Methods and server systems for computing fraud risk scores for various merchants associated with an acquirer described herein. The method performed by a server system includes accessing merchant-related transaction data including merchant-related transaction indicators associated with a merchant from a transaction database. Method includes generating a merchant-related transaction features based on the merchant-related indicators. Method includes generating via risk prediction models, for a payment transaction with the merchant, merchant health and compliance risk scores, merchant terminal risk scores, merchant chargeback risk scores, and merchant activity risk scores based on the merchant-related transaction features. Method includes facilitating transmission of a notification message to an acquirer server associated with the merchant. The notification message includes the merchant health and compliance risk scores, the merchant terminal risk scores, the merchant chargeback risk scores, and the merchant activity risk scores.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
2.
ARTIFICIAL INTELLIGENCE BASED METHODS AND SYSTEMS FOR PREDICTING CREDITWORTHINESS OF MERCHANTS
Embodiments provide methods and systems for determination of creditworthiness of a first merchant. The method performed by a server system includes receiving invoice data of the first merchant from a merchant invoice database. The invoice data includes information of past invoices associated with the first merchant. Additionally, the method includes generating a homogeneous graph based, at least in part, on the information of past invoices. Further, the method includes determining a feature representation of the first merchant based on data features associated with the first merchant in the homogenous graph. Furthermore, the method includes calculating a credit risk score for the first merchant based on the credit risk score model.
Embodiments provide methods and systems for determining validity of certificates while performing a transaction in a network. A method performed by server system includes receiving a check certificate request message from a plug-in server upon detecting by the plug-in server that a certificate associated with an access control server (authentication server) during a payment transaction is invalid. The check certificate request message includes at least a message reference identifier. The method further includes accessing one or more certificate attributes of the certificate associated with the authentication server based, at least in part, on message reference identifier; determining validity of the certificate associated with the authentication server based, at least in part, on the one or more certificate attributes; and transmitting an update certificate request message to the authentication server based, at least in part, on determining that the certificate associated with the authentication server is invalid.
Methods and server systems for computing fraud risk scores for various merchants associated with an acquirer described herein. The method performed by a server system includes accessing merchant-related transaction data including merchant-related transaction indicators associated with a merchant from a transaction database. Method includes generating a merchant-related transaction features based on the merchant-related indicators. Method includes generating via risk prediction models, for a payment transaction with the merchant, merchant health and compliance risk scores, merchant terminal risk scores, merchant chargeback risk scores, and merchant activity risk scores based on the merchant-related transaction features. Method includes facilitating transmission of a notification message to an acquirer server associated with the merchant. The notification message includes the merchant health and compliance risk scores, the merchant terminal risk scores, the merchant chargeback risk scores, and the merchant activity risk scores.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/14 - Architectures de paiement spécialement adaptées aux systèmes de facturation
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
5.
Systems and Methods for Use in Authenticating Users in Connection With Network Transactions
Systems and methods are provided for authenticating users. An exemplary method includes receiving, by a directory server (DS), an authentication request for a transaction to an account where the request includes a token and a cryptogram, and transmitting the token and cryptogram to a digital service server (DSS). The method also includes mapping, by the DSS, the token to an account number for the account, validating the cryptogram, generating a directory server nonce (DSN) for the request, and transmitting the DSN and the account number to the DS. The method further includes transmitting, by the DS, the DSN and the account number to an access control server (ACS) associated with an issuer of the account and, in response to an issuer authentication value (IAV), compiling an accountholder authentication value (AAV) including the IAV, the DSN and an amount of the transaction and transmitting the AAV to a merchant or server.
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
6.
SYSTEMS AND METHODS FOR MERGING NETWORKS OF HETEROGENEOUS DATA
A method and system for merging heterogeneous data types are provided. The method includes receiving a first corpus of first data, the first data includes an indicator of an interaction between a first element of the first corpus of first data and a second element of the first corpus of first data, receiving a second corpus of second data, the second data includes an indication of an interaction between a third element of the second corpus of second data and a fourth element of the second corpus of data, and generating a third matrix using correlations of the first and second elements with correlations of the third and fourth elements.
Described herein is a data security system for enabling tokenized access to sensitive data, including a token provider configured to initiate a secure connection with a remote client computing device of a first data subject, and receive, from the remote client computing device, a request for an access token to provide a service provider with access to sensitive data associated with the first data subject. The request includes a data definition and authorization parameters including a data source identifier. The token provider is also configured to generate the access token that enables access to the sensitive data from the data source, store the access token in a token database, and transmit, to the remote client computing device, a response including the access token and instructions that enable the remote computing device to display the access token to the first data subject or transmit the access token to the service provider.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
G16H 10/60 - TIC spécialement adaptées au maniement ou au traitement des données médicales ou de soins de santé relatives aux patients pour des données spécifiques de patients, p.ex. pour des dossiers électroniques de patients
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
The present invention relates to an apparatus, a method, and a system for determining location. The apparatus comprises an apparatus comprising a camera, and a processor. The camera is configured to capture an image of a microscopic object located at a predetermined location. The microscopic object comprises coded information. The processor is configured to process the image to decode the coded information and to determine a location of the device as being the predetermined location based on the decoded information. The apparatus may further comprise a manually operated inventory carrier (such as a shopping trolley or cart) or a robotic inventory carrier. The predetermined location may be in a supermarket or an inventory facility. The microscopic object may comprise a QR code or other barcode, and may be one of an array or repeating patterns of microscopic objects.
Methods and systems for preventing geographically unauthorized blockchain transactions are discussed herein. Participants in a blockchain provide information during an onboarding process to identify a geographic location associated therewith. During the onboard, a geographic key is assigned to the participant based on their geographic location. When a new proposed blockchain transaction is submitted, the geographic keys associated with the participants are identified. If the geographic keys match, which indicates that the participants are associated with the same geographic location, then the transaction is authorized and goes through a standard blockchain approval process. If the geographic keys do not match, indicating that the participants are in different geographic locations, then a check is performed to determine if the transaction can proceed using a smart contract, which determines if there are any sanctions or other regulations preventing the transaction from taking place between the participants in the associated geographic locations.
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 50/26 - Services gouvernementaux ou services publics
10.
SYSTEMS AND METHODS FOR PROVISIONING TOKENS FOR MULTIPLE USERS TO A TOKEN STORAGE DEVICE
A token management computing system for provisioning at least one secure payment token for use in payment transactions is provided. The token management computing system includes a token storage device in communication with a plurality of user computing devices each associated with a respective user, and a token management (“TM”) server. The TM server is programmed to receive a token request for at least one token, generate, upon receiving the token request, the at least one token, wherein the at least one token includes at least one of i) a prepaid token including prepaid funds, ii) multiple tokens each associated with a different user, and iii) a budgeting token associated with a plurality of virtual budget accounts.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/28 - Schémas de prépaiement, c. à d. de "paiement préalable"
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
11.
ARTIFICIAL INTELLIGENCE BASED METHODS AND SYSTEMS FOR IMPROVING ACCURACY OF AUTHORIZATION OPTIMIZER
Methods and server systems for improving accuracy of authorization optimizer are described herein. Method performed by server system includes receiving a Non- Sufficient Funds (NSF) error message from an acquirer server. Method includes accessing historical transaction data from a transaction database. The historical transaction data includes transaction related information associated with a plurality of users. Method includes generating a plurality of transaction features associated with the user based on the historical transaction data. Method includes determining via an authorization optimizer model, an optimal time slot from a plurality of time slots for the user based on the plurality of transaction features associated with the user. The optimal time slot indicates an optimal time window for the acquirer server to transmit an upcoming recurring payment request to the payment account of the user. Method includes facilitating transmission of a notification message including the optimal time slot to the acquirer server.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06N 3/0442 - Réseaux récurrents, p.ex. réseaux de Hopfield caractérisés par la présence de mémoire ou de portes, p.ex. mémoire longue à court terme [LSTM] ou unités récurrentes à porte [GRU]
12.
DIGITIZATION OF PAYMENT CARDS FOR WEB 3.0 AND METAVERSE TRANSACTIONS
Systems and techniques for digitization of payment cards for Web 3.0 (“Web3”) and metaverse transactions are provided. The described systems and techniques allow for the use of non-fungible tokens (NFTs) to represent a payment token for making a payment inside a Web3 and Metaverse environment. Indeed, the described systems and techniques provide a financial NFT enabled representation of a payment card account as a token in a blockchain network, which can then be used to facilitate Web3 payments with real-time fiat to crypto exchanges.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
13.
SYSTEM AND METHOD FOR AUTHENTICATION OF PROCESSED AUDIO FILES
An audio file authentication system configured to extract a plurality of audio features for a plurality of raw audio files containing a digital recording of a specific user's voice, provide an authenticated audio file that includes a digital recording the specific user's voice based on the authentication information for the specific user, generate a parent hash key and sequential child hash keys that are unique to the authenticated audio file, and generate a processed audio file in which the parent hash key and each of the sequential child hash keys is inserted sequentially as data within the audio gaps of the audio file.
G10L 17/06 - Techniques de prise de décision; Stratégies d’alignement de motifs
G10L 17/02 - Opérations de prétraitement, p.ex. sélection de segment; Représentation ou modélisation de motifs, p.ex. fondée sur l’analyse linéaire discriminante [LDA] ou les composantes principales; Sélection ou extraction des caractéristiques
G10L 17/04 - Entraînement, enrôlement ou construction de modèle
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
14.
METHODS AND SYSTEMS OF USING SUB-DOMAINS TO FEDERATE DEVICE CREDENTIALS SCOPED TO A COMMON DOMAIN
A computer-implemented method for authenticating a user device via a device credential scoped to a common domain shared among a plurality of payment networks may be provided. The method may include receiving, by a server of a payment network, a first request redirected from a sub-domain assigned to the payment network to a domain name associated with the payment network, responsive to the first request, transmitting, to the user device, an authentication request comprising a challenge, a user identifier that identifies the user, and the common domain to which the device credential is scoped, receiving, from the user device, a response, accessing the device credential, the device credential having been stored by the payment network, validating the response based on the device credential, and causing, by the server, the user identifier and the device credential to be federated to the other ones of the plurality of payment networks based on the validating.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
15.
SYSTEMS AND METHODS FOR USE IN REDEMPTION OF TOKENS
Systems and methods are provided for use in redeeming tokens. One example computer-implemented method includes receiving, by a processing network, from a first institution, an authorization request for redemption of a token by a user and checking a data structure escrow address associated with the redemption of the token. The method also includes, in response to the data structure address being indicative of the token, authorizing the redemption, whereby the institution transfers value associated with the token to the user.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
16.
SYSTEMS AND METHODS FOR INCORPORATING BREACH VELOCITIES INTO FRAUD SCORING MODELS
A method and system for detecting fraudulent network events in a payment card network by incorporating breach velocities into fraud scoring models are provided. A potential compromise event is detected, and payment cards that transacted at a compromised entity associated with the potential compromise event are identified. Subsequent transaction activity for the payment cards is reviewed, and a data structure for the payment cards are generated. The data structure sorts subsequent transaction activity into fraud score range stripes. The data structure is parsed over a plurality of time periods, and at least one cumulative metric is calculated for each of the time periods in each fraud score range stripe. A plurality of ratio striping values are determined, and a set of feature inputs is generated using the ratio striping values. The feature inputs are applied to a scoring model used to score future real-time transactions initiated using the payment cards.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Described is a computer system for creating a digital record of a physical item of value. The computer system includes a network computer device comprising at least one processor communicatively coupled to at least one memory and a distributed network of computer nodes each associated with a respective entity of a plurality of entities, each computer node comprising a camera and an optical character recognition (OCR) application executable thereon, each computer node is communicatively coupled to the network computer device.
Systems and techniques for digitization of payment cards for Web 3.0 ("Web3") and metaverse transactions are provided. The described systems and techniques allow for the use of non-fungible tokens (NFTs) to represent a payment token for making a payment inside a Web3 and Metaverse environment. Indeed, the described systems and techniques provide a financial NFT enabled representation of a payment card account as a token in a blockchain network, which can then be used to facilitate Web3 payments with real-time fiat to crypto exchanges.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
A method for facilitating permission-based cryptographic transactions across service providers includes: receiving an onboarding request including permission data and an identification value from a first computing system, the identification value being associated with a first blockchain wallet for a blockchain associated with a blockchain network; generating a permission token based on the permission data and an alias, the permission token including verified identity data points; transmitting the generated alias to the first computing system in response to the onboarding request; receiving a token request from a second computing system, the token request including the alias; and transmitting the generated permission token identification value to the second computing system in response to the token request.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Software as a service (saas) services, namely, providing online non-downloadable software using generative artificial intelligence and machine learning in the field of financial services; software as a service (saas) services, namely, providing online non-downloadable software using generative artificial intelligence and machine learning for research and analysis of data, payment transactions and experiences, market trends, credit card comparisons, and consumer insights; software as a service (saas) services, namely, providing online non-downloadable software for machine-learning-based language and speech processing software for use in the fields of financial services, data analysis and market trend reporting, and consumer insights, market trends, credit card comparison, and consumer insights; software as a service (saas) services, namely, providing online non-downloadable software for sharing datasets for the purpose of machine learning and predictive analytics; downloadable software for developing, running and analyzing algorithms that are able to learn to analyze, classify, and take actions in response to exposure to data; software as a service (saas) services, namely, providing online non-downloadable software with virtual assistant capabilities; software as a service (saas) services, namely, providing online non-downloadable software for data analysis, data processing, deep learning, generative artificial intelligence, generating text and graphics, and simulating conversations; software development services; software consulting services; research and development services in the field of generative artificial intelligence; research, design and development of software
21.
SYSTEMS AND METHODS FOR USE IN REDEMPTION OF TOKENS
Systems and methods are provided for use in redeeming tokens. One example computer-implemented method includes receiving, by a processing network, from a first institution, an authorization request for redemption of a token by a user and checking a data structure escrow address associated with the redemption of the token. The method also includes, in response to the data structure address being indicative of the token, authorizing the redemption, whereby the institution transfers value associated with the token to the user.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
A method for facilitating permission-based cryptographic transactions across service providers includes: receiving an onboarding request including permission data and an identification value from a first computing system, the identification value being associated with a first blockchain wallet for a blockchain associated with a blockchain network; generating a permission token based on the permission data and an alias, the permission token including verified identity data points; transmitting the generated alias to the first computing system in response to the onboarding request; receiving a token request from a second computing system, the token request including the alias; and transmitting the generated permission token identification value to the second computing system in response to the token request.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
23.
MOBILE DEVICE PLATFORM FOR AUTOMATED VISUAL RETAIL PRODUCT RECOGNITION
A computer-implemented method for configuring a mobile point-of-sale application to perform automated product-recognition checkout processes. The application includes a convolutional neural network including hidden layer n positioned downstream of remaining hidden layers and downstream of an input segment of the convolutional neural network. The method includes: appending a fine classification arm operating on output from hidden layer n and having a first loss function for generating output; appending a second classification arm operating on the output from one of the remaining n hidden layers upstream from hidden layer n and having a second loss function for generating output; providing a plurality of true labels for image subset(s) and applicable to at least one product class; and training the CNN by passing the image subsets therethrough, observing corresponding output of the first and second loss functions, and iteratively adjusting values of CNN model parameters based on the loss function outputs.
G06F 16/16 - Opérations sur les fichiers ou les dossiers, p.ex. détails des interfaces utilisateur spécialement adaptées aux systèmes de fichiers
G06F 18/21 - Conception ou mise en place de systèmes ou de techniques; Extraction de caractéristiques dans l'espace des caractéristiques; Séparation aveugle de sources
G06F 18/241 - Techniques de classification relatives au modèle de classification, p.ex. approches paramétriques ou non paramétriques
G06F 18/40 - Dispositions logicielles spécialement adaptées à la reconnaissance des formes, p.ex. interfaces utilisateur ou boîtes à outils à cet effet
G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p.ex. lecture de la lumière blanche réfléchie
The disclosure relates to methods and systems of generating a platform-agnostic identification of an entity through rules-based computational modeling of entity relationships. For example, the platform-agnostic identification of an entity may be used to identify an acquirer entity across different data platforms, such as payment networks, that each assign respective acquirer identifiers to the acquirer entity. The computational modeling may generate a mapping between a first acquirer identifier assigned by a first payment network to the acquirer entity and a second acquirer identifier assigned by a second payment network to the acquirer entity. The mapping may be based on an anchor value that is associated with both the first acquirer identifier and the second acquirer identifier. The mapping may be validated by multi-validation rules and/or issuer-validation rules that reduce false positive results that may occur through computational modeling.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
25.
ACCELERATED VIRTUAL CARD PAYMENTS IN B2B TRANSACTIONS
The disclosure herein relates to methods and systems of that facilitate instant payment of invoices based on automatic, intelligent, predictions that a buyer will approve an invoice without express input by the buyer. For example, a system may determine a probability that an invoice will be approved for payment by a buyer with express approval from the buyer. Once an invoice is automatically approved for payment, the system may employ various automated systems to facilitate payment to suppliers without the need for suppliers to extract virtual card data or other payment information from email payment requests or other invoice payment requirements to receive payment. For example, the system may generate calls to automatically generate virtual card numbers on behalf of buyers and submit payment messages for payments to suppliers using the virtual card numbers.
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 30/016 - Fourniture d’une assistance aux clients, p. ex pour assister un client dans un lieu commercial ou par un service d’assistance après-vente
26.
CONSERVING SYSTEM RESOURCES WITH CREDENTIAL DIGITIZATION AND ENROLLMENT
Examples provide a system and method for digitization of payment credentials via a point-of-sale (POS) device. When a physical payment credential is presented, the system determines, in real-time, if the credential is enrolled in a digitized payment credential service. If the credential is not enrolled and the user is qualified for enrollment based on eligibility rules, the system prompts the user to consent to automatic enrollment via the POS device. If consent is obtained, the system triggers digitization of the payment credential, which is stored at the digitized payment credential service. A token corresponding to the digitized payment credential is linked to one or more identifiers of the user, such as email, phone number, shopper account number, biometric data, or other identifiers. When enrollment is complete, the user can provide linked identifier(s) at the POS to complete payment of future transaction without presenting the tokenized physical payment credential.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Various implementations described herein may refer to a compliance platform for use with identity data. In one implementation, a method may include receiving a compliance data package from a user, where the compliance data package includes encrypted evidence data corresponding to digital identity data of the user. The method may also include encrypting the compliance data package using a first cryptographic key. The method may further include generating a user key shard, a requestor key shard, and a regulator key shard based on the first cryptographic key. The method may include generating an unlock data package that includes the requestor key shard and encrypting the unlock data package using a second cryptographic key. The method may also include transmitting the user key shard, the encrypted unlock data package, and the encrypted compliance data package to the user. The method may include transmitting the regulator key shard to a regulator.
H04L 9/14 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p.ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
Methods and server systems for detecting fraudulent transactions are described herein. Method performed by server system includes accessing base graph including plurality of nodes further including plurality of labeled nodes and unlabeled nodes. Method includes assigning via Graph Neural Network (GNN) model, fraudulent label or non-fraudulent label to each unlabeled node based on the base graph. This assigning process includes generating plurality of sub-graphs based on splitting the base graph and filtering these sub-graphs via Siamese Neural Network model based on pre-defined threshold values. Then, the GNN model generates plurality of sets of embeddings based on plurality of filtered sub-graphs. Further, aggregated node embedding is generated for each node and then, final node representation for each node is generated via dense layer of GNN model. Then, fraudulent label or the non-fraudulent label is assigned to each unlabeled node of plurality of unlabeled nodes based on final node representation.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
A data center rack assembly includes a rack, an electronic device, and an adjustable air duct. The rack includes a frame defining opposite first and second rack sides spaced apart in a longitudinal direction. The electronic device presents an intake side configured to receive air therethrough for passage into the electronic device. The electronic device is mounted to the frame such that the intake side is disposed intermediately between the rack sides and is spaced from the first rack side to define a longitudinal dimension therebetween. The duct includes relatively shiftable first and second duct sections that extend in the longitudinal direction to cooperatively present an adjustable longitudinal duct length, and a drive mechanism operably coupled to the first and second sections to control relative shifting of the sections in the longitudinal direction to thereby adjust the longitudinal duct length to correspond with the longitudinal dimension.
Systems and methods are provided for replicating data between different services used to update databases. One example system includes a database and a computing device coupled in communication with the database, wherein the computing device is configured to perform a create, update or delete operation on the data included in the database and to post an entry representative of the operation to an outbox data structure. The computing device is also configured to retrieve the entry from the outbox data structure; publish the entry as a first message to a message bus, thereby informing a different data system of the operation in the database; receive a second message from the message bus indicative of a create, update or delete operation at a database included in a different data system; and direct a service of the system to perform the create, update or delete operation of the second message.
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
31.
SYSTEM AND METHOD FOR PROVIDING PUSH PAYMENT TRANSACTION PROCESSING IN A CARD-PRESENT ENVIRONMENT
Systems and methods for providing push payment transaction processing in a card-present environment are provided. The described push payment transactions processing enables a user having any form factor visiting at a merchant location accepting payment cards to perform push payment transactions. Indeed, push payment transactions can be supported from physical point-of-sale ("POS") or originate from POS terminals. During the described push payment transaction processing, a merchant acquirer can receive, from a POS terminal, a push payment transaction request comprising at least a transaction type indicating a push payment transaction, transaction information, authorization data, and sender information. In response to receiving the push payment transaction request, the merchant acquirer can generate an application programming interface (API) request package comprising the push payment transaction request; and communicate the API request package to an intermediary platform connected to a payment network.
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/14 - Architectures de paiement spécialement adaptées aux systèmes de facturation
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/16 - Paiements effectués par le biais de systèmes de télécommunication
32.
Systems, Methods and Computer Program Products for Contactless Payment Card
Security at Unattended Type Terminals
The invention secures contactless payment cards against misuse at ‘unattended type’ terminal devices having near field communication capabilities. The invention involves receiving from a communication device a first unique identifier associated with a contactless payment card, and a second unique identifier associated with the communication device. Transmission of the first unique identifier and the second unique identifier from the communication device is implemented in response to the communication device detecting a contactless card tap event, and the communication device retrieving the first unique identifier from the contactless payment card. The invention involves selectively implementing one of a first payment authorization communication flow and a second payment authorization communication flow. The selective implementation is based on whether the first and second unique identifiers have been recorded within a database that stores combinations of payment card identifiers and communication device identifiers for payment transactions that have been previously successfully authorized.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
33.
SYSTEM AND METHOD FOR PROVIDING PUSH PAYMENT TRANSACTION PROCESSING IN A CARD-PRESENT ENVIRONMENT
Systems and methods for providing push payment transaction processing in a card-present environment are provided. The described push payment transactions processing enables a user having any form factor visiting at a merchant location accepting payment cards to perform push payment transactions. Indeed, push payment transactions can be supported from physical point-of-sale (“POS”) or originate from POS terminals. During the described push payment transaction processing, a merchant acquirer can receive, from a POS terminal, a push payment transaction request comprising at least a transaction type indicating a push payment transaction, transaction information, authorization data, and sender information. In response to receiving the push payment transaction request, the merchant acquirer can generate an application programming interface (API) request package comprising the push payment transaction request; and communicate the API request package to an intermediary platform connected to a payment network.
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
34.
METHODS AND SYSTEMS FOR EXTENDING INSTALLMENT OPTIONS
Systems and methods are provided for use in providing users with options at points of interaction. One example method includes posting a record for an installment option to an immutable data structure, where the record includes a total amount, payment terms associated with multiple installments, a first hashed value associated with a first party, and an identifier of the first party. The method also includes receiving a request related to the record, where the request includes a secret and a second hashed value, and validating the request based on the secret and the first hashed value included in the immutable data structure. The method then includes, based on validation of the request, coordinating a fund transfer consistent with the request and updating the record included in the immutable data structure to include the second hashed value in association with the identifier of the first party.
G06Q 20/24 - Schémas de crédit, c. à d. de "paiement différé"
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
35.
SYSTEMS AND METHODS FOR USE IN SECURING BACKUP DATA FILES
Systems and methods are provided for backing up a data file. One example computer-implemented method includes generating an L4 key and, for each contact attribute of the data file, generating an L3 file including the L4 key and an identifier of a user and encrypting the L3 file with an un-masked version of the contact attribute. The method also includes compiling the encrypted L3 file(s) and the masked version(s) of the contact attribute(s) into an L2 file, generating an L2 key, encrypting the L2 file with the L2 key, compiling the encrypted L2 file and L2 key into an L1 file, generating an L1 key, encrypting the L1 file with the L1 key, compiling an L4 file to include identity attributes of the user, encrypting the L4 file with the L4 key, and combining the encrypted L4 file and the encrypted L1 file.
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p.ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
G06F 21/78 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données
36.
DATA CLEAN-UP METHOD FOR IMPROVING PREDICTIVE MODEL TRAINING
A method that improves the training of predictive models. Better trained predictive models make better predictions, and can classify transactions with reduced levels of false positives and false negative. Included is an apparatus for executing a data clean-up algorithm that harmonizes a wide range of real world supervised and unsupervised training data into a single, error-free, uniformly formatted record file that has every field coherent and well populated with information.
G06N 5/04 - Modèles d’inférence ou de raisonnement
G06F 16/215 - Amélioration de la qualité des données; Nettoyage des données, p.ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
37.
SYSTEMS AND METHODS FOR ADVANCED SYNTHETIC DATA TRAINING AND GENERATION
A data generation system for a secure synthetic data generation is provided. The system includes at least one processor and a memory device in operable communication with the at least one processor. The memory device includes computer-executable instructions stored therein, which, when executed by the processor, cause the at least one processor to receive a plurality of historical data including one or more trends; train a data generator with the plurality of historical data and a plurality of noise data to generate data to simulate the one or more trends; receive one or more user input parameters; execute the data generator with the one or more user input parameters to generate a plurality of synthetic data, wherein the plurality of synthetic data includes the one or more trends; and output the plurality of synthetic data to a user.
G06F 30/27 - Optimisation, vérification ou simulation de l’objet conçu utilisant l’apprentissage automatique, p.ex. l’intelligence artificielle, les réseaux neuronaux, les machines à support de vecteur [MSV] ou l’apprentissage d’un modèle
A computer system includes a processor and a memory device. The computer system is configured to execute a function that builds a software instance definition object. The software instance definition object includes one or more configuration items, attributes, permissions, and linkages to other objects, which define a software instance. The computer system temporarily stores the software instance definition object in the memory device. The computer system updates at least one of the configuration items, attributes, permissions, and linkages to other objects of the stored software instance definition object, thereby creating an updated software instance definition object. A fix command is then executed to update the software instance based on the updated software instance definition object, thereby creating an updated software instance. After creating the updated software instance, the software instance definition object is deleted from the memory device.
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Advertising, promotion and marketing services in the nature of email campaigns for others; business records management; business data analytics; business management and business strategy development
(2) Financial services, namely, electronic processing of electronic funds transfer, ACH, credit card, debit card, electronic check and electronic payments financial services, namely, electronic processing of bill payments and associated remittance and confirmation data
(3) Software as a service (SaaS) featuring software for business management and customer relationship management (CRM); providing online non-downloadable software for the creation and distribution of email and marketing campaigns; providing online non-downloadable software for document management, namely storing, managing, tracking, analyzing and exchanging of documents; electronic generation and capture of invoices; providing online non-downloadable computer software for accounts payable invoicing and payment functions via a hosted, online service; software as a service (SaaS) featuring software for transaction and payment processing services, financial record-keeping, and management of financial data; Designing, developing and maintenance of a marketing software platform for third parties for marketing and analytics, customer relationship management and business data analysis; providing online non-downloadable software for group calendar management, contact management, task delegation and reporting, and recording of notes; providing online non-downloadable software for electronic messaging
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Advertising, promotion and marketing services; advertising, promotion and marketing services in the nature of email campaigns for others; business records management; business data analytics; business management and business strategy development; invoicing services; electronic generation and capture of invoices; accounting services; billing and payroll services; customer relationship management services; business consultancy services relating to the development of new business; business meeting planning and scheduling services; business organisation and administration services; information, advisory and consultancy services relating to all the aforesaid services. Financial services; fund transfer services; electronic payment services; payment processing services; credit card and debit card payment processing services; financial services, namely, electronic processing of electronic funds transfer, ACH, credit card, debit card, electronic check and electronic payments; financial services, namely, electronic processing of bill payments and associated remittance and confirmation data; information, advisory and consultancy services relating to all the aforesaid services. Software as a service (SaaS); platform as a service (PaaS); providing online non-downloadable software; Software as a service (SaaS) featuring software for business management and customer relationship management (CRM); providing online non-downloadable software for the creation and distribution of email and marketing campaigns; providing online non-downloadable software for document management, namely storing, managing, tracking, analyzing and exchanging of documents; providing online non-downloadable computer software for accounts payable invoicing and payment functions via a hosted, online service; software as a service (SaaS) featuring software for transaction and payment processing services, financial record-keeping, and management of financial data; designing, development and maintenance of software; Designing, developing and maintenance of a marketing software platform for third parties for marketing and analytics, customer relationship management and business data analysis; providing online non-downloadable software for group calendar management, contact management, task delegation and reporting, and recording of notes; providing online non-downloadable software for electronic messaging; hosting of web portals; electronic storage of data, files and documents; information, advisory and consultancy services relating to all the aforesaid services.
A system and computer-implemented method for optimising, by a quantum computer, an allocation of opportunities to recipients comprising: determining a plurality of opportunities to be allocated; determining a plurality of recipients to be allocated at least one of the plurality of opportunities; determining a respective acceptance likelihood of each of the plurality of recipients accepting each of the plurality of opportunities; determining a first constraint associated with a cost acceptance of each of the plurality of opportunities by the plurality of recipients; and determining an optimised allocation of the opportunities to the recipients based on the respective likelihoods and the first constraint, in the quantum computer.
A method and system for recommending a merchant are provided. The method includes receiving financial transaction data documenting financial transactions between a plurality of account holders and a plurality of merchants and generating a merchant correspondence matrix that includes the plurality of merchants and a plurality of indicators of interactions associated with pairs of the plurality of merchants. The plurality of indicators of interactions tallying financial transactions conducted by the plurality of account holders at both of the merchants in a pair of the plurality of merchants. The method further includes receiving a query for a recommendation of a merchant from an account holder and generating a ranked list of merchants based on a recommender algorithm. The recommender algorithm inferring user preferences from attributes of the plurality of merchants that were visited by the cardholder.
G06Q 30/0282 - Notation ou évaluation d’opérateurs commerciaux ou de produits
G06F 7/08 - Tri, c. à d. rangement des supports d'enregistrement dans un ordre de succession numérique ou autre, selon la classification d'au moins certaines informations portées sur les supports
43.
EFFICIENT USER CONTROL OF THEIR DATA STORED IN A CENTRALISED BIOMETRIC DATABASE
There is disclosed a computer implemented method (300) of managing user accounts at a biometric database, the biometric database comprising biometric data of a user. The method comprises the steps of: receiving (301), at the biometric database, a message from a user device to suspend a user's account, the message comprising a cryptographic parameter; suspending (303) the user's account, the step of suspending comprising: encrypting (305), at the biometric database, biometric data of the user associated with the user's account using the cryptographic parameter; storing (307), the encrypted biometric data; and discarding (309), at the biometric database, the cryptographic parameter; and transmitting (311), from the biometric database, a message to the user device indicating that the user's account has been suspended.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
44.
METHOD AND SYSTEM FOR PAYMENT PROCESSING USING DISTRIBUTED DIGITIZED SURROGATES
A method for pre-authorization of a payment transaction with tokenized credentials includes: receiving a first data set signed with a first digital signature and including an acquirer identification value and a second data set; verifying the first digital signature using a first public key of a first cryptographic key pair associated with the acquirer identification value; extracting, from the first data set in response to verification of the first digital signature, the second data set including a merchant identification value and a third data set; extracting, from the second data set, the third data set including an issuer identification value and transaction data; identifying an issuing computing system based on the issuer identification value; and transmitting a fourth data set to the issuing computing system, the fourth data set including the first data set and a steward identification value.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
45.
DEEP LEARNING SYSTEMS AND METHODS FOR PREDICTING IMPACT OF CARDHOLDER BEHAVIOR BASED ON PAYMENT EVENTS
A system is configured to retrieve a set of customer raw transaction data, wherein the transactions are devoid of any target transactions of interest. An impact neural network model is applied to the transaction data using a “notTarget” variable. The “notTarget” variable indicates that the target transaction of interest is not included in the transaction data. The model predicts a first result based on the “notTarget” variable. The model is applied to the transaction data using an “isTarget” variable. The “isTarget” variable indicates that the target transaction of interest is included in the set of customer raw transaction data. The model predicts a second result based on the “isTarget” variable. The system determines a difference between the second and first results. The difference is a predicted incremental impact on cardholder behavior. The system presents the predicted incremental impact on cardholder behavior to an issuer associated with the transaction data.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
46.
METHOD AND SYSTEM FOR PAYMENT PROCESSING USING DISTRIBUTED DIGITIZED SURROGATES
A method for pre-authorization of a payment transaction with tokenized credentials includes: receiving a first data set signed with a first digital signature and including an acquirer identification value and a second data set; verifying the first digital signature using a first public key of a first cryptographic key pair associated with the acquirer identification value; extracting, from the first data set in response to verification of the first digital signature, the second data set including a merchant identification value and a third data set; extracting, from the second data set, the third data set including an issuer identification value and transaction data; identifying an issuing computing system based on the issuer identification value; and transmitting a fourth data set to the issuing computing system, the fourth data set including the first data set and a steward identification value.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A system is configured to retrieve a set of customer raw transaction data, wherein the transactions are devoid of any target transactions of interest. An impact neural network model is applied to the transaction data using a "notTargef ' variable. The "notTargef ' variable indicates that the target transaction of interest is not included in the transaction data. The model predicts a first result based on the "notTargef' variable. The model is applied to the transaction data using an "isTargef ' variable. The "isTargef ' variable indicates that the target transaction of interest is included in the set of customer raw transaction data. The model predicts a second result based on the "isTargef ' variable. The system determines a difference between the second and first results. The difference is a predicted incremental impact on cardholder behavior. The system presents the predicted incremental impact on cardholder behavior to an issuer associated with the transaction data.
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06N 20/20 - Techniques d’ensemble en apprentissage automatique
G06N 5/04 - Modèles d’inférence ou de raisonnement
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06F 17/18 - Opérations mathématiques complexes pour l'évaluation de données statistiques
G06F 21/72 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information dans les circuits de cryptographie
A system and computer-implemented method for allocating a plurality of transactions to a plurality of networks comprising: receiving from a router at a classical computer a plurality of first information associated with a respective one of the plurality of transactions; receiving from a router at the classical computer a plurality of second information associated with a respective one of the plurality of networks; determining in the classical computer a switching characteristic to be optimised by the allocation of the plurality of transactions to the plurality of networks; expressing by the classical computer in at least one expression to a quantum computer, the plurality of first information, the plurality of second information and the switching characteristic; resolving in the quantum computer the at least one expression to determine the allocation of the plurality of transactions to the plurality of networks; and providing the allocation to the router.
Systems and methods are provided for associating authentications and authorizations in connection with network interactions. An exemplary system includes a computing device configured to receive an authorization request for a network interaction from an acquirer, where the authorization request represents a transaction to a payment account and includes a transaction amount and an accountholder authentication value (AAV) indicative of a prior authentication associated with the transaction. The computing device is configured to determine whether the authorization request, the transaction amount and/or an interval associated with the authorization request satisfies a parameter. In response to the authorization request, the transaction amount and/or the interval associated with the authorization request failing to satisfy the parameter, the computing device is configured to append a tag indicative of the parameter to the authorization request and transmit the authorization request to an issuer of the payment account.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
50.
DEEP LEARNING SYSTEMS AND METHODS FOR PREDICTING IMPACT OF CARDHOLDER BEHAVIOR BASED ON PAYMENT EVENTS
A system is configured to retrieve historical raw transaction data, wherein each transaction is one of a target or non-target transaction. The target transactions are related to a target transaction event. A target transaction identifier is appended to each target transaction. The raw transaction data is stored to a first data table. A first neural network is trained using the first data table to generate a training data classification model. The training data classification model is applied to the first data table. A first similarity score distribution associated with the target transactions and a second similarity score distribution associated with the non-target transactions is determined. A plurality of non-target transactions whose combined similarity score distribution matches the target transactions is selected. The target transactions and the selected plurality of non-target transactions are stored to a second data table and a second neural network is trained using the second data table.
There is disclosed a computer implemented method (300) of managing user accounts at a biometric database, the biometric database comprising biometric data of a user. The method comprises the steps of: receiving (301), at the biometric database, a message from a user device to suspend a user's account, the message comprising a cryptographic parameter; suspending (303) the user's account, the step of suspending comprising: encrypting (305), at the biometric database, biometric data of the user associated with the user's account using the cryptographic parameter; storing (307), the encrypted biometric data; and discarding (309), at the biometric database, the cryptographic parameter; and transmitting (311), from the biometric database, a message to the user device indicating that the user's account has been suspended.
G06F 16/22 - Indexation; Structures de données à cet effet; Structures de stockage
G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
A system is configured to retrieve historical raw transaction data, wherein each transaction is one of a target or non-target transaction. The target transactions are related to a target transaction event. A target transaction identifier is appended to each target transaction. The raw transaction data is stored to a first data table. A first neural network is trained using the first data table to generate a training data classification model. The training data classification model is applied to the first data table. A first similarity score distribution associated with the target transactions and a second similarity score distribution associated with the non-target transactions is determined. A plurality of non-target transactions whose combined similarity score distribution matches the target transactions is selected. The target transactions and the selected plurality of non-target transactions are stored to a second data table and a second neural network is trained using the second data table.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Promoting the services of others Providing grants to organizations working with small business owners Providing small business use technology resources to digitize their operations
54.
METHOD AND SYSTEM OF IDENTIFYING AND REDUCING SCALPING USING DISTRIBUTED LEDGERS
A method for preventing an unauthorized transaction indicative of scalping includes: receiving transaction data for a first payment transaction including one or more product identifiers associated with one or more products purchased in the first payment transaction and consumer identification data; updating a consumer profile based on the one or more product identifiers, wherein the consumer profile is identified using the consumer identification data; receiving a transaction message for a second payment transaction including at least one product identifier included in the one or more product identifiers and at least one consumer data value that is also included in the consumer profile; determining a suspicion score for the consumer profile above a predetermined threshold value; and transmitting an authorization response message for the second payment transaction including a response code indicative of rejection of the second payment transaction.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
55.
METHOD AND SYSTEM FOR ENABLING COMMUNICATION BETWEEN BLOCKCHAINS ON HETEROGENEOUS BLOCKCHAIN NETWORKS
A system for enabling communication between blockchains on heterogeneous blockchain networks. The system can include a sending blockchain network comprised of a sending blockchain that includes a plurality of blocks, each block including a block header and one or more transaction values associated with an identification request transmitted by the sending blockchain. The system can include a directory service node configured to receive the identification request from the sending blockchain, and identify a receiving blockchain, which forms part of a receiving blockchain network. The system can include an identity service node configured to receive a trust request from the directory service node to determine whether a valid trust certificate is available for the receiving blockchain, and enable communication between the sending blockchain and the receiving blockchain, when the valid trust certificate is determined to be available.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
A method for generating and provisioning payment credentials to a mobile device lacking a secure element includes: generating a card profile associated with a payment account, wherein the card profile includes at least payment credentials corresponding to the associated payment account and a profile identifier; provisioning, to a mobile device lacking a secure element, the generated card profile; receiving, from the mobile device, a key request, wherein the key request includes at least a mobile identification number (PIN) and the profile identifier; using the mobile PIN; generating a single use key, wherein the single use key includes at least the profile identifier, an application transaction counter, and a generating key for use in generating a payment cryptogram valid for a single financial transaction; and transmitting the generated single use key to the mobile device.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
57.
METHOD AND SYSTEM OF FACILITATING PAYMENTS THROUGH AN INTERMEDIARY PLATFORM
A method for facilitating payments across multiple platforms and networks includes: establishing communication channels with each of a plurality of enterprise systems; establishing communication channels with each of a plurality of payment networks; receiving a payment request message via one of the enterprise systems using the associated channel, the payment request message including a payee identifier and payment amount; identifying a computing device based on the payee identifier; transmitting a notification message to the computing device including the payment amount; receiving a response message from the computing device including a network identifier; and processing payment of the payment amount to a payee using one of the payment networks selected based on the network identifier, wherein processing payment of the payment amount includes transmitting one or more data messages to the one of the payment networks using the established communication channel.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/42 - Confirmation, p.ex. contrôle ou autorisation de paiement par le débiteur légal
An internal flow determination method comprising the steps of: receiving, at a classical computer, an input flow vector comprising a plurality of input entries. Then, receiving an output flow vector comprising a plurality of output entries. Said output entries are indicative of a monetary amount exiting the processing node. Determining an objective optimization problem subject to one or more constraints, wherein an objective of the objective optimization problem is to determine: an input flow matrix and an output flow matrix. Then, determining a quadratic unconstrained binary optimization (QUBO) formulation suitable for implementing the objective optimization problem. Solving, by a quantum computer, the QUBO formulation, thereby providing a solution representative of the input flow matrix and the output flow matrix. Finally, generating, by the classical computer, a probability matrix indicative of a probability that an internal flow of the processing node connects an input entry to an output entry.
A method for facilitating payments across multiple platforms and networks includes: establishing communication channels with each of a plurality of enterprise systems; establishing communication channels with each of a plurality of payment networks; receiving a payment request message via one of the enterprise systems using the associated channel, the payment request message including a payee identifier and payment amount; identifying a computing device based on the payee identifier; transmitting a notification message to the computing device including the payment amount; receiving a response message from the computing device including a network identifier; and processing payment of the payment amount to a payee using one of the payment networks selected based on the network identifier, wherein processing payment of the payment amount includes transmitting one or more data messages to the one of the payment networks using the established communication channel.
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
60.
PROVISIONING OF PAYMENT ACCEPTANCE TO PAYMENT ACCOUNT HOLDERS
A method includes receiving a request for enrollment from a user at a wallet service provider (WSP) computer, and enrolling the user in the WSP computer. A message is transmitted to the user to query the user about accepting payment card account system transactions. A response to the message, from the user, is received in the WSP computer. The WSP computer downloads, to a device operated by the user, a list of acquirer financial institutions. The WSP computer receives, from the device operated by the user, an indication that the user has selected one of the acquirer financial institutions from the list. An application program supplied by the selected acquirer financial institution is downloaded to the device operated by the user.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
61.
MACHINE LEARNING FOR AUTHENTICATION BASED ON DEVICE PROXIMITY
A device and method of authentication includes pairing a card to a mobile electronic device and a wearable device. A machine learning model is trained by obtaining first received signal strength indicator (RSSI) data from the card, the mobile electronic device, and the wearable device at calibrated distances. A first estimated proximity radius encompassing the card, the mobile electronic device, and the wearable device is calculated. The first estimated proximity radius is classified to be within a threshold. Upon receipt of a request to authorize a request, second RSSI data from the card, the mobile electronic device, and the wearable device is obtained. A second estimated proximity radius encompassing the card, the mobile electronic device, and the wearable device is calculated. Using the trained machine learning model, the second estimated proximity radius is determined to be within the threshold. Authentication is then complete.
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Financial services, namely, banking, credit card services, debit card services, charge card services, pre-paid card services offered through cards with stored value, electronic credit and debit transactions, bill payment and presentment services, cash disbursement, check verification, check cashing, deposit access and automated teller machine services, transaction authorization and settlement services, transaction reconciliation, cash management, consolidated funds settlement, consolidated dispute processing, funds movement services in the field of payment cards, electronic payment processing services, payment transaction authentication and verification services, value exchange services, namely, secure electronic cash transactions and electronic cash transmissions, over public computer networks to facilitate electronic commerce, providing financial information, namely, credit and debit card data and reports, electronic funds transfer and currency exchange services, financial assessment and risk management services for others in the field of consumer credit; dissemination of financial information via a global computer network, financial information rendered by computer by means of a secure information computer network and advisory services regarding all of the foregoing services; the provision of financial services for the support of retail services provided through mobile telecommunications means, namely, payment services through wireless devices; the provision of financial services for the support of retail services provided on-line, through electronic networks; financial analysis and consultation; banking and credit services; banking, payment, credit, debit, charge, cash disbursement, stored valued deposit access services; cheque verification; processing of financial transactions both on-line via a computer database or via telecommunications and at point of sale; processing services for financial transactions by card holders via automatic teller machines; the provision of balance details, deposits and withdrawals of money to card holders via automatic teller machines; financial settlement and financial authorization services in connection with the processing of financial payment transactions; travel insurance services; issuing and redemption of travelers cheques and travel vouchers; payer authentication services; verification of financial information; maintenance of financial records; remote payment services; stored value electronic purse services, electronic payments services and transaction authorization and settlement services; provision of debit and credit services by means of radio frequency identification devices (transponders); provision of debit and credit services by means of communication and telecommunication devices; the provision of financial services for the support of retail services provided through mobile telecommunications means, including payment services through wireless devices; processing of credit and debit transactions by telephone and telecommunication link; the provision of financial services for the support of retail services provided on-line, through networks or other electronic means using electronically digitized information; value exchange services, namely, the secure exchange of value, including electronic cash, over computer networks accessible by means of smartcards; bill payment services provided through a website; on-line banking; financial services provided over the telephone and by means of a global computer network or the Internet; financial services, namely, the provision of contactless mobile payments through merchants at retail, online and wholesale locations; financial services, namely, providing a cloud-based digital wallet that stores customer account information to access coupons, vouchers, voucher codes and rebates at retailers and to obtain loyalty or monetary rewards that can be credited to their accounts via a cash-back system; consulting services regarding payment solutions, banking, credit card, debit card and payment card; information, advisory and consultancy services relating to all the aforesaid services Computer hardware and software consulting services; computer programming; support and consultation services for managing computer systems, databases and applications; providing temporary use of non-downloadable software and applications for managing, locating, activating and revoking authentication and digital credentials of near field communication (NFC) devices; design, development, maintenance and update of computer hardware and application software for mobile devices; design, development, maintenance and update of downloadable computer programs and application software for mobile phones and other digital devices that allows users to access coupons, vouchers, voucher codes, rebates, price-comparison information, product reviews, links to the retail websites of others, and discount information; authentication services, namely, providing user and identity authentication services using software and hardware technology; computer and Internet related services, namely, providing on-line electronic databases via a global computer network in the field of identity authentication and verification, payment cards, fraud and risk management, and banking; data encryption and decryption of financial information; digital signature authentication services for authentication of others, namely, data encryption and data integrity; digital certificate verification, authentication, issuance, distribution and management; consulting services in the fields of computer programming, financial computer networks, data processing, secure communications, data encryption and decryption and local area network security; dissemination of information over a global computer network in the fields of computer software, computer hardware, financial computer networks and local area networks; data processing and data verification services; data storage and retrieval services; data repository and client profile information services; information, advisory and consultancy services relating to all the aforesaid services
63.
METHODS AND SYSTEMS FOR EXTENDING INSTALLMENT OPTIONS
Systems and methods are provided for extending installment options to users. One example computer-implemented method includes, as part of an authentication challenge to a user for a transaction, requesting, by a communication device of the user, installment options from an installment service provider (ISP) based on an identifier specific to a first party involved in the transaction. In response, the ISP retrieves the requested installment options and provides them to the communication device. The method also includes displaying, by the communication device, the installment options to the user, soliciting a selection of one of the installment options, and, in response to the selection, identifying the selected one of the installment options to the ISP, whereby the ISP records the selected installment option as payment for the transaction.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
A method for carrying out a wireless transaction for authorization through a transaction processing system between a first computing device and a second computing device is described. The first computing device establishes a secure network connection with a third computing device. The first computing device initiates the wireless transaction with the second computing device. The first computing device provides information to perform a security protocol for the transaction to the third computing device over the secure connection. The performance of the security protocol includes determination of a secure result. The first computing device receives a dummy secure result from the third computing device, and performs the wireless transaction with the second computing device using the dummy secure result. The third computing device prepares a true secure result for the wireless transaction. The dummy secure result may be used to reconcile the wireless transaction with the true secure result.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
65.
METHOD AND SYSTEM FOR TRANSFERRING DIGITAL TOKENS TO AND FROM A PHYSICAL CARD
A method and system are disclosed for transferring digital tokens to and from a physical payment card. The method includes: receiving, on a processing server, a plurality of digital tokens issued from a central bank; and transferring, from the processing server, the plurality of digital tokens to the physical payment card, the physical payment card configured to be used with a point of sale (POS).
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
66.
METHODS AND SYSTEMS FOR PERFORMING SECURE TRANSACTIONS ASSOCIATED WITH INSTRUCTIONS RECEIVED IN NATURAL LANGUAGE FORM
Embodiments provide methods and systems for facilitating scheduled payment transactions to users via an application provided by the server system, the application available on the user device. The method performed by the server system includes receiving a transaction request message from the user device, the transaction request message includes scheduled transaction instruction provided by the user in natural language format. The method includes authenticating the user based on a plurality of user authentication factors received from the user at pre-defined time intervals. In an embodiment, the server system is configured to train a data model using ML algorithms by learning the plurality of user authentication factors based on which the user is automatically authenticated by the server system. Upon successful authentication, the method includes parsing the transaction request message to determine a scheduled transaction instruction. The method includes facilitating, processing of the scheduled transaction based on the scheduled transaction instruction.
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p.ex. clés électroniques ou cartes à puce intelligentes
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Systems, methods, and non-transitory computer-readable media for biometrically confirming a trusted engagement between two or more individuals that overcomes an identity challenge from a digital environment. The identity challenge including but not limited to: when two or more individuals met in the digital environment only to meet in person, when two or more parties to a contract want to ensure that the true parties sign an agreement, when one or more individuals wants to provide proof of past interactions, when an individual or an entity wants to minimize a risk of a party to a financial transaction is using stolen identity credentials, when an individual receives a friend request from an unknown individual, when an individual wants to ban interactions with an undesired personal contact, when an individual meets with an imposter during a person-to-person transaction, and when an individual meets a friend that has created a new digital persona.
Systems, methods, and non-transitory computer-readable media for biometrically confirming a trusted engagement between two or more individuals that overcomes an identity challenge from a digital environment. The identity challenge including but not limited to: when two or more individuals met in the digital environment only to meet in person, when two or more parties to a contract want to ensure that the true parties sign an agreement, when one or more individuals wants to provide proof of past interactions, when an individual or an entity wants to minimize a risk of a party to a financial transaction is using stolen identity credentials, when an individual receives a friend request from an unknown individual, when an individual wants to ban interactions with an undesired personal contact, when an individual meets with an imposter during a person-to-person transaction, and when an individual meets a friend that has created a new digital persona.
G06F 21/40 - Authentification de l’utilisateur sous réserve d’un quorum, c. à d. avec l’intervention nécessaire d’au moins deux responsables de la sécurité
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
69.
DATA COMMUNICATION AND CRYPTOGRAPHIC OPERATIONS FOR SECURE WIRELESS INTERACTIONS
There is provided a method of generating a secure result to support authorisation of a rapid wireless interaction between a first computing device and a second computing device, the method being implemented by a third computing device remote from the first and second computing devices. The method comprises: receiving, from the first computing device via a secure communications channel, a request to generate the secure result, the request comprising interaction data relating to the wireless interaction; retrieving, from a data store in secure communication with the third computing device, cryptographic material to be used to generate the secure result; generating, using the retrieved cryptographic material, the secure result by applying the cryptographic material to the interaction data; and transmitting, to the first computing device via the secure communications channel, the secure result, for processing and onward provision by the first computing device to the second computing device for subsequent authorisation of the wireless interaction. A computing device arranged to implement this method is also provided.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
A method for carrying out a wireless transaction between a first computing device and a second computing device is described - the transaction is for authorisation through a transaction processing system. The first computing device establishes a secure network connection with a third computing device, and then initiates the wireless transaction with the second computing device. The first computing device provides information for performance of a security protocol for the transaction to the third computing device over the secure connection, wherein performance of the security protocol includes determination of a secure result. The first computing device receives a dummy secure result from the third computing device, and it completes the wireless transaction with the second computing device using the dummy secure result. In the meantime, a true secure result for the wireless transaction prepared by the third computing device and provided to the transaction processing system. In authorisation of the wireless transaction the dummy secure result can be used to reconcile the wireless transaction with the true secure result.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
A method for application of account and transaction controls on a payment token includes: storing, in a first device of a system, a control profile including a token number and transaction controls; storing, in a second device of the system, a token profile including the token number and a corresponding account number; receiving, at the first device, a transaction message including a data element having the token number and additional transaction data; determining, by the first device, compliance with the transaction controls based on the additional transaction data; transmitting the transaction message from the first to the second device; replacing, by the second device, the token number with the account number in the transaction message; and transmitting, by the second device, the transaction message to a financial institution associated with the account number.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
72.
COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR PAYMENT ROUTING
A system for payment routing programmed to: receive a payment transaction message relating to a putative transaction, the payment transaction message containing putative transaction data identifying an account of an accountholder and a transaction amount corresponding to the putative transaction; input at least some of the putative transaction data to a scaled score algorithm to generate a scaled score representing the likelihood of settlement of the putative payment transaction on a date, the scaled score algorithm including a plurality of components each respectively outputting a value and the scaled score being based on the plurality of values; generate metadata regarding the scaled score by applying a plurality of contribution rules to the values, the metadata comprising significance indicators for the components with respect to the generation of the scaled score; and output the scaled score and the metadata regarding the scaled score in response to the payment transaction message.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
73.
COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR PAYMENT ROUTING
A system for payment routing programmed to: receive a payment transaction message relating to a putative transaction, the payment transaction message containing putative transaction data identifying an accountholder and a transaction amount corresponding to the putative transaction; input historical transaction data for the accountholder and at least a portion of the transaction amount to a scaled score algorithm to generate scaled scores for corresponding potential settlement dates, each of the scaled scores representing the likelihood of settlement of the putative transaction from an account of the accountholder on the corresponding one of the potential settlement dates; retrieve, from a financial institution corresponding to the account, actual account balances for the account on the corresponding potential settlement dates; and retrain the scaled score algorithm using the actual account balances.
A system for payment routing programmed to: receive a payment transaction message relating to a putative payment transaction of an accountholder, the payment transaction message containing putative payment transaction data including a transaction amount corresponding to the putative payment transaction; identify a plurality of accounts corresponding to the accountholder based on the payment transaction message, the accounts being held with a plurality of financial institutions; and responsive to receipt of the putative transaction data, generate a scaled score representing the likelihood of settlement of the putative payment transaction on a date for each of accounts held with the financial institutions.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
75.
COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR PAYMENT ROUTING
A system for payment routing programmed to: receive a payment transaction message relating to a putative payment transaction of an accountholder, the payment transaction message containing putative payment transaction data including a transaction amount corresponding to the putative payment transaction; identify a plurality of accounts corresponding to the accountholder based on the payment transaction message; implement a payment split among the accounts, the payment split assigning a proportion of the transaction amount to each of the accounts; and generate a scaled score representing the likelihood of settlement of the assigned proportion of the transaction amount via each of the accounts on a date.
A system for payment routing programmed to: receive a payment transaction message relating to a putative transaction, the payment transaction message containing putative transaction data identifying an accountholder and a transaction amount corresponding to the putative transaction; input historical transaction data for the accountholder and at least a portion of the transaction amount to a scaled score algorithm to generate scaled scores, each of the scaled scores representing the likelihood of settlement of the putative transaction on a corresponding date and payment rail; output the scaled scores to a merchant in response to the payment transaction message; receive, from the merchant and in response to the output, feedback data for the putative transaction, the feedback data including a date of attempted payment processing for the putative transaction and an indicator of whether the attempted payment processing was completed; and retrain the scaled score algorithm using the feedback data.
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Advertising, promotion and marketing services in the nature of email campaigns for others; business records management; business data analytics; business management and business strategy development services Financial services, namely, electronic processing of electronic funds transfer, ACH, credit card, debit card, electronic check and electronic payments financial services, namely, electronic processing of bill payments and associated remittance and confirmation data Software as a service (SaaS) featuring software for business management and customer relationship management (CRM); providing online non-downloadable software for the creation and distribution of email and marketing campaigns; providing online non-downloadable software for document management, namely storing, managing, tracking, analyzing and exchanging of documents; electronic generation and capture of invoices; providing online non-downloadable computer software for accounts payable invoicing and payment functions via a hosted, online service; software as a service (SaaS) featuring software for transaction and payment processing services, financial record-keeping, and management of financial data; Designing, developing and maintenance of a marketing software platform for third parties for marketing and analytics, customer relationship management and business data analysis; providing online non-downloadable software for group calendar management, contact management, task delegation and reporting, and recording of notes; providing online non-downloadable software for electronic messaging
78.
Systems and methods for identifying synthetic party identities associated with network communications
Systems and methods are provided for use in identifying synthetic party identities. One exemplary method includes receiving, at a computing device, a request from a relying party to assess validity of an identity presented by an asserting party in a network communication between the asserting party and the relying party, where the request includes identity data associated with the identity of the asserting party. The method also includes calculating, by the computing device, an assessment metric representative of the validity of the identity of the asserting party, where the assessment metric is based on at least one score derived from the identity data, and transmitting, by the computing device, the assessment metric to the relying party, whereby the relying party utilizes the assessment metric to determine whether or not to further interact with the asserting party in connection with the network communication.
G06Q 20/00 - Architectures, schémas ou protocoles de paiement
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Systems and methods are provided for managing disputes in biometric-enabled network interactions. One example computer-implemented method includes receiving, at a biometric identity switch (BIS), a dispute notification for a biometric-enabled network interaction involving an account of a user, and retrieving biometric data specific to the biometric-enabled network interaction. The method also includes determining, by the BIS) whether the biometric data is representative of the user and, in response to the biometric data not being representative of the user, requesting, from a biometric service provider, a biometric identifier for an additional user, based on the biometric data. The method then includes receiving, by the BIS, the biometric identifier from the biometric service provider, identifying an interaction history of the additional user, based on the biometric identifier, and determining whether to assign the biometric-enabled network interaction to the additional user, based on the interaction history of the additional user.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
80.
SYSTEMS AND METHODS FOR MANAGING OFFLINE DATABASE ACCESS
A computer-implemented method for managing access to data stored in a database is provided. The method includes storing in the database a switch parameter having a first value, storing in the database at least two instances of a data object wherein each of the instances includes a unique identifier, receiving a client query from a requestor, determining by the computing device an active instance from the at least two instances based at least in part on comparing the first value of the switch parameter to the unique identifier of each instance, modifying by the computing device the client query at least in part based on the determined active instance to create a resultant query, executing the resultant query against the active instance to generate a resultant data, and providing the resultant data to the requestor.
A method for routing computer messages between parties is provided. The method is implemented using a message gateway computing system including a processor and a memory. The method includes receiving a message routing offer from a seller and representing an offer to process payment card transactions. The method also includes receiving a message routing request from a buyer. The method further includes first message route between the buyer party and a first seller party of the plurality of seller parties on a message processing network. The method also includes receiving a payment card transaction from the buyer party. The method further includes identifying the first message route associated with the payment card transaction. The method also includes transmitting the payment card transaction to the first seller party based at least in part on the first message route.
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
The disclosure herein describes receiving and routing a remote procedure call (RPC) message from an external source. A microservice platform receives an RPC message from a source via an RPC interface, wherein the RPC message includes a header structure and a payload structure. The RPC message is validated based on security data in the header structure and the identity of the source is authenticated based on identity data in the header structure. A service interface function is triggered based on routing data in the payload structure and a multi-layer route and one of a plurality of microservices are identified. Payload data of the payload structure is routed through each of the ordered plurality of layers of the multi-layer route to the identified microservice, wherein each of the ordered plurality of layers and the microservice are configured to perform an operation using the payload data.
The disclosure herein describes receiving and routing a remote procedure call (RPC) message from an external source. A microservice platform receives an RPC message from a source via an RPC interface, wherein the RPC message includes a header structure and a payload structure. The RPC message is validated based on security data in the header structure and the identity of the source is authenticated based on identity data in the header structure. A service interface function is triggered based on routing data in the payload structure and a multi-layer route and one of a plurality of microservices are identified. Payload data of the payload structure is routed through each of the ordered plurality of layers of the multi-layer route to the identified microservice, wherein each of the ordered plurality of layers and the microservice are configured to perform an operation using the payload data.
H04L 67/133 - Protocoles pour les appels de procédure à distance [RPC]
H04L 67/63 - Ordonnancement ou organisation du service des demandes d'application, p.ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises en acheminant une demande de service en fonction du contenu ou du contexte de la demande
84.
SYSTEMS AND METHODS FOR USE IN BIOMETRIC-ENABLED NETWORK INTERACTIONS
Systems and methods are provided for managing disputes in biometric- enabled network interactions. One example computer-implemented method includes receiving, at a biometric identity switch (BIS), a dispute notification for a biometric- enabled network interaction involving an account of a user, and retrieving biometric data specific to the biometric-enabled network interaction. The method also includes determining, by the BIS) whether the biometric data is representative of the user and, in response to the biometric data not being representative of the user, requesting, from a biometric service provider, a biometric identifier for an additional user, based on the biometric data. The method then includes receiving, by the BIS, the biometric identifier from the biometric service provider, identifying an interaction history of the additional user, based on the biometric identifier, and determining whether to assign the biometric-enabled network interaction to the additional user, based on the interaction history of the additional user.
A method for facilitating payment transactions includes receiving, by a server, a flash code request indicative of a transaction amount. A flash code associated with the transaction amount is communicated by the server to the payer device. The flash code is encoded into a flash pattern at the payer device and communicated to a payee device of a payee for executing a payment transaction between the payer and the payee. A first request for the payment transaction is received by the server from the payee device. The first request includes the flash code obtained by decoding the flash pattern at the payee device. The flash code included in the first request is validated by the server. Based on successful validation of the flash code, the transaction amount is deducted from a payer account of the payer and credited to a payee account of the payee.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
Broadly speaking, the present invention provides a technical solution by which virtual cards can be leveraged to become tokens generated by the payment platform and coupled with dynamic cryptography to enhance security, reliability, performances, user experience and reduce latency during the transactional flow. This technical solution advantageously ensures that transactions are simplified for implementation, while being efficient in terms of BIN and PAN usages, and having minimal latency, resulting in simpler integration and faster transactions. Additionally, the present invention requires relatively little change to the configuration of the computing devices that collectively function to enable the transaction to take place (e.g. payment network computing devices, merchant computing devices). Furthermore, the invention can improve the security around use of virtual cards as it enables a dynamic cryptogram to be used rather than a relatively insecure static cryptogram.
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
87.
METHOD AND SYSTEM FOR VERIFICATION OF IDENTITY ATTRIBUTE INFORMATION
A method for verification of a data value via a Merkle root includes: storing, in a memory of a processing server, a Merkle root; receiving at least a data value, a nonce, and a plurality of hash path values; generating a combined value by combining the data value and the nonce; generating a first hash value via application of a hashing algorithm to the combined value; generating a subsequent hash value via application of the hashing algorithm to a combination of the first hash value and a first of the plurality of hash path values; repeating generation of the subsequent hash value using a combination of the next hash path value of the plurality of hash path values and the most recent subsequent hash value; and verifying the data value based on a comparison of the Merkle root and the last generated subsequent hash value.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
Methods and systems for managing payment card credentials provisioned to an Internet of Things (IoT) device via a companion application. A mobile device processor of a consumer mobile device launches a wallet application, displays a wallet application user interface on a touch screen that includes a card management option, receives selection of the card management option, and displays a device list that includes a plurality of icons representing IoT devices. The mobile device processor receives selection of an icon and then displays a payment card representation, payment card information, and card management options including a suspend card option and a delete card option. After receiving a selection of a card management option the mobile device processor transmits instructions to the IoT device to one of delete or suspend the payment card credentials.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
39 - Services de transport, emballage et entreposage; organisation de voyages
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
43 - Services de restauration (alimentation); hébergement temporaire
Produits et services
Promoting the goods and services of others; promoting the cultural events and experiences, travel experiences, retail outlets and events, restaurants and fine dining events, and special events of others; providing recommendations of service providers and merchants to consumers for commercial purposes Travel advice, namely, providing travel information on destinations, experiences, and activities; tourist information and travel information services Providing entertainment information in the field of cultural events and experiences Providing online non-downloadable software featuring artificial intelligence for providing recommendations on cultural events and experiences, travel experiences, retail outlets and events, restaurants and fine dining events, and special events of others Providing entertainment information in the field of restaurants and fine dining events
90.
SYSTEMS AND METHODS FOR USE IN LEVERAGING DIFFERENT DATA REPOSITORIES IN DIFFERENT REGIONS
Systems and methods are provided for leveraging different data repositories. One example computer-implemented method includes receiving a transfer request for a transfer from a sender in a first region to a recipient in a second region and determining whether the transfer request satisfies a regulation associated with the first and/or second region for information related to the recipient and/or sender. The method also includes submitting an identity request for the recipient and/or sender to an identity network, in response to the transfer request failing to satisfy the regulation, and receiving information regarding the recipient and/or sender, in response to the identity request, from the identity network, where the information includes identifying information for the recipient and/or sender. The method then includes compiling and submitting a transfer request for the transfer to an associated network, whereby the transfer request is submitted to be completed.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
91.
SYSTEM AND METHODS FOR OBTAINING REAL-TIME CARDHOLDER AUTHENTICATION OF A PAYMENT TRANSACTION
A secondary authentication system and computer-implemented method for obtaining real-time cardholder authentication of a payment transaction associated with a cardholder's payment card includes a memory device for storing data and a processor communicatively coupled to the memory device. The processor is programmed to receive a payment authorization request message including a primary account number corresponding to a payment account of the cardholder for funding the payment transaction. In addition, the processor is programmed to determine whether the payment account requires secondary authentication by the cardholder for the payment transaction, and if, based on the determination, the payment account requires secondary authentication of the payment transaction, place the payment transaction on hold. Furthermore, the processor is programed to identify a mobile device associated with the payment account of the cardholder, transmit an authentication request message to the identified mobile device, and receive, from the mobile device, an authentication response message.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
92.
SYSTEM AND METHOD FOR SECURING INFORMATION IN A NETWORK
A payment management system and method of managing a payment network includes generating a payment token based on a bank account of a user (e.g., a buyer), receiving a dynamic code through a network for a transaction, and validating a request for payment of the transaction using an installment plan based on funds from the bank account. The validating the request for payment of the transaction is performed based on operations which include authenticating the payment token and verifying the dynamic code. In addition, the method includes generating a decision signal indicating a decision for the request when the request for payment is validated and transmitting the decision signal to a merchant system to authorize or decline completion of the transaction.
A payment management system and method of managing a payment network includes generating a payment token based on a bank account of a user (e.g., a buyer), receiving a dynamic code through a network for a transaction, and validating a request for payment of the transaction using an installment plan based on funds from the bank account. The validating the request for payment of the transaction is performed based on operations which include authenticating the payment token and verifying the dynamic code. In addition, the method includes generating a decision signal indicating a decision for the request when the request for payment is validated and transmitting the decision signal to a merchant system to authorize or decline completion of the transaction.
G06Q 20/24 - Schémas de crédit, c. à d. de "paiement différé"
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
36 - Services financiers, assurances et affaires immobilières
41 - Éducation, divertissements, activités sportives et culturelles
Produits et services
Business advice; business consultancy; strategic business consultancy; assistance with business planning; business analysis; business analysis services; business statistical analysis; business data research; analysis of business data; market research studies; analysis of market research data; interpretation of market research data; market analysis reports; collecting business information; business research consulting; business marketing consultancy; consumer research; consumer response analysis; consumer profiling for commercial or marketing purposes; providing advice relating to the analysis of consumer buying habits; market research services regarding customer loyalty. Financial advice and consultancy services; Financial data analysis; financial consulting services in the fields of payment solutions, credit cards, debit cards, and payment cards; providing online banking and financial services to consumers and businesses, namely, financial transaction analysis, credit authorization and management; Collection of financial information; Financial services, namely, banking, credit card services, debit card services, charge card services, pre-paid card services offered through cards with stored value; financial services, namely, electronic credit and debit transaction processing; transaction authorization, clearance and settlement services; dissemination of financial information via a global computer network; the provision of financial services for the support of retail services provided online; payer authentication services, namely, provision of services relating to the authentication of cardholders, merchants and banks for payment card transactions; verification of financial information; financial services, namely, the provision of contactless mobile payments through merchants in the field of retail, online retail store services and wholesale store services; payment card transaction authorization and settlement services; online financial services for business clients, namely, online payment processing services in the field of electronic payments. Training; training courses; business training; arranging and conducting of workshops and seminars; organisation of Webinars; organisation of educational events; educational services relating to business.
95.
SYSTEMS AND METHODS FOR DETECTION OF FRAUD ATTACKS USING MERCHANTS TO TEST PAYMENT ACCOUNTS
Provided herein is a computing system for detecting compromised merchants in a payment card network. The computing system includes a processor in communication with a memory, and the processor is configured to: (i) receive historical transaction data associated with historical transactions carried out at merchants, (ii) determine historical values for key merchant variables for each merchant, (iii) store the historical key merchant variable values, (iv) receive current transaction data associated with current transactions carried out at a selected merchant, (v) determine current values for key merchant variables for the selected merchant, (vi) compare the current key merchant variable values with the historical key merchant variable values for the selected merchant, (vii) identify abnormalities between the current key merchant variable values and the historical key merchant variable values for the selected merchant, and (viii) determine that the selected merchant is a compromised merchant based upon the identified abnormalities.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
A real-time fraud prevention system enables merchants and commercial organizations on-line to assess and protect themselves from high-risk users. A centralized database is configured to build and store dossiers of user devices and behaviors collected from subscriber websites in real-time. Real, low-risk users have webpage click navigation behaviors that are assumed to be very different than those of fraudsters. Individual user devices are distinguished from others by hundreds of points of user-device configuration data each independently maintains. A client agent provokes user devices to volunteer configuration data when a user visits respective webpages at independent websites. A collection of comprehensive dossiers of user devices is organized by their identifying information, and used calculating a fraud score in real-time. Each corresponding website is thereby assisted in deciding whether to allow a proposed transaction to be concluded with the particular user and their device.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 30/0201 - Modélisation du marché; Analyse du marché; Collecte de données du marché
97.
METHOD AND SYSTEM FOR IMPROVED BLOCKCHAIN PERFORMANCE THROUGH AGGREGATION
A method for periodic aggregation of blockchain transactions for reduced processing times and bandwidths includes: storing at least a cryptographic key pair comprising a private key and a public key and a plurality of unspent blockchain transactions, each unspent blockchain transaction including at least an output address and transaction amount; generating a digital signature using the private key; generating a recipient address using the public key; generating a new blockchain transaction after satisfaction of a trigger condition, the new blockchain transaction including each of the plurality of unspent blockchain transactions as inputs, the digital signature, the recipient address, and a transfer amount based on a summation of the transaction amount for each of the unspent blockchain transactions; and transmitting the new blockchain transaction to a node in a blockchain network.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
98.
IDENTIFICATION OF FRAUDULENT HEALTHCARE PROVIDERS THROUGH MULTIPRONGED AI MODELING
A system and computer-implemented method for identifying fraudulent healthcare providers receives raw claims data from one or more data sources. The raw claims data includes claims associated with a selected healthcare provider. Each of the claims includes one or more claim lines. A first model is executed on the raw claims data. The first model determines a first score for the healthcare provider. A second model is executed on the raw claims data. The second model determines a second score for the healthcare provider. In addition, a third model is executed on the raw claims data. The third model determines a third score for the healthcare provider. A final provider-level risk score is determined for the healthcare provider based on the first, second, and third scores.
G16H 40/20 - TIC spécialement adaptées à la gestion ou à l’administration de ressources ou d’établissements de santé; TIC spécialement adaptées à la gestion ou au fonctionnement d’équipement ou de dispositifs médicaux pour la gestion ou l’administration de ressources ou d’établissements de soins de santé, p.ex. pour la gestion du personnel hospitalier ou de salles d’opération
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
G16H 50/00 - TIC spécialement adaptées au diagnostic médical, à la simulation médicale ou à l’extraction de données médicales; TIC spécialement adaptées à la détection, au suivi ou à la modélisation d’épidémies ou de pandémies
Techniques for training an entity resolution model are presented. The techniques include receiving a minimum viable data product (MVDP) scope, a product scope, and a data mining scope from a user. A data mining goal is determined based on the MVDP scope, product scope, and data mining scope. One or more proof of concept (PoC) models are defined based on the data mining goal, and one of the PoC models is selected for training. A trained deep learning model is generated by iteratively training the selected PoC model. The trained deep learning model is then tested and validated against a predefined achievable loss metric using a sample labelled dataset for testing.
Techniques for training a classification model to improve the classification of open banking transactions are presented. The techniques include receiving raw training data from a data source. The raw training data includes historical transaction data made up of a plurality of individual transactions. The raw training data is input into the classification model. The raw training data is processed by performing a data preparation operation on the raw training data. The data preparation operation includes removing numerical characters, repeating special characters, and accent words from the textual data of each transaction. Vocabulary training is then performed on the processed training data, including tokenizing the text of each transaction and converting the tokenized text into a transformer model specific format. The classification model is then trained using a transformer model, which uses the tokenized text. The trained classification model is then stored in a database.