Systems, methods, and apparatuses for providing a central location to manage permissions provided to third-parties and devices to access and use user data and to manage accounts at multiple entities. A central portal may allow a user to manage all access to account data and personal information as well as usability and functionality of accounts. The user need not log into multiple third-party systems or customer devices to manage previously provided access to the information, provision new access to the information, and to manage financial or other accounts. A user is able to have user data and third-party accounts of the user deleted from devices, applications, and third-party systems via a central portal. The user is able to impose restrictions on how user data is used by devices, applications, and third-party systems, and control such features as recurring payments and use of rewards, via a central portal.
A computer-implemented method performed by a depository computing system includes receiving a check deposit and a withdrawal request associated with a customer account of a customer where the customer account is associated with a first amount and the withdrawal request comprises a second amount greater than the first amount, forwarding an inquiry message regarding the check deposit to a paying computing system, determining real time account status information of a payor account of a payor, and authorizing in real time relative to when the real time account status information is accessed, the withdrawal request for the second amount where the authorization occurs prior to settlement of the check deposit.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
Automated configuration and deployment of models for projects of business enterprises. A model deployment configuration framework includes a template generated at a user interface. The template prompts a user to select model configuration aspects and model operating factors, and submit the selected aspects and factors to configure and deploy the model in a computing environment of the enterprise's computer system for packaging, training, scoring, and/or auditing the model in connection with a project of the enterprise.
Techniques described herein include performing a distributed device trust determination that includes determining trust scores for customer devices across multiple organizations. In one example, this disclosure describes a method that includes receiving data of a user device event including an organization confidence level for a user device associated with the user device event; updating common data in an entry for the user device in a device registry based on the received data of the user device event and the organization confidence level for the user device; determining a common confidence level for the user device based on the common data in the entry for the user device in the device registry; and outputting the common confidence level for the user device for use by the computing device of the first organization to determine how to handle an access request from the user device.
A computer system includes a token repository configured to store payment tokens, and a server system. The server system includes a processor and instructions stored in non-transitory machine-readable media, the instructions configured to cause the server system to receive a request to provision a payment token based on a financial product, wherein the request includes information related to the financial product, provision a payment token based on the token request, including authenticating the financial product based on the financial product information and generating the payment token upon authenticating the financial product, wherein the payment token is useable to make a payment via the financial product, and store the payment token in the token repository.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
6.
SYSTEMS AND METHODS FOR PASSWORDLESS LOGIN VIA A CONTACTLESS CARD
A method includes receiving, from a customer device while the customer device depicts a login page for an account, information regarding the customer device including a customer device token and information regarding the contactless card including an encrypted contactless card token that is received by the customer device from a contactless communication with the contactless card; authenticating, while the customer device depicts the login page for the account, a customer associated with the contactless card based on the information regarding the customer device, an indication that the customer has logged into the customer device, and the information regarding the contactless card by: decrypting the encrypted contactless card token; identifying the customer; verifying that the customer is logged in to the customer device; and providing access to the account by sending an instruction to the customer device to display online account information in place of the login page.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G06F 21/33 - User authentication using certificates
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
7.
BILLER CONSORTIUM ENROLLMENT AND TRANSACTION MANAGEMENT ENGINE
A method for coordinating billing requests and payments across different financial institutions includes receiving an electronic enrollment request by a biller exchange computing system from a customer computing device; displaying an interactive control on a user interface of the customer computing device configured to collect customer authentication data for the biller; transmitting the customer authentication data to a remote computing system associated with the biller; causing the remote computing system to generate a customer-biller account authentication token that authorizes the biller exchange computing system to perform financial transactions with the biller on behalf of the customer; and authenticating, by the biller exchange computing system, a transaction request received from the customer computing device for a transaction between the customer and the biller based on the customer-biller account authentication token.
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Systems, apparatuses, methods, and computer program products are disclosed for at least semi-automated generation of model documentation. In an example embodiment, a template corresponding to a model is selected. User input populating portions of a build notebook is received. The build notebook comprises a model identifier identifying the model and executable code. The build notebook is executed using an execution engine to cause an intermediary file encoded in a type-setting system to be generated. Executing the build notebook causes cross-references of elements of the model documentation to be mapped to appropriate locations within the intermediary file. The elements comprise graphical representations of results of model tests executed on the model and/or extracted or user-defined artifacts required for the model documentation. The intermediary file is executed using a type-setting system compiler to assemble user-provided text and the elements, in accordance with the template, to generate the model documentation.
An automated teller machine (ATM) allows a user with accounts at both a first institution and a second institution to use an ATM of the first institution to physically place cash or a check into the ATM of the first institution for deposit into an account at the second institution. In some cases, a failed attempt message may indicate a funds transfer failed due to a network connectivity issue, an inactive payee account, or an expired payee account number. In case of a network connectivity issue, the funds transfer may be reinitiated. In case of an inactive payee account or expired payee account number, funds may be transferred to the first account instead of the second account. The ATM may display an indication of the failed attempt and a confirmation of a transfer to the first account.
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G07F 19/00 - Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
10.
AUTOMATED MANAGEMENT OF APPLICATIONS FOR NETWORK FAILURES
A centralized application management computing system is described that is configured to generate digital dog tag files for local storage on each computing device of a plurality of computing devices (e.g., data center servers) within the enterprise network. The computing system is configured to periodically retrieve, from one or more sources within the enterprise network, application information for one or more applications hosted on a given computing device of the plurality of computing devices. The computing system is configured to periodically generate, based on the application information, a digital dog tag file for the given computing device that includes recovery information for the one or more applications hosted on the given computing device. The computing system is further configured to send the digital dog tag file for local storage at a predefined location on the given computing device.
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
H04L 41/069 - Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
A system and method for card control includes a card control computing system configured to enforce a card control rule based upon transactions made with a payment card. The card control computing system includes a memory unit configured to store information associated with a card control dashboard, and a processing unit configured to cause presentation of the card control dashboard via a display associated with a remote computing device, such that the card control dashboard is associated with the payment card and the card control rule. The card control dashboard includes a user interface. The processing unit is further configured to receive an input via the user interface to activate or deactivate one or more features associated with the card control rule, and trigger the card control rule based upon the one or more features that are activated or deactivated.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
A system and method for card control includes a card control computing system configured to enforce a card control rule based upon transactions made with a payment card. The card control computing system includes a memory unit configured to store information associated with a card control dashboard, and a processing unit configured to cause presentation of the card control dashboard via a display associated with a remote computing device, such that the card control dashboard is associated with the payment card and the card control rule. The card control dashboard includes a user interface. The processing unit is further configured to receive an input via the user interface to activate or deactivate one or more features associated with the card control rule, and trigger the card control rule based upon the one or more features that are activated or deactivated.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
Disclosed is an approach for generating interactive visualizations for multi-nodal transfers that may involve terminal nodes and multiple transitional nodes by using various protocols to acquire data from computing systems or devices associated with each node. A first visualization layer comprising a set of geographic or physical indicators in a multi-nodal transfer route (which comprises a set of three or more nodes) may be generated. API protocols (and/or non-API protocols) corresponding to each node in the transfer route may be identified. The protocols may be executed to obtain, from computing systems and devices associated with the nodes, data packets used to generate a second visualization layer, which may comprise graphics that visually depict details of a transfer along the transfer route. An overlay of visualization layers may be displayed such that the graphics are displayed in association with multiple nodes.
A biometric electronic signature authenticated key exchange (“BESAKE”) token processing system. The system includes a storage location having a plurality of biometric reference templates. The system further includes an authentication computing system having a processor and instructions. The instructions configured to cause the authentication computing system to receive a signing party identifier and the BESAKE token from a signing party. The BESAKE token having a biometric sample encrypted using an encryption key. The instructions further configured to generate a decryption key and decrypt the encrypted biometric sample from the BESAKE token. The instructions further configured to match the biometric sample with a biometric reference template and transmit to a biometric service provider computing system a match request. The instructions further configured to determine a signing party identity via a binary match value. The binary match value relating to a result of matching the biometric sample with the biometric reference template.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
Systems and methods that facilitate operational support for network infrastructures are discussed. The disclosed system and method facilitate a unified view of the current state of the network and networked devices including real-time log monitoring and for providing metrics for long term system planning. One such method can include the acts of automatically discovering a device deployed on a network, receiving device and network related data in real-time, determining whether a device is authorized, terminating device network access, filtering device data, validating device configuration, configuring a device and providing an output for use by a user. The disclosed system and method can be utilized, for example, to reduce the time involved in troubleshooting and resolving network issues, for establishing a baseline for network performance and for network capacity planning.
A data structure is specialized in efficiently representing a key-value pair in a highly optimized way. The data structure is a pointer in a traversal graph that takes advantage of constant time traversal for all operations. The data structure has specific instructions for inserting data nodes, router nodes, and how the expansion or collapse of the graph works. The data structure can be applied where the time to get the result back is most prominent. The data structure can be used to reduce the memory footprint to reach the data that is being searched and achieve a worst-case time complexity in constant time.
G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
A method for managing a communication session includes receiving a request to perform a task. The task is divided into one or more steps. One or more user devices are identified that can be used to perform one or more of the steps. One or more communication channels are identified that are available to the one or more user devices. The communication session is permitted to switch from one or more of the user devices and communication channels to complete the one or more steps of the task while maintaining a continuity of the communication session.
In some examples, a landing device is configured to be disposed within a container receptacle of a pneumatic transport system, the landing device comprising: a landing platform defining a landing surface for a container of the pneumatic transport system, the landing platform comprising: a first material configured to at least partially deform in response to the container impacting the landing surface; and a second material disposed over the first material, the second material configured to facilitate removal of the container from the container receptacle; and a base mechanically connected to a second surface of the landing platform, the base configured to secure the landing device to the container receptacle, wherein the landing device is configured to be inserted into the container receptacle without removing one or more components of the container receptacle.
A method includes receiving a request to open an account associated with a customer, information regarding the account, and a mobile device identifier. The mobile device identifier is received from a third-party computing system based on a first wireless communication between the mobile device and the third-party computing system. The method includes validating the mobile device as belonging to the customer based on the received mobile device identifier and binding the mobile device identifier to the customer based on the validation. The method includes establishing the account for the customer based on the received information regarding the account and generating a token for the account. In response to establishing the account and generating the token, the token is provided to the third-party computing system and provisioned to the validated mobile device via a second wireless communication between the mobile device and the third-party computing system.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
Systems, apparatuses, methods, and computer program products are disclosed for post-quantum cryptography (PQC). An example method includes receiving data. The example method further includes receiving a set of data attributes about the data. The set of data attributes comprises one or more sets of data environment data attributes that are each representative of a set of data environments associated with the data. The example method further includes receiving one or more sets of data environment threat data structures associated with one or more data environments in the one or more sets of data environments associated with the data. The example method further includes selecting one or more cryptographic techniques for encrypting the data for at least the one or more data environments based on the set of data attributes, the one or more sets of data environment threat data structures, and a cryptograph optimization machine learning model.
An example computer system for capturing security information can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to create: a dashboard engine programmed to generate a dashboard with the security information thereon; a remediation engine programmed to track remediation of one or more security vulnerabilities; and a report generator engine programmed to generate a report including the security information and the one or more security vulnerabilities, wherein dissemination of the report is controlled.
A system for managing an electronic loan application can include: a loan information pane listing financial information associated with a loan transaction, the financial information including details of the loan transaction and an indicator of a status of an attribute of the loan transaction; an action pane listing upcoming actions associated with the loan transaction; and an assets pane listing assets associated with the loan transaction, the assets pane including: a list with each of the assets, including identification of each of the assets; and a statement pane for a selected asset of the assets, the statement pane listing items associated with a statement for the selected asset, with each of the items including a status indicator and a highlighted excerpt from the statement.
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
A method for identifying security vulnerabilities in a third party software component includes generating a test application for the third party software component. The test application is generated such that every externally accessible data path in the third party component is called. The test application and the third party software component are analyzed using a static application security testing (SAST) code analyzer. One or more test results are obtained from the SAST code analyzer. The one or more test results are used to identify security vulnerabilities in the third party component.
The innovation disclosed and claimed herein, in one aspect thereof, comprises systems and methods of determining network segmentation. The innovation can search a network to determine a set of network entities, the network entities belonging to the network, and determine network factors of each network entity in the set of network entities. The innovation can evaluate each network factor and determine segmentation candidates based on the evaluation of each network factor. The innovation can determine a risk ranking for each network factor for each network entity and aggregate each risk ranking into a segmentation score for each network entity. The innovation can determine a segmentation candidate when a network entity segmentation score satisfies a threshold score. The innovation can generate a sub-network that is part of the network for the segmentation candidate, and transfer the segmentation candidate to the sub-network.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
A distributed computing system includes a blockchain comprising a plurality of blockchain services comprising an oracle service, a predictive analytics service, a loan service, and a consensus service. The oracle service configured to receive input data comprising at least one of financial data associated with at least one of the plurality of syndicate participants, macroeconomic data, geo-location data, disaster data, or public health data. The predictive analytics service configured to utilize the input data to determine whether a first syndicate participant of the plurality of syndicate participants has an excess of funds and whether a second syndicate participant of the plurality of syndicate participants has a lack of funds where the first syndicate participant is different than the second syndicate participant. The loan service configured to facilitate a loan agreement between the first syndicate participant and the second syndicate participant. The consensus service enabling a consensus process used to agree on a validity of data transactions that are recorded by the blockchain such that the consensus service maintains a replicating ledger within the distributed computing system.
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
Systems and methods provide for authenticating a user attempting to make a payment using a piezoelectric device are disclosed herein. In an embodiment, the piezoelectric device can be embedded on a credit card, debit card, or other form of payment card and signals generated by the piezoelectric device can be used to authenticate the user when making the payment. For example, the user can squeeze or manipulate the piezoelectric device in a specific predetermined pattern and the resulting electric charge or induced current generated by the piezoelectric device can facilitate transmitting a signal to a point of sale device, and the point of sale device can authenticate the user based on the signal. In other embodiments, the piezoelectric device can contain circuitry and/or logic that can authenticate the user and send a confirmation signal to the point of sale device to authenticate the payment.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
28.
IDENTITY VERIFICATION SERVICES WITH IDENTITY SCORE THROUGH EXTERNAL ENTITIES VIA APPLICATION PROGRAMMING INTERFACE
The described financial institution computing system provides services to customers through an application programming interface (“API”). The services include user identification services to customers. The user identification services allow the customers to verify the identity of users as non-fraudulent users. Further the user identification services allow the financial institution to provide known user information to the customers for purposes of prepopulating registration forms, completing transactions, and the like. Further services, such as user account validation services, payment services, and the like are also possible through the financial institution APIs. In some situations, users are registered with the financial institution. For example, a user may also be an account holder with the financial institution. In other situations, the users are not registered with the financial institution.
A method for completing jammed transactions at a transaction device by a computing system includes receiving partial transaction information related to an interrupted transaction, storing a physical document associated with the interrupted transaction at a receptacle such that the transaction device is operable to receive additional documents, receiving a first data packet associated with the interrupted transaction from a computing device where the first data packet includes image data captured by the computing device, determining additional transaction information based on the first data packet, and executing operations related to the interrupted transaction based on the additional transaction information.
G07D 11/237 - Means for sensing or detection for detecting malfunctions for detecting transport malfunctions, e.g. jams or misfeeds
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G07F 19/00 - Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
A system includes a portable locker configured to contain contents and a remote server. The portable locker is configured to prevent access to the contents until the portable locker arrives at a preset destination from a starting location and notify a remote server in response to a determination that the portable locker is not within a threshold range of a user device during transit to the predefined destination.
An automated teller machine comprising a sensor, a network interface, and a processor configured to receive, during a transaction at the automated teller machine, user data from the sensor configured to monitor user movement information during the transaction, receive, via the network interface, user data from a mobile device, determine a risk of a fraudulent transaction based on a comparison of the user movement information from the sensor and the user data from the mobile device to expected parameters, determine that the risk of a fraudulent transaction is below a threshold, and allow access to a secure resource at the automated teller machine.
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
An example system places control and choice of managing the usage of private data into the hands of the users themselves. In some examples, the disclosed data privacy management system allows users to select preferences on how their private data is used by the business, both internally and externally. For example, the system may present users with one or more selectable options regarding how the user's private data is used. The system may then use the user's data for purposes that are in line with the user's selected preferences.
Techniques are described for performing complaint prioritization using one or more machine learning models for customer communications. For example, a computing system includes a memory and one or more processors in communication with the memory. The one or more processors are configured to receive communication data indicative of a service inquiry from a user device, generate a set of emotion factor values that indicate a measure of particular emotions in the service inquiry, determine, using a machine learning model and based on the set of emotion factor values, an emotional priority score for the service inquiry, and determine a response priority order for the service inquiry based on at least the emotional priority score.
A computing system includes a network interface circuit and a processing circuit configured to receive a plurality of issuer ratings associated with issuers from a plurality of analyst devices, wherein the plurality of issuer ratings include qualitative ratings, generate numerical quality ratings for the issuers based on the qualitative ratings of the issuers, receive a plurality of investment parameters from a manager device, the plurality of investment parameters defining characteristics of a custom investment strategy, generate a dataset regarding securities issued by the issuers based on the numerical quality ratings of the issuers, the dataset including securities issued by the issuers having a numerical quality rating over a pre-determined value, generate the custom investment strategy by selecting securities from the dataset based on the numerical quality ratings and the plurality of investment parameters, and provide the custom investment strategy to the manager device.
G06Q 40/00 - Finance; Insurance; Tax strategies; Processing of corporate or income taxes
G06F 16/22 - Indexing; Data structures therefor; Storage structures
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
G06Q 30/0282 - Rating or review of business operators or products
H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
35.
Systems and methods for automated teller machine-based communication
Systems, and methods for communicating during a calamity include a processing system of a first ATM that is communicably coupled via an ATM network to a second ATM. The first ATM includes an external network connection separate from the ATM network. The processing system can modify the first ATM from a first mode to a second mode responsive to detecting an event indicative of a calamity. The processing system can receive a user input to send a message to an address. The processing system can transmit the message to the second ATM via the ATM network, to cause the second ATM to route the message to the address. The processing system can receive a response to the message via the ATM network from the second ATM. The processing system can display the response to the message on a user interface of the first ATM.
G07F 19/00 - Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G07D 11/235 - Means for sensing or detection for detecting malfunctions
G07D 11/26 - Servicing, repairing or coping with irregularities, e.g. power failure or vandalism
A technological approach can be employed to protect data. Datasets from distinct computing environments of an organization can be scanned to identify data elements subject to protection, such as sensitive data. The identified elements can be automatically protected such as by masking, encryption, or tokenization. Data lineage including relationships amongst data and linkages between computing environments can be determined along with data access patterns to facilitate understanding of data. Further, personas and exceptions can be determined and employed as bases for access recommendations.
Evaluating computers, devices, or endpoints on a network, such as a large network of computers in an enterprise environment. Detecting computers, devices, or endpoints that may present a security risk to the network or may be compromised in some way. Generating network traffic that, in some cases, should be ignored or should prompt specific, known responses. Detecting endpoint(s) that respond to such network traffic in an anomalous way, or otherwise attempt to perform certain operations based on such network traffic.
Systems, methods, and apparatuses of creating a repair token for a distributed ledger are provided. A method includes identifying an error in the distributed ledger via a computing system. The error is associated with a first block on the distributed ledger. The method further includes creating the repair token having content of the first block and a correction to the error via the computing system.
G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
39.
Management of requests to provider systems for performing functions within a distributed computing system
An example method includes identifying provider systems each configured to perform a function requested by a device, wherein the provider systems are associated with vendors that provide one or more of services, goods, or device skills, responsive to selecting a provider system, sending, to the provider system, the request to perform the function, after sending the request to the provider system, receiving, by the management system and from the provider system, provider response information associated with performance of the function, sending, by the management system and to the device, the provider response information associated with performance of the function, and initiating a payment of funds from a first financial system associated with the device to a second financial system associated with the provider system.
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
The validity of a mail item containing a monetary solicitation is determined. An image is received of the mail item and the image is analyzed to identify a plurality of data fields within the mail item. The validity or invalidity of the data within each of the plurality of identified data fields is then established, and a user-interactive image overlay is generated for the image of the mail item that includes a validity indicator for each of the plurality of identified data fields. The validity indicator is representative of the validity or invalidity of the data within each of the identified plurality of data fields. The user-interactive image overlay is sent to a user device to display the image of the mail item.
A method, user device, and computer-readable storage media for registering and activating accounts is provided. One method includes transmitting a first input from a user regarding opening an account at an institution, establishing a communication session based on exchanging encryption keys between the user device and the computing system, in response to establishing the communication session, automatically installing a client application, displaying, via the client application, a graphical user interface (GUI) including a request for a user verification, transmitting, via the communication session, a received user verification, receiving a second input to add the account a mobile wallet on the user device, prompting the user for a value regarding the account, and receiving and storing, via the communication session, a payment token for transactions via the mobile wallet before a physical card associated with the account of the computing system is received.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G07F 7/10 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card together with a coded signal
A method includes receiving, by an identity provider computing system, a user token from a third party provider, wherein the user token is associated with a user of the identity provider computing system; sending, by the identity provider computing system, a prompt to a user device associated with the user token, the prompt requesting authentication information; authenticating, by the identity provider computing system, the user token based on receipt of the requested authentication information; receiving, by the identity provider computing system, user device information from the third party provider; identifying, by the identity provider computing system, related user activity based on the user device information; and authenticating, by the identity provider computing system, the user based on the related user activity and the authentication of the user token.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
A method can include receiving a first request from a third party computing system. The method can include generating a passcode based the first request. The method can include transmitting the passcode to the third party computing system. The method can include receiving a second request for payment of a bill. The method can include generating a user interface to receive a passcode input and a cash deposit selection. The method can include receiving the passcode input and the cash deposit selection. The method can include receiving a user selected payment amount. The method can include initiating a cash deposit mechanism. The method can include receiving cash from the third party customer. The method can include counting the cash. The method can include determining that cash matches the user selected payment amount. The method can include transmitting a notification to the third party computing system.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
44.
SYSTEMS AND METHODS FOR PEER-TO-PEER REWARDS AND GIFT CARD TRANSFER VIA MESSAGING
A provider institution computing system includes a network interface circuit and a processing circuit. The processing circuit includes a processor coupled to a non-transitory memory. The processing circuit can receive a request to send a gift to a recipient; verify that a first account associated with the sender includes a first value of points; determine, based on the request, a first gift value having a first gift type and a second gift value having a second gift type; and provide a first gift option to the sender device for display. The processing circuit can receive a first gift selection and provide data that causes the sender device to generate and transmit the gift message to the recipient via the second messaging application. The processing circuit can receive a request for a monetary amount in lieu of the first gift selection and authenticate the recipient device.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
H04L 51/046 - Interoperability with other network applications or services
45.
SYSTEMS AND METHODS FOR DIGITALLY KNOWING AND VERIFYING YOUTHS
Systems and methods for remotely verifying an identity of a user to open an account are provided. A method includes: receiving information relating to an identity of a first user from a first computing device associated with a second user, the information comprising contact information for the first user; sending a notification to a second computing device associated with the first user based on the information received from the first computing device; in response to receiving an affirmative reply from the second computing device, verifying the identity of the first user; and opening an account for the first user based on the identity of the first user being verified by receiving the affirmative reply from the second computing device.
A method for gesture-based multi-factor authentication includes mapping a gesture password to a first substitution string, generating a cryptographic key using the first substitution string as an input to a password authenticated key exchange protocol, encrypting a challenge response with the cryptographic key to generate an encrypted challenge response, and transmitting, to a relying party computing system, a first authentication message comprising the encrypted challenge response and a user identifier identifying a user.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
Techniques are described for determining a likelihood that a customer communication is fraudulent using one or more machine learning models. For example, a computing system includes a memory and one or more processors in communication with the memory. The one or more processors are configured to: receive a set of emotion factor values for communication data of a current communication associated with a customer, wherein each emotion factor value indicates a measure of a particular emotion factor in the current communication; classify, using an emotion variance model running on the one or more processors, the current communication into an emotional fraud category based on the set of emotion factor values for the current communication associated with the customer; and determine a risk score for the current communication indicative of a probability that the current communication is fraudulent based on at least the emotional fraud category for the current communication.
An example computer system for providing financial education can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to generate: a financial account module programmed to provide a first user and a second user access to a financial account; an education module programmed to provide educational material related to finances, the education module tailoring the educational material based upon a level of sophistication of the first user, wherein the level of sophistication is set by the second user or is determined based on an attribute of the first user; and a communication module programmed to facilitate communication between the first user and the second user relating to the finances of the first user.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
49.
Apparatuses, methods, and computer program products for proactive offline authentication
A method, apparatus, and computer program product for proactive offline authentication are provided. An example method includes determining a current offline condition of a computing device at a first time and determining a prior online condition of the computing device at a second time that is earlier than the first time at which the computing device generated second authentication credentials based upon one or more user attributes obtained from a digital identity construct database associated with a first user at the second time. The method further includes obtaining, at the first time, first authentication credentials associated with the first user and determining a discrepancy between the first and the second authentication credentials. In response to the determined discrepancy, the method includes generating an authentication token based upon the second authentication credentials for authenticating a first user device of the first user with the computing device.
Systems and techniques for real-time feature level software security are described herein. A request may be received from a computing device for data from the feature of the software application. The request for data may include authorization information of a user of the computing device. It may be identified that the feature of the software application contains code containing a reference to a security configuration service. A security configuration may be determined for the feature of the software application by comparing a resource identifier and a feature identifier of the feature of the software application to a set of security configurations of the security configuration service. The security configuration may provide access rules for the feature of the software application. A response may be sent to the computing device based on a comparison of the received authorization information of the user of the computing device to the determined security configuration.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
A distributed system includes a lending device that is configured to receive, from a user device, a real-time request for a loan associated with a service, where the request specifies at least an identifier of the user device and a specific amount of funds; determine, based at least on the specific amount of funds for the loan and on the identifier of the user device, to provide the loan to the user device; generate a digital token associated with the loan, where the digital token specifies usage restrictions that are associated with (i) an approved amount of funds, (ii) a duration of the loan, and (iii) a payee associated with a service device; and provide, the user device and/or the service device, the digital token associated with the loan, where the digital token is redeemable by the payee associated with the service device for the approved amount of funds.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
52.
Systems and methods for post-quantum cryptography communications channels
Systems, apparatuses, methods, and computer program products are disclosed for PQC. An example method includes transmitting a first portion of an electronic communication to a client device over a non-PQC communications channel, wherein the client device comprises a PQC shim circuitry. The example method further includes transmitting one or more communications between a PQC callback circuitry and the client device over a PQC communications channel, wherein the client device is a non-PQC device. The example method further includes transmitting a second portion of the electronic communication to the client device over a PQC communications channel.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
A method of authenticating a user via a galvanic skin response on electric computing device is described. The method includes receiving a request for user authentication from a second electronic computing device. The electronic computing device measures a change in the galvanic skin response associated with the user, and the change in the galvanic skin response is indicative of the user creating a physical connection between the electronic computing device and the second electronic computing device. The electronic computing device compares the galvanic skin response to a threshold skin conductance level. When the comparison of the galvanic skin response indicates, an authentication confirmation is sent to the second electronic computing device.
Disclosed in some examples are methods, systems, and machine readable mediums which provide summaries of topics determined within a corpus of documents. These summaries may be used by customer service associates, analysts, or other users to quickly determine both topics discussed and contexts of those topics over a large corpus of text. For example, a corpus of documents may be related to customer complaints and the topics may be summarized to produce summaries such as “credit report update due to stolen identity.” These summarizations may be used to efficiently spot trends and issues.
Point of sale (POS) devices, systems, and methods disclosed herein enable payments by merchants to non-customers, such as to employees of the merchant. A point of sale system of the merchant determines an amount of a payment to be made by the merchant to the employee. The point of sale system transmits payment instructions for executing the payment to a payment system provider computing system. The funds are made available in a bank account of the employee instantly or near instantly.
Provided herein is a holistic fraud cocoon that protects a user from incoming or outgoing fraud and phishing communications by capturing, analyzing and either altering, discarding or presenting communications to the user. For example, the holistic fraud cocoon captures all incoming sources (mail, in-person visits, phone, TV, radio, newspapers and internet) and the actions performed by the user, triggered by those sources. Certain actions are held in a queue to be reviewed, validated and acted upon by a third party before the actions are executed.
An example method includes receiving an encrypted biometric enrollment data and user identifier data. The encrypted biometric enrollment data includes at least one biometric enrollment sample from a user encrypted using an encryption key. The encryption key is generated based on a user secret and the user identifier is associated with the user. The user identifier is matched with a stored user secret. A decryption key is generated based on the stored user secret. The encrypted biometric enrollment data is decrypted using the decryption key. The at least one biometric enrollment sample is retrieved from the decrypted biometric enrollment data. The at least one biometric enrollment sample is processed using a biometric processing algorithm to generate a biometric reference template. A biometric reference template identifier uniquely identifying the biometric reference template is generated. An encryption key is generated based on the stored user secret and encrypts an enrollment confirmation message.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
Disclosed in some examples are methods, systems, and machine readable mediums for secure end-to-end digital communications involving mobile wallets. The result is direct, secure, in-band messaging using mobile wallets that may be used to send messages such as payments, requests for money, financial information, or messages to authorize a debit or credit.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
An example method is described. The method includes receiving, by a computing system, data indicative of a call into an interactive voice response (IVR) system from a user device and determining, by the computing system and based on the data, a set of actions performed by the user device within the IVR system and a corresponding set of results performed by the IVR system during the call. Additionally, the method includes converting, by the computing system, the set of actions and the corresponding set of results into a sequence of code pairs using a dictionary established based on training data, determining, by the computing system, an activity pattern during the call based on the sequence of code pairs; and calculating, by the computing system, a probability that the call is fraudulent based on the activity pattern during the call.
H04M 1/64 - Automatic arrangements for answering calls; Automatic arrangements for recording messages for absent subscribers; Arrangements for recording conversations
Systems and techniques for operating system integrated image capture guidance are described herein. An indication may be received of an object to be captured for completing a transaction. Configuration data may be obtained for an image of the object. The configuration data may indicate an orientation of the object in the image. An image of the object may be obtained from an imaging sensor of a device. A discrepancy may be determined between the orientation of the object in the image using the configuration data. Orientation guidance may be generated that indicates repositioning of the object in the image. It may be determined that the discrepancy between the orientation of the object in the image has been eliminated. Capture guidance may be generated for output via the device based on a set of commands determined based on detection of an operating system executing on the device.
Various examples are directed to systems and methods for processing offline payments from a mobile wallet. A computing system may receive, from a financial institution system, an authentication request message comprising a first offline token. The computing system may determine that the mobile wallet application is not online and determine that the first offline toke comprises first offline token data that matches the first offline token reference data. The computing system may send to the financial institution system a first authentication message indicating that the first offline token is associated with the mobile wallet application.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
A method may include presenting a user interface on a computing device, the user interface including: an input element configured to receive an input of a search concept; a similar concept selection element; and a concept comparison portion; executing a similarity search in a vector-space representation of a knowledge graph using the input; populating the similar concept selection element with a set of a similar concepts based on a result of the executed similarity search; receiving a selection of a comparison concept of the set of similar concepts from the similar concept selection element; generating a predicate comparison visualization in the concept comparison portion based on predicates in the knowledge graph of the comparison concept and the search concept; and presenting the predicate comparison visualization in the concept comparison portion.
A method may include storing access rights with respect to a plurality of shared data ledgers, wherein each respective shared data ledger of the plurality of shared data ledgers comprises: a plurality of data portions; and at least one data record stored within a data portion of the plurality of data portions; receiving a request, from a requesting computing device, the request including: a requesting identifier stored in a data record of a first shared data ledger; and a request for information, associated with the requesting identifier, stored in a second shared data ledger; determining that the requesting computing device is authorized to access the information stored in the second shared data ledger based on the stored access rights; and based on the determining: accessing the information associated with the requesting identifier from the second shared data ledger; and transmitting at least a portion of the accessed information.
A system includes a housing structured to be positioned within a portion of a vault of a transaction device. The housing includes a transfer cassette interface structured to receive a transfer cassette. The transfer cassette is structured to retrievably store banknotes. The housing also includes a vault interface structured to couple to the portion of the vault. The housing also includes a housing transport apparatus structured to facilitate transporting banknotes to and from the transfer cassette via at least one of the transfer cassette interface or the vault interface.
G07F 19/00 - Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
65.
REAL TIME APPLICATION PROTECTION SYSTEM CONFIGURATION DRIFT CATEGORIZATION AND RESPONSE
Techniques are described for improving real-time application protection (RTAP) systems (e.g., web application firewalls (WAFs), runtime application self-protection (RASP) systems). In particular, a device within a trusted network may monitor or test the configuration settings of the RTAP systems, network traffic into the RTAP systems, and/or log information from the RTAP systems. For example, the device may detect drift in a configuration for a particular RTAP system by comparing the configuration settings of the RTAP systems to baseline configuration settings and classifying any detected drift as good drift or bad drift. In some examples, the device may maintain the configuration settings or set the configuration settings as the baseline configuration settings when the configurations settings include good drift from the baseline configuration settings. In other examples, the device may set the configuration settings with the bad drift to the baseline configuration settings.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/0853 - Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information
Systems and methods for mutual authentication of a user and a container administrator computer system. A container administrator computer system receives a request from a mobile computing device for a user to access a secure container. The request includes a user identifier. The administrator system receives a first authentication factor corresponding to the user. The administrator system authenticates the user by verifying that the first authentication factor matches a first reference authentication factor associated with the user identifier. The administrator system sends a second authentication factor associated with the administrator system to a human-machine interface associated with the secure container or the mobile computing device. The administrator system receives a notification of authentication of the administrator system using the authentication factor. The administrator system transmits an unlock signal to unlock the secure container.
G07C 9/00 - Individual registration on entry or exit
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
A method performed by a provider computing system includes training one or more artificial intelligence (AI) models to generate task prompts, receiving a requested action from a customer, determining contextual information about a plurality of customer devices, generating a task prompt using the one or more AI models, generating an interaction board accessible by the customer via a customer device and accessible by an employee via an employee device, receiving an indication that the customer pre-task has been completed prior to a customer interaction at a branch location, updating the interaction board to indicate that the customer pre-task has been completed prior to the customer interaction, receiving information associated with the requested action from the customer device during the customer interaction, and updating the interaction board to include the information received from the customer device during the customer interaction.
A method, apparatus, and system of activating and using a contactless card are disclosed. More particularly, a transaction card that includes a contactless enabled chip having a customer-specific uniform resource locator (URL) stored thereon, where the contactless enabled chip is configured to communicate the customer-specific URL to a mobile device via a contactless communication to activate the transaction card for use in a transaction.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
H04B 5/00 - Near-field transmission systems, e.g. inductive loop type
H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
69.
Systems and methods for improved verification of transactions
A method includes receiving a request to set verification settings for a payment aggregator computing system; determining an alias account number for a transaction account based on account information; transmitting a request to the payment aggregator computing system to store the alias account number instead of the account information; receiving a transaction request from the payment aggregator computing system; implementing a verification policy comprising a first sub-policy and a second sub-policy, based on the verification settings corresponding to the alias account number and a threshold transaction amount, including: determining a predetermined threshold of a monetary amount, determining a first sub-policy monetary amount, comparing the first sub-policy monetary amount to the predetermined threshold, determining that the first sub-policy monetary amount does not meet the predetermined threshold, implementing the second sub-policy, generating and transmitting an electronic message comprising a selectable hyperlink generated for the transaction request, and approving the transaction request.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
70.
Measuring risk tolerance using virtual or augmented reality view of simulated outcome
One embodiment relates to a computing system. The computing system includes a risk analysis circuit. The risk analysis circuit is configured to simulate a plurality of investment outcomes. The risk analysis circuit is configured to display at least one augmented reality or virtual reality depiction of at least one of the plurality of investment outcomes via a display device. The risk analysis circuit is configured to monitor a reaction of a user to the displayed augmented reality or virtual reality depictions. The risk analysis circuit is configured to generate a user reaction score based on the reaction of the user. The risk analysis circuit is configured to generate an overall score for each of the plurality of investment outcomes by weighing the user reaction score and investment outcome.
Systems, methods and computer-readable storage media utilized to track a plurality of assets on a distributed ledger network. One method includes receiving a request to track a specific asset on the distributed ledger network. The method further includes identifying a reason for the exchange, wherein the reason for exchange is based on a set of predefined actions. The method further includes determining an asset type associated with the specific asset. The method further includes generating a unique identifier identifying the specific asset. The method further includes generating a unique tracking identifier, the unique tracking identifier including a subset of identifiers, the subset of identifiers including an asset issuer identifier, an asset type identifier, and the unique identifier. The method further includes providing, to the distributed ledger network, a cryptographic code and the reason for the exchange.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Techniques are described that include detecting customer personal information within any appropriate set of data, such as customer communications produced by customer-facing services offered by an organization. Once detected, the customer personal information may be tokenized within the customer communications, making the data appropriate for external systems, such as cloud-hosted applications. The disclosed techniques include a masking service that may be plugged into an on-premises pipeline of any customer-facing service that makes requests to an off-premises, cloud-hosted application. The masking service may apply rule-based detection and/or machine learning-based detection to detect both structured and unstructured customer personal information included in customer communications. The masking service may further tokenize or otherwise obfuscate or replace the detected customer personal information. The tokenized customer communications may then be included in the requests to the cloud-hosted application or otherwise transmitted to external systems without exposing the customer personal information.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
73.
SYSTEMS AND METHODS FOR MANUFACTURED DATA GENERATION AND MANAGEMENT VIA AN INTERACTIVE MANUFACTURED DATASET LIBRARY
Systems, apparatuses, methods, and computer program products are disclosed for manufactured dataset generation and management. An example method includes receiving, by communications hardware, a user input set indicating data manufacture requirements. The example method also includes generating, by query generation circuitry, a manufactured dataset library query based on the data manufacture requirements. The example method also includes receiving, by the communications hardware and based on an execution of the manufactured dataset library query, a set of results comprising one or more manufactured datasets of a manufactured dataset library, the one or more manufactured datasets having been previously generated based on one or more previously received user input sets. The example method also includes generating, by dataset generation circuitry, a manufactured dataset based on the set of results.
A method includes: receiving, by at least one processing circuit of a provider computing system associated with a provider institution, an action notification regarding an action associated with an account held by a customer at the provider institution; obtaining, by the at least one processing circuit, user action information associated with the action; performing, by the at least one processing circuit, a fraud detection analysis based on the user action information, the fraud detection analysis comprising generating a plurality of individual risk values associated with a plurality of fraud data risk elements based on the user action information; determining, by the at least one processing circuit, that the action is fraudulent based on the plurality of individual risk values associated with the plurality of fraud data risk elements; and performing, by the at least one processing circuit, a fraud mitigation action based on determining that the action is fraudulent.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
75.
APPARATUSES, COMPUTER-IMPLEMENTED METHODS, AND COMPUTER PROGRAM PRODUCTS FOR DYNAMIC TRAVEL TRANSACTIONS
Methods, apparatuses, and computer program products are disclosed for providing dynamic travel transactions. An example computer-implemented method includes receiving first device data of a first user device associated with a first user. The first device data includes first trip data of a vehicle and the first user. The example method further includes receiving travel variability data associated with the vehicle that includes one or more vehicle operating parameters that vary during travel of the vehicle. The example method also includes generating a travel transaction based upon the first device data of the first user device and the travel variability data associated with the vehicle. In some instances, the method includes determining a base transaction based upon the first device data that's effectuated at a first time and determining a modification to the base transaction based upon the travel variability data that's effectuated at a second time.
A card, such as a payment card, can enable provisioning of services. The card includes hardware and software that enable the card to connect to a local device that includes a display. Further, the card can comprise hardware and software that allow the card to connect to a remote server, in one instance by way of a dedicated communication channel. The card can also include a processor and memory that stores instructions that when executed by the processor provide services, such as bank services. The display is provided with graphical elements by the service for rendering including data from a bank or other remote server. A device or interactive display can enable user interaction with services.
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
Systems, methods, and apparatuses for authenticating requests to access one or more accounts over a network using authenticity evaluations of two or more automated decision engines are discussed. A login request for access to a user account may be submitted to multiple decision engines that each apply different rulesets for authenticating the login request, and output an evaluation of the authenticity of the login request. Based on evaluations from multiple automated decision engines, the login request may be allowed to proceed to validation of user identity and, if user identity is validated, access to the user account may be authorized. Based on the evaluations, the login attempt may also be rejected. One or more additional challenge question may be returned to the computing device used to request account access, and the login request allowed to proceed to validation of identity if the response to the challenge question is deemed acceptable.
Systems, apparatuses, and methods of an event-based automatic transaction on behalf of a user include and not limited to, determining, based on a plurality of information sources including a plurality of news information sources independent of a particular physical location, a probability of an event occurring, the probability being based on a predetermined percentage of news information sources indicating that the event is going to occur or is occurring, in response to the probability of the event occurring satisfying a predetermined threshold corresponding to the predetermined percentage, determining a location impacted by the event, in response to determining that the location of the user is proximate to the location impacted by the event, initiating a transaction with a mobile banking client application linked to an authorized financial account on behalf of the user, the authorized financial account being associated with the user and provided by the financial institution computing system.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
79.
Mobile wallet account provisioning systems and methods
A method includes: providing a mobile wallet on a mobile device of a user; generating a customer token regarding the user; generating a device token regarding the mobile device; encrypting and sending the customer token and the device token; receiving a user credential associated with a second institution; accessing information regarding an account of the user at the second institution; automatically provisioning the account to the mobile wallet; providing tokenized account information associated with the provisioned account to the mobile wallet; receiving an input of a login credential associated with the first institution; receiving an indication of an initiation of a mobile wallet transaction; validating and identifying the user based on the received login credential and the customer token; validating the mobile wallet of the mobile device based on the device token; and transferring funds from the provisioned account to a recipient as part of the mobile wallet transaction.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
80.
Identifying and providing unfulfilled services via an ATM
Systems and methods for identifying and providing unfulfilled services to a user of a provider institution mobile application are provided. A method includes: identifying an unfulfilled service of the user of the provider institution mobile application based on an indication that the user has a pending service that requires further action on behalf of the user; scanning a digital calendar of a mobile device of the user hosting the provider institution mobile application based on receiving a user input to access the digital calendar; determining an availability of the user based on scanning the digital calendar; identifying a current location of the user during the determined availability; determining a plurality of service locations near the identified current location of the user during the determined availability; and prompting the user to visit an identified service location from the plurality of service locations.
Risk assessment can be performed in many contexts including in lending. A set of metrics can be received and derived from data associated with a party, such as a third-party retailer or dealer, with respect to performance of an activity. A subset of metrics can be identified that exceed a threshold of acceptable performance. Weights can be applied to at least the subset of metrics that captures significance of corresponding metrics. A single weighted score can be computed from aggregation of the weighted subset of metrics, and a third party can be classified based on comparison of the weighted score to a predetermined threshold.
Systems and techniques for authentication of impaired voices are described herein. A voice profile may be generated for a user. An audio stream may be received including an authentication voice of the user. It may be determined that the authentication voice does not match a first set of authentication criteria. The audio stream may be compared to a second set of authentication criteria. The user may be authenticated based on the comparison.
A broadcast headend includes an upstream network circuit, an upstream signal processing circuit, and a content processing circuit. The upstream network circuit is configured to communicate with a financial institution computing system over an internet network. The upstream signal processing circuit is configured to broadcast a video content signal over a broadcast medium to a downstream device. The content processing circuit is configured to receive a content stream including a unique property code associated with a vendor; while the video content signal is being broadcast, parse the unique property code associated with the vendor from the content stream; and send a bill pay request to the financial institution computing system to effect a payment to the vendor.
Methods, apparatuses, and computer program products are disclosed for providing dynamic travel transactions. An example computer-implemented method includes receiving first device data of a first user device associated with a first user. The first device data includes first trip data of a vehicle and the first user. The example method further includes receiving travel variability data associated with the vehicle that includes one or more vehicle operating parameters that vary during travel of the vehicle. The example method also includes generating a travel transaction based upon the first device data of the first user device and the travel variability data associated with the vehicle. In some instances, the method includes determining a base transaction based upon the first device data that's effectuated at a first time and determining a modification to the base transaction based upon the travel variability data that's effectuated at a second time.
A method for generating an adaptive user interface may include, generating a graphical user interface for presentation to a user at an automated banking machine that includes a touch screen display and a currency note dispenser. The automated banking machine may include a sensor that senses information indicating a physical disposition of the user relative to the automated banking machine. The method may include adjusting the placement of the menu options on the touch screen display based on the information regarding the physical disposition of the user relative to the automated banking machine.
G06F 3/041 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
G06F 3/0488 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
G07F 19/00 - Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
A technological approach to management of data lifecycle includes protecting data. Datasets from distinct computing environments of an organization can be scanned to identify data elements subject to protection, such as sensitive data. Data lineage associated with the identified data elements can be determined including relationships amongst other data and linkages between computing environments or systems. The identified elements can be automatically protected based at least in part on the lineage such as by masking, encryption, or tokenization. Further, the datasets can be monitored to create audit trails for interactions with the datasets.
Systems, methods, and apparatuses for providing a customer a central location to manage permissions provided to third-parties and devices to access and use customer information maintained by a financial institution are described. The central location serves as a central portal where a customer of the financial institution can manage all access to account information and personal information stored at the financial institution. Accordingly, the customer does not need to log into each individual third-party system or customer device to manage previously provided access to the customer information or to provision new access to the customer information. A user additionally is able to have user data and third-party accounts of the user deleted from devices, applications, and third-party systems via a central portal. Restrictions on how user data is used by devices, applications, and third-party systems can be imposed via a central portal.
Systems, methods, and apparatuses for token management in a federated environment are provided. A method includes: linking a single token of a user to an online account associated with the single token based on receiving a user input to couple to the online account such that a mobile device is configured to receive updates regarding the single token; generating a rule that associates the single token with two or more accounts; based on the linking, receiving an update regarding the online account and (i) deactivating the single token to prevent fund transfers utilizing the single token and (ii) providing an alert regarding the update; reactivating the single token based on an input in response to the alert; receiving a fund transfer transaction request identifying the single token for a fund transfer; and applying the rule based on the single token to process the fund transfer.
G06Q 40/00 - Finance; Insurance; Tax strategies; Processing of corporate or income taxes
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
89.
Systems and methods for linking ATM to retailer transaction to preserve anonymity
Systems, methods, and apparatuses for providing cash back to a customer from a linked ATM after a purchase transaction are described herein. A customer initiates the transactions using a payment check. A cash back amount is determined and an authentication passcode is created. Cash back information is then transmitted to the linked ATM. The cash back information includes the cash back amount and the authentication passcode. The authentication passcode is then provided to the customer. A cash back transaction is then authenticated using the authentication passcode, and the customer is provided with the cash back amount from the linked ATM.
G06K 7/14 - Methods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
Systems, apparatuses, methods, and computer program products are disclosed for managing open issues. An example method includes obtaining a dashboard access request for a portion of open issues managed by the issue management system, the issue management system storing variables associated with each open issue of the open issues; obtaining a dashboard data package based on scores for the portion of open issues, the scores indicating a severity level of the open issues of the portion of open issues and being based on the variables that are stored in the issue management system; and performing an action set using the dashboard data package to manage the portion of open issues.
H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
H04L 41/0631 - Management of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
A method includes receiving an update biometric reference sample and a user identifier by a computing system and retrieving a previous biometric reference template record in a storage location based on the user identifier by the computing system. The previous biometric reference template record includes a previous biometric reference template generated using a previous biometric reference sample. The method further includes comparing the update biometric reference sample to the previous biometric reference template by the computing system and, responsive to determining that a biometric data type of the update biometric reference sample is different than that of the previous biometric reference template, generating an update biometric reference template by the computing system. The method further includes generating an update biometric reference template record by the computing system. The method further includes receiving comparing the update biometric reference sample to the biometric authentication sample by the computing system.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
A computer-implemented system and method are provided for adaptively controlling communication activity of a communication system. The method stores user information comprising contact preferences, a goal, and account information. The system may receive external information by a trigger engine which applies a trigger rule to determine a degree of relatedness between the goal and at least one of external information and the account information. When the degree of relatedness exceeds a threshold, then the contact preferences may be used to format a communication related to the external information based on the contact preferences. The system may then send the communication to the user by the communication entity according to the contact preferences, and, based on a feedback or lack of feedback from the user related to the communication, adjust at least one of the contact preferences, the trigger rule, or a weighting factor of the trigger rule.
G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
G10L 17/26 - Recognition of special voice characteristics, e.g. for use in lie detectors; Recognition of animal voices
G10L 25/63 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination for estimating an emotional state
93.
DIGITAL ACCOUNT CONTROLS PORTAL AND PROTOCOLS FOR FEDERATED AND NON-FEDERATED SYSTEMS AND DEVICES
Systems, methods, and apparatuses for a secure digital controls portal enabling enhanced control over account functionalities and usage of secure information provided to third party systems and devices maintained by various federated and non-federated provider computing systems of various product and service providers. The secure digital controls portal can interface with various provider computing systems via custom APIs protocols. The API protocols may utilize APIs that are particular to the software and hardware operated by the various provider computing systems. The secure digital controls portal can also standardize information from the various provider computing systems. The secure digital controls portal can be a central portal accessible via a client application running on a user device that enhances one-stop switch control and security of a user's digital footprint.
A method performed by a computing system includes determining that the mobile device is at the merchant location based on a comparison of a location of a mobile device of a user with a merchant location of a merchant, determining that the merchant participates in a rewards promotion, receiving a transaction request associated with a rewards account of the user, activating the rewards promotion based on the determination that the mobile device is at the merchant location and the determination that the merchant participates in the rewards promotion, determining a value of a rewards balance based on the activated rewards promotion, and determining that the value of the rewards balance based on the activated rewards promotion is sufficient to complete the transaction request.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
95.
SYSTEMS AND METHODS FOR PHYSICAL MATH BASED CURRENCY (MBC) CREDIT CARDS
Embodiments include a method of performing math based currency (“MBC”) exchanges. One method includes receiving an exchange request from a merchant point-of-sale (POS) system and determining a merchant POS system accepts MBC payments. The method further includes exchanging, on a published blockchain, an amount of MBC equal to an amount to an MBC account of the merchant POS system and updating a pooled account database. The method further includes updating an overlay ledger to modify an MBC balance of the MBC credit card account held by the customer and broadcasting the exchange to a plurality of MBC verification nodes for verification.
Embodiments include a method of performing math based currency (“MBC”) exchanges. One method includes receiving an exchange request, from a customer computer system, a remote exchange request for an amount. The method further includes exchanging, on a published blockchain, an amount of MBC equal to the amount to an MBC account of the online merchant and updating a pooled account database. The method further includes updating an overlay ledger to modify an MBC balance of the MBC account held by the customer and broadcasting the remote exchange to a plurality of MBC verification nodes for verification.
Systems, methods, and computer-readable storage media of private network issuance of digital currency. One method includes receiving an issuance request associated with a first denomination of digital currency. The method further includes issuing a first digital currency token, wherein issuing is an off-chain exchange transferring the first denomination outside a digital currency ledger.
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
A method may include receiving a first classification of a network address associated with a login attempt as an AVA, and in response, generating a first random number, selecting a first blocking length of time from a plurality of blocking lengths of time, calculating a first deny list duration based on summing the first random number and the first blocking length of time, and adding the network address to a deny list for the first deny list duration, and adding the network address to a parole list for a parole duration, receiving a second classification of the address as an AVA during the duration; and in response selecting a second blocking length of time from a plurality of blocking lengths, calculating a second deny list duration based on summing the second random number and the second blocking length and adding the address to the deny list for the second duration
An approach for establishing and managing network security linkages is disclosed. The linkages may be used to facilitate management of accounts, goals, or resources of one or more entities, or to provide an integrated view of the circumstances of, for example, family members or other interrelated persons. A person receiving assistance with the management of one or more accounts need not disclose authentication credentials to persons helping manage the accounts, enhancing security. Members may view members and access accounts administered by separate computing systems without needing credentials for each member, account, and/or computing system. The multiple accounts (which may be held at multiple institutions) need not be accessed individually by each member of the network security linkage, saving time and computing resources of users.
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
A computer system includes a token repository configured to store payment tokens, and a server system. The server system includes a processor and instructions stored in non-transitory machine-readable media, the instructions configured to cause the server system to receive a request to provision a payment token based on a financial product, wherein the request includes information related to the financial product, provision a payment token based on the token request, including authenticating the financial product based on the financial product information and generating the payment token upon authenticating the financial product, wherein the payment token is useable to make a payment via the financial product, and store the payment token in the token repository.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 30/02 - Marketing; Price estimation or determination; Fundraising