A method may include storing access rights with respect to a plurality of shared data ledgers, wherein each respective shared data ledger of the plurality of shared data ledgers comprises: a plurality of data portions; and at least one data record stored within a data portion of the plurality of data portions; receiving a request, from a requesting computing device, the request including: a requesting identifier stored in a data record of a first shared data ledger; and a request for information, associated with the requesting identifier, stored in a second shared data ledger; determining that the requesting computing device is authorized to access the information stored in the second shared data ledger based on the stored access rights; and based on the determining: accessing the information associated with the requesting identifier from the second shared data ledger; and transmitting at least a portion of the accessed information.
Various examples are directed to systems and methods for processing offline payments from a mobile wallet. A computing system may receive, from a financial institution system, an authentication request message comprising a first offline token. The computing system may determine that the mobile wallet application is not online and determine that the first offline toke comprises first offline token data that matches the first offline token reference data. The computing system may send to the financial institution system a first authentication message indicating that the first offline token is associated with the mobile wallet application.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
A method may include presenting a user interface on a computing device, the user interface including: an input element configured to receive an input of a search concept; a similar concept selection element; and a concept comparison portion; executing a similarity search in a vector-space representation of a knowledge graph using the input; populating the similar concept selection element with a set of a similar concepts based on a result of the executed similarity search; receiving a selection of a comparison concept of the set of similar concepts from the similar concept selection element; generating a predicate comparison visualization in the concept comparison portion based on predicates in the knowledge graph of the comparison concept and the search concept; and presenting the predicate comparison visualization in the concept comparison portion.
Systems, methods, and apparatuses for generating a tokenized cash code include a provider computing system associated with a provider including a network interface structured to facilitate data communication via a network and a processing circuit comprising a processor and memory. The processing circuit is structured to receive a signal from an external device indicating a monetary amount. The memory comprises a tokenize cash code circuit structured to generate a tokenized cash code associated with the monetary amount and structured for a redemption of the monetary amount at an ATM. The processing circuit is structured to transmit the tokenized cash code to a user of the external device.
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
5.
REAL TIME APPLICATION PROTECTION SYSTEM CONFIGURATION DRIFT CATEGORIZATION AND RESPONSE
Techniques are described for improving real-time application protection (RTAP) systems (e.g., web application firewalls (WAFs), runtime application self-protection (RASP) systems). In particular, a device within a trusted network may monitor or test the configuration settings of the RTAP systems, network traffic into the RTAP systems, and/or log information from the RTAP systems. For example, the device may detect drift in a configuration for a particular RTAP system by comparing the configuration settings of the RTAP systems to baseline configuration settings and classifying any detected drift as good drift or bad drift. In some examples, the device may maintain the configuration settings or set the configuration settings as the baseline configuration settings when the configurations settings include good drift from the baseline configuration settings. In other examples, the device may set the configuration settings with the bad drift to the baseline configuration settings.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/0853 - Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information
6.
SYSTEMS AND METHODS FOR AN INTERACTIVE CUSTOMER INTERFACE UTILIZING CUSTOMER DEVICE CONTEXT
A method performed by a provider computing system includes training one or more artificial intelligence (AI) models to generate task prompts, receiving a requested action from a customer, determining contextual information about a plurality of customer devices, generating a task prompt using the one or more AI models, generating an interaction board accessible by the customer via a customer device and accessible by an employee via an employee device, receiving an indication that the customer pre-task has been completed prior to a customer interaction at a branch location, updating the interaction board to indicate that the customer pre-task has been completed prior to the customer interaction, receiving information associated with the requested action from the customer device during the customer interaction, and updating the interaction board to include the information received from the customer device during the customer interaction.
A system includes a housing structured to be positioned within a portion of a vault of a transaction device. The housing includes a transfer cassette interface structured to receive a transfer cassette. The transfer cassette is structured to retrievably store banknotes. The housing also includes a vault interface structured to couple to the portion of the vault. The housing also includes a housing transport apparatus structured to facilitate transporting banknotes to and from the transfer cassette via at least one of the transfer cassette interface or the vault interface.
G07F 19/00 - Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
Systems and methods for mutual authentication of a user and a container administrator computer system. A container administrator computer system receives a request from a mobile computing device for a user to access a secure container. The request includes a user identifier. The administrator system receives a first authentication factor corresponding to the user. The administrator system authenticates the user by verifying that the first authentication factor matches a first reference authentication factor associated with the user identifier. The administrator system sends a second authentication factor associated with the administrator system to a human-machine interface associated with the secure container or the mobile computing device. The administrator system receives a notification of authentication of the administrator system using the authentication factor. The administrator system transmits an unlock signal to unlock the secure container.
G07C 9/00 - Individual registration on entry or exit
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
A method, apparatus, and system of activating and using a contactless card are disclosed. More particularly, a transaction card that includes a contactless enabled chip having a customer-specific uniform resource locator (URL) stored thereon, where the contactless enabled chip is configured to communicate the customer-specific URL to a mobile device via a contactless communication to activate the transaction card for use in a transaction.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
H04B 5/00 - Near-field transmission systems, e.g. inductive loop type
H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
10.
Systems and methods for improved verification of transactions
A method includes receiving a request to set verification settings for a payment aggregator computing system; determining an alias account number for a transaction account based on account information; transmitting a request to the payment aggregator computing system to store the alias account number instead of the account information; receiving a transaction request from the payment aggregator computing system; implementing a verification policy comprising a first sub-policy and a second sub-policy, based on the verification settings corresponding to the alias account number and a threshold transaction amount, including: determining a predetermined threshold of a monetary amount, determining a first sub-policy monetary amount, comparing the first sub-policy monetary amount to the predetermined threshold, determining that the first sub-policy monetary amount does not meet the predetermined threshold, implementing the second sub-policy, generating and transmitting an electronic message comprising a selectable hyperlink generated for the transaction request, and approving the transaction request.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
11.
Measuring risk tolerance using virtual or augmented reality view of simulated outcome
One embodiment relates to a computing system. The computing system includes a risk analysis circuit. The risk analysis circuit is configured to simulate a plurality of investment outcomes. The risk analysis circuit is configured to display at least one augmented reality or virtual reality depiction of at least one of the plurality of investment outcomes via a display device. The risk analysis circuit is configured to monitor a reaction of a user to the displayed augmented reality or virtual reality depictions. The risk analysis circuit is configured to generate a user reaction score based on the reaction of the user. The risk analysis circuit is configured to generate an overall score for each of the plurality of investment outcomes by weighing the user reaction score and investment outcome.
Techniques are described that include detecting customer personal information within any appropriate set of data, such as customer communications produced by customer-facing services offered by an organization. Once detected, the customer personal information may be tokenized within the customer communications, making the data appropriate for external systems, such as cloud-hosted applications. The disclosed techniques include a masking service that may be plugged into an on-premises pipeline of any customer-facing service that makes requests to an off-premises, cloud-hosted application. The masking service may apply rule-based detection and/or machine learning-based detection to detect both structured and unstructured customer personal information included in customer communications. The masking service may further tokenize or otherwise obfuscate or replace the detected customer personal information. The tokenized customer communications may then be included in the requests to the cloud-hosted application or otherwise transmitted to external systems without exposing the customer personal information.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
Systems, methods and computer-readable storage media utilized to track a plurality of assets on a distributed ledger network. One method includes receiving a request to track a specific asset on the distributed ledger network. The method further includes identifying a reason for the exchange, wherein the reason for exchange is based on a set of predefined actions. The method further includes determining an asset type associated with the specific asset. The method further includes generating a unique identifier identifying the specific asset. The method further includes generating a unique tracking identifier, the unique tracking identifier including a subset of identifiers, the subset of identifiers including an asset issuer identifier, an asset type identifier, and the unique identifier. The method further includes providing, to the distributed ledger network, a cryptographic code and the reason for the exchange.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Systems, apparatuses, and methods of an event-based automatic transaction on behalf of a user include and not limited to, determining, based on a plurality of information sources including a plurality of news information sources independent of a particular physical location, a probability of an event occurring, the probability being based on a predetermined percentage of news information sources indicating that the event is going to occur or is occurring, in response to the probability of the event occurring satisfying a predetermined threshold corresponding to the predetermined percentage, determining a location impacted by the event, in response to determining that the location of the user is proximate to the location impacted by the event, initiating a transaction with a mobile banking client application linked to an authorized financial account on behalf of the user, the authorized financial account being associated with the user and provided by the financial institution computing system.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
15.
SYSTEMS AND METHODS FOR MANUFACTURED DATA GENERATION AND MANAGEMENT VIA AN INTERACTIVE MANUFACTURED DATASET LIBRARY
Systems, apparatuses, methods, and computer program products are disclosed for manufactured dataset generation and management. An example method includes receiving, by communications hardware, a user input set indicating data manufacture requirements. The example method also includes generating, by query generation circuitry, a manufactured dataset library query based on the data manufacture requirements. The example method also includes receiving, by the communications hardware and based on an execution of the manufactured dataset library query, a set of results comprising one or more manufactured datasets of a manufactured dataset library, the one or more manufactured datasets having been previously generated based on one or more previously received user input sets. The example method also includes generating, by dataset generation circuitry, a manufactured dataset based on the set of results.
Methods, apparatuses, and computer program products are disclosed for providing dynamic travel transactions. An example computer-implemented method includes receiving first device data of a first user device associated with a first user. The first device data includes first trip data of a vehicle and the first user. The example method further includes receiving travel variability data associated with the vehicle that includes one or more vehicle operating parameters that vary during travel of the vehicle. The example method also includes generating a travel transaction based upon the first device data of the first user device and the travel variability data associated with the vehicle. In some instances, the method includes determining a base transaction based upon the first device data that's effectuated at a first time and determining a modification to the base transaction based upon the travel variability data that's effectuated at a second time.
Systems, methods, and apparatuses for authenticating requests to access one or more accounts over a network using authenticity evaluations of two or more automated decision engines are discussed. A login request for access to a user account may be submitted to multiple decision engines that each apply different rulesets for authenticating the login request, and output an evaluation of the authenticity of the login request. Based on evaluations from multiple automated decision engines, the login request may be allowed to proceed to validation of user identity and, if user identity is validated, access to the user account may be authorized. Based on the evaluations, the login attempt may also be rejected. One or more additional challenge question may be returned to the computing device used to request account access, and the login request allowed to proceed to validation of identity if the response to the challenge question is deemed acceptable.
A card, such as a payment card, can enable provisioning of services. The card includes hardware and software that enable the card to connect to a local device that includes a display. Further, the card can comprise hardware and software that allow the card to connect to a remote server, in one instance by way of a dedicated communication channel. The card can also include a processor and memory that stores instructions that when executed by the processor provide services, such as bank services. The display is provided with graphical elements by the service for rendering including data from a bank or other remote server. A device or interactive display can enable user interaction with services.
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
A method includes: receiving, by at least one processing circuit of a provider computing system associated with a provider institution, an action notification regarding an action associated with an account held by a customer at the provider institution; obtaining, by the at least one processing circuit, user action information associated with the action; performing, by the at least one processing circuit, a fraud detection analysis based on the user action information, the fraud detection analysis comprising generating a plurality of individual risk values associated with a plurality of fraud data risk elements based on the user action information; determining, by the at least one processing circuit, that the action is fraudulent based on the plurality of individual risk values associated with the plurality of fraud data risk elements; and performing, by the at least one processing circuit, a fraud mitigation action based on determining that the action is fraudulent.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
20.
Mobile wallet account provisioning systems and methods
A method includes: providing a mobile wallet on a mobile device of a user; generating a customer token regarding the user; generating a device token regarding the mobile device; encrypting and sending the customer token and the device token; receiving a user credential associated with a second institution; accessing information regarding an account of the user at the second institution; automatically provisioning the account to the mobile wallet; providing tokenized account information associated with the provisioned account to the mobile wallet; receiving an input of a login credential associated with the first institution; receiving an indication of an initiation of a mobile wallet transaction; validating and identifying the user based on the received login credential and the customer token; validating the mobile wallet of the mobile device based on the device token; and transferring funds from the provisioned account to a recipient as part of the mobile wallet transaction.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
21.
Identifying and providing unfulfilled services via an ATM
Systems and methods for identifying and providing unfulfilled services to a user of a provider institution mobile application are provided. A method includes: identifying an unfulfilled service of the user of the provider institution mobile application based on an indication that the user has a pending service that requires further action on behalf of the user; scanning a digital calendar of a mobile device of the user hosting the provider institution mobile application based on receiving a user input to access the digital calendar; determining an availability of the user based on scanning the digital calendar; identifying a current location of the user during the determined availability; determining a plurality of service locations near the identified current location of the user during the determined availability; and prompting the user to visit an identified service location from the plurality of service locations.
Risk assessment can be performed in many contexts including in lending. A set of metrics can be received and derived from data associated with a party, such as a third-party retailer or dealer, with respect to performance of an activity. A subset of metrics can be identified that exceed a threshold of acceptable performance. Weights can be applied to at least the subset of metrics that captures significance of corresponding metrics. A single weighted score can be computed from aggregation of the weighted subset of metrics, and a third party can be classified based on comparison of the weighted score to a predetermined threshold.
Systems and techniques for authentication of impaired voices are described herein. A voice profile may be generated for a user. An audio stream may be received including an authentication voice of the user. It may be determined that the authentication voice does not match a first set of authentication criteria. The audio stream may be compared to a second set of authentication criteria. The user may be authenticated based on the comparison.
A broadcast headend includes an upstream network circuit, an upstream signal processing circuit, and a content processing circuit. The upstream network circuit is configured to communicate with a financial institution computing system over an internet network. The upstream signal processing circuit is configured to broadcast a video content signal over a broadcast medium to a downstream device. The content processing circuit is configured to receive a content stream including a unique property code associated with a vendor; while the video content signal is being broadcast, parse the unique property code associated with the vendor from the content stream; and send a bill pay request to the financial institution computing system to effect a payment to the vendor.
Methods, apparatuses, and computer program products are disclosed for providing dynamic travel transactions. An example computer-implemented method includes receiving first device data of a first user device associated with a first user. The first device data includes first trip data of a vehicle and the first user. The example method further includes receiving travel variability data associated with the vehicle that includes one or more vehicle operating parameters that vary during travel of the vehicle. The example method also includes generating a travel transaction based upon the first device data of the first user device and the travel variability data associated with the vehicle. In some instances, the method includes determining a base transaction based upon the first device data that's effectuated at a first time and determining a modification to the base transaction based upon the travel variability data that's effectuated at a second time.
A method for generating an adaptive user interface may include, generating a graphical user interface for presentation to a user at an automated banking machine that includes a touch screen display and a currency note dispenser. The automated banking machine may include a sensor that senses information indicating a physical disposition of the user relative to the automated banking machine. The method may include adjusting the placement of the menu options on the touch screen display based on the information regarding the physical disposition of the user relative to the automated banking machine.
G06F 3/041 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
G06F 3/0488 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
G07F 19/00 - Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
A technological approach to management of data lifecycle includes protecting data. Datasets from distinct computing environments of an organization can be scanned to identify data elements subject to protection, such as sensitive data. Data lineage associated with the identified data elements can be determined including relationships amongst other data and linkages between computing environments or systems. The identified elements can be automatically protected based at least in part on the lineage such as by masking, encryption, or tokenization. Further, the datasets can be monitored to create audit trails for interactions with the datasets.
Systems, methods, and apparatuses for providing a customer a central location to manage permissions provided to third-parties and devices to access and use customer information maintained by a financial institution are described. The central location serves as a central portal where a customer of the financial institution can manage all access to account information and personal information stored at the financial institution. Accordingly, the customer does not need to log into each individual third-party system or customer device to manage previously provided access to the customer information or to provision new access to the customer information. A user additionally is able to have user data and third-party accounts of the user deleted from devices, applications, and third-party systems via a central portal. Restrictions on how user data is used by devices, applications, and third-party systems can be imposed via a central portal.
Systems, methods, and apparatuses for token management in a federated environment are provided. A method includes: linking a single token of a user to an online account associated with the single token based on receiving a user input to couple to the online account such that a mobile device is configured to receive updates regarding the single token; generating a rule that associates the single token with two or more accounts; based on the linking, receiving an update regarding the online account and (i) deactivating the single token to prevent fund transfers utilizing the single token and (ii) providing an alert regarding the update; reactivating the single token based on an input in response to the alert; receiving a fund transfer transaction request identifying the single token for a fund transfer; and applying the rule based on the single token to process the fund transfer.
G06Q 40/00 - Finance; Insurance; Tax strategies; Processing of corporate or income taxes
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
30.
Systems and methods for linking ATM to retailer transaction to preserve anonymity
Systems, methods, and apparatuses for providing cash back to a customer from a linked ATM after a purchase transaction are described herein. A customer initiates the transactions using a payment check. A cash back amount is determined and an authentication passcode is created. Cash back information is then transmitted to the linked ATM. The cash back information includes the cash back amount and the authentication passcode. The authentication passcode is then provided to the customer. A cash back transaction is then authenticated using the authentication passcode, and the customer is provided with the cash back amount from the linked ATM.
G06K 7/14 - Methods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
Systems, apparatuses, methods, and computer program products are disclosed for managing open issues. An example method includes obtaining a dashboard access request for a portion of open issues managed by the issue management system, the issue management system storing variables associated with each open issue of the open issues; obtaining a dashboard data package based on scores for the portion of open issues, the scores indicating a severity level of the open issues of the portion of open issues and being based on the variables that are stored in the issue management system; and performing an action set using the dashboard data package to manage the portion of open issues.
H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
H04L 41/0631 - Management of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
A method includes receiving an update biometric reference sample and a user identifier by a computing system and retrieving a previous biometric reference template record in a storage location based on the user identifier by the computing system. The previous biometric reference template record includes a previous biometric reference template generated using a previous biometric reference sample. The method further includes comparing the update biometric reference sample to the previous biometric reference template by the computing system and, responsive to determining that a biometric data type of the update biometric reference sample is different than that of the previous biometric reference template, generating an update biometric reference template by the computing system. The method further includes generating an update biometric reference template record by the computing system. The method further includes receiving comparing the update biometric reference sample to the biometric authentication sample by the computing system.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
A computer-implemented system and method are provided for adaptively controlling communication activity of a communication system. The method stores user information comprising contact preferences, a goal, and account information. The system may receive external information by a trigger engine which applies a trigger rule to determine a degree of relatedness between the goal and at least one of external information and the account information. When the degree of relatedness exceeds a threshold, then the contact preferences may be used to format a communication related to the external information based on the contact preferences. The system may then send the communication to the user by the communication entity according to the contact preferences, and, based on a feedback or lack of feedback from the user related to the communication, adjust at least one of the contact preferences, the trigger rule, or a weighting factor of the trigger rule.
G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
G10L 17/26 - Recognition of special voice characteristics, e.g. for use in lie detectors; Recognition of animal voices
G10L 25/63 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination for estimating an emotional state
34.
DIGITAL ACCOUNT CONTROLS PORTAL AND PROTOCOLS FOR FEDERATED AND NON-FEDERATED SYSTEMS AND DEVICES
Systems, methods, and apparatuses for a secure digital controls portal enabling enhanced control over account functionalities and usage of secure information provided to third party systems and devices maintained by various federated and non-federated provider computing systems of various product and service providers. The secure digital controls portal can interface with various provider computing systems via custom APIs protocols. The API protocols may utilize APIs that are particular to the software and hardware operated by the various provider computing systems. The secure digital controls portal can also standardize information from the various provider computing systems. The secure digital controls portal can be a central portal accessible via a client application running on a user device that enhances one-stop switch control and security of a user's digital footprint.
A method performed by a computing system includes determining that the mobile device is at the merchant location based on a comparison of a location of a mobile device of a user with a merchant location of a merchant, determining that the merchant participates in a rewards promotion, receiving a transaction request associated with a rewards account of the user, activating the rewards promotion based on the determination that the mobile device is at the merchant location and the determination that the merchant participates in the rewards promotion, determining a value of a rewards balance based on the activated rewards promotion, and determining that the value of the rewards balance based on the activated rewards promotion is sufficient to complete the transaction request.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
36.
SYSTEMS AND METHODS FOR PHYSICAL MATH BASED CURRENCY (MBC) CREDIT CARDS
Embodiments include a method of performing math based currency (“MBC”) exchanges. One method includes receiving an exchange request from a merchant point-of-sale (POS) system and determining a merchant POS system accepts MBC payments. The method further includes exchanging, on a published blockchain, an amount of MBC equal to an amount to an MBC account of the merchant POS system and updating a pooled account database. The method further includes updating an overlay ledger to modify an MBC balance of the MBC credit card account held by the customer and broadcasting the exchange to a plurality of MBC verification nodes for verification.
Embodiments include a method of performing math based currency (“MBC”) exchanges. One method includes receiving an exchange request, from a customer computer system, a remote exchange request for an amount. The method further includes exchanging, on a published blockchain, an amount of MBC equal to the amount to an MBC account of the online merchant and updating a pooled account database. The method further includes updating an overlay ledger to modify an MBC balance of the MBC account held by the customer and broadcasting the remote exchange to a plurality of MBC verification nodes for verification.
Systems, methods, and computer-readable storage media of private network issuance of digital currency. One method includes receiving an issuance request associated with a first denomination of digital currency. The method further includes issuing a first digital currency token, wherein issuing is an off-chain exchange transferring the first denomination outside a digital currency ledger.
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
A method may include receiving a first classification of a network address associated with a login attempt as an AVA, and in response, generating a first random number, selecting a first blocking length of time from a plurality of blocking lengths of time, calculating a first deny list duration based on summing the first random number and the first blocking length of time, and adding the network address to a deny list for the first deny list duration, and adding the network address to a parole list for a parole duration, receiving a second classification of the address as an AVA during the duration; and in response selecting a second blocking length of time from a plurality of blocking lengths, calculating a second deny list duration based on summing the second random number and the second blocking length and adding the address to the deny list for the second duration
An approach for establishing and managing network security linkages is disclosed. The linkages may be used to facilitate management of accounts, goals, or resources of one or more entities, or to provide an integrated view of the circumstances of, for example, family members or other interrelated persons. A person receiving assistance with the management of one or more accounts need not disclose authentication credentials to persons helping manage the accounts, enhancing security. Members may view members and access accounts administered by separate computing systems without needing credentials for each member, account, and/or computing system. The multiple accounts (which may be held at multiple institutions) need not be accessed individually by each member of the network security linkage, saving time and computing resources of users.
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
A computer system includes a token repository configured to store payment tokens, and a server system. The server system includes a processor and instructions stored in non-transitory machine-readable media, the instructions configured to cause the server system to receive a request to provision a payment token based on a financial product, wherein the request includes information related to the financial product, provision a payment token based on the token request, including authenticating the financial product based on the financial product information and generating the payment token upon authenticating the financial product, wherein the payment token is useable to make a payment via the financial product, and store the payment token in the token repository.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 30/02 - Marketing; Price estimation or determination; Fundraising
A computing system includes one or more processing circuits configured to identify an anomaly associated with an electronic transaction, wherein the anomaly is identified based on a profile or pattern of a user. The processing circuits further configured to transmit data corresponding to the anomaly to a user interface. The processing circuits further configured to receive, using the user interface, an indication that one or more risks associated with the anomaly are acceptable. The processing circuits further configured to transmit, to the user interface, an indication of at least one rule violation and information for resolving the at least one rule violation. The processing circuits further configured to receive, from the user interface, a response setting an exception and update the profile of the user, wherein updating comprises changing a classification of the profile of the user based on profile data consistent with the electronic transaction.
Example implementations include a method for using tokens between two entities including a client device and a server, by generating, by a first one-way function of the client device, a first intermediate value from a transaction count corresponding to a number of transactions involving an original data, the first intermediate value being unique to a first verification transaction at a server, generating, by a second one-way function of the client device, a second intermediate value from the first intermediate value, the second intermediate value being unique to a second verification transaction at the server, sending, by the client device, a first token based on the first intermediate value to the server to execute the first verification transaction, and sending, by the client device, a second token based on the second intermediate value to the server to execute the second verification transaction.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
44.
SYSTEMS AND METHODS FOR DIGITIZED PROOF OF TRANSACTIONS
A method can include receiving first data corresponding to a transaction between a merchant and a customer; receiving second data captured at substantially the same time as the transaction and at a location corresponding to the transaction; generating a designation for the transaction based on a first match between the good identified in the first image and the identifying information and a second match between the depiction of the customer and a profile image of the customer; storing third data comprising at least one of the plurality of images and a unique identifier assigned to the transaction; and linking the second data to the third data; populating a claim with at least some of the second data and the third data according to a selection of a user interface element.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
Various examples described herein are directed to systems and methods for providing a user interface at a plurality of computing devices. A first interface application executing at a first computing device may determine a first state for a user interface. The first interface application may detect a set of user computing devices for providing the user interface to a user and select a second computing device that is in the set of user computing devices based at least in part on the first state of the user interface. The first interface application may send a description of the user interface to the second computing device.
A method comprises receiving, by a provider institution computing system via a network, a cash level indicator from each of a plurality of customer payment systems, the customer payment systems receiving cash from customers of a plurality of stores. The method further comprises receiving, by the provider institution computing system via the network, a cash request from a user device of a user. The provider institution computing system selects one of the plurality of customer payment systems based on the cash level indicator and location data of a plurality of delivery agent devices of delivery agents. The method further comprises sending, by the provider institution computing system to a selected delivery agent device, a message comprising location data of the selected customer payment system, the selected delivery agent device being one of the plurality of delivery agent devices.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
Systems, apparatuses, methods, and computer program products are disclosed for automatically determining accuracy of entity recognition of text. An example method includes segmenting a service entity recognition analysis of the text and a gold entity recognition analysis of the text into common superstrings that define entity spans. The example method further includes classifying each of the entity spans based on an accuracy of entity recognition in the service analysis of the text corresponding to the entity spans using a classification system that differentiates accurately identified but improperly bounded entities into at least three subcategories to obtain an entity accuracy classification. The example method also includes obtaining a score report based on the entity accuracy classification. The example method additionally includes performing an action set based on the entity accuracy classification.
G06F 18/21 - Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
G06F 18/2113 - Selection of the most significant subset of features by ranking or filtering the set of features, e.g. using a measure of variance or of feature cross-correlation
G06F 18/241 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
Methods and systems for augmenting smart card functionality using a companion mobile wallet are disclosed. The mobile wallet can establish communication with the companion smart card which can determine that the mobile wallet and the smart card are companions. The mobile wallet can send supplemental data to the companion smart card to augment the functionality of the smart card. The smart card can establish communication between with a POS device and send the supplemental data to the POS device. The mobile wallet, smart card and POS device can communicate with one another in an online mode or using batch processing.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
49.
Control tower for linking accounts to applications
Systems, methods, and apparatuses for providing a central location to manage permissions provided to third-parties and devices to access and use user data and to manage accounts at multiple entities. A central portal may allow a user to manage all access to account data and personal information as well as usability and functionality of accounts. The user need not log into multiple third-party systems or customer devices to manage previously provided access to the information, provision new access to the information, and to manage financial or other accounts. A user is able to have user data and third-party accounts of the user deleted from devices, applications, and third-party systems via a central portal. The user is able to impose restrictions on how user data is used by devices, applications, and third-party systems, and control such features as recurring payments and use of rewards, via a central portal.
Systems and methods for identifying, categorizing, reporting, and/or remedying knowledge risks of a workforce. The systems and methods can operate automatically and in real-time. Risks can be identified on a per-skill basis using a plurality of risk factors. Graphical user interfaces can be generated to present knowledge risks across an entire enterprise or portion thereof in easily digestible formats. Upskilling recommendations can be generated based on categorization of knowledge risks.
A method, apparatus, and system of activating and using a contactless card are disclosed. More particularly, a method of accessing an account is disclosed. The method includes receiving, by a transaction card processing circuit from a customer device, information regarding the customer device and information regarding a contactless card associated with the account, where the information regarding the contactless card is received by the customer device via a contactless communication with the contactless card, authenticating a customer associated with the contactless card based on the information regarding the customer device and the information regarding the contactless card, and providing access to the account by the customer device based on the authentication.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G06F 21/33 - User authentication using certificates
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
52.
Mobile wallet using tokenized card systems and methods
A method includes receiving a fund access request from a user device associated with a user; generating a tokenized card number based on an actual card account number of the user that substitutes the actual card account number in a payment transaction; providing a code to the user device including the tokenized card number and a numeric or alphanumeric string of values; determining that the numeric or alphanumeric string of values in the code transmitted to the user device matches a numeric or alphanumeric string of values in a field of a code received from a separate computer system; determining that a location of the user device matches a merchant location; authenticating the payment transaction based on the numeric or alphanumeric match and the location match; and, transmitting the actual card account number to the separate computer system as part of the payment transaction.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
53.
Systems and methods for expediting math-based currency transactions
Systems, methods, and computer-readable storage media utilized in math-based currency (MBC) exchange utilizing MBC transaction guarantees. One method includes receiving, from a merchant point of sale (POS) terminal, a payment reimbursement request comprising a guarantee identifier associated with an MBC transfer. The method further includes determining, utilizing the guarantee identifier, transaction information. The method further includes determining, utilizing the transaction information, the guarantee identifier is associated with a failed transaction based on accessing and analyzing a plurality of disputed transactions on an MBC blockchain. The method further includes, in response to identifying the failed transaction, initiating an MBC payment from the financial computing system to an MBC address of a merchant. The method further includes providing, to the merchant POS terminal, a payment confirmation.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
A provider institution computing system includes a customer database storing customer information, a network interface circuit structured to enable an exchange of information over a network, and a transaction circuit generating trackable transaction requests. The transaction circuit is structured to: receive information including a transaction type and destination account information; generate a transaction request including at least one tracking instruction and a transaction identification code associated with the transaction request; transmit the transaction request to a correspondent institution; generate a graphical user interface that includes a list of transaction requests that have transaction identification codes associated with the customer, the list including tracking information, the transaction identification code, and information regarding an estimated date that the first transaction request will be settled; provide the graphical user interface to a customer device; provide information regarding a travel history of the transaction request; and settle the transaction request.
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/10 - Payment architectures specially adapted for home banking systems
Systems, apparatuses, methods, and computer program products are disclosed for securing communications between devices. An example method includes obtaining a quantum random number (QRN) from a remote QRN source using a secure communication channel between the initiating device and the remote QRN source. The QRN may be a true random number. The example method may also include using the QRN to participate in computer implemented services with the participating device that received the QRN from the remote QRN source.
Methods and systems of exchanging data using payment cards with universal reference numbers are disclosed. A merchant computing system includes a merchant input/output assembly receiving a universal reference number from a customer at a point of sale. A merchant database retrievably stores a plurality of universal reference numbers and customer information associated with each of the plurality of universal reference numbers. A transaction circuit receives the universal reference number from the merchant input/output assembly, retrieves customer information associated with the universal reference number, and provides an output relating to a transaction based on the customer information.
Systems and methods that facilitate a mobile wallet splitting payments to an invoice between multiple payment accounts are disclosed herein. The mobile wallet can receive an invoice, and then select a set of payment accounts to each pay a portion of the invoice. The mobile wallet can send the payment information to a point of sale device, indicating that the payment include multiple payments from different payment accounts. The point of sale device can then process the multiple payments, either sequentially, or in parallel. In an embodiment, the mobile wallet can receive partial payments from other mobile wallets for the invoice, collect the payments together, and send the payment information at once to the point of sale device for the set of mobile wallets.
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
58.
DETECTION AND INTERVENTION FOR ANOMALOUS TRANSACTIONS
Disclosed are methods, systems, and devices for identifying anomalous and/or problematic payments based on past payment patterns of a user, past experiences with the user, and the user's circumstances, and implementing intervention mechanisms for proactively resolving account issues before downstream impacts, such as collections calls, inbound calls, and complaints. Anomalous payments may be detected using clustering and prediction. Interventions may include phone calls, emails, notifications, etc. An alert or notification may be sent to the user's mobile application, and various selectable response options suited to the situation may be presented to the user.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06N 3/044 - Recurrent networks, e.g. Hopfield networks
59.
SYSTEMS AND METHODS FOR PROVIDING NOTIFICATIONS REGARDING DATA BREACHES
A method includes acquiring information regarding a user; generating one or more indicators of a data breach for an entity that stores one of transactional behavior data regarding the user or an indication of a transaction with the user in a past predefined time period; generating a first notification; providing the first notification to the user during a log-in process; receiving an indication from the user to exercise an option to scan transaction information of the user for suspected fraudulent activity at the entity; scanning the transaction information; determining a suspected fraudulent transaction; generating a second notification specific to the user and the suspected fraudulent transaction; deactivating a payment card associated with the suspected fraudulent transaction; and providing a supplemental notification to the user regarding the suspected fraudulent transaction.
A system, method, and apparatus for creating and managing smart contracts on a blockchain is provided. A method includes detecting, by the computing system, a code language of the smart contract code, wherein each of a plurality of code languages is associated with at least one of a plurality of blockchain platforms; determining, by the computing system, based at least partially on the code language of the smart contract code, an optimal blockchain platform to deploy the smart contract onto, the optimal blockchain platform being one of the plurality of blockchain platforms associated with the detected code language, the smart contract code capable of being deployed onto two or more blockchain platforms; compiling, by the computing system, the smart contract code based on the determination of the optimal blockchain platform so as to generate smart contract byte code and metadata; and deploying, by the computing system, the smart contract byte code to the optimal blockchain platform.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
61.
Systems and methods for automatic generation of event materials
Systems, apparatuses, methods, and computer program products are disclosed for generating one or more candidate event material sets. An example method includes receiving an event material generation request. The example method further includes generating one or more candidate event feature sets and one or more candidate event material sets based on the one or more candidate event feature sets. The method further includes providing the one or more candidate event material sets.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
G06F 16/2457 - Query processing with adaptation to user needs
G06F 40/109 - Font handling; Temporal or kinetic typography
Systems and techniques for semantic graph database capture of industrial organization and market structure are described herein. Electronic market data may be obtained from an electronic data source. A set of entities and corresponding relationships may be extracted from the electronic market data. A property may be determined for each of the relationships. A market graph data structure may be generated using the set of entities. A search query may be received including an identifier of a member of the set of entities. A market graphic may be generated based on a node corresponding to the identifier and a set of edges corresponding to the node. The market graphic may be output in a computer-readable format.
Systems and methods for using an information wallet system to deliver a gift and receive, redeem, or re-gift the gift are disclosed. The information wallet system's storage is securely maintained by a financial institution computing system (i.e. a bank) and receives and holds purchase transaction information. Purchase information transaction may be received from a user computing device or an entity computing system, such as a merchant computing system. In one embodiment, a user may purchase a gift through an online website or at a brick and mortar location and direct the gift to be deposited into the information wallet storage of a recipient. A recipient may then continue to hold the gift, redeem the gift, or re-gift the gift to another party.
B42D 25/20 - Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
64.
KPI-threshold selection for audio-transcription models
In general, this disclosure describes techniques for generating and evaluating automatic transcripts of audio recordings containing human speech. In some examples, a computing system is configured to: generate transcripts of a plurality of audio recordings; determine an error rate for each transcript by comparing the transcript to a reference transcript of the audio recording; receive, for each transcript, a subjective ranking selected from a plurality of subjective rank categories; determine, based on the error rates and subjective rankings, objective rank categories defined by error-rate ranges; and assign an objective ranking to a new machine-generated transcript of a new audio recording, based on the objective rank categories and an error rate of the new machine-generated transcript.
The innovation disclosed and claimed herein, in one aspect thereof, comprises systems and methods of authenticating customers and service agents. The innovation receives a connection request to connect a customer and a service agent. The customer is authenticated for the service agent by matching biometric data of the customer to previously stored biometric data using a biometric recognition algorithm. The service agent is authenticated for the customer by matching a unique identifier to a previously stored unique identifier. A confirmation notification is generated and sent to the service agent and the customer to confirm the authentications. A connection is established between the customer and the service agent according to the authentications and the connection request.
Systems, apparatuses, methods, and computer program products are disclosed for session authentication. In an exemplary embodiment, a session authentication system encodes and decodes a set of quantum bits using different quantum bases in order to generate a random number used to generate a session key or a random seed (e.g., a set of bits that is randomized due to quantum effects such as the principle of quantum uncertainty) for pseudorandom number generation used to establish a secure session. An example system includes decoding circuitry configured to receive, over a quantum line, a set of qbits generated based on a first set of quantum bases not received by the decoding circuitry, and decode, based on a second set of quantum bases, the set of qbits to generate a decoded set of bits; and session authentication circuitry configured to generate a session key based on the decoded set of bits.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
A computer-implemented method of completing a transaction comprises receiving, by one or more processors, a request to complete a transaction between a third party and a third party customer. The method comprises providing a first user interface to the third party customer via a customer device associated with the third party customer. The first user interface comprises a plurality of payment options to complete the transaction. The method comprises receiving a selection of one of the plurality of payment options to complete the transaction. The selection comprises a cash payment at a transaction machine. The method comprises generating a second user interface comprising a map that shows locations of a plurality of transaction machines in relation to a current position of the third party customer. The method comprises completing the transaction based on the cash payment being received by one of the plurality of transaction machines from the map.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
68.
Using native and non-native events to control funding/actions on various connected digital platforms
A method, apparatus, and system of using native and non-native events to control incentives in a computing environment is provided. A method includes: creating, by a processing circuit, a master account; creating, by the processing circuit, a subordinate account linked to the master account; receiving, by the processing circuit and from the master account, a first task and an associated incentive for the first task; detecting, by the processing circuit, a native or non-native event regarding the first task; and, implementing, by the processing circuit, an action corresponding to the associated incentive based on detecting the native or non-event regarding the first task. Detecting the native event includes receiving a message directly from a device linked to the processing circuit. Detecting a non-native event includes receiving an indication from a user device associated with the subordinate account.
G06Q 30/0207 - Discounts or incentives, e.g. coupons or rebates
G05B 19/418 - Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control (DNC), flexible manufacturing systems (FMS), integrated manufacturing systems (IMS), computer integrated manufacturing (CIM)
The innovation disclosed and claimed herein, in one aspect thereof, comprises systems, methods and computer program products that enable transactions requested by a user using a trade asset card. The innovation enables the transactions to be completed in real time or near real time per pre-determined rules and settings, or audited changes to rules and settings, while staying perpetually invested in the user's investment portfolio.
A method for determining vehicle insurance costs includes receiving a starting location and a destination location for a trip using a vehicle. One or more routes for the vehicle from the starting location to the destination location are received. A cost of insurance is determined for each of the one or more routes for the trip. The cost of insurance for each of the one or more routes for the trip is displayed. A selected route from the one or more routes is received. Operation of the vehicle for the trip is enabled along the selected route.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
In equities trading, users typically develop trading strategies designed to achieve profitable returns. The trading strategies may include rules surrounding how to respond to particular market conditions. However, when a wide variety of conflicting market scenarios arise, users are often confused and unsure of how to untangle all the conflicting market conditions and struggle with making a final trading decision. The disclosed trade execution engine uses a switching matrix model to separate the different market conditions and reacts to the different market states based on intelligent execution driving signals.
A system determines a baseline cyberthreat-risk score for a user, and displays the baseline cyberthreat-risk score via a user interface. The system presents at least one cyberthreat-education activity via the user interface, and receives, via the user interface, at least one user input associated with the presented at least one cyberthreat-education activity. The system generates an updated cyberthreat-risk score at least in part by updating the baseline cyberthreat-risk score based at least in part on the user input, and displays the updated cyberthreat-risk score via the user interface.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 16/9535 - Search customisation based on user profiles and personalisation
G06Q 10/107 - Computer-aided management of electronic mailing [e-mailing]
A computer system and method for enabling or disabling a payment vehicle at the request of a payment card holder from a remote device. The computer system comprises a computer having memory and a processor for processing input data received from a remote device. The input data comprises an instruction executable by the processor in a form of a text message or electronic mail received from the remote device, with the instruction to enable or disable a payment card of a payment card holder by changing the status of the payment card. An interactive remote interface computer software application is provided to the payment card holder for use on the remote or other device.
A computer system is described that is configured to calculate probable risks of assets being transferred away from an institution that is currently holding the assets. In order to reduce transfers of assets from an institution, the computer system is configured to predict a likelihood of transfer of the asset from the institution based on the client data. The computer system is configured to predict a risk of transfer of the asset that takes into account the value of the asset. For example, particular higher value assets may be more valuable to the financial institution than other assets given a comparable likelihood of transfer. The computer system is further configured to propose and/or prioritize actions, such as potential advising opportunities, to minimize the risk of transfer of the asset from the financial institution.
A two-way cash recycler system includes a vault having a plurality of media cassettes, an first input/output panel having a first media aperture on a first side, a second input/output panel having a second media aperture on a second side, a transport system disposed between the first side and the second side. The transport system includes a pass-through pathway structured to transport transaction media between the first media aperture and the second media aperture, a concurrent use pathway structured to transport transaction media from at least one of the first media aperture and the second media aperture to the vault, and a dispense pathway structured to transport transaction media from the vault to at least one of the first media aperture and the second media aperture.
Systems, methods, and computer program products are provided for disparate quantum computing (QC) detection. An example system includes QC detection data generation circuitry that generates a first set of QC detection data and generates a second set of QC detection data. The system also includes cryptographic circuitry that generates a first public cryptographic key and a first private cryptographic key via a first post-quantum cryptographic (PQC) technique and generates a second public cryptographic key and a second private cryptographic key via a second PQC technique. The cryptographic circuitry further generates encrypted first QC detection, second QC detection data, and destroys the first private cryptographic key and the second private cryptographic key. The system further includes data monitoring circuitry that monitors for the first encrypted QC detection data and the second encrypted QC detection data.
Systems, methods, and apparatuses for providing a central location to manage permissions provided to third-parties and devices to access and use user data and to manage accounts at multiple entities. A central portal may allow a user to manage all access to account data and personal information as well as usability and functionality of accounts. The user need not log into multiple third-party systems or customer devices to manage previously provided access to the information, provision new access to the information, and to manage financial or other accounts. A user is able to have user data and third-party accounts of the user deleted from devices, applications, and third-party systems via a central portal. The user is able to impose restrictions on how user data is used by devices, applications, and third-party systems, and control such features as recurring payments and use of rewards, via a central portal.
A method may include ingesting a plurality of sources files from a plurality of infrastructure assets; inputting the plurality of source files into a cognitive computing engine (CCE); receiving an output from the CCE, the output indicating a plurality of relationships between the infrastructure assets; and updating a data store based on the plurality of relationships.
Systems, methods, and storage media for pre-approving onboarding to a payment platform, executing on a processing device are disclosed. Exemplary implementations may: access a node network; determine a first entity associated with a first node of the plurality of nodes is not a member of a payment platform; determine a total strength of connections of the first node to one or more nodes of the plurality of nodes exceeds a predetermined threshold value; and flag the first node of the plurality of nodes for an offer of onboarding to the payment platform consequent to determining the total strength of connections of the first node to the one or more nodes of the plurality of nodes exceeds the predetermined threshold value.
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
Systems and methods for generating bill pay requests via an internet-enabled video displaying device are described. The system includes one or more processors and memory storing instructions that, when executed by the one or more processors, cause the one or more processors to maintain a database that includes account information for at least one customer of a financial institution, maintain a bill pay database that includes at least one registered biller, provide a bill pay feature by which a customer can cause a payment to be issued to a registered biller, receive a bill pay request to a vendor corresponding to a segment of broadcast video content, and complete a bill pay request by causing funds from the customer's account to be sent to the vendor.
A computer-implemented method performed by one or more processors of a computer system is provided. The computer-implemented method includes: determining, by one or more processors of a computer system, an offer to provide to a mobile device of a user; generating, by augmented reality logic, an overlay display configured to overlay an image displayed on the mobile device, the overlay display providing additional information related to the offer to the user; generating, by the one or more processors, an offer code for the mobile device of the user for providing to a third party; and sending, by the one or more processors, the offer code to the mobile device.
G06Q 30/0207 - Discounts or incentives, e.g. coupons or rebates
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
A system includes a processing circuit including one or more processors coupled to non-transitory memory. The processing circuit is configured to: store a cookie associated with a user device of a user; receive a prefetch request based on the cookie for account information in advance of a user request for the account information; identify the user based on the stored cookie; verify the identity of the user based on a received credential regarding the user; perform asynchronous data gathering by receiving data intermittently over one or more network nodes to retrieve the account information based on the prefetch request and the verification of the identity of the user; and provide account information to an active cache of the user device that proactively updates stored account information. The account information is stored in the active cache of the user device for later retrieval.
A method for providing an application programming interface (API) service that enables a third-party to provide screens that allow account holders to provide credentials to an institution while bypassing the third-party, comprising transmitting an API to a third-party device for integration into a website served by the third-party, the API configured to generate a portal that accepts the credentials without revealing the credentials to the third-party; receiving, via the API integrated into the third-party website, a request for verification of a user; instructing the API integrated into the third-party website to display a screen of the institution within a window through which transmissions can be received directly from the user without the third-party receiving the transmissions; receiving, directly from the user and through the window, user credentials input into the screen without revealing the input user credentials to the third-party; and verifying the user by confirming the user credentials.
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
84.
METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR MONITORING METRICS OF A MATURING ORGANIZATION AND IDENTIFYING ALERT CONDITIONS
A method, apparatus and computer program product are provided for providing resource adequacy intelligence information. A user may configure organizational data relating to various levels within an organizational hierarchy. Various assumption data, including quantifiable target developments of an organization, at any level of the hierarchy, may be configured. A monitoring engine monitors actual values of metrics provided by integrating systems, and/or predicted values predicted based on the actual values, relative to target values calculated according to assumption data. Alert conditions relating to metrics, and for any level of the hierarchy may be generated in response to the monitoring and provided via a user interface. Intelligence information relating to workforce needs, location optimization, and real estate needs is also provided.
A method for representing a visualization of assets includes receiving a request for a transfer of assets from an electronic computing device having augmented reality (AR) capabilities or virtual reality (VR) capabilities. The request includes a source account, a destination account, and a transfer amount. An image data is generated, which is representative of the transfer amount being transferred from the source account to the destination account. The image data is sent to an image generator of the electronic computing device to be displayed.
G06T 19/00 - Manipulating 3D models or images for computer graphics
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
A method includes: receiving an authorization request for a transaction including information identifying an account of a user; identifying an identity of the user; determining a computing device associated with the identified user; determining a distance between a location of the transaction and a location of the determined computing device; determining that additional authentication is required based on the determined distance relative to an authentication distance such that in response to the determined distance being greater than an authorization distance but less than or equal to the authentication distance, the required additional authentication includes a first set of authentication information, and in response to the determined distance being greater than the authentication distance, the required additional authentication includes a second set of authentication information different from the first set of authentication information; and authorizing the transaction based on the additional information matching stored additional authentication information.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
Systems and methods may generally be used to authenticate a user. An example method may include capturing an image of a portion of a face of a user, retrieving, based on identification information, a registered model of the face from a database, and comparing the portion of the face in the captured image to a facial feature of the registered model. In response to determining that the portion of the captured image matches the facial feature of the registered model, the method may include granting access to secure content.
Systems, methods, and computer-readable media for matching a job to a plurality of workers are described herein. A user device is associated with a worker from the plurality of workers. A processing circuit is structured to receive an electronic request. The electronic request comprises a data set related to the job. The processing circuit is further structured to generate a local disaster data set and a test requirement data set. The processing circuit is further structured to select at least one worker. The processing circuit is further structured to cause a client application deployed to the user device to display an electronic notification comprising at least in part the data set related to the job, a risk level rating, a risk level pay premium corresponding to the risk level rating, and an accept control structured to allow the worker to accept the job.
The innovation disclosed and claimed herein, in one aspect thereof, comprises systems and methods of validating models guided by machine learning algorithms. The innovation can begin by receiving a risk model for validation having multiple sets of data. A first data set is selected from as an input. Outputs are generated for validation. One output can be generating a second set of analysis results using a comparable algorithm to the risk model. Another output can be generating a second set of variables and transformations using a machine learning algorithm and an untransformed set of the selected variables to assess the set of selected transformations. Another output can be generating a third set of variables using one or more machine learning algorithms and an extended feature set of variables to assess the selected variables. The outputs are compared to the analysis results, coefficients, selected variables, and selected transformations. A report of the comparison is generated.
A system, method, and computer-readable storage media for performing a transaction for a customer of a financial institution using math-based currency (MBC), the system comprising a permissioned ledger banking system comprising a transaction circuit comprising a transaction processor and a transaction memory, an account mapping circuit comprising an account mapping processor and an account mapping memory, and an MBC account database comprising an MBC account of the customer, a fiat banking system comprising an account management circuit and a customer fiat accounts database, and the permissioned ledger banking system and the fiat banking system are connected via a communications network, wherein the account management circuit comprises an account management processor and an account management memory storing executable account management instructions that when executed by the account management processor causes the account management processor to perform steps of storing a fiat account of the customer in the customer fiat accounts database.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Disclosed in some examples are methods, systems, and machine readable mediums for providing P2P lending through mobile wallets. The P2P lending may utilize a central registry or be a fully distributed P2P system. In some examples, the use of a network accessible P2P loan service may simplify the discovery and communication with other mobile wallets throughout the process of obtaining a loan.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
A centralized application management computing system is described that is configured to generate digital dog tag files for local storage on each computing device of a plurality of computing devices (e.g., data center servers) within the enterprise network. The computing system is configured to periodically retrieve, from one or more sources within the enterprise network, application information for one or more applications hosted on a given computing device of the plurality of computing devices. The computing system is configured to periodically generate, based on the application information, a digital dog tag file for the given computing device that includes recovery information for the one or more applications hosted on the given computing device. The computing system is further configured to send the digital dog tag file for local storage at a predefined location on the given computing device.
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
H04L 41/069 - Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
An application in production may communicate with one or more heterogeneous services, including requesting and receiving data from a one or more data sources. The communication between the application and the services can include complicated scenarios making facilitating end-to-end testing of the application difficult. The disclosed service virtualization solution works in two stages of ‘record and replay’ to simulate a backend service. During the recording stage, the disclosed tool intercepts the data flow between the client and the service and records the data and during the replay stage, the disclosed tool creates a proxy service that simulates the responses of service application by reading the recorded session file, allowing for the client application to be tested without having to connect to the actual service application.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 11/36 - Preventing errors by testing or debugging of software
H04L 43/00 - Arrangements for monitoring or testing data switching networks
A data mapping system provides a share, reusable and single mapping tool for mapping data and data lineage. The mapping system provides a version control functionality in the form of spreadsheet for tracking a plurality of mapping tasks that occur in parallel. The system allows multiple users to view the changes in mapping tasks, thereby improving data mapping visibility. Such visibility can significantly reduce conflicts between different mapping tasks that are independently performed by different teams or persons.
Computer-implemented methods, apparatuses, and computer program products are provided for frequency based operations. An example computer-implemented method includes receiving a request for data transfer of a plurality of data elements of a production data environment to a non-production data environment. The method includes determining an access frequency associated with each data element and grouping each data element into a first set of data elements or a second set of data elements based upon the determined access frequency. The method further includes refreshing the first set of data elements according to a first refresh protocol defining a first refresh rate and refreshing the second set of data elements according to a second refresh protocol defining a second refresh rate less than the first refresh rate. The method also includes outputting the plurality of data elements to the non-production data environment.
Subscriber identity modules can be bound to devices and utilized for authentication. An initial or additional subscriber identity module can be bound to a user device, for instance after successful user authentication by way of an alternate mechanism. A subscriber identity module of a device can be identified, and carrier data associated with the subscriber identity module can be requested and received. A determination can be made regarding whether the subscriber identity module is linked to the device, for instance by an original linkage. A user profile can be automatically updated with the carrier data to bind the user to the user device based on the subscriber identity module when the subscriber identity module is verified to be linked to the user device. Subsequently, the subscriber identity module can be utilized as a basis for authentication.
A method of authenticating a passcode entered by a user on an unstable electronic computing device. The method includes receiving an indication that an input is unstable, impacting the ability of a user to provide the input; generating a dynamic keyboard including at least one alphanumeric key, the dynamic keyboard being configured to address the unstable input; presenting the dynamic keyboard to the user; receiving the input from the user, the input comprising a selection of at least one alphanumeric character of a passcode on the dynamic keyboard; and authenticating the input received from the user by comparing the at least one alphanumeric character and a stored passcode.
H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity
H04W 12/68 - Gesture-dependent or behaviour-dependent
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
Systems, apparatuses, methods, and computer program products are disclosed for training a lattice linear discriminant analysis (Lattice-LDA). An example method includes receiving, by communications hardware, a training dataset comprising one or more features, and selecting, by training circuitry, a set of shape constraints, the set of shape constraints including a shape constraint for each feature in the training dataset. The example method further includes training, by the training circuitry, the Lattice-LDA using the training dataset and the selected set of shape constraints, where the Lattice-LDA is generated based on an additive form of a plurality of nonlinear functions, and training the Lattice-LDA generates a shape-restricted hyperplane that defines a decision boundary separating a first class of data points in the training dataset from a second class of data points in the training dataset.
A computer-implemented method includes: receiving a request to perform a mobile wallet transaction between a user and a merchant via a mobile wallet application operating on a mobile device of the user; determining a location of the mobile device; receiving transaction information from a merchant computer system associated with the merchant; determining a location of a merchant point-of-sale device in communication with the mobile device; comparing the location of the mobile device and the location of the merchant point-of-sale device to determine whether the location of the mobile device is within a predefined distance of the location of the merchant point-of-sale device; generating a transaction code; transmitting the transaction code to the mobile device; transferring funds from an account of the user to a merchant account; and, transmitting an indication that the mobile wallet transaction has been completed to the mobile device.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
A method includes receiving a payment request for a transaction between a merchant and a customer. The payment request includes a payment token and an amount of the transaction in currency. The rewards account stores a number of rewards points. The method includes authenticating the payment request. The method includes determining a currency conversion value for the rewards points. The currency conversion value is based on a conversion rate and a merchant multiplier. The method includes determining the number of rewards points is not enough to cover the transaction. The method includes identifying a secondary payment source that contains sufficient funds to cover a remaining balance of the transaction. The method includes transmitting an approval message to a merchant computing system.
G06Q 30/0226 - Incentive systems for frequent usage, e.g. frequent flyer miles programs or point systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 30/0207 - Discounts or incentives, e.g. coupons or rebates
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists