social media data associated with the first social networking account; receiving, from the computing system associated with the social networking platform, the requested social media data; generating a personal preference profile based on the obtained social media data; obtaining, from computing systems associated with one or more third-party affiliate entities, product data for products that are exchangeable with stored value associated with the data record; and generating recommendations of product offers based on filtering the obtained product data using the personal preference profile.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 50/00 - Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
In an aspect, a method performed at a server includes: receiving an electronic message indicating an expected transfer, the message indicating at least a quantity of resources associated with the expected transfer and a value date associated with the expected transfer; detecting a trigger condition associated with the expected transfer; in response to detecting the trigger condition associated with the expected transfer, determining whether a transfer associated with the expected transfer has been made; and in response to determining that the expected transfer has not been made, providing a notification to a client device associated with a recipient of the expected transfer.
A computer-implemented method for providing location-based appointment operations is disclosed. The method includes receiving input indicating an instruction to perform an action related to appointments. Responsive to the input indicating the instruction to perform the action related to appointments, it may be determined that a computing device is proximate to a physical location where locations are schedulable. Then, responsive to determining that the computing device is proximate to the physical location, information related to scheduling appointments at the physical location is received via a network. The indication based on the received information is presented at the computing device. Input requesting an action in relation to an appointment at the physical location may be received at the computing device. An indication to initiate the requested action may be sent via the network. Related computing devices and computer-readable media are also disclosed.
G06Q 10/02 - Reservations, e.g. for tickets, services or events
G06K 7/14 - Methods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
H04M 1/72451 - User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to schedules, e.g. using calendar applications
24.
SYSTEM AND METHOD FOR REAL-TIME CHEQUE PROCESSING AND RETURN AT AN AUTOMATED TELLER MACHINE
An automated teller machine comprises a communications module; an image module; a processor; and a memory coupled to the processor storing instructions that, when executed by the processor, configure the processor to receive a first cheque for deposit; engage the image module to capture an image of the first cheque; send, via the communications module and to a server computer system, a signal that includes the image of the first cheque for acceptance; send, via the communications module and to an automated teller machine switch, a signal that includes a request for transaction authorization approval based on the first cheque; receive, via the communications module and from the server computer system, a signal that includes an indication of acceptance of the image of the first cheque; receive, via the communications module and from the automated teller machine switch, a signal that includes an indication of approval of the request for the transaction authorization based on the first cheque; and responsive to receiving the signal that includes the indication of acceptance of the image of the first cheque and the signal that includes the indication of approval of the request for the transaction authorization, return the first cheque.
A computer-implemented method is disclosed. The method includes: receiving, via a user device, input of parameters associated with a schedule item and a resource allocation; obtaining account data of a resource account associated with the user device; generating a first schedule of recommended activities for the schedule item based on the inputted parameters and the account data of the resource account, the first schedule identifying one or more activities and an order associated with the one or more activities; obtaining real-time context data associated with the user device; detecting a deviation from the first schedule based on the real-time context data; and in response to detecting the deviation, providing, via the user device, a first notification including indications of the detected deviation and a recommendation of a second schedule of activities.
Computing platforms, methods, and storage media for executing data processing tasks are disclosed. Exemplary implementations may: receive a plurality of serially executable software object tasks; obtain thread data associated with a plurality of available threads and machine data associated with a plurality of available machines; distribute the plurality of serially executable software object tasks for parallel execution via the plurality of available threads and on the plurality of available machines; and obtain and store shared thread data for the plurality of available threads, such that first thread status data associated with a first thread from the plurality of available threads is made available to a second thread from the plurality of available threads. Executing software tasks in parallel, even when the tasks were not designed to be executed in parallel, increases speed and execution of the software tasks, which uses less processing power and less memory compared to known approaches.
A system and method are provided for examining data from a source. The method is executed by a device having a processor and includes receiving a set of historical data and a set of current data to be examined, from the source. The method also includes generating multiple statistical models based on the historical data and a forecast for each model. The method also includes selecting one of the multiple statistical models based on at least one criterion, and generating a new forecast using the selected model. The method also includes comparing the set of current data against the new forecast to identify any data points in the set of current data with unexpected values. The method also includes outputting a result of the comparison, the result comprising any data points with unexpected values.
A server device, system, method, and for controlling access to project resources is disclosed. The disclosure includes a processor, and a communications module and a memory coupled to the processor. The memory, when executed by the processor, causes the processor to generate a plurality of zones for a project, each zone defining a set of access rights to: i) a database; and ii) at least one tool. The processor configures each set of access rights to allow a proxy service to access the zones, and receives, from a client device and via the proxy service, an access query to access at least one zone. The processor provides the client device access to, via the proxy service, the at least one dataset and at least one tool of the at least one zone.
H04L 47/762 - Admission control; Resource allocation using dynamic resource allocation, e.g. in-call renegotiation requested by the user or requested by the network in response to changing network conditions triggered by the network
A server computer system comprises a communications module; a processor coupled to the communications module; and a memory coupled to the processor, the memory storing processor-executable instructions which, when executed, configure the processor to store, in a database, an indication that digital receipts are to be provided for all purchases made on a payment card; receive, via the communications module and from a point-of-sale system, a signal requesting an indication that a digital receipt is to be provided for a purchase made on the payment card; consult the database to determine that the digital receipt is to be provided for the purchase made on the payment card; and send, via the communications module and to the point-of-sale system, a signal that includes the indication that the digital receipt is to be provided for the purchase made on the payment card.
A computer system comprises a communications module; a processor coupled to the communications module; and a memory coupled to the processor, the memory storing processor-executable instructions which, when executed, configure the processor to receive, via the communications module, a signal that includes an ownership key associated with a digital asset minted on a payment card network; store the ownership key associated with the digital asset in a digital wallet; send, via the communications module and to the payment card network, a signal that includes a request to perform an action on the digital asset using the ownership key; receive, via the communications module and from the payment card network, a signal that indicates permission for the action to be performed on the digital asset; and perform the action.
H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
In some aspects, a computing system may include a processor. Also, the computing system may include a communications module coupled to the processor. Furthermore, the computing system may include a memory coupled to the processor, the memory storing instructions that, when executed, configure the computing system to: determine a daily positive modifier amount based on an amount of positive adjustments to an account over an extended time period; determine a daily non-discretionary negative modifier amount based on an amount of non-discretionary negative adjustments to the account over the extended time period; determine a daily discretionary amount based on the daily positive modifier amount and the daily non-discretionary negative modifier amount; detect an expected negative modification event; and in response to detect the expected negative modification event, trigger a notification based on the daily discretionary amount.
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
Apparatus and methods for expanding a data transfer framework are disclosed. Exemplary implementations may: provide an ETL framework comprising a plurality of ETL modules and comprising code including variables; obtain a configuration file including data values to replace the variables for executing selected ETL modules, and including external command data configured to execute a new data transformation external to and absent from the ETL framework, the external command data including a reference to an external module generated in relation to an external interface; and execute the one or more selected ETL modules based on the code, the data values and the external command data. Exemplary implementations provide a flexible and expandable ETL framework that enable a new type of data transformation that is not currently supported by the framework, without having to modify the framework. The framework may impart native properties and characteristics of the framework to the external module.
There is provided a computer-implemented method for automatically managing storage resources of a distributed file system comprising: obtaining actual past storage usage data of a first directory from a plurality of directories of the distributed file system to a current time; detecting, a space quota limit for the first directory and associated with a pre-defined expected future time; determining from the actual past storage usage data, projected storage usage data of the first directory over a future time period; obtaining an aggregated correction coefficient providing an indication of aggregated projected storage usage needs of remaining other directories relative to the first directory; in response to determining an expected value of the projected storage usage data at the expected future time is inconsistent with the space quota limit, adjusting the space quota limit to a new quota limit based on the expected value weighted by the aggregated correction coefficient.
A computer-implemented method is disclosed. The method includes: receiving, via a client device, a resource transfer request for resources to be transferred to a transferee account; generating a secure data object based on request data of the resource transfer request, the secure data object including a first hash computed based on an input string comprising a transferee account identifier; signing the secure data object using a private key of a transferee resource account management system; and sending the signed secure data object to a messaging address associated with a transferor account.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
35.
System And Method for Managing Data Stored in A Remote Computing Environment
A system, method and memory for managing remotely stored data is disclosed. The system includes a processor, a communications module, and a memory. Instructions stored on the memory cause the processor to provide an agent within a remote computing environment (RCE) with access to data stored on the RCE and custom applications. Another agent on a local computing environment capable of communicating with the agent is provided. The other agent has access to configuration files. The other agent instructs the agent to execute custom applications based on the configuration files. The other agent receives metadata of the data in response to triggering the agent. The instructions cause the processor to populate, via the other agent, a catalogue of the plurality of data within the remote computing environment based on the received plurality of metadata, and provide the catalogue for display for reviewing the plurality of data.
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
36.
System and Method for Managing Data Stored in A Remote Computing Environment
A method, device and memory for providing access to remotely stored data is provided. The method includes providing an interface capable of communicating with a remote computing environment storing a plurality of data sets. The method includes receiving a request, via the interface, to access at data sets according to access parameters. The method includes applying a first set of masking parameters when the data sets are accessed via respective views. The method includes satisfying the request by granting access to the views associated with the data sets, without copying the data sets. The views enable data from the data sets to be viewed as masked according to the first set of masking parameters, and the views are masked according to a second set of masking parameters associated with the access parameters.
In an aspect a computer system is configured to: receive accelerated transfer definition data defining one or more conditions for accelerating a transfer; obtain a due date for completing the transfer; initiate the transfer in response to the earlier of: determining that at least one of the conditions for accelerating the transfer have occurred; and determining that a current date is within a defined proximity of the due date for completing the transfer.
A system for testing applications is disclosed. The system includes one or more processors, one or more communications modules coupled to the one or more processors to enable communications between services provided by the system, and at least one memory coupled to the one or more processors. The at least one memory stores computer executable instructions to enable a plurality of virtualized test services, each virtualized test service at least in part emulating dependent server responses to application operations. The instructions enable a load-balancing service for communication with the plurality of virtualized test services, and test an application based on a load, by directing the application to interact with the plurality of virtualized test services that are available, while avoiding communicating with the dependent servers during testing. The load-balancing service balances the testing of the application between the plurality of virtualized test services that are available.
A computer-implemented method is disclosed. The method includes: receiving a second request to create a first service object instance of a first service object; identifying a first set of service object instances that are related to the first service object instance based on at least a time associated with the first service object instance and a first service location; obtaining location data associated with a first set of service object instances; determining a geographical area associated with a second request based on the location data associated with the first set of service object instances and a first service location; and causing to be displayed, in a map interface, an interactive map UI element showing a map region corresponding to the geographical area, the map UI element including graphical representations of the first service object instance, the first set of service object instances, and a current location associated with the merchant.
A device, method and system for loading data into a remote computing environment is disclosed. The method includes receiving a request to load a new data set into a remote computing environment, the new data set impacting a data set stored thereon. The method includes identifying one or more changes to a current representation of the data set within the new data set, the one or more changes replacing information in the current representation. The method includes transmitting the identified one or more changes to a data store persisting the current representation. The method includes transmitting the replaced information to a data store persisting a previous representation of the data set. The method includes transmitting other information in the new data set that is determined to be invalid data to a data store persisting an invalid data set associated with the data set.
Computing platforms, methods, and storage media for data movement are disclosed. Exemplary implementations may: obtain a data transfer command including a table-based characterization of a set of data to be transferred; automatically determine, based on the table-based characterization of the data to be transferred, a set of files to be transferred; and initiate transfer of the set of files. In an implementation, data is moved at the table level, and the files associated with the specified tables/date range are automatically determined. A single command, which may reference a CSV file, may be used to efficiently and reliably transfer a large amount of data without a user having to specify the specific files to be transferred.
A system, device, and method for ingesting data into a remote computing environment are provided. The example device comprises a processor, a communications module, and a memory. The processor executes instructions on the memory to receive a data file, and extract metadata from the data file. The extracted metadata comprises at least one property of the data file. A configuration file, from a plurality of configuration files, that is associated with the data file is determined. The determination is performed, at least in part, based on correlating the extracted metadata with data file types used by the determined configuration file. The data file is ingested for storage in a remote computing environment based on the determined configuration file.
A computer server system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to obtain, from at least one big data source, a big data dataset that includes transaction data; categorize the transaction data into a number of data buckets; analyze the transaction data from at least one of the data buckets to generate at least one graphical user interface to display at least some of the transaction data from the at least one of the data buckets, the at least one graphical user interface including at least one selectable interface element to adjust a display of the graphical user interface; and send, via the communications module and to a computing device, the at least one graphical user interface for display.
G06F 3/04842 - Selection of displayed objects or displayed text elements
G06F 3/04845 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
44.
System, method, and device for uploading data from premises to remote computing environments
A system, method and device for ingesting data files into remote computing environments is disclosed. The method includes receiving a plurality of data files and processing same according to a modified round-robin (MRR) process. The MRR assigns data files for processing by determining which of a plurality of remote processors are active, and by determining an amount of queued processing for the active remote processors. The method includes assigning each data file of the plurality of data files to a remote processor of the plurality of remote processors based on the remote processor (1) being active, and (2) having a relatively lower amount of queued processing. The method includes instructing a storage writer to store processed data files.
A non-autoregressive transformer model is improved to maintain output quality while reducing a number of iterative applications of the model by training parameters of a student model based on a teacher model. The teacher model is applied several iterations to a masked output and a student model is applied one iteration, such that the respective output token predictions for the masked positions can be compared and a loss propagated to the student. The loss may be based on token distributions rather than the specific output tokens alone, and may additionally consider hidden state losses. The teacher model may also be updated for use in further training based on the updated model, for example, by updating its parameters as a moving average.
A computer server system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to monitor resource consumption data to identify a first resource type being provided to a resource requester at a periodic rate; identify a second resource type to replace or offset the first resource type at the periodic rate; and perform operations to automatically provide the second resource type to replace or offset the first resource type at the periodic rate.
A computer-implemented method is disclosed. The method includes: authenticating a user for login to a service for a first authenticated user session; in response to authenticating the user, sending, to a client device associated with the user, a first data string associated with a first validity period; receiving, from the client device after expiry of the first authenticated user session, a data access request to access protected data, the data access request including the first data string; validating the first data string based on checking the first validity period; and in response to determining that the first data string is valid, transmitting, to the client device, a data access response including at least a subset of the requested protected data.
A server computer system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to receive, via the communications module and from a remote computing device, a signal including a request to provision a data record for a service; select digital identity network verification as a primary verification technique; attempt verification using the primary verification technique; determine that verification using the primary verification technique has failed; responsive to determining that verification using the primary verification technique has failed, attempt verification using a secondary verification technique; determine successful verification using the secondary verification technique; and responsive to successful verification using the secondary verification technique, provision the data record for the service.
Systems and methods of determining whether to initiate a pull of an accumulated data transfer amount are described. An accumulated data transfer amount for a periodic data transfer scheduled to be pushed at a future date is determined. A determination is made of whether an overall data amount in a storage location is expected to be greater at a date on or after the scheduled future date if a pull of the accumulated data transfer amount is performed before the scheduled future date than if a pull operation is not performed and the accumulated data transfer amount is sent at the scheduled future date. When the overall data amount in the storage location is expected to be greater at the scheduled future date if the pull of the accumulated data transfer amount is performed, a pull of the accumulated data transfer amount is initiated.
An example operation may include one or more of storing transaction content from transactions executed via one or more fiat payment accounts and one or more crypto accounts of a digital wallet of a user, identifying historical usage characteristics of the one or more fiat payment accounts and the one or more crypto accounts from the stored transaction content, creating a security token for the user and embedding the historical usage characteristics within a storage area of the security token, executing a blockchain consensus process among a plurality of blockchain peers of a blockchain network to verify the security token, and committing the security token to a blockchain ledger of the blockchain network in response to verification of the security token.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
51.
API FOR INCREMENTAL AND PERIODIC CRYPTO ASSET TRANSFER
An example operation may include one or more of storing transaction content from transactions executed via one or more fiat payment accounts and one or more crypto accounts of a digital wallet of a user, and determining, via execution of a machine learning model on the stored transaction content, a recurring expense value of the user and a next point in time in which the recurring expense value, dividing the recurring expense value into a plurality of sub-values; generating a plurality of transactions which transfer the plurality of sub-values from a fiat payment account to a crypto account from among the one or more crypto accounts and store the plurality of transactions within a queue, initiating a plurality of time-to-live jobs for the plurality of transactions, respectively, wherein the plurality of time-to-live jobs comprise a plurality of different respective expiration times that are staggered such that the plurality of time-to live jobs expire in incremental intervals from a current time to the next point in time in which the recurring expense value is due and executing the plurality of transactions at the plurality of different expiration times to incrementally transfer the plurality of sub-values from the fiat account to a crypt account via an application programming interface (API).
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
The disclosed exemplary embodiments include computer-implemented systems, devices, and processes that securely distribute digital assets within a computing environment using permissioned distributed ledgers. For example, an apparatus may receive, from a computing system, an allocation request, a first digital signature applied to the allocation request, and a second digital signature applied to the allocation request and to the first digital signature. Based on a validation of the first and second digital signatures, the apparatus may approve the allocation request and allocate a digital asset to the first device in accordance with the approved allocation request. The apparatus may also perform operations that record a public key and asset data identifying a digital asset onto a distributed ledger, and may generate and transmit, to the first device, confirmation data indicative of the allocation of the digital asset to the first device.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06Q 30/0226 - Incentive systems for frequent usage, e.g. frequent flyer miles programs or point systems
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
53.
APPLICATION OF TRAINED ARTIFICIAL INTELLIGENCE PROCESSES TO ENCRYPTED DATA WITHIN A DISTRIBUTED COMPUTING ENVIRONMENT
The disclosed embodiments include computer-implemented processes that predict a credit score for a customer in real-time based on an application of a trained machine-learning or artificial-intelligence process to encrypted event data at a third-party computing cluster. For example, an apparatus may transmit encrypted event data to a third-party computing system. The third-party computing system may apply a trained artificial intelligence process to encrypted feature data that includes the encrypted event data, and the apparatus may receive, from the third-party computing system, encrypted output data representative of a predicted credit score during at least one temporal interval. The apparatus may decrypt the encrypted output data using a homomorphic decryption key, and transmit a notification that includes the decrypted output data to a device. An application program executed at the device may present a graphical representation of at least a portion of the decrypted output data within a digital interface.
A method and device for automating analysis of executed performance testing is disclosed. The device includes a processor, and a communications module and memory coupled to the processor. The memory stores computer executable instructions that when executed by the processor cause the processor to receive an input associated with executing a performance test of an application. The processor identifies a test analysis template from a plurality of test analysis templates based on the performance test or the application, each test analysis template defining analysis parameters for interpreting results of executed performance tests. The processor creates a session for analyzing a result of the performance test being executed. Within the analysis session, one or more models are applied to the result, where the one or more models are responsive to the analysis parameters. The processor generates a performance analysis report based on the applied one or more models.
The system, method, and device for simulating application performance prior to conducting performance testing is disclosed. The illustrative method includes obtaining results of a preliminary simulation, and processing the obtained results from the preliminary simulation, with a profiling tool, and generate a software model based on an output of the profiling tool. A workload model and a hardware model are configured to account for a desired scenario. A performance model is defined using the software model, the workload model, and the hardware model, and prior to testing the application, the performance model is used to simulate performance of the application in the desired scenario.
There is provided methods, systems and techniques for optimized anomaly prediction using machine learning. A data set is obtained which corresponds to a query for anomaly detection. Feature classification is performed along with anomaly labelling using an unsupervised clustering technique based on determining similar groups of data and behaviours and determining a distribution for a particular feature of interest in each cluster such as to apply a threshold to each cluster to extract the anomaly data and label same. Once the labelled dataset is generated, a tree classification model is trained based on the labelled data set for detecting anomaly. Once trained, a set of computing model rules may be extracted from the tree classification model to generate a rules executable for anomaly spotting to define combinations of feature characteristics resulting in outlier data so that the rules executable may be applied to new data.
A computer-implemented method is disclosed. The method includes: receiving a first request to initiate a first customer service session; establishing a primary web socket connection between a first web server and service agent terminal; establishing a first communication sub-channel associated with the primary web socket connection, the first communication sub-channel corresponding to the first customer service session; receiving a second request to initiate a second customer service session; in response to receiving the second request: establishing a second communication sub-channel associated with the primary web socket connection, the second communication sub-channel corresponding to the second customer service session.
A system and method are provided for executing a dynamic routing service. The method includes i) subscribing to ingress a first topic for a current task in a process workflow and ii) receiving a data object for the current task. The method also includes iii) querying a first service to determine a next workflow task, the next workflow task having been translated by the first service from a workflow graph to a file and data interchange format. The method also includes iv) updating the data object, v) routing the updated data object to a second topic by a message broker using the data interchange format, and vi) subscribing to ingress the second topic for a next task in the process workflow and repeating ii) to v) while the process workflow is being executed.
An image retrieval system receives an image for which to identify relevant images from an image repository. Relevant images may be of the same environment or object and features and other characteristics. Images in the repository are represented in an image retrieval graph by a set of image nodes connected by edges to other related image nodes with edge weights representing the similarity of the nodes to each other. Based on the received image, the image traversal system identifies an image in the image retrieval graph and alternatively explores and traverses (also termed “exploits”) the image nodes with the edge weights. In the exploration step, image nodes in an exploration set are evaluated to identify connected nodes that are added to a traversal set of image nodes. In the traversal step, the relevant nodes in the traversal set are added to the exploration set and a query result set.
G06F 16/583 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06V 10/75 - Image or video pattern matching; Proximity measures in feature spaces using context analysis; Selection of dictionaries
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06V 10/84 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using probabilistic graphical models from image or video features, e.g. Markov models or Bayesian networks
60.
System and Method for Managing Loyalty Program Accounts
A system and method are provided for managing loyalty program accounts. The method is executed by a device and includes providing, from the device, access to a loyalty wallet application. The method also includes storing loyalty account information for a plurality of loyalty accounts in the loyalty wallet application and integrating a loyalty tracking application, operable from the device, with at least one transaction channel accessed via the device. The method also includes receiving transaction data from the at least one transaction channel; detecting, from the transaction data, that a transaction yet to be executed is eligible for a loyalty reward associated with one or more of the plurality of loyalty accounts; and modifying the transaction to use corresponding loyalty account information to obtain the loyalty reward. The method also includes enabling the modified transaction to be completed to obtain the loyalty reward.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Systems and methods for preprocessing large inference files in a cluster environment prior to transmission to one or more downstream applications. The inference files are processed using templates that correspond to particular downstream applications, allowing for optimized transmission and optimized processing by each downstream application.
G06F 16/22 - Indexing; Data structures therefor; Storage structures
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
G06F 16/21 - Design, administration or maintenance of databases
G06F 16/25 - Integrating or interfacing systems involving database management systems
An example operation may include one or more of receiving a payment amount and an identifier of a recipient account from a digital wallet application of a user, the digital wallet application containing a payment card account and a cryptocurrency account, determining to perform a buy-now pay-later (BNPL) transaction for the payment amount based on current holdings in the payment card account and current holdings in the cryptocurrency account; transmitting, via a crypto-bridge application programming interface (API), fiat currency from the payment card account to a crypto exchange, receiving, via the crypt-bridge API, an amount of the cryptocurrency based on the payment amount and store the amount of cryptocurrency in the digital wallet application; generating an entry comprising a future date, the identifier of the recipient account, and a return value to retrieve from the crypto exchange at the future date, and storing the entry in the queue.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
63.
SECURE DISTRIBUTION AND MANAGEMENT OF CRYPTOGRAPHIC KEYS WITHIN A COMPUTING ENVIRONMENT USING DISTRIBUTED LEDGERS
The disclosed exemplary embodiments include computer-implemented systems, devices, and processes that securely distribute and manage cryptographic keys within a computing environment using permissioned distributed ledgers. By way of example, an apparatus may receive a registration request and a first digital signature applied to the registration request from a device. Based on a validation of the first digital signature, the apparatus may approve the registration request and apply a second digital signature to the registration request and the first digital signature. In some examples, the second digital signature may be indicative of the approval of the registration request by the apparatus. The apparatus may also transmit the registration request and the first and second digital signatures to a computing system, which may validate the first and second digital signatures and perform operations that record a public cryptographic key of an application program executed at the device onto a distributed ledger
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06Q 30/0226 - Incentive systems for frequent usage, e.g. frequent flyer miles programs or point systems
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
64.
CRYPTO-BRIDGE FOR AUTOMATING RECIPIENT DECISION ON CRYPTO TRANSACTIONS
An example operation may include one or more of receiving a payment amount and an identifier of a recipient account from a digital wallet, predicting, via a machine learning model, a future value of a cryptocurrency based on historical values of the cryptocurrency over time, determining to perform a BNPL transaction for the payment amount based on the predicted future value of a cryptocurrency stored within the digital wallet application of the user, transmitting, via a crypto-bridge API, fiat currency from a fiat account of the user to a crypto exchange and receiving an amount of the cryptocurrency based on the payment amount and storing the amount of cryptocurrency in the blockchain wallet, generating an entry comprising a future date, the identifier of the recipient account, and a return value to retrieve from the crypto exchange at the future date, and storing the entry in the queue.
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 30/02 - Marketing; Price estimation or determination; Fundraising
65.
SYSTEM AND METHOD FOR PROVIDING RESTRICTED TOKEN USAGE DURING AN ONBOARDING PHASE
Systems and methods for providing restricted token usage during an onboarding phase are disclosed. A request to generate a token via an onboarding system may be received from a first entity. A token may then be generated and associated with a special handling instruction to enable temporary usage of the token by the onboarding system but to prevent usage by other systems. The token may then be provided to the first entity via the onboarding system. A change may then be detected in a status of the token. In response to detecting the change in status of the token, the special handling instruction associated with the token may be removed.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
66.
CONFIGURING DATA TRANSFERS BASED ON ELECTRONIC MESSAGES
Configuring data transfers based on electronic messages. A system includes a communication module, a processor, and a memory. The memory stores instructions that, when executed, configure the processor to: receive, from a client device, an authentication credential and associate the authentication credential with a client record. The processor identifies, based on delegated access to query a message account at a message server, a resource request message associated with the message account using a defined criteria. The processor obtains, based on the resource request message, a resource parameter to define a proposed resource transfer to a recipient entity. The processor generates and transmits, to the client device, a transfer request alert based on the proposed resource transfer for display at the client device. In response to receiving, from the client device, a selection of a selectable option, the processor allocates a resource to the recipient entity.
A server computer system comprises a communications module; a processor coupled to the communications module; and a memory coupled to the processor, the memory storing processor-executable instructions which, when executed, configure the processor to obtain, via the communications module, automated teller machine session data; generate a first checksum based on at least the automated teller machine session data; and store the first checksum and the automated teller machine session data in a database.
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
A computer model is trained to account for data samples in a high-dimensional space as lying on different manifolds, rather than a single manifold to represent the data set, accounting for the data set as a whole as a union of manifolds. Different data samples that may be expected to belong to the same underlying manifold are determined by grouping the data. For generative models, a generative model may be trained that includes a sub-model for each group trained on that group's data samples, such that each sub-model can account for the manifold of that group. The overall generative model includes information describing the frequency to sample from each sub-model to correctly represent the data set as a whole in sampling. Multi-class classification models may also use the grouping to improve classification accuracy by weighing group data samples according to the estimated latent dimensionality of the group.
G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
G06V 10/762 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using clustering, e.g. of similar faces in social networks
69.
DISTRIBUTED MODEL TRAINING WITH COLLABORATION WEIGHTS FOR PRIVATE DATA SETS
Model training systems collaborate on model training without revealing respective private data sets. Each private data set learns a set of client weights for a set of computer models that are also learned during training. Inference for a particular private data set is determined as a mixture of the computer model parameters according to the client weights. During training, at each iteration, the client weights are updated in one step based on how well sampled models represent the private data set. In another step, gradients are determined for each sampled model and may be weighed according to the client weight for that model, relatively increasing the gradient contribution of a private data set for model parameters that correspond more highly to that private data set.
According to an aspect there is provided an ambient commerce system. The ambient commerce system may include a sensor at an ambient commerce premises, a communication module, and a processor coupled to the sensor and the communication module. The ambient commerce system further includes a memory coupled to the processor. The memory stores processor-executable instructions which, when executed, cause the processor to: detect, based on an output of one or more of the sensors, an unauthenticated entity at an ambient commerce premises; receive, from a first independent trusted system and via the communication module, an indication that authentication has been performed by the first independent trusted system for the unauthenticated entity using a first authentication parameter; determine that the entity is an authenticated entity based on the indication that the authentication has been performed and at least a second authentication parameter; and perform an ambient commerce operation for the authenticated entity.
A model evaluation system evaluates the extent to which privacy-aware training processes affect the direction of training gradients for groups. A modified differential-privacy (“DP”) training process provides per-sample gradient adjustments with parameters that may be adaptively modified for different data batches. Per-sample gradients are modified with respect to a reference bound and a clipping bound. A scaling factor may be determined for each per-sample gradient based on the higher of the reference bound or a magnitude of the per-sample gradient. Per-sample gradients may then be adjusted based on a ratio of the clipping bound to the scaling factor. A relative privacy cost between groups may be determined as excess training risk based on a difference in group gradient direction relative to an unadjusted batch gradient and the adjusted batch gradient according to the privacy-aware training.
A model evaluation system evaluates the extent to which privacy-aware training processes affect the direction of training gradients for groups. A modified differential-privacy (“DP”) training process provides per-sample gradient adjustments with parameters that may be adaptively modified for different data batches. Per-sample gradients are modified with respect to a reference bound and a clipping bound. A scaling factor may be determined for each per-sample gradient based on the higher of the reference bound or a magnitude of the per-sample gradient. Per-sample gradients may then be adjusted based on a ratio of the clipping bound to the scaling factor. A relative privacy cost between groups may be determined as excess training risk based on a difference in group gradient direction relative to an unadjusted batch gradient and the adjusted batch gradient according to the privacy-aware training.
Probability density modeling, such as for generative modeling, for data on a manifold of a high-dimensional space is performed with an implicitly-defined manifold such that points belonging to the manifold is the zero set of a manifold-defining function. An energy function is trained to learn an energy function that, evaluated on the manifold, describes a probability density for the manifold. As such, the relevant portions of the energy function are “filtered through” the defined manifold for training and in application. The combined energy function and manifold-defining function provide an “energy-based implicit manifold” that can more effectively model probability densities of a manifold in the high-dimensional space. As the manifold-defining function and the energy function are defined across the high-dimensional space, they may more effectively learn geometries and avoid distortions due to change in dimension that occur for models that model the manifold in a lower-dimensional space.
A system and method are provided for persisting data generated in executing a process workflow. The method is executed by a device having a communications module and includes receiving via the communications module messages exchanged in executing the process workflow by a message broker. The method also includes using a writer service to disassemble each received message into multiple properties according to a database schema and persist the received message in a database according to the database schema via the communications module. The method also includes using a reader service to access the database and assemble the multiple properties of a first persisted message, in response to a read request received via the communications module, wherein the reader service is separate from the writer service.
A computer server system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to receive, via the communications module and from a requesting device, a signal that includes a request to send a stored-value card to a recipient, the request identifying one or more parameters of the stored-value card; generate the stored-value card and a three-dimensional object representing the stored-value card according to the one or more parameters; and send, via the communications module and to a mobile device of the recipient, a signal that includes the three-dimensional object representing the stored-value card for display in augmented reality.
G06T 19/00 - Manipulating 3D models or images for computer graphics
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
A computer-implemented method is disclosed. The method includes: receiving, via a browser application on a computing device, a request to retrieve a first web page from a web server; determining that the first web page is associated with a first merchant; in response to determining that the first web page is associated with the first merchant: obtaining historical transactions data of a resource account associated with the computing device; determining a first allocation of resources associated with the resource account; detecting a user action in the browser application for interacting with the web page; in response to detecting the user action in the browser application: identifying at least one product associated with the merchant based on the detected user action; generating a notification associated with the identified at least one product based on the historical transactions data of the resource account and the first allocation of resources; and providing, to the computing device for display in the browser application, the generated notification.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
G06Q 40/06 - Asset management; Financial planning or analysis
77.
SYSTEMS AND METHODS FOR AUTOMATED DATA PROCESSING USING MACHINE LEARNING FOR VEHICLE LOSS DETECTION
A data processing system comprising: inputting a tiled image of a vehicle including four different angle views of the vehicle combined into a single image to a first machine learning model (e.g. CNN), the model trained based on historical image data to predict a first likelihood of total loss vehicle; inputting a multi-fusion of images each into a second set of machine learning models; the multi-fusion of images including a set of separate and distinct images for each of the views input separately into the second set of machine learning models, and extracting features to predict a second likelihood of total loss vehicle; inputting tabular data relating to the vehicle into a third machine learning model to predict a third likelihood of total loss vehicle for the vehicle; and aggregating the first, second and third likelihood of total loss vehicle to determine the overall likelihood of total loss.
G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
G06V 10/80 - Fusion, i.e. combining data from various sources at the sensor level, preprocessing level, feature extraction level or classification level
G06V 10/26 - Segmentation of patterns in the image field; Cutting or merging of image elements to establish the pattern region, e.g. clustering-based techniques; Detection of occlusion
Computing platforms, methods, and storage media for processing instructions associated with one or more data transfers are disclosed. Exemplary implementations may: obtain, by the apparatus, input data associated with a set of data transfer requests, the input data including a plurality of records; generate, by the apparatus and based on the input data and in the absence of a visual representation of the plurality of records, link presence indicators for the input data by automatically creating indications of presence of links between the plurality of records based on one or more of the plurality of variables; and create, by the apparatus and for storage in a memory, a set of linked data based on the input data and the generated linking relationships. Exemplary implementations focus on whether, rather than how, items are linked together, in an automated and scalable approach, and may perform analytics on the links and entities.
An example operation may include one or more of receiving, via a host platform, a payment authorization request message for a payment transaction of a digital wallet hosted by the host platform from a payment gateway of an electronic payment network, verifying that a payment account in the digital wallet has sufficient funds to satisfy an amount of the payment transaction and transmitting a payment authorization response to the payment gateway, pausing clearing and settling of the authorized payment transaction, executing a blockchain transaction via a blockchain ledger of a cryptocurrency network to exchange fiat currency from the payment account for cryptocurrency based on the amount of the payment transaction, prior to a due date of the authorized payment transaction, executing a second blockchain transaction to exchange the cryptocurrency for a new amount of fiat currency, and settling the authorized payment transaction based on the new amount of fiat currency received from the second blockchain transaction.
G06Q 40/04 - Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
An authorization control network includes a limit profile database and at least one computer server. The server(s) receives an account identifier and a datum from a communications device, and associates the datum with the account identifier in a limit profile record of the limit profile database. The server(s) also receives the account identifier and a transaction limit, and associates the transaction limit with the account identifier in the limit profile record. The server(s) then receives from a POS device an authorization request that includes the account identifier and an authorization amount. If the server(s) confirms that the authorization amount does not exceed the transaction limit that is associated with the account identifier in the limit profile record and does not exceed an available credit limit that is associated with the account identifier, the server(s) transmits to the POS device an authorization response that confirms authorization of the authorization amount.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
Systems and methods for optimizing multi-stage data machine learning model processing, by providing an intermediate processing step to identify or filter records in voluminous inference data that meet a predetermined threshold. Multiple downstream processes can be optimized by applying multiple thresholds to the voluminous inference data.
An example operation may include one or more of receiving, via a host platform of a digital wallet, a payment authorization request message for a payment transaction of the digital wallet from a payment gateway of an electronic payment network, verifying that the digital wallet has sufficient funds to satisfy an amount of the payment transaction and transmitting a payment authorization response to the payment gateway, pausing clearing and settling of the authorized payment transaction, generating an entry that represents the authorized payment transaction and storing the entry in a temporary storage structure of the host platform, executing a cryptocurrency transaction which exchanges cryptocurrency for an amount of fiat currency that satisfies the amount of the payment transaction, and canceling the authorized payment transaction and settling the payment transaction based on the amount of fiat currency received from the cryptocurrency transaction.
G06Q 40/04 - Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
A server comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to send, via the communications module and to a remote computing device, a signal causing the remote computing device to display a unique code and a telephone number; monitor at least one instant messaging account associated with the telephone number for the unique code; after determining that the unique code has been received at the at least one instant messaging account associated with the displayed telephone number, determine that authentication for a particular account has been successful; and in response to determining that authentication for the particular account has been successful, initiate an authenticated session.
A computer-implemented method is disclosed. The method includes: receiving, via a first computing device, a login request for a resource account; authenticating a user associated with the login request to an account session of the resource account; receiving, via the first computing device during the account session, a trade request for performing a first trading action in connection with a tradeable object; in response to receiving the trade request: granting, to the first computing device, time-limited access to an account operation for the resource account, the first account operation associated with defined first trade parameters for the first trading action; receiving, via the first computing device, user input for initiating the first account operation at a first time; validating the first account operation based on verifying eligibility of the first trading action and validity of the account session at the first time; and in response to validating the first account operation, cause the first trading action to be executed based on processing the first account operation.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
In an aspect, the present application describes a computer system. The computer system includes a communications module and a processor coupled to the communications module. The computer system include a memory coupled to the processor storing instructions that, when executed by the computer system, cause the computer system to: receive, from an automated teller machine (ATM) and via the communications module, an indication of a deposit of a value instrument; save, in the memory, a retention instruction including an associated temporal period, the retention instruction preventing withdrawal of value instruments corresponding to an amount of the deposit; receive, via the communications module, an instruction to process a data transfer to a recipient, the data transfer to the recipient accessing at least a portion of the deposit; and process the data transfer to the recipient during the temporal period using at least a portion of the deposit.
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G07F 19/00 - Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
86.
SYSTEM AND METHOD FOR ENABLING ONE OR MORE TRANSFER FEATURES ASSOCIATED WITH A REAL-TIME TRANSFER PROTOCOL
A server computer system, comprises a processor; a communications module coupled to the processor; and a memory coupled to the processor, the memory storing instructions that, when executed, configure the processor to receive, via the communications module and from a client device, a signal including a request to configure a transfer of data to a particular data record; determine that the particular data record is associated with a third party server; obtain a trust score associated with the particular data record; determine that the trust score satisfies trust criteria; and responsive to determining that the trust score satisfies trust criteria, enable one or more transfer features associated with a real-time transfer protocol.
H04L 67/06 - Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
A computer system for automatically handling and releasing funds for deposit items has a memory storing instructions that, when executed by a processor, cause the system to receive an image of a cheque received and scanned by an automated teller machine (ATM) for deposit into a first account of an institution associated with the ATM. The scanned image of the cheque is analyzed to identify an institution and account on which that cheque is drawn. If that account has sufficient available funds to cover the cheque, then the first account is credited in the amount of the cheque without placing a hold on any of the credited amount and funds of the account on which the cheque is drawn are encumbered in that same amount. After crediting the first account, an indication is provided that the funds are available (e.g., to withdraw). Related methods and computer-readable media are also disclosed.
G07F 19/00 - Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
A system and method are provided for integrating external services into process workflow environments. The method can include subscribing to one or more topics in an external domain coupled to at least one external microservice to be notified of incoming messages, the topics in the external domain being mapped to topics in an internal domain coupled to a message broker for routing messages within the internal domain. The method can also include subscribing to the one or more topics in the internal domain to be notified of outgoing messages to the at least one external microservice and detecting an incoming message published to a first topic by a first external microservice. The method can also include sending the incoming message to the first topic of the internal domain, detecting an outgoing message from the first topic or a second topic of the internal domain, and publishing the outgoing message to the first external microservice or another external microservice via a corresponding topic in the external domain.
A computer-implemented method of providing a recommendation as to a fault determination for a motor vehicle collision is disclosed. The method may include receiving unstructured text describing the circumstances of the collision. The unstructured text is evaluated an associated intent related to the circumstances of the motor vehicle collision is identified. The intent is mapped to an internal node of a decision tree corresponding to a set of fault-determination rules. The computer then successively prompts and receive input responsive to the prompting that corresponds to details of the circumstances of the collision. The computer may identify, based on the received input, a path through the decision tree ending at a leaf node that corresponds to a fault-determination rule governing motor vehicle collisions that matches the circumstances of the motor vehicle collision. The recommendation is then provided based on that rule. Related systems and computer-readable media are also disclosed.
G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
A text-video recommendation model determines relevance of a text to a video in a text-video pair (e.g., as a relevance score) with a text embedding and a text-conditioned video embedding. The text-conditioned video embedding is a representation of the video used for evaluating the relevance of the video to the text, where the representation itself is a function of the text it is evaluated for. As such, the input text may be used to weigh or attend to different frames of the video in determining the text-conditioned video embedding. The representation of the video may thus differ for different input texts for comparison. The text-conditioned video embedding may be determined in various ways, such as with a set of the most-similar frames to the input text (the top-k frames) or may be based on an attention function based on query, key, and value projections.
The present disclosure involves systems, software, and computer implemented methods for generating new credit accounts for immediate availability for use in current online transaction. One example process includes identifying, at a merchant application, a request to perform a credit application process associated with a particular user via a client application. The credit application process is associated with a financial institution, and the merchant application stores a set of user accounts, each associated with a merchant-specific identifier identifying the particular user profile at the merchant. An interactive application is presented within the merchant application, and information associated with the completed application is transmitted to an API associated with the financial institution with the merchant-specific identifier of the associated user. A payment credential for a newly created credit account is received, and can be associated with the user profile corresponding to the merchant-specific identifier.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
The present disclosure involves systems, software, and computer implemented methods for automatically generating acquisition IDs and using them to track and record how products are identified, offered, and sold, as well as how customers respond to particular variations of product offers. The acquisition ID can be associated with any product sale, transaction completion, or account creation initiated using or otherwise identifying or associated with the acquisition ID, where the connection to the acquisition ID can be maintained and retained with ongoing records associated with the interaction and created account, transaction, and/or product purchase. Using the stored information and the acquisition IDs, an organization can precisely determine what products were sold using which marketing tactic, campaign, or channel through which the transaction occurred and/or was initiated, among others.
A method of generating recommendations for a collective profile, the collective profile being linked to a first profile and a second profile. The method may include authenticating a login request from an end user device in association with the collective profile based on credentials associated with the first profile, identifying a query from among a plurality of queries and transmit the query to the end user device, receiving a response to the query, determining that the response is not inconsistent with one or more earlier responses received in association with the second profile and, in response, refining at least one attribute or goal in the collective profile based on the response to generate and store a refined collective profile, and determining whether the refined collective profile results in a new recommendation and, if so, outputting the new recommendation.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06F 16/9035 - Filtering based on additional data, e.g. user or group profiles
94.
DYNAMIC AND CRYPTOGRAPHICALLY SECURE AUGMENTATION OF PARTICIPANTS IN PROGRAMMATICALLY ESTABLISHED CHATBOT SESSIONS
The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that dynamically and securely augment participants in programmatically established chatbot sessions. For example, an apparatus may obtain messaging data generated during a first communications session involving a first device and based on the messaging data, detecting an occurrence of an event that triggers an establishment of a second communications session involving the first device and a second device. The apparatus may generate and transmit, to the second device, notification data causing the second device to validate one or more authentication credentials, and may receive confirmation data indicative of the one or more validated authentication credentials from the second device. Based on the confirmation data, the apparatus may perform operations that establish the second communications session in accordance with at least a portion of the messaging data.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
H04L 65/1069 - Session establishment or de-establishment
H04L 51/04 - Real-time or near real-time messaging, e.g. instant messaging [IM]
The present disclosure involves systems, software, and computer implemented methods for automatically controlling access and limiting functionality of a computer workstation based on which user is currently logged in. In some implementations, an overwatch application is installed on the workstations to be controlled and monitored. If an authorized, but limited, user logs in, the overwatch application can initiate a lockdown process on the workstation. In some instances, the lockdown process is managed by a dedicated lockdown application, which is initiated or notified from the overwatch application, and which can initiate a lockdown of particular applications, functionality, and allowed interactions on the workstation until the limited user has completed their task and a new user logs in.
A processor-implemented method is disclosed. The method includes: receiving, from a media data source, video data associated with a video; obtaining metadata from the received video data, the metadata including text associated with video content of the video; identifying one or more tradeable objects associated with the video based on the metadata; determining one or more segments of the video corresponding to the one or more identified tradeable objects, the one or more video segments having respective playback start timestamps; generating, for display on a client device, one or more user interface elements corresponding to the one or more video segments, the one or more user interface elements being selectable to initiate playback of the respective video segments; receiving, via the client device during playback of the video, a first user input selecting a user interface element corresponding to a first one of the video segments; in response to receiving the first user input: generating supplementary display data associated with a first tradeable object corresponding to the first video segment; and sending, to the client device, the supplementary display data.
H04N 21/845 - Structuring of content, e.g. decomposing content into time segments
G06F 16/783 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06F 16/78 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
A processor-implemented method is disclosed. The method includes: obtaining sensor readings from a plurality of sensors associated with a plurality of homes; receiving, from a computing device associated with a first one of the plurality of homes, a request for a live home score; determining, based on first sensor readings for at least one sensor associated with the first one of the plurality of homes and second sensor readings from corresponding sensors associated with at least a second one of the plurality of homes, a live home score for the first one of the plurality of homes; and sending the live home score to the computing device associated with the first one of the plurality of homes.
Systems and methods of determining whether to initiate a pull of an accumulated data transfer amount are described. An accumulated data transfer amount for a periodic data transfer scheduled to be pushed at a future date is determined. A determination is made of whether an overall data amount in a storage location is expected to be greater at a date on or after the scheduled future date if a pull of the accumulated data transfer amount is performed before the scheduled future date than if a pull operation is not performed and the accumulated data transfer amount is sent at the scheduled future date. When the overall data amount in the storage location is expected to be greater at the scheduled future date if the pull of the accumulated data transfer amount is performed, a pull of the accumulated data transfer amount is initiated.
The present disclosure involves systems, software, and computer implemented methods for generating new credit accounts for immediate availability for use in current online transaction. One example process includes identifying a request to perform a credit application process associated with a particular user via a client application. A first signal can be transmitted that includes a redirect instruction for the client application to a credit application site to perform a credit application process. A second signal can be transmitted that includes a merchant-specific identifier of the particular user and a request to perform the credit application process. A third signal can be received from the credit application site that includes an approval, a payment credential associated with a newly created credit account, and the merchant-specific identifier of the particular user. The payment credential can be associated with the user profile of the user corresponding to the merchant-specific identifier.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
A system and method are provided for testing application. The method is executed by a device having a communications module and includes initiating via the communications module, an application testing tool, to test an application build according to at least one metric and obtain a test result. The method also includes accessing via the communications module, session details generated by the application testing tool while testing the application build, to determine an overhead component introduced by the application testing tool in generating the test result. The method also includes adjusting the test result based on the overhead component to increase an accuracy of the test result.