An entity may generate digital account credentials when a new account is approved for generation by an authorizing entity that controls or issues new accounts. A user may contact an authorizing entity to open a new account with the authorizing entity. The authorizing entity may authenticate the user and may approve a new account to be generated for the user. The user may wish to conduct transactions immediately upon approval. However, the authorizing entity may not immediately generate a physical identification device along with an actual account identifier associated with the new account. An intermediary entity may generate digital account credentials for the new account immediately after the authorizing entity approves generation of the new account, provide the digital account credentials to the account holder, and process transactions using the digital account credentials.
G06F 21/45 - Structures ou outils d’administration de l’authentification
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
A method performed by a computer is disclosed. The method comprises receiving interaction data between electronic devices of a plurality of entities. The interaction data is used to form an entity interaction vector containing a number of interactions between the electronic devices of a chosen entity and an entity time series containing a plurality of metrics per unit time of the interactions. An interaction encoder of the computer can generate an interaction hidden representation of the entity interaction vector using embeddings of the plurality of entities. A temporal encoder of the computer can generate a temporal hidden representation of the entity time series. The interaction hidden representation and the temporal hidden representation can be used to generate a predicted scale and a shape estimation of a target interaction metric. The computer can then generate an estimated interaction metric of a time period using the predicted scale and the shape estimation.
Methods, systems, and computer program products are provided for analyzing and/or improving transformer models. A method may include receiving a trained transformer model. The trained transformer model may include at least one multi-head self-attention layer including a plurality of attention heads. At least one sample may be received. The sample(s) may be inputted to the trained transformer model to generate at least one layer output of the multi-head self-attention layer(s) and at least one model output of the trained transformer model. Each respective attention head may be pruned, and the sample(s) may be inputted to the trained transformer model with the respective attention head pruned to generate at least one respective pruned layer output and at least one respective pruned model output. At least one importance metric may be determined for each respective attention head based on at least two of the aforementioned outputs.
G06V 10/764 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant la classification, p.ex. des objets vidéo
G06V 10/94 - Architectures logicielles ou matérielles spécialement adaptées à la compréhension d’images ou de vidéos
Provided are methods for identifying sub-merchants within a Global Merchant Repository (GMR) that include receiving sub-merchant data associated with one or more sub-merchants, from one or more payment facilitators associated with a plurality of sub-merchants, where the sub-merchant data comprises a Card Acceptor Identifier (CAID) associated with each of the one or more payment facilitators, assigning a plurality of pseudo acquirer identifiers to the sub-merchant data received from each of the one or more payment facilitators, and identifying the one or more sub-merchants in the GMR by mapping the sub-merchant data with transaction data associated with a plurality of merchants in the GMR, based on the plurality of pseudo acquirer identifiers and the CAID associated with the respective payment facilitators. Systems and computer program products are also disclosed.
Provided are systems that include at least one processor to receive a dataset comprising a set of labeled anomaly nodes, a set of unlabeled anomaly nodes, and a set of normal nodes, randomly sample a node to provide a set of randomly sampled nodes, generate a plurality of new nodes based on the set of labeled anomaly nodes and the set of randomly sampled nodes, combine the plurality of new nodes with the set of labeled anomaly nodes to provide a combined set of labeled anomaly nodes, and train a machine learning model based on an embedding of each labeled anomaly node in the combined set of labeled anomaly nodes, a center of the combined set of labeled anomaly nodes in an embedding space, and a center of the set of normal nodes in the embedding space. Methods and computer program products are also disclosed.
G06F 18/2323 - Techniques non hiérarchiques basées sur la théorie des graphes, p.ex. les arbres couvrants de poids minimal [MST] ou les coupes de graphes
A computer-implemented method of dispositioning a transaction associated with a payment account is disclosed herein. The method can include receiving a registration request for a computing device to host transactions associated with the payment account, generating a unique identifier for the computing device, correlating the payment account to the generated unique identifier for the computing device, receiving a transaction authorization request associated with the payment account, and routing the received transaction authorization request associated with the payment account to the computing device for dispositioning based on the correlation. The computing device can host funds associated with the payment account and wherein computing device can be configured to disposition the transaction authorization request in accordance with a predetermined rule.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
7.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR PROVIDING A FRAMEWORK TO IMPROVE DISCRIMINATION OF GRAPH FEATURES BY A GRAPH NEURAL NETWORK
Provided are methods for enhancing a distribution of graph feature embeddings in an embedding space to improve discrimination of graph features by a graph neural network (GNN) that may include receiving a dataset comprising graph data associated with a graph, calculating a distance between a first set of node embeddings and a second set of node embeddings, determining a measure of uniformity for the dataset, determining a plurality of groups of node embeddings, determining a measure of alignment for the plurality of groups of node embeddings, generating a set of graph features based on the measure of uniformity, the measure of alignment, and the distance, and training the GNN based on the set of graph features to provide a trained GNN. Systems and computer program products are also disclosed.
Systems, methods, and computer program products may store, in a distributed cache, a rule associated with a plurality of accounts in a Real-Time Payments (RTP) network, the rule being stored in association with account data associated with the plurality of accounts; receive an account level exclusion directive associated with the account; store, in the distributed cache, the account level exclusion directive in association with the account; receive transaction data associated with a transaction in the RTP network between the account and another account; retrieve, from the distributed cache, the rule, the account level exclusion directive, and the account data associated with the account; exclude, based on the account level exclusion directive, use of the rule for processing the transaction; and process, without applying the rule, the transaction in the RTP network.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
An event driven system and method for traveler thematic destination segmentation are disclosed. The event driven system includes a processor and a memory coupled to the processor to store machine instructions executable by the processor. When executed by the processor the machine instructions cause the processor to extract clearance and settlement transaction data from a database, prepare the clearance and settlement transaction data, clean geo-data associated with the clearance and settlement transaction data, enrich and standardize the geo-data, scrape theme data associated with a trip from a public network, verify the relevant theme data associated with the trip, enrich and standardize geo-data associated with the relevant theme data associated with the trip, and map the enriched and standardized geo-data associated with the clearance and settlement transaction data to the enriched and standardized geo-data associated with the relevant theme data associated with the trip.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
10.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR MULTITASK LEARNING ON TIME SERIES DATA
Provided are methods for generating a multitask machine learning model based on time series data, that may include receiving input time series data associated with an input time series of data points, calculating a pairwise distance between the input time series and a plurality of time series templates, providing the pairwise distance as a first input to a building block of a residual neural network, where the residual neural network has a plurality of multi-dimensional convolutional layers; generating a first output of the first building block of the residual neural network based on the first input, generating a final output of the residual neural network based on the first output, and generating a first output of a multitask machine learning model using a first output layer and a second output of the multitask machine learning model using a second output layer. Systems and computer program products are also disclosed.
A method is disclosed. The method includes receiving, from a client device, a checkout request for a transaction between a user operating the client device and a resource provider operating the resource provider computer. The resource provider computer and the client device communicate via a first communication channel. The method includes obtaining a first one-time code, displaying, the first one-time code to the user on the client device, and determining an indication that the first one-time code matches a second one-time code that was provided by the user through a second communication channel that is different than the first communication channel. The method includes allowing the transaction to continue based on the determination that the first one-time code matches the second one-time code.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/16 - Paiements effectués par le biais de systèmes de télécommunication
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
e.g.e.g., payment cards, identification cards, driver's license cards) that are removably attachable to a portable electronic device. In some aspects, the portable electronic device may include a charging coil, a ferromagnetic component disposed about the charging coil, and a ferromagnetic alignment component. The card can include a substrate and a magnet embedded the substrate. The magnet can magnetically couple to the ferromagnetic component disposed about the charging coil.
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
G06K 19/077 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré - Détails de structure, p.ex. montage de circuits dans le support
13.
System, Method, and Computer Program Product for Testing a Machine Learning Model Based on Simulations in an Offline Environment
Provided is a system for testing a machine learning (ML) model based on simulations in an offline environment that includes at least one processor programmed or configured to receive historical transaction data, generate online simulation data, wherein generating the online simulation data includes modifying the historical timestamp of each data record to provide online simulation data. The processor is further programmed or configured to determine a timeline for a plurality of data insertion actions and a plurality of data request actions based on the online simulation data, perform a simulation of online activities involving a stateful ML model using the timeline for the plurality of data insertion actions and the plurality of data request actions, and validate the stateful ML model based on the simulation of online activities. Methods and computer program products are also provided.
A method is disclosed. The method includes receiving, by a processing computer, a payout validate message for a transaction from an aggregator computer, which receives a payout inquiry message from an originator computer of a plurality of originator computers. The aggregator computer is in communication with the plurality of originator computers. The payout inquiry message and the payout validate message can comprise a transaction amount for the transaction. The processing computer validates the payout validate message, and then transmits a payout validate response message to the aggregator computer. The payout validate response message comprises data regarding validation of the payout validate message. After transmitting the payout validate response message to the aggregator computer, the method includes receiving, by the processing computer, from the aggregator computer, a payout message. The method also includes transmitting, by the processing computer, a payout response message to the aggregator computer.
Automated computer systems and methods to determine a sentiment of information in digital information or content are disclosed. One aspect includes deriving, by a processor, the digital information from a source; generating, by the processor, a domain-specific machine learning sentiment score, based on the digital information, by one model of at least two machine learning models; autonomously mapping, by the processor, a non-domain specific knowledge graph of associations between elements in a set of digital contextual information; receiving, by the processor, sentiment graphs, each sentiment graph defining a sentiment; generating, by the processor, a graph sentiment score based on the non-domain specific knowledge graph and the sentiment graphs; generating, by the processor, a final sentiment score based on the graph sentiment score and the domain-specific machine learning sentiment score; and determining the sentiment of the information in the digital information or content via the final sentiment score.
Systems and methods for entity linking using a graph neural network are disclosed. In one aspect, a method for entity linking can include extracting a first attribute set of an unknown entity from an information source and retrieving second attribute sets of known entities from a database, wherein each of the second attribute sets corresponds to one of the known entities. The method can further include generating an unknown entity graph based on the first attribute set, generating known entity graphs based on the second attribute sets, generating an unknown entity graph embedding by applying the unknown entity graph to a graph neural network, and generating known entity graph embeddings by applying the known entity graphs to the graph neural network. The method can further include assigning the information source to one of the known entities based on the unknown entity graph embedding and the known entity graph embeddings.
G06F 16/901 - Indexation; Structures de données à cet effet; Structures de stockage
G06F 16/904 - Navigation; Visualisation à cet effet
G06F 16/907 - Recherche caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement
A method for personalizing a transaction via a blockchain network via payment network is disclosed herein. The method can include receiving an application programming interface ("API") call from a computing device of a user, wherein the API call includes a private key, a public key, and a unique identifier, detecting, a non-fungible token ("NFT") on the blockchain network based on the public key, authenticating the NFT asset on the blockchain network based on the private key, storing an NFT asset associated with the NFT, the private key, the public key, and the unique identifier upon authenticating the NFT, associating the unique identifier with the NFT upon authenticating the NFT, and transmitting the NFT asset to the computing device of the user, wherein the NFT asset is configured for use in association with a transaction associated with the unique identifier.
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A method is disclosed. The method comprises generating, by sender device or a sender computer associated with a sender, a base token in a token space associated with parameters. The base token can comprise one or more token attributes within the parameters, and an amount. The base token can then be signed, by the sender device or the sender computer, to form a minted token. The method may then include transmitting, by the sender device to a receiver device, a transfer request comprising the minted token.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
20.
MULTI-DIRECTIONAL WALLET CONNECTOR APPARATUSES, METHODS AND SYSTEMS
The W-CONNECTOR (“W-CONNECTOR”) facilitates the enrollment of payment accounts in a consumer's virtual wallet. The consumer may be logged into their payment account issuer's web site and designate one or more payment accounts for enrollment in a virtual wallet. The issuer may then share account, billing and/or other relevant information with the virtual wallet provider to facilitate the enrollment of the designated payment accounts in the virtual wallet. The W-CONNECTOR may also be configured to facilitate the creation and funding of pre-paid accounts in a consumer's virtual wallet.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/28 - Schémas de prépaiement, c. à d. de "paiement préalable"
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
21.
System, Method, and Computer Program Product for Maintaining User Privacy in Group Transactions
Methods are provided for maintaining user privacy, and may include establishing a secret key for communication between a plurality of user devices, the plurality of user devices including a first user device associated with a requesting user and a second user device associated with a second user, wherein at least one server computer does not have access to the secret key; receiving from the first user device, a split-payment request message comprising encrypted data, the encrypted data included in the split-payment request message encrypted based on the secret key; generating an encrypted balance for the requesting user and the second user based on the encrypted data of the split-payment request message; and transmitting to the second user device, a split-payment confirmation message including the encrypted balance for the requesting user and/or the second user. Systems and computer program products are also provided.
Entity linking using a graph neural network is disclosed. Entity linking can include tokenizing an unknown name, tokenizing a known name from a set of known names, identifying a candidate from the set of known names, and generating a tripartite graph. The tripartite graph can include a first layer node corresponding to the unknown name, second layer nodes corresponding to words of the known name and the candidate, and a third layer node corresponding to the candidate. The method can further include assigning the unknown name to one of the known names by applying the tripartite graph to a graph neural network model.
Systems, methods, and computer program products are provided for determining influence of a node of a graph on a graph neural network (GNN). The method includes receiving a dataset including graph data associated with a graph. The method may further include selecting a target node of a plurality of nodes based on the graph data and determining target node data associated with the target node and target edge data associated with the target node. The method may further include removing the target node data and the target edge data from the dataset to provide a target graph dataset; determining a measure of influence of the target node on a GNN based on the target graph dataset, wherein the GNN was trained using the dataset; and performing an action based on the measure of influence of the target node on the GNN.
A method is disclosed. It includes prompting, by a second user device operated by a second user, a first user to interact a portable device of the first user with the second user device in a transaction and then receiving interaction data comprising a credential or token, from the portable device in a contactless communication. The method also includes determining that the transaction cannot be completed without further interaction by the first user, and responsive to determining that the transaction cannot be completed, providing at least one alternate transaction option for the first user. The method also includes receiving, from the first user, a selection of an alternate transaction option from the at least one alternate transaction option, and processing the transaction according to the selected alternate transaction option.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
A Web site comprise detection method and system are disclosed. The method includes obtaining a resource identifier associated with a remote computer, and then receiving source code associated with the resource identifier. The method also includes parsing the source code, analyzing the source code to determine an indicator of compromise is present in the source code, determining that the indicator of compromise is associated with malware meta-data, and storing the resource identifier associated with the source code associated with the malware meta-data in a database.
Methods, systems, and computer program products for learning continuous embedding space of real time payment (RTP) transactions are provided. A method may include receiving RTP data including a plurality of attributes, including a sender and a receiver. One attribute is selected as a target attribute. The remaining attributes are input into a first machine learning model (e.g., NLP model), comprising at least one embedding layer and one hidden layer, which is trained to predict the target attribute. After the model is trained, each of the remaining attributes are converted to a first vector using the at least one embedding layer of the machine learning model to form a first set of vectors. The first set of vectors are stored and subsequently input into a second machine learning model to perform at least one second task different than the first task.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06N 5/022 - Ingénierie de la connaissance; Acquisition de la connaissance
G06N 5/04 - Modèles d’inférence ou de raisonnement
A computer-implemented method comprising providing a graphical user interface for user selection of fraud rules that comprises fraud transaction parameters determined based on transaction parameters included in a plurality of known fraudulent transactions. The GUI also comprises high risk merchants with a fraud rate that exceeds a threshold fraud rate. The method includes receiving a user selection of fraud rules relating to at least the fraud transaction parameters, the high risk merchants, and the high frequency merchants. The method includes receiving test transaction data including at least one transaction parameter and at least one merchant associated with the test transaction, applying the fraud rules to the received transaction data to identify probable fraudulent transactions.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06N 20/20 - Techniques d’ensemble en apprentissage automatique
G06Q 20/42 - Confirmation, p.ex. contrôle ou autorisation de paiement par le débiteur légal
28.
Method and System for Enabling Speaker De-Identification in Public Audio Data by Leveraging Adversarial Perturbation
Provided is a method for enabling speaker de-identification in public audio data by leveraging adversarial perturbation. The method may include receiving audio data associated with at least one voice sample. One or more of the voice sample(s) may be perturbed toward an edge of a decision boundary of at least one classifier model. One pitch of each voice sample may be perturbed to shift each voice sample across the decision boundary of the at least one classifier model to provide at least one de-identified voice sample. A media file with the at least one de-identified voice sample may be encoded. A system and computer program product are also disclosed.
G10L 21/013 - Adaptation à la hauteur tonale ciblée
G10L 25/18 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes caractérisées par le type de paramètres extraits les paramètres extraits étant l’information spectrale de chaque sous-bande
G10L 25/90 - Détermination de la hauteur tonale des signaux de parole
A method is disclosed and includes receiving a push transfer message with a first transaction amount, and a digital tag, a credential or a token from an application server computer, in a transaction. In the transaction, a first user using a first user device interacts with a second user using the digital tag. The digital tag associated with the credential or the token, and the first user device has a transfer application that receives the digital tag and is in communication with the application server computer. The push transfer message is transmitted to an authorizing entity computer where a second amount is credited to the second user's account.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
The Board of Trustees of the Leland Stanford Junior University (USA)
Inventeur(s)
Agrawal, Shashank
Bünz, Karl Benedikt
Zamani, Mahdi
Boneh, Dan
Abrégé
Blockchain-based, smart contract platforms have great promise to remove trust and add transparency to distributed applications. However, this benefit often comes at the cost of greatly reduced privacy. Techniques for implementing a privacy-preserving smart contract is described. The system can keep accounts private while not losing functionality and with only a limited performance overhead. This is achieved by building a confidential and anonymous token on top of a cryptocurrency. Multiple complex applications can also be built using the smart contract system.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Methods and systems for anonymizing time-series data are disclosed. An anonymizing computer can generate an anonymized sequence of time-series data that can share many useful properties, patterns, or characteristics with a private sequence of time-series data, without revealing sensitive or private information about the private sequence of time-series data. This may enable data researchers and scientists to study the anonymized sequence of time-series data in lieu of the private sequence of time-series data, thereby preserving the privacy of data subjects (e.g., people) corresponding to the private sequence of time-series data. The anonymized sequence of time-series data can be generated using an iterative optimization process that can involve updating the anonymized sequence of time-series data to minimize a loss value. The loss value can correspond to both the utility and privacy of the anonymized sequence of time-series data.
Described are a method, system, and computer program product for generating robust graph neural networks using universal adversarial training. The method includes receiving a graph neural network (GNN) model and a bipartite graph including an adjacency matrix, initializing model parameters of the GNN model, initializing perturbation parameters, and sampling a subgraph of a complementary graph based on the bipartite graph. The method further includes repeating until convergence of the model parameters: drawing a random variable from a uniform distribution; generating a universal perturbation matrix based on the subgraph, the random variable, and the perturbation parameters; determining Bayesian Personalized Ranking (BPR) loss by inputting the bipartite graph and the universal perturbation matrix to the GNN model; updating the perturbation parameters based on stochastic gradient ascent; and updating the model parameters based on stochastic gradient descent. The method further includes, in response to convergence of the model parameters, outputting the model parameters.
A method includes a host computer creating a log file containing data used to determine if the host computer is being controlled by a viewer computer. The host computer transmits an interaction request message comprising the log file to an authentication server computer. The authentication server computer determines if an interaction associated with the interaction request message is authentic or not authentic.
A method is configured to perform a continuous software testing. A processor receives, from a code developer computer, a request to commit a code portion for a microservice to a code repository including a source code for a plurality of microservices. The processor executes, using the source code into which the code portion is incorporated, a test transaction routine including tests respectively associated with the plurality of microservices. The processor determines if one or more errors occurred in response to the executing the test transaction routine. If no errors occurred, the code portion is committed to the code repository, and, if one or more errors occurred, a notification is sent to the code developer computer regarding the one or more errors without committing the code portion to the code repository.
Provided is a computer-implemented method for generating synthetic graphs that simulate real-time payment transactions that includes generating a base payment graph includes a plurality of nodes and a plurality of edges connecting the plurality of nodes, wherein each node represents an entity and each edge represents a probability that a real-time-payment transaction may be conducted involving two entities that are connected by the edge, wherein the real-time payment transaction is artificially created, generating a plurality of dynamic payment graphs based on the base payment graph, inserting patterns representing adversarial activity into the plurality of dynamic payment graphs, and performing an action associated with a machine learning technique using the plurality of dynamic payment graphs. Systems and computer program products are also provided.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
36.
System, Method, and Computer Program Product for Analyzing a Relational Database Using Embedding Learning
Provided are systems for analyzing a relational database using embedding learning that may include at least one processor programmed or configured to generate one or more entity-relation matrices from a relational database and perform, for each entity-relation matrix of the one or more entity-relation matrices, an embedding learning process on an embedding associated with an entity. When performing the embedding learning process on the embedding associated with the entity, the at least one processor is programmed or configured to generate an updated embedding associated with the entity. Computer-implemented methods and computer program products are also provided.
Embodiments of the invention involve using biometric templates to wirelessly authenticate individuals. In one embodiment, a mobile device may generate a first biometric template and a first public value from a first biometric sample of a user and generate a first cryptographic key by passing the first biometric template to a fuzzy extractor's generate function. An access device may generate a second biometric template from a second biometric sample of the user, generate a second secret cryptographic key by passing the second biometric template and the first public value to the fuzzy extractor's reproduce function, encrypt the second biometric template with the second secret cryptographic key, and broadcast the encrypted template to a plurality of nearby mobile devices including the mobile device. If the mobile device is able to decrypt the encrypted template with the first cryptographic key, the access device can associate the user with the mobile device.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06F 18/22 - Critères d'appariement, p.ex. mesures de proximité
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G06F 21/45 - Structures ou outils d’administration de l’authentification
G06N 7/02 - Agencements informatiques fondés sur des modèles mathématiques spécifiques utilisant la logique floue
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06V 10/75 - Appariement de motifs d’image ou de vidéo; Mesures de proximité dans les espaces de caractéristiques utilisant l’analyse de contexte; Sélection des dictionnaires
G06V 40/50 - Traitement de données biométriques ou leur maintenance
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A method is disclosed. The method includes receiving a training dataset including a set of training samples. The method then includes obtaining a first parameter value and a second parameter value. After the parameters are determined, the training dataset can be fed into a machine learning model to train the machine learning model using a neighborhood-specific loss function. The method can then include receiving a second dataset including a set of second samples. Each second sample can then be input into the trained machine learning model to determine a prediction score for each second sample, and the prediction scores can form a bimodal distribution centered around the first parameter and the second parameter.
Provided are systems, methods, and computer program products for segmenting a master non-fungible token (NFT). The method includes minting an NFT on a blockchain network, segmenting the master NFT into a plurality of segments, each segment of the plurality of segments corresponding to at least one asset of a plurality of assets on the blockchain network, issuing assets of the plurality of assets to a plurality of users based on the plurality of users conducting eligible transactions, validating a request from a user of the plurality of users based on determining that the user has possession of a set of assets of the plurality of assets corresponding to the plurality of segments, and in response to validating the request, transferring the master NFT to the user via the blockchain network.
G06Q 30/0226 - Systèmes d’incitation à un usage fréquent, p.ex. programmes de miles pour voyageurs fréquents ou systèmes de points
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
40.
System, method, and computer program product for consent management
A system, method, and computer program product are provided for consent management. A method may include receiving a first data request for user data associated with a user, the user data stored in a user data database; communicating a consent request to the requester system; receiving a consent response from the requester system; storing consent data associated with the consent response for the user data requested in the first data request in an immutable ledger; receiving a consent verification request from the user data database, the consent verification request based on a second data request for the user data from the requester system to the user data database; verifying the consent verification request based on the consent data; and communicating a consent verification response to the user data database, the consent verification response indicating consent from the user to share the user data with the requester system.
Techniques for managing an application token may include providing, by a first service provider application on a communication device to a first service provider computer, a first request for a first application token, receiving, by an account management application on the communication device from a token service computer in communication with the first service provider computer, the first application token, and storing the first application token in a token container in the account management application.
G06F 21/33 - Authentification de l’utilisateur par certificats
G06F 21/44 - Authentification de programme ou de dispositif
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Methods and systems for mobile cardholder authentication are provided. An access device can obtain interaction data produced during an interaction between a user and the resource provider computer in which the user attempts to obtain a resource from a resource provider and user device data comprising a cryptogram and supplemental data from the user device or another user device operated by the user. The cryptogram of the user device can be validated and the interaction data and user device data can be compared to determine that the user interacting with the access device is the same user as the user that interacted with the resource provider computer. The access device can provide an indication that the resource will be provided to the user responsive to determining that the user interacting with the access device is the same user as the user that interacted with the resource provider computer.
G06F 21/35 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p.ex. clés électroniques ou cartes à puce intelligentes communiquant sans fils
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
H04W 12/069 - Authentification utilisant des certificats ou des clés pré-partagées
H04W 12/47 - Dispositions de sécurité utilisant des modules d’identité utilisant la communication en champ proche [NFC] ou des modules d’identification par radiofréquence [RFID]
A method includes establishing, with a second computer, a first interaction channel with a first initial value associated with the first computer and a second initial value associated with the second computer, and recording them on a blockchain. The method includes conducting with the second computer, a plurality of interactions without recording the interactions on the blockchain. After that, the method includes determining a first current value associated with the first computer, which is than the first initial value. The method also includes initiating a transfer of transfer value from the first computer to a third computer. The method also includes conducting, with the second computer, an update interaction to update of the first current value by the transfer value to obtain a second current value, the second current value used by the first computer in the first interaction channel.
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
44.
System, Method, and Computer Program Product for Dynamic Node Classification in Temporal-Based Machine Learning Classification Models
Described are a system, method, and computer program product for dynamic node classification in temporal-based machine learning classification models. The method includes receiving graph data of a discrete time dynamic graph including graph snapshots, and node classifications associated with all nodes in the discrete time dynamic graph. The method includes converting the discrete time dynamic graph to a time-augmented spatio-temporal graph and generating an adjacency matrix based on a temporal walk of the time-augmented spatio-temporal graph. The method includes generating an adaptive information transition matrix based on the adjacency matrix and determining feature vectors based on the nodes and the node attribute matrix of each graph snapshot. The method includes generating and propagating initial node representations across information propagation layers using the adaptive information transition matrix and classifying a node of the discrete time dynamic graph subsequent to the first time period based on final node representations.
Various systems and methods of anonymously conducting a secured payment transaction between a consumer and a merchant are disclosed. The methods can be carried out at a transaction code computer in communication with an alias directory. According to the method a transaction code computer receives a request for a dynamic transaction code from a merchant computer. The request includes a merchant alias identifier. The transaction code computer queries an alias directory storing merchant information details. The transaction code computer validates the merchant with the alias directory based on the merchant alias identifier. The transaction code computer generates the dynamic transaction code and transmits a response to the request for the dynamic transaction code to the merchant computer.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p.ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p.ex. forme, nature, code
46.
VIRTUAL ACCESS CREDENTIAL INTERACTION SYSTEM AND METHOD
A method includes an authorizing entity computer receiving a request for a virtual access credential from a communication device operated by a user. The authorizing entity computer can then transmit the virtual access credential to the communication device operated by the user. The authorizing entity computer can then receive an authorization request message comprising the virtual access credential from an access device associated with a resource provider for an interaction between the user and the resource provider. The authorizing entity computer can then determine an account identifier linked to the virtual access credential. The account identifier being associated with an account maintained by an external entity computer that is external to the authorizing entity computer. The authorizing entity computer can then determine that the interaction is authorized based upon determining the account identifier associated with the virtual access credential.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
47.
SYSTEM AND METHOD FOR PERFORMING DEVICE ISOLATION IN AN AUTHENTICATION NETWORK
In some embodiments, a method includes monitoring behavior patterns of a plurality of devices associated with a user in an authentication network; generating a behavioral accuracy score for each device of the plurality of devices in the authentication network based on the behavior patterns of each device of the plurality of devices; generating a deviation score for each device of the plurality of devices based on a deviation in behavior of each device of the plurality of devices from conventional device behavior; and using the behavioral accuracy score and the deviation score to determine whether to isolate a device of the plurality of devices from the authentication network. In some embodiments, the method further includes determining whether the behavioral accuracy score of a first device of the plurality of devices is within a first behavioral accuracy score category, a second behavioral accuracy score category, or a third behavioral accuracy score category.
G06F 21/71 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information
G06N 5/04 - Modèles d’inférence ou de raisonnement
A system and method is disclosed. The method comprises a client device receiving a verification request comprising an interaction identifier. The client device can then query a full node for a random sampling of block headers from the full node. The client device can receive the random sampling of block headers from the full node, and verify the random sampling of block headers. The client device can then determine that the blockchain maintained by the full node is valid after verifying the random sampling of block headers.
H01B 1/02 - Conducteurs ou corps conducteurs caractérisés par les matériaux conducteurs utilisés; Emploi de matériaux spécifiés comme conducteurs composés principalement de métaux ou d'alliages
H01B 7/28 - Protection contre les dommages provoqués par des facteurs extérieurs, p.ex. gaines ou armatures par l'humidité, la corrosion, les attaques chimiques ou les conditions atmosphériques
H01B 7/295 - Protection contre les dommages provoqués par des facteurs extérieurs, p.ex. gaines ou armatures par des températures extrêmes ou par les flammes en utilisant un matériau résistant aux flammes
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H05B 1/02 - Dispositions de commutation automatique spécialement adaptées aux appareils de chauffage
H05B 3/04 - Joints étanches à l'eau ou à l'air pour appareils de chauffage
H05B 3/14 - Eléments chauffants caractérisés par la composition ou la nature des matériaux ou par la disposition du conducteur caractérisés par la composition ou la nature du matériau conducteur le matériau étant non métallique
A method is disclosed. The method includes presenting, by a user device, a completion page for a transaction to a user; capturing, by the user device, an image of the completion page; storing, by the user device, completion page image data for the image of the completion page; and presenting, by the user device, transaction data for the transaction along with the image of completion page to the user, the image of the completion page generated using the stored completion page image data.
36 - Services financiers, assurances et affaires immobilières
Produits et services
(1) Advertising services, namely promoting the sale of payment card accounts through the administration of incentive award programs; awarding purchase points, discounts, sweepstakes, rebates, value added offers and coupons for payment card use
(2) Loyalty program services namely the operation of a credit card program involving discounts, incentives or points for the purchase of selected goods or services; operation of consumer loyalty program; operation of customer incentive, award and loyalty programs; organisation and management of customer loyalty programs; organization and management of customer loyalty programs; promoting the sale of goods and services through a consumer loyalty program; providing information on the administration of a customer loyalty program via a website
(3) Data processing in the field of payment and credit card services, data collection and report preparation for financial
51.
Method and System for Routing Payment Transactions of a Payment Account
Disclosed herein is a method and system for routing payment transactions of a payment account. After the payment transaction is initiated, a payment server identifies flag information from the payment request indicating a payment account to be multi-configurable. When the payment server identifies that the payment request is from the POS device, the payment server retrieves primary configuration details corresponding to the payment account from a routing service and routes the payment transaction for the payment request to an issuer corresponding to the primary configuration details. Further, when the payment server identifies that the payment request is from a payment gateway, the payment server retrieves a list of names of configuration details corresponding to the payment account from the routing service for selection. Upon selection, the payment server retrieves configuration details corresponding to the selected issuer and routes the payment transaction to the issuer for completing the payment transaction.
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
Systems, methods, and computer program products for multi-domain ensemble learning based on multivariate time sequence data are provided. A method may include receiving multivariate sequence data. At least a portion of the multivariate sequence data may be inputted into a plurality of anomaly detection models to generate a plurality of scores. The multivariate sequence data may be combined with the plurality of scores to generate combined intermediate data. The combined intermediate data may be inputted into a combined ensemble model to generate an output score. In response to determining that the output score satisfies a threshold, at least one of an alert may be communicated to a user device, the multivariate sequence data may be inputted into the feature-domain ensemble model to generate a feature importance vector, or at least one of a model-domain, a time-domain, a feature-domain, or the combined ensemble model may be updated.
Provided is a computer-implemented method for communicating transaction data between mobile devices, including: registering account data associated with a merchant account corresponding to short message service (SMS) device data associated with a point-of-sale (POS) device, and account data associated with a user account as corresponding to SMS device data associated with a user device; receiving, via an SMS communication connection, transaction data associated with a transaction from the POS device, verifying the POS device and the user device are registered; in response to determining that an account balance of the user account is greater than the transaction authorization limit, transmitting a first confirmation message associated with the transaction, via an SMS communication connection, to the user device to confirm the transaction; and in response to receiving a first confirmation response associated with the transaction, via an SMS communication connection, processing the transaction data.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/42 - Confirmation, p.ex. contrôle ou autorisation de paiement par le débiteur légal
54.
ISOLATING APPLICATION AND SOFTWARE DEVELOPMENT KIT SANDBOXES FOR SECURITY PROTECTION
Systems and methods are disclosed for application run-time architectures that provide continuous and autonomous security protection from unauthorized access to sensitive data. Several aspects comprise running, on a client device, a software development kit (SDK) in a first application sandbox with a first unique identifier (UID); and running, on the client device, an application comprising an SDK interface in a second application sandbox with a second UID, the application communicating with the SDK via the SDK interface on a runtime service. The first UID and the second UID are each associated with their own resources. The resources may include files, keys, and registries. The first application sandbox may prevent access to resources associated with the first UID by applications without the first UID. The second application sandbox may prevent access to resources associated to the second UID by applications without the second UID.
G06F 21/53 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p.ex. "boîte à sable" ou machine virtuelle sécurisée
A verification application executing at a user's mobile phone directs the user to take a photo of an identification document (e.g., driver's license or other form of government issued identification) or of their face. After the verification application sends the image to a backend service, the service may then dispatch a drone to the user's location and take a photograph of the user. The service may then validate the previously-imaged document or photo of the user's face against the photograph of the user and the geolocation sent with the first image. The service may then verify the new account and provision a token to the verification application to complete a secured account generation.
G06V 40/16 - Visages humains, p.ex. parties du visage, croquis ou expressions
H04W 4/80 - Services utilisant la communication de courte portée, p.ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
Methods, systems, and computer program products may formulate an iterative data mix up problem into a Markov decision process (MDP) with a tailored reward signal to guide a learning process. To solve the MDP, a deep deterministic actor-critic framework may be modified to adapt a discrete-continuous decision space for training a data augmentation policy.
36 - Services financiers, assurances et affaires immobilières
Produits et services
Financial services, namely, banking services; credit card services in the nature of authorization services, payment processing services, transaction processing services, transaction settlement services and issuance of credit cards by others; debit card services in the nature of authorization services, verification services, payment processing services, transaction processing services, and transaction settlement services; charge card payment processing services; pre-paid purchase card services, namely, processing electronic payments through pre-paid cards; electronic credit card and debit card transaction processing services; electronic funds transfer; payment processing services in the field of credit card payments, debit card payments, and prepaid card payments; cash replacement rendered by credit cards and debit cards; currency exchange services; online banking services, bill payment services; deposit access and automated teller machine (ATM) banking services; check cashing and cash disbursement services; providing financial information and electronic payment data including via a global computer network; financial sponsorship of sports competitions, events, activities, and games
36 - Services financiers, assurances et affaires immobilières
Produits et services
(1) Financial services namely credit card services, debit card services, charge card services, pre-paid card services, smart card services, electronic credit and debit transactions, electronic funds transfer, payment processing services, transaction authentication and verification services, cash replacement rendered by credit cards and debit cards, currency exchange services, bill payment services, deposit access and automated teller machine services, check cashing and cash disbursement services, dissemination of financial information and electronic payment data including via a global computer network, financial sponsorship of sports competitions, events, activities, and games
60.
Method, System, and Computer Program Product for Flexible Settlement Decisions
Provided is a computer-implemented method for dynamically designating a settlement window for a transaction within a settlement cycle between an acquirer and an issuer. The method includes receiving a plurality of transaction records associated with a plurality of transactions, determining a first settlement window of a plurality of settlement windows to assign a transaction record of the plurality of transaction records, assigning the transaction record of the plurality of transaction records to the first settlement window based on determining the first settlement window of the plurality of settlement windows to assign the transaction record, and performing a settlement function for a transaction associated with the transaction record assigned to the first settlement window based on assigning the transaction record of the plurality of transaction records to the first settlement window. A system and computer program product are also disclosed.
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
61.
VERIFICATION OF BIOMETRIC TEMPLATES FOR PRIVACY PRESERVING AUTHENTICATION
Secure protocols for external-facing authentication are provided for both user templates stored on their devices and the biometric measurement captured by external sensors of an access device. The protocols provide different levels of security, ranging from passive security with some leakage to active security with no leakage. A packing technique is also provided. Zero-knowledge techniques are used during enrollment to validate a norm of user templates and knowledge of the plaintext biometric template. Once enrolled, the verifier can sign the encrypted template for use in a later matching phase with an access device.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
An issuing authority (IA) may validate the identity of a user and issue a digital license to the user. IA may generate IA public-private key pair, and provide IA public key to the certification authority (CA). IA may sign the digital license with IA private key, and provision the signed digital license on the user device. IA may request CA to certify the digital license. CA may use IA public key to validate the digital license, and sign IA public key with CA private key, thereby generating a digital certificate associated with the issuing authority that is linked to the digital license. A relying party may use CA public key to validate the digital license. The relying party can retrieve the information from the digital license and trust that the retrieved information is legitimate.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 21/10 - Protection de programmes ou contenus distribués, p.ex. vente ou concession de licence de matériel soumis à droit de reproduction
G06F 21/33 - Authentification de l’utilisateur par certificats
63.
System, Method, and Computer Program Product for Diagnosing Faulty Components in Networked Computer Systems
Described are a system, method, and computer program product for diagnosing faulty components in networked computer systems. The method includes generating a graph of a network topology of a networked computer system and determining a set of nodes of the graph affected by a fault in the networked computer system based on an alert associated with the set of nodes. The method also includes determining a faulty component of the networked computer system based on a common node having a plurality of edges connected to nodes in the set of nodes affected by the fault. The method further includes retrieving a set of records of operational changes to the networked computer system and determining an operational change that caused the fault. The method further includes resetting the networked computer system to a prior state before the operational change.
H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p.ex. la hiérarchie ou l’analyse temporelle ou arborescente
H04L 41/0659 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau en isolant ou en reconfigurant les entités défectueuses
H04L 41/12 - Découverte ou gestion des topologies de réseau
64.
STRUCTURED GRAPH CONVOLUTIONAL NETWORKS WITH STOCHASTIC MASKS FOR NETWORK EMBEDDINGS
A method includes receiving a first data set comprising embeddings of first and second types, generating a fixed adjacency matrix from the first dataset, and applying a first stochastic binary mask to the fixed adjacency matrix to obtain a first subgraph of the fixed adjacency matrix. The method also includes processing the first subgraph through a first layer of a graph convolutional network (GCN) to obtain a first embedding matrix, and applying a second stochastic binary mask to the fixed adjacency matrix to obtain a second subgraph of the fixed adjacency matrix. The method includes processing the first embedding matrix and the second subgraph through a second layer of the GCN to obtain a second embedding matrix, and then determining a plurality of gradients of a loss function, and modifying the first stochastic binary mask and the second stochastic binary mask using at least one of the plurality of gradients.
An automation computer can receive a set of instructions pertaining to a transaction. The automation computer can generate a request to generate and activate a virtual account, where the virtual account is associated with a transaction value and a transaction amount. The virtual account can be managed by an authorization computer that can load a transaction value onto the virtual account in an amount equal to the transaction amount. The authorization computer managing both issuer and acquirer functionality in a transaction settlement can settle the transaction rapidly using the loaded virtual account by depositing the transaction value associated with the virtual account directly into an account of a resource provider.
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/28 - Schémas de prépaiement, c. à d. de "paiement préalable"
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
A method is disclosed. The method includes transmitting, by a user device to an access device, a digital certificate and a seed. The access device encrypts the seed and a first access device key with a public key from the digital certificate to form encrypted data. The method also includes receiving from the access device, the encrypted data, decrypting the encrypted data using a private key corresponding to the public key to obtain the seed and the first access device key, verifying that the seed received from the access device matches the seed sent to the access device, encrypting a secret or derivative thereof with the first access device key to form an encrypted secret or derivative thereof, and transmitting to the access device, the encrypted secret or derivative thereof.
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
When a merchant fails to provide payment service details, a system matches in real time information from a data processor with data from the payment service to allow matching a request from the payment system to a particular transaction. The matching system may use high speed buffers and hardware logic to rapidly match related data from different sources at speeds of thousands a second or more. This allows characterization of the transaction for recognition of current offers applicable to the transaction as well as generation of future offers.
Provided is a method for matching card transaction data to mobile application data. The method may include generating a plurality of regions within a geographic area, each region of the plurality of regions associated with a region identifier. Transaction data associated with an account identifier and mobile application data associated a user identifier may be received. A region for each transaction and for each interaction may be determined based on the transaction and interaction locations. A transaction signature may be generated for each account and an interaction signature may be generated for each user identifier. At least one transaction may be matched to at least one interaction signature. At least one account identifier may be linked to at least one user identifier based on matching the at least one transaction signature to the at least one interaction signature. A system and computer program product are also disclosed.
An authorization data can be captured and reused for an unauthorized purpose or context during the validity period by an adversity. Current anti-replay solutions are complex and unpractical. For example, conditional access anti-replay solution requires supplementary context or behavior control services to protect against replay. However, any authorization data can be issued with an authentication timecode, which is valid during a period of short time and is non-predictable, i.e., it can be stolen but not replayed. Therefore, a timecode can be issued with the authorization data to protect against a replay attack.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A method is disclosed. The method includes receiving, by a processing network computer from a relying party computer associated with a relying party, a request for data associated with a user operating a user device. The processing network computer may retrieve first encrypted data of the user having a user-layer of encryption. The processing computer can then generate a second symmetric key to add a relying party-layer of encryption to the first encrypted data using a stream cipher. The doubly encrypted data may be transmitted to a user device that removes the user-layer of encryption on the first doubly encrypted data, and then adds a second relying party-layer of encryption to form second doubly encrypted data. The second doubly encrypted data may be transmitted to the relying party computer, which can remove both relying party-layers of encryption to gain access to the data associated with the user.
H04L 9/14 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
Systems and methods for processing a financial transaction are provided. In a method conducted at an issuing server computer associated with a first entity, a transaction request message is transmitted to an acquiring server computer associated with a second entity. The transaction request message is in respect of a push transaction in which funds from the first entity are transferred to the second entity and includes a first set of data elements. In response to transmitting the transaction request message, a transaction response message and a second set of data elements are received. The second set of data elements are associated with the first set of data elements and the financial transaction is processed using information contained in the first set of data elements and the second set of data elements.
A plurality of wireless charging systems may be employed within a network at a venue or other physical area to precisely locate a battery-operated node of the network. The location of the node may then be used to manage a transaction between that node and another node within the network when the transaction is associated with that precise location.
H02J 50/40 - Circuits ou systèmes pour l'alimentation ou la distribution sans fil d'énergie électrique utilisant plusieurs dispositifs de transmission ou de réception
H02J 50/80 - Circuits ou systèmes pour l'alimentation ou la distribution sans fil d'énergie électrique mettant en œuvre l’échange de données, concernant l’alimentation ou la distribution d’énergie électrique, entre les dispositifs de transmission et les dispositifs de réception
H02J 50/12 - Circuits ou systèmes pour l'alimentation ou la distribution sans fil d'énergie électrique utilisant un couplage inductif du type couplage à résonance
H02J 50/20 - Circuits ou systèmes pour l'alimentation ou la distribution sans fil d'énergie électrique utilisant des micro-ondes ou des ondes radio fréquence
74.
SYSTEM AND METHOD FOR SCHEDULING DATABASE APPLICATIONS
In some embodiments, a method includes receiving zonal topology information related to a zonal topology of a plurality of zones; utilizing the zonal topology information to perform a level strength assessment of each level of a plurality of levels associated with the zonal topology of the plurality of zones; and based on the level strength assessment of each level of the plurality of levels, scaling a target number of resources to at least a first level of the plurality of levels of the zonal topology. In some embodiments of the method, the level strength assessment includes performing a level-by-level breadth analysis of each level of the plurality of levels of the zonal topology.
Provided is a system for implementing a communication interface layer for managing online services, the system including at least one processor programmed or configured to receive a request for an authentication token for access to an online service, where the request includes a user identifier, generate an authentication token associated with the user identifier, transmit the authentication token to a user device, receive a request to access the online service to perform an action associated with the account via a first function of a communication interface layer, determine that the user device is authenticated for access to the online service, and perform an action involving the online service via a second function of the communication interface layer. Methods and computer program products are also provided.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06F 21/44 - Authentification de programme ou de dispositif
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/42 - Confirmation, p.ex. contrôle ou autorisation de paiement par le débiteur légal
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
H04W 12/069 - Authentification utilisant des certificats ou des clés pré-partagées
H04W 12/082 - Sécurité d'accès utilisant la révocation d’autorisation
H04W 12/37 - Gestion des politiques de sécurité pour des dispositifs mobiles ou pour le contrôle d’applications mobiles
76.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR CRYPTOGRAM-BASED TRANSACTIONS
A computer-implemented method may include: transmitting a public key to a merchant system, the public key of a payment device provider system; receiving a request for a prepaid amount from a user device of a user; in response to receiving the request, generating a cryptogram based on a payment device of the user, the prepaid amount, and a private key corresponding to the public key of the payment device provider system, the public key and the private key forming a public-private key pair associated with the payment device provider system; and transmitting the cryptogram to the user device, the cryptogram configured to authenticate the user device during an electronic payment transaction initiated by the user device with a merchant system.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
H04L 9/14 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
An embodiment includes a node receiving one or more blocks of a blockchain. The node comprising a data storage can store, in the data storage, a plurality of sets of keys and data values associated with keys of the plurality of sets of keys, the data values being data associated with the blockchain. The node can perform a validation process for the one or more blocks. The validation process includes for each of the one or more blocks a) identifying a set of keys associated with the block, b) retrieving data values associated the identified keys from the data storage, c) storing the retrieved data values into volatile memory, and d) validating the block using the data values in the volatile memory. The node can then complete the validation of the one or more blocks.
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 12/123 - Commande de remplacement utilisant des algorithmes de remplacement avec listes d’âge, p.ex. file d’attente, liste du type le plus récemment utilisé [MRU] ou liste du type le moins récemment utilisé [LRU]
Embodiments provide methods and systems for associating a single token with multiple accounts of a user, and enabling the user to define rules for processing transactions using the token. A Federated Virtual Card (FVC) may be provisioned on a digital wallet of a user device through a token associated with the FVC. Transactions conducted using the FVC may be divided among the two or more user accounts based on user-defined rules. An account (e.g. card) may be added to or removed from the FVC without disrupting the card holder's ability to use the card to transact outside the FVC. A mobile application or an online platform may be provided for managing the FVC.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
A server computer may receive an authentication data packet including authentication data from a relying party computer in communication with an authenticator associated with a user device. The server computer may verify the authentication data in the authentication data packet. The server computer may store the authentication data packet in a database. The server computer may transmit to an authorizing entity computer, a data packet including data relating to the verification of the authentication data.
Methods, systems, and computer program products are provided for cleaning noisy data from unlabeled datasets using autoencoders. A method includes receiving training data including noisy samples and other samples. An autoencoder network is trained based on the training data to increase a first metric based on the noisy samples and to reduce a second metric based on the other samples. Unlabeled data including unlabeled samples is received. A plurality of third outputs is generated by the autoencoder network based on the plurality of unlabeled samples. For each respective unlabeled sample, a respective third metric is determined based on the respective unlabeled sample and a respective third output, and whether to label the respective unlabeled sample as noisy or clean is determined based on the respective third metric and a threshold. Each respective unlabeled sample determined to be labeled as noisy is cleaned.
A method and system for authenticating a payment transaction. The method includes receiving a request for verifying a phone number associated with a Subscriber Identification Module card from a merchant application installed in the user device. Further, obtaining a first key from at least one of a server associated with a manufacturer of the user device and a network server. Furthermore, generating a first cryptogram based on at least one of the phone number and a unique identification value associated with the user device using the first key, wherein the first cryptogram is provided to the server associated with the manufacturer for verification. Upon verification of the first cryptogram, the method includes receiving a second cryptogram from the server associated with the manufacturer, wherein the merchant application provides the second cryptogram and payment transaction details to an issuer server for authentication of the payment transaction.
Enhanced techniques for communicating with an integrated circuit chip card are disclosed. An integrated circuit chip card may include a processor, a memory storing a plurality applications executable by the processor, an input/output (I/O) interface, and a network interface coupled to the (I/O) interface. The network interface may implement a plurality of logical ports, and the network interface can be configurable to select between multiple communication protocols to communicate with an external device in a socket communication mode. The network interface can be configured to establish a plurality of communication channels between the external device the integrated circuit chip card using the plurality of logical ports, and each of the communication channels may support communication with one of the plurality of applications.
Systems, methods, and computer program products calculate a historical feature similarity point distribution associated with a first machine learning model, calculate a real-time feature similarity point distribution associated with a second machine learning model, and automatically provide, based on a comparison of the historical feature similarity point distribution to the real-time feature similarity point distribution, an indication of whether the second machine learning model is aligned with the first machine learning model.
G06N 20/20 - Techniques d’ensemble en apprentissage automatique
G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
84.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR PROCESSING TRANSACTIONS USING ELECTRONIC WALLETS
A computer-implemented method includes: storing, by a payment application, payment device data including: first and second payment device identifiers and first and second wallet identifiers corresponding to first and second electronic wallets in which first and second payment device credentials of first and second payment devices are respectively stored; initiating a payment transaction with a merchant system; displaying the first and second payment device identifiers; receiving a user input from the user of the user device, the user input comprising a selection of the first payment device identifier; determining that the first electronic wallet includes the first payment device credentials of the first payment device; and facilitating a transfer of payment data between the merchant system and the first electronic wallet to initiate processing of the payment transaction.
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Embodiments allow for a first transfer application executing on a first user device to send funds to a second transfer application executing on a second user device along with supplemental data. The supplemental data includes one or more of a text message, an audio content, a video content, a drawing, a photograph, a multimedia file, and the like. The application provider server of the first transfer application and/or the application provider server of the second transfer application does not support transfer of the supplemental data. A processing computer positioned between the two transfer applications facilitates the transfer of supplemental data. When the funds transfer is processed by an authorizing entity, the processing computer generates an enhanced notification including the supplemental data, and transmits the enhanced notification directly to the second transfer application.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
Described herein are a system and techniques for updating balance information for a disbursement module on a portable device using a transaction module on that same portable device. In some embodiments, each of the transaction module and the disbursement module may be associated with a different transaction processing system. A client device may be used to interact with the transaction module of the portable device via a communication element. In some embodiments, the client device may be configured to receive an account identifier from the transaction module, generate and transmit an authorization request message to an authorization entity, and upon receiving authorization from the authorization entity, cause the transaction module on the portable device to update a balance associated with the disbursement module.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
89.
Systems and Methods for Generating Behavior Profiles for New Entities
Disclosed are a method and system for generating a behavior profile for a new entity. The method is performed in response to and immediately after a new entity is added to a fraud detection system. The method includes generating a doppelganger behavior profile for the new entity based on feature data of the new entity and pre-existing entities. Generating the profile includes determining a similarity score for each pre-existing entity, ranking the plurality of pre-existing entities based on the score, selecting pre-existing entities based on the ranking, and combining behavior profiles of the preexisting entities to produce the profile. The method also includes assigning the profile to the new entity and monitoring the new entity. The method further includes detecting fraud, an anomaly, and/or malicious intent based on the profile, and automatically suspending an aspect of the new entity in response to the detection.
A payment instrument may include a memory, a contactless chip, a sensor, a visual output component, and/or a processor. The memory may store gesture data associated with one or more predefined gestures. The contactless chip may detect an operating field of an access device and establish a communication with the access device through a near-field communication protocol. The sensor may capture further gesture data associated with a gesture made by a user with the payment instrument in the operating field of the access device. The visual output component may provide a visual output to the user. The processor may compare the further gesture data to the gesture data to determine whether a captured gesture matches a predefined gesture, and in response to the captured gesture not matching a predefined gesture, increment a counter. The processor may control, based on a current count of the counter, the visual output component.
G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
A method is disclosed. The method comprises receiving, by a digital identity computer, a request for personal data associated with a user. The digital identity computer may retrieve encrypted personal data, wherein the personal data is encrypted with a public key associated with the user. The digital identity computer may encrypt the encrypted personal data with a first public key associated with a relying party or derivative thereof to form subsequently encrypted personal data. The method may then proceed to transmit the subsequently encrypted personal data or derivative thereof to a relying party computer, or a user device. If the user device receives the subsequently encrypted personal data, the user device may thereafter transmit the subsequently encrypted personal data or derivative thereof to the relying party computer. Then, the relying party computer obtains the personal data from the subsequently encrypted personal data or derivative thereof.
Described are a system and computer program product for secure n-party computation. The system includes a computing device programmed or configured to communicate an input to a trusted execution environment (TEE), and receive a first encrypted output. The computing device is also programmed or configured to post the first encrypted output on a blockchain and receive a first proof of publication. The computing device is further programmed or configured to communicate the first proof of publication to the TEE and receive the first function output of the n-party computation. The computing device is further programmed or configured to communicate a witness to the TEE and receive a second encrypted output. The computing device is further programmed or configured to post the second encrypted output on the blockchain, receive a second proof of publication, communicate the second proof of publication to the TEE, and receive the second function output.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
93.
Method, System, and Computer Program Product for Fraud Prevention Using Deep Learning and Survival Models
Provided is a method for fraud prevention using deep learning and survival models. The method may include receiving, with at least one processor, transaction data associated with a plurality of transactions of at least one payment account. At least one attempted attack may be detected based on the transaction data. A fraud risk score for each subperiod of a plurality of subperiods in a time period following the at least one attempted attack may be generated based on the transaction data using a deep learning model and a survival model. The fraud risk score for each respective subperiod may be associated with a probability that a fraudulent transaction will not occur by the respective subperiod. A system and computer program product are also disclosed.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
A token processing server computer to process tokens for non-fungible tokens is disclosed. The token processing server computer includes a processor and a memory coupled to the processor. The memory stores machine executable instructions that when executed by the processor cause the processor to issue a token identification (ID) based on a non-fungible token (NFT) and authenticate ownership of the NFT using payment rails.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
95.
System, Method, and Computer Program Product for Generating an Inference Using a Machine Learning Model Framework
Provided is a system for generating an inference based on real-time selection of a machine learning model using a machine learning model framework that includes at least one processor programmed or configured to receive a request for inference, wherein the request includes a payload, select a machine learning model of a plurality of machine learning models based on the request for inference, determine an aggregation of data based on the machine learning model and the payload of the request, transform the aggregation of data into inference data, wherein the inference data has a configuration that is capable of being processed by the machine learning model, and generate an inference based on the inference data using the machine learning model. Methods and computer program products are also provided.
Provided is a natural language processing system for determining a merchant based on a natural language query. The system may include a processor to receive a natural language query, convert at least one word of the natural language query to a vector using at least one neural network to form a set of vectors, determine a vector distance from the set of vectors to each profile in a set of profiles, rank the set of profiles based on the vector distance of each profile to the set of vectors, communicate merchant data associated with at least one merchant included in the set of profiles to the user device, receive a selection of a first merchant associated with the merchant data from the user device, and schedule an appointment with the first merchant for a user of the user device. A computer program product and method are also disclosed.
A cross-wallet system generate a cross-platform key or a virtual account number for a first digital wallet provider to be used by the consumer when the consumer wishes to send payment to a second digital wallet provider with which the consumer does not possess an account. Moreover, the virtual account number, in one example, may only include a partial set of card number that does not include the typical set of card number. The virtual account number created by embodiments of the invention further enable security features that prevent fraud and protect the consumer's financial assets.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Methods and systems for performing on demand access transactions are disclosed. In one example, the method includes receiving, by a directory service computer from an authorizing computer, a file including a primary access identifiers and virtual access identifiers, the virtual access identifiers not being capable of being used at resource providers to conduct transactions. The method also includes receiving a request to provide an access token that is associated with an account, the request comprising information that identifies the account. The method further includes retrieving a virtual access identifier based on the identifying information; and requesting, by the directory service computer to a token service computer, that the access token be provisioned on the user device or an application computer associated with an application on the user device.
Systems and methods are for confidentially and securely provisioning data to an authenticated user device. A user device may register an authentication public key with an authentication server. The authentication public key may be signed by an attestation private key maintained by the user device. Once the user device is registered, a provisioning server may send an authentication request message including a challenge to the user device. The user device may sign the challenge using an authentication private key corresponding to the registered authentication public key, and may return the signed challenge to the provisioning server. In response, the provisioning server may provide provisioning data to the user device. The registration, authentication, and provisioning process may use public key cryptography while maintaining confidentiality of the user device, the provisioning server, and then authentication server.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A disclosed method includes a data distribution computer receiving a data packet comprising a plurality of data values in response to an interaction between a resource provider and a user. The data distribution computer can then determine a data item for each data value of the plurality of data values and associate each data value to a processing computer using the data item for each data value. It can generate a plurality of authorization request messages comprising at least one data value. It can then transmit the plurality of authorization request messages to a plurality of processing computers adapted to process the data values in the respective authorization request messages, where the plurality of processing computers process the data values in the respective authorization request messages. The plurality of authorization request messages are subsequently forwarded to the authorization computer. The authorization computer then analyzes each authorization request message.
G06F 21/10 - Protection de programmes ou contenus distribués, p.ex. vente ou concession de licence de matériel soumis à droit de reproduction
G06F 21/44 - Authentification de programme ou de dispositif
H04L 67/147 - Méthodes de signalisation ou messages fournissant des extensions aux protocoles définis par la normalisation
G06F 21/78 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données