Systems and methods are provided for persistent login. Such persistent login may be based on linking user identity across accounts of different entities to allow each entity to maintain control over their respective sets of user data, while providing a streamlined user experience that avoids much of the repetitive need to login to different services with different login credentials (e.g., during periods of heavy use). Such persistent login may utilize a set of tokens issued and exchanged between devices of the partnering entities. Such tokens may include an access token, refresh token, and identity token. When a user associated with a first entity requests access to information secured by a second entity, such request may be associated with the access token. If the access token is determined to be expired, the refresh token may be used to refresh the access token, which may also trigger issuance of a new refresh token. The refreshed access token may be used in conjunction with the identity token to access the requested information secured by the second entity.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
An authentication system may enable remote access to multiple user profiles of a user with a single authentication. The authentication system may receive a connection request including personal identifiable information associated with a current user of a user device. The authentication system may select an authentication process from a plurality of authentication processes based on at least a portion of the personal identifiable information. Once authenticated, the authentication system may establish a temporary session for the user device, enabling execution of an action one or more user profiles.
Systems and methods are provided through which loyalty reward tokens are automatically generated and redeemed through one or more decentralized distributed ledger nodes based on dynamic tracking of user transactions. As transaction data associated with a user is received, transaction tokens are automatically minted through a decentralized distributed ledger. When a threshold amount of transaction tokens corresponding to a loyalty reward has been minted, the provided systems automatically generate a rewards token in the decentralized distributed ledger. The rewards token is redeemable for use with a merchant system, whereby when the rewards token is redeemed, the merchant system can apply the corresponding reward.
G06Q 30/0226 - Incentive systems for frequent usage, e.g. frequent flyer miles programs or point systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
The present disclosure is directed to systems and methods that enable scanning of any type of card regardless of the shape and design of a given card and/or a font, a shape and a format with which characters such as numbers, letters and symbols are printed on the cards including cards with non-embossed characters printed thereon. In one example, a method includes scanning a card, the card including at least an account number associated with a user of the card and an identifier of the user; detecting, by applying a machine learning model to the card after scanning the card, at least the account number printed on the card; and completing a task using the account number.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Disclosed embodiments may provide techniques for tracking fulfillment statuses of objects associated with transactions. A computer-implemented method can include identifying receiving a request for distribution of resources. The resources can be associated with a transaction, and the transaction is associated with a set of objects. The computer-implemented method can also include detecting one or more fulfillment actions associated with the set of objects. The computer-implemented method can also include determining that fulfillment conditions associated with a subset of objects have been satisfied. The satisfaction of the fulfillment conditions can be determined based on the one or more fulfillment actions. The computer-implemented method can also include identifying a fulfillment metric associated with the subset of objects. The computer-implemented method can also include determining that the fulfillment metric exceeds a predetermined threshold. The computer-implemented method can also include distributing the resources after determining that the fulfillment metric exceeds the predetermined threshold.
Systems and methods provide an application-programming interface (API) framework for fulfilling transactions based on resources provided by a resource provider. A computer-implemented method can include receiving user-profile data associated with a request for resources to fulfill a transaction. The computer-implemented method can also include constructing an API request based on the user-profile data. When the API request is received, the resource server can dynamically generate and transmit a response message. The computer-implemented method can also include parsing the response message to identify a set of installment options. When a particular installment option is selected, the resource server can authorize transmittal of one or more resources associated with the selected installment option. The computer-implemented method can also include fulfilling the transaction after transmitting the selected installment option. The computer-implemented method can also include receiving the one or more resources associated with the selected installment option after fulfillment of the transaction.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
7.
APPLICATION USER INTERFACE FRAMEWORK FOR ACTIVATING REVOLVING ACCOUNTS
Disclosed embodiments may provide an application-programming interface (API) framework for activating revolving accounts. A computer-implemented method can include receiving a preapproval API response to identify a set of preapproved revolving accounts. In response to receiving a selection of a revolving account from the set of preapproved revolving accounts, an activation API request for activating the selected revolving account can be constructed. In some instances, the activation API request includes supplemental personally-identifiable information (PII) associated with the user. The computer-implemented method can also include receiving an approval API response that includes an indication that the user is approved for the selected revolving account, and the indication is determined based on a formal qualification inquiry performed on the supplemental PII.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
8.
DETERMINING CONDITIONS AND INCENTIVES ASSOCIATED WITH INSTALLMENT OPTIONS
Disclosed embodiments may provide techniques for configuring conditions and incentives associated with installment options. A computer-implemented method can include identifying an installment option and an alternative installment option associated with an account. In some instances, the alternative installment option is associated with an incentive, which can be applied when one or more conditions associated with the account are satisfied. The computer-implemented method can also include receiving a user selection of the alternative installment option. The computer-implemented method can also include detecting in real-time a set of actions performed for the account, in which the set of actions can be associated with the one or more conditions. The computer-implemented method can also include determining in real-time that the one or more conditions have been satisfied based on the set of actions. The computer-implemented method can also include processing the incentive associated with the alternative installment option.
Systems and methods provide a framework through which user data is automatically propagated to different service provider systems through one or more decentralized distributed ledger nodes in response to modification of the user data and to changes to service provider systems authorized to access the user data.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
10.
SYSTEM AND METHOD FOR INTEGRATING DATA FROM A REMOTE SERVER WITH A CLIENT APPLICATION
The electronic device may invoke a host application. The device may display a first host user interface on the display, the first host user interface including a first host user interface component associated with a child application. In response, the device may invoke, using the host application, the child application executed at the electronic device. The device may transmit, using the host application, a request for data associated with a child user interface component to the child application. The device may transmit, using the child application, the request for data associated with the child user interface component to a child application server, wherein the data associated with the child user interface component is inaccessible by the host application. The device may receive, using the child application, the data associated with the child user interface component from the child application server. The device may display the child user interface component.
A system determines an amount of time available for responding to a request regarding eligibility for a client account for a modification based on a confidence grade for the client. The system transmits a first query and a second query. The system uses trained machine learning model(s) to determine respective estimated receipt times of first and second datasets responsive to the first and second queries, and to determine respective importance levels of the first and second datasets to determining the confidence grade. The system generates a preliminary confidence grade based on the first dataset, and delays generation of the confidence grade until the second dataset is received based on the estimated receipt times and importance levels. The system updates the preliminary confidence grade using the second dataset to generate the confidence grade, determines the eligibility determination, and updates the training of the machine learning models.
A system determines an amount of time available for responding to a request regarding eligibility for a client account for a modification based on a confidence grade for the client. The system transmits a first query and a second query. The system uses trained machine learning model(s) to determine respective estimated receipt times of first and second datasets responsive to the first and second queries, and to determine respective importance levels of the first and second datasets to determining the confidence grade. The system generates a preliminary confidence grade based on the first dataset, and delays generation of the confidence grade until the second dataset is received based on the estimated receipt times and importance levels. The system updates the preliminary confidence grade using the second dataset to generate the confidence grade, determines the eligibility determination, and updates the training of the machine learning models.
Methods may include initiating, by a client device, a checkout operation including a default transaction amount associated with a plurality of items and a plurality of promotions. A device may receive data associated with multiple display promotions, where the data includes a single default promotional code associated with the default transaction amount, the plurality of items, and the plurality of promotions. A device may display an error message for at least one display promotion of the multiple display promotions. A device may decline the checkout operation, wherein a server call reduces processing time used to validate error messages during the checkout operation, and where the single default promotional code prevents or reverses payment associated with the error message.
A system architecture of a gift transaction system is disclosed. The gift transaction system can include a buyer interface module, a recipient interface module, a merchant backend interface module, a store front interface module, a curation module, a reminder module, an analytics module, or a media plug-in interface module. A method of operating the gift transaction system under the system architecture includes: providing an embedded widget on a website to determine gift intent to initiate a gift transaction by a buyer account for a recipient account; generating a gift buyer interface for a first client device to personalize a gift package including a gift item; generating a gift recipient interface for a second client device to customize the gift package; and communicating with a merchant backend system
Examples described herein include systems, methods, instructions, and other implementations for data security with integrated installment payment systems. In one example, account security system receives a checkout communication that includes data describing a validated checkout system of a merchant system. A client token is transmitted in response to an authentication that the checkout communication is from the validated checkout system, and an account communication including the client token and secure client information is received from a client device. An installment payment communication associated with the secure transaction is received from a system other than a merchant system involved in the transaction. The secure transaction is then facilitated following receipt of the installment payment communication.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Systems and methods provide a framework through which automatic reimbursement for adjudicated claims is performed through dynamic evaluation of claims and of available reimbursement methods. In response to a reimbursement request, a system, through dynamically trained machine learning algorithms, can dynamically generate different reimbursement method recommendations. For a selected reimbursement method, the system can further automatically interact with different payment instrument services to ensure that corresponding payment instruments can be used for the reimbursements. This interaction can be facilitated through the use of tokenized payment instruments provided by these payment instrument services.
Examples described herein include implementations for big-data validation. One aspect includes generating a configuration file including dynamic matching data describing a first plurality of data entries and a second plurality of data entries, and generating a data action file. A plurality of data queries are generated based on the dynamic matching data indicated in the configuration file. The plurality of data queries are dynamically executed in parallel, including execution of a plurality of simultaneous data queries to the data source system. Fields of the first plurality of data entries and the second plurality of data entries are matched using the key type and the value structure, corresponding fields of the first data fields and the second data fields having a data mismatch are identified, and a mismatch database entry for the corresponding fields having the data mismatch is automatically generated.
Systems and methods for a dynamic encryption model in which dynamic encryption keys are associated with an access token having an expiration time. The access token is generated for a user session of a user application seeking to make API calls to a service provider system. When the access token expires, or becomes otherwise invalid, the dynamic encryption keys are discarded, and any further API calls are made using an updated access token and updated dynamic encryption keys. The dynamic encryption keys are used to encrypt specially designated fields of API calls and/or API call results.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
In one aspect, a distributed ledger system include a first network node configured to detect a triggering condition for processing a claim; collect user and broker information for processing the claim; convert the information from a first computer-readable format to a second computer-readable format; validate the converted information based on corresponding digital signatures; generate claim state objects based on the validated information to be used by each node of the distributed ledger system to execute a smart contract for processing the claim; receive one or more updated claim state objects from a second network node reflecting updated processing status of the claim to be used by each node of the distributed ledger system to execute the smart contract for processing the claim; and process the claim based on results of execution of the smart contract using the one or more updated claim state objects.
Imaging systems and techniques are described. In some examples, an imaging system receives an image captured by an image sensor. The imaging system determines that an image region in the image includes a depiction of an object of a specified category. The imaging system adjusts a hue (and/or saturation and/or brightness) of at least one pixel of the depiction of the object in the image region to a specified hue (and/or saturation and/or brightness) to generate a processed image.
Imaging systems and techniques are described. In some examples, an imaging system receives an image captured by an image sensor. The imaging system determines that an image region in the image includes a depiction of an object of a specified category. The imaging system adjusts a hue (and/or saturation and/or brightness) of at least one pixel of the depiction of the object in the image region to a specified hue (and/or saturation and/or brightness) to generate a processed image.
Techniques are provided for using machine learning to improve capabilities of the flexible linked objects. In an example, a method involves accessing history data associated with a profile. The method further involves generating a set of options using the history data and a machine learning model. The method further involves receiving an indication of a selection of an object from the set of options. The method further involves identifying detail information associated with the selected object. The method further involves encoding a link to the detail information in a machine-readable representation, thereby generating a flexible linked object that is associated with the machine-readable representation.
Data selection systems and techniques are described. For instance, a system receives a data set with a plurality of data elements. The system generates a plurality of random values. The system generates a ranking of the plurality of random values. The system selects a subset of the plurality of data elements based on a comparison between the ranking and a predetermined threshold. The predetermined threshold is based on a predetermined proportion of the plurality of data elements to be included in the subset. The system outputs a randomization scheme that includes the ranking and the predetermined proportion, wherein a second selection of a second subset of the plurality of data elements is based on the randomization scheme. The system output an indication of the subset and the second subset.
The present disclosure is directed to a system of software robots executed on a plurality of network clients for a secure and automated processing of time sensitive data. In one aspect, a method includes receiving a data set for processing, processing the data set being subject to a time limit; splitting the data set into a plurality of data subsets; assigning each of the plurality of data subsets to one a plurality of network clients each of which is configured to execute at least one software bot to process one or more data subsets of the plurality of data subsets assigned thereto; configuring the plurality of network clients to simultaneously process the one or more data subsets assigned thereto such that the data set is processed within the time limit; configuring each of the plurality of network clients to provide an update on processing status of each of the one or more data subsets assigned thereto; and generating a summary report indicative of a summary of the data set processed.
Examples describe data security for communication systems. One example includes validating a merchant system using merchant data and generating a set of merchant credentials. The set of merchant credentials is then used in authentication to facilitate a secure transaction, which involves automatically generating transaction data with a tokenized client account number associated with the secure transaction. A refund request associated with the secure transaction is received with the set of merchant credentials that are used for automatically authenticating the merchant system. The example then involves accessing a database that includes the transaction data for automatically facilitating settlement of a refund payment using the authenticated merchant system and the transaction data.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Examples describe data security for communication systems. One example includes validating a user device using secure user data and generating a long term token for the user device, where the long term token is generated with a randomized unique token system. The method further includes receiving a transaction communication associated with a secure transaction, the transaction communication including the long term token, generating a transaction token that is different than the long term token for the transaction communication using the long term token from the transaction communication, and facilitating the secure transaction using the transaction token and the long term token.
Systems and methods provide a framework through which securitization of a secured payment instrument is performed through real-time solicitation of peers for a security deposit associated with the secured payment instrument. The systems and methods, through training of machine learning algorithm, generate a recommendation for one or more peers that can be solicited for a security deposit associated with the secured payment instrument. If the security deposit is obtained, the secured payment instrument is issued. The security deposit is returned to the peers that contributed to the security deposit upon graduation of the secured payment instrument according to their pro rata contribution to the security deposit.
Systems and methods for enabling gifting of a gift product on a merchant store front determine eligibility of an abstract product available for purchase on the merchant store front to be selected as a gift product, the abstract product representing a set of all available SKUs for a given product, a gift product representing a subset of all available SKUs for a given abstract product, and the subset including less than all available SKUs for the given abstract product and greater than one available SKU for the given abstract product; generate and place an embedded widget on the merchant store front to determine gift intent to initiate a gift transaction of the gift product; assign at least one representative SKU to represent the gift product; and mimic an orchestrated transaction between a user and the merchant store front prior to final selection of a specific SKU of the gift product.
A system is provided for generating dynamic objects in response to detected intent signals. The system receives a request to generate a dynamic object through an object placement implemented through a network object and in response to an intent signal. The request indicates a resource amount allocated for the request. The system identifies other requests and determines whether the resource amount is greater than other resource amounts associated with the other requests. If so, the system obtains a set of assets corresponding to the dynamic object and, in response to detecting the intent signal in real-time, uses the assets to generate the dynamic object through the object placement.
Examples describe data security and routines structured to avoid conflicts. One example includes accessing data for a merchant website including a framework with a first routine for a function, and accessing an account security element for the merchant website with a second routine associated with an account security system for the function. The second routine is optimized to avoid conflicts with the first routine. The framework is automatically updated while the second routine is maintained with no changes. The merchant website data is then transmitted with the updated first routine and the account security element with the second routine, where the updated first routine and the second routine facilitate data security on the client device without framework conflicts when the updated first routine for the function and the second routine for the function operate concurrently on the client device.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A data classification system obtains a data set including first data associated with a first characteristic and second data associated with a second characteristic. In response to obtaining the data set, the system uses a classification model to generate a classification by classifying the first data into majority data and the second data into minority data. From the classification and using the classification model, the system determines a loss. The system modifies the classification model based on this loss to generate an updated classification model. The system uses the updated classification model to re-classify a subset of the first data into the minority data and a subset of the second data into the majority data.
Systems, devices, methods, instructions, and other implementations are described for network data management. One embodiment involves request data received at a device associated with a digital lockbox, where the request data includes identifying information for an originating device associated with a location and is associated with a user device. A unique token is generated with the identifying information. The unique token can be used to tokenize a network link to create a secure one-time link. The system transmits the one-time link, which can then be used to facilitate secure communications between a computing system associated with the originating device and the user device.
G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
A classification modeling system receives a request to identify a classification model from a set of classification models. The request includes a data set and specifies one or more metrics for evaluating performance of the set of classification models in classifying data from the data set. The system uses the set of classification models to generate a set of classifications and determines the performance of the set of classification models based on the set of classifications and according to the one or more metrics. Based on the performance of the set of classification models, the system selects a classification model and provides the classification model to fulfill the request.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06F 18/2413 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on distances to training or reference patterns
Data analysis and instrument upgrading technologies are described. In some examples, a system tracks usage data for an instrument (controlling access to an account) over time. The system processing the usage data using a trained machine learning model to generate a predictive simulation that identifies a predicted result of an upgrade of the instrument. The system dynamically updates the predictive simulation as the usage data continues to be received. The system detects that the update to the predictive simulation caused a change in the predicted result, and automatically upgrades the instrument from the first category of instrument to the second category of instrument based on the change in the predicted result. The system tracks further usage data for the instrument after the upgrade, and further trains the machine learning model based on a comparison between the further usage data and the predicted result to improve accuracy of further predictive simulations.
A system and method for processing promotions in connection with digital purchasing. Data associated with a digital purchase request made by a consumer (the data comprising a token, an amount associated with the transaction, a promotional code for each item included in the digital purchase request associated with a promotion, a default transaction amount, and a single default promotional code) is received from a merchant server. The single default promotional code is assigned to all items included in the digital purchase request that are associated with promotions. Using the token, account information associated with the consumer is retrieved from a database. For each promotional code received, promotional information is retrieved. The retrieved promotional information is displayed. The digital purchase request is submitted for processing using the single default promotional code.
The present disclosure is related to object recognition and tracking using multi-camera driven machine vision. In one aspect, a method includes capturing, via a multi-camera system, a plurality of images of a user, each of the plurality of images representing the user from a unique angle; identifying, using the plurality of images, the user; detecting, throughout a facility, an item selected by the user; creating a visual model of the item to track movement of the item throughout the facility; determining, using the visual model, whether the item is selected for purchase; and detecting that the user is leaving the facility; and processing a transaction for the item when the item is selected for purchase and when the user has left the facility.
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06V 40/20 - Movements or behaviour, e.g. gesture recognition
37.
SYSTEMS AND METHODS FOR AUTOMATICALLY ASSOCIATING OBJECTS WITH A VALUE
Systems and methods for automatically generating a graphical interface include determining a counter value associated with a counter object and automatically determining one or more corresponding objects using the counter value. A subset of the one or more corresponding objects is determined and a graphical interface including the subset is generated. An updated counter value associated with the counter object is determined according to a modification and one or more updated corresponding objects are automatically determined using the updated counter value. An updated subset of the one or more updated corresponding objects is determined an updated graphical interface including the updated subset is generated and is transmitted, wherein when the updated graphical interface is received, the updated graphical interface facilitates a selection of an updated corresponding object from the updated subset.
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
Methods are described herein for transmitting digital objects between devices through a digital ledger. A computing device may maintain a digital ledger containing a plurality of allocation nodes. The computing device may execute an exchange between a first and second allocation node. The first and second allocation nodes may be associated with a first and second user device, respectively. The first allocation node may transfer ownership of a package of data to the second allocation node. The computing device may generate one or more data factors by comparing the package of data to an individual data bundle of the second user device. Finally, the computer device may generate a modified package of data by applying the data factors to the package of data.
Systems and method are provided that include process that customize the presentation of webpages according to alternative acquisition protocols. The processes include receiving, from a first server, a webpage identifying an object for acquisition by a user using a first acquisition protocol. The processes then execute a call to a second server that includes an identification of a user interacting with the webpage and a request for an identification of one or more alternative acquisition protocols based on the identification of the user. In response, the processes receive JavaScript code that executes to provide information associated with the one or more alternative acquisition protocols. The processes then generating a modified webpage that includes a modification to a portion of the webpage based on at least one of the one or more alternative acquisition protocols. The modified webpage may be displayed to a user.
Systems and methods provide a framework through which one or more machine learning algorithms and programmatic logic are implemented to dynamically, and in real-time, process incoming invoices and corresponding claims as these invoices are received to identify one or more conditions for which treatment was provided. Based on these identified one or more conditions, as well as any known historical data corresponding to the claimant, adjudication of the invoices and corresponding claims may be performed.
Systems and methods describe providing alternate redemption options. One aspect involves receiving an order, analyzing consumer information using a redemption options algorithm to obtain redemption options including an alternate redemption option, providing an initial gift notification to a recipient device based on the gift order, the initial gift notification including the alternate redemption option, receiving an alternate redemption request, transmitting an alternate redemption information request, receiving alternate redemption information, adding alternate redemption information to the historical consumer information to obtain updated historical consumer information, training the redemption options algorithm using the updated historical consumer information to obtain an updated redemption options algorithm, and performing an alternate redemption action set using the alternate redemption information. Alternate redemption options may include an option to regift a gift, to donate the value of a gift to a donation recipient, and/or to donate a positive balance remaining after the redemption of a gift.
Disclosed embodiments may provide a framework to measure and leverage the observable attributes that most directly affect the data stability of a customer. In addition, embodiments track the dynamics of the observable components that sustain the data stability of a customer. Embodiments may be used to estimate the stability of a variety of conditions for various contexts, such as the stability of a computing system over time.
G06F 17/18 - Complex mathematical operations for evaluating statistical data
G06F 18/22 - Matching criteria, e.g. proximity measures
G06F 18/2411 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on the proximity to a decision surface, e.g. support vector machines
43.
METHODS AND SYSTEMS FOR OBJECT-BASED USER RECOGNITION
Systems and methods for providing object based recognition. A recognition system may provide a recognition initiation request to a gifting service system. The gifting service system may provide gift option information in response to the request and receive gift selection information in return. Based at least in part on the gift selection information, gift options may be provided to an intended recognition recipient. The recognition recipient may provide redemption information, which may initiate a recognition redemption action set.
Systems and methods are provided for generating surprise gift objects presentable to intended recipients based on real-time location data associated with recipients. Users are provided with recommendations for surprise gift objects that can be provided to recipients based on information associated with recipients and inventory data associated with locations through which options associated with these surprise gift objects are made available. Through these systems and methods, recipients are notified of the availability of surprise gift objects based on their real-time location data. As recipients select different options associated with these surprise gift objects or otherwise redeem these surprise gift objects at the one or more locations, data corresponding to these redemptions is used to further enhance the systems and methods in order to provide more accurate tailored recommendations to users wishing to send surprise gift objects to recipients and to the recipients when redeeming surprise gift objects.
Examples described herein include systems, methods, instructions, and other implementations of different objects. One embodiment includes receipt of an authorization request message for an instrument utilization associated with a record identifier. The authorization request message includes an external system category code and does not include object information. A determination is then made that the instrument utilization is eligible for an object based on the external system category code. The object is then automatically applied to the instrument utilization at the record identifier, and an authorization response message is then generated authorizing the instrument utilization.
Systems and methods are provided for generating flexible gift objects that can be provided to recipients while allowing the recipients to activate the flexible gift objects and assign the flexible gift objects to specific entities. The systems and methods can provide a user with options for defining a gift object category for a flexible gift object for a recipient. The gift object category is associated with a set of entities to which the flexible gift object can be assigned. The recipient receiving the flexible gift object can scan the flexible gift object to identify the gift object category associated with the flexible gift object and select an entity to which the flexible gift object is to be assigned. Upon assignment of the flexible gift object to the selected entity, the flexible gift object is activated, and the recipient can use the flexible gift object with the selected entity.
G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
47.
Systems and methods for optimizing allocation of points
In one aspect of the present disclosure, a device includes one or more memories having computer-readable instructions stored therein and one or more processors. The one or more processors are configured to execute the computer-readable instructions to receive, over a period of time, information regarding transactions conducted in association with a user account; identify a category associated with one or more of the transactions based on the information, wherein identifying yields a number of categories; generate a ranking of the categories based on a transaction parameter; assign a different number of points to corresponding transactions in one or more of the categories based on the ranking, with a highest number of points assigned to the corresponding transactions in at least one category with highest ranking; and apply the corresponding number of points to the user account.
The present disclosure is directed to systems and methods that enable scanning of any type of card regardless of the shape and design of a given card and/or a font, a shape and a format with which characters such as numbers, letters and symbols are printed on the cards including cards with non-embossed characters printed thereon. In one example, a method includes scanning a card, the card including at least an account number associated with a user of the card and an identifier of the user; detecting, by applying a machine learning model to the card after scanning the card, at least the account number printed on the card; and completing a task using the account number.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Systems and methods are provided for persistent login. Such persistent login may be based on linking user identity across accounts of different entities to allow each entity to maintain control over their respective sets of user data, while providing a streamlined user experience that avoids much of the repetitive need to login to different services with different login credentials (e.g., during periods of heavy use). Such persistent login may utilize a set of tokens issued and exchanged between devices of the partnering entities. Such tokens may include an access token, refresh token, and identity token. When a user associated with a first entity requests access to information secured by a second entity, such request may be associated with the access token. If the access token is determined to be expired, the refresh token may be used to refresh the access token, which may also trigger issuance of a new refresh token. The refreshed access token may be used in conjunction with the identity token to access the requested information secured by the second entity.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A data management system identifies data stores that store transaction datasets associated with transactions. The data stores are configured based on respective parameters, and continue to receive additional transaction data over time. The system generates scripts based on the data stores' parameters and based on a filtering scheme. The system uses the scripts to extract subsets of the transaction datasets according to the filtering scheme in real-time as the data stores continue to receive additional transaction data. The system merges the extracted subsets of the transaction datasets into an output dataset according to an output scheme, and analyzes the output dataset, all in real-time as the data stores continue to receive the additional transaction data and the system continues to merge the extracted subsets. By analyzing the output dataset, the system recognizes a pattern in the output dataset. The system outputs an alert indicative of the recognized pattern.
Systems and methods for determining whether a user associated with a provider system qualifies to receive an option to redeem a reward. A gifting service system may assess user information and various other types of information using a reward offer algorithm to make the determination. When the user qualifies to receive the option to redeem a reward, the user may be provided with a redemption option Once the user selects the option, the gifting service system obtains various selections and items of information, and sends gift options to an user. The gifting service system interacts with the user to obtain various selections and items of information to facilitate delivery of the gift to the user or other entity.
Examples described herein include systems, methods, instructions, and other implementations for data security with integrated promotion systems. In one example, account security system receives a checkout communication that includes data describing a validated checkout system of a merchant system, where the checkout communication does not include a purchase promotion option. A client token is transmitted in response to an authentication that the checkout communication is from the validated checkout system, and an account communication including the client token and secure client information is received from a client device. A plurality of promotion options associated with the secure transaction is transmitted in response to the account communication, and a promotion selection for the secure transaction is received from the client device and not from the merchant system.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 30/0207 - Discounts or incentives, e.g. coupons or rebates
Disclosed embodiments may provide a framework to implement post-purchase tender switches. For example, following a transaction made with a particular payment instrument, a customer may be offered the ability to apply for a preferred payment instrument and/or to switch his or her tender type to the preferred payment instrument for the previous transaction.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 30/0235 - Discounts or incentives, e.g. coupons or rebates constrained by time limit or expiration date
Systems and methods for a dynamic encryption model in which dynamic encryption keys are associated with an access token having an expiration time. The access token is generated for a user session of a user application seeking to make API calls to a service provider system. When the access token expires, or becomes otherwise invalid, the dynamic encryption keys are discarded, and any further API calls are made using an updated access token and updated dynamic encryption keys. The dynamic encryption keys are used to encrypt specially designated fields of API calls and/or API call results.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A method for use an earned autopay account, an available autopay account, an earned points account, and an available points account each associated with a customer. The method includes storing a cache including first and second numbers of points stored in the available autopay account and the available points account, respectively. A points authorization request requesting a first transaction amount is received from a requesting computing device. A second transaction amount is subtracted from the first and/or second numbers of points. A points redemption request including a third transaction amount is sent to the payment processing computing device. Each of the first, second, and third transaction amounts includes a particular monetary value and/or a corresponding transaction number of points. The payment processing computing device subtracts the third transaction amount from the available points account and/or the available autopay account.
G06Q 30/0207 - Discounts or incentives, e.g. coupons or rebates
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
Provided are systems, methods, and computer-program products for a proxy network that can determine, for a set of objects, an initial differential, where the initial differential is determined using a rules data store of a host network. The proxy network can further determine a supplemental differential for the set of objects. The proxy network can further determine a final differential that is the sum of the initial differential and the supplemental differential. The proxy network can further determine a final sum for the set of objects that is the object value less the final differential. The proxy network can further generate an outbound data packet that includes values corresponding to the set of objects and the final sum. When the host network receives the outbound data packet, the host network can modify an object data store using the values corresponding to the set of objects and the final sum.
H04L 67/5682 - Policies or rules for updating, deleting or replacing the stored data
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
H04L 1/00 - Arrangements for detecting or preventing errors in the information received
H04L 41/0893 - Assignment of logical groups to network elements
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
H04L 61/2521 - Translation architectures other than single NAT servers
H04L 61/5076 - Update or notification mechanisms, e.g. DynDNS
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Examples describe data security for communication systems. One example includes validating a merchant system using merchant data and generating a set of merchant credentials. The set of merchant credentials is then used in authentication to facilitate a secure transaction, which involves automatically generating transaction data with a tokenized client account number associated with the secure transaction. A refund request associated with the secure transaction is received with the set of merchant credentials that are used for automatically authenticating the merchant system. The example then involves accessing a database that includes the transaction data for automatically facilitating settlement of a refund payment using the authenticated merchant system and the transaction data.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
58.
System and method for integrating data from a remote server with a client application
The electronic device may invoke a host application. The device may display a first host user interface on the display, the first host user interface including a first host user interface component associated with a child application. In response, the device may invoke, using the host application, the child application executed at the electronic device. The device may transmit, using the host application, a request for data associated with a child user interface component to the child application. The device may transmit, using the child application, the request for data associated with the child user interface component to a child application server, wherein the data associated with the child user interface component is inaccessible by the host application. The device may receive, using the child application, the data associated with the child user interface component from the child application server. The device may display the child user interface component.
Examples described herein include implementations for big-data validation. One aspect includes generating a configuration file including dynamic matching data describing a first plurality of data entries and a second plurality of data entries, and generating a data action file. A plurality of data queries are generated based on the dynamic matching data indicated in the configuration file. The plurality of data queries are dynamically executed in parallel, including execution of a plurality of simultaneous data queries to the data source system. Fields of the first plurality of data entries and the second plurality of data entries are matched using the key type and the value structure, corresponding fields of the first data fields and the second data fields having a data mismatch are identified, and a mismatch database entry for the corresponding fields having the data mismatch is automatically generated.
The present disclosure is related to object recognition and tracking using multi-camera driven machine vision. In one aspect, a method includes capturing, via a multi-camera system, a plurality of images of a user, each of the plurality of images representing the user from a unique angle; identifying, using the plurality of images, the user; detecting, throughout a facility, an item selected by the user; creating a visual model of the item to track movement of the item throughout the facility; determining, using the visual model, whether the item is selected for purchase; and detecting that the user is leaving the facility; and processing a transaction for the item when the item is selected for purchase and when the user has left the facility.
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06V 40/20 - Movements or behaviour, e.g. gesture recognition
61.
SYSTEMS AND METHODS FOR ESTIMATING STABILITY OF A DATASET
Disclosed embodiments may provide a framework to measure and leverage the observable attributes that most directly affect the data stability of a customer. In addition, embodiments track the dynamics of the observable components that sustain the data stability of a customer. Embodiments may be used to estimate the stability of a variety of conditions for various contexts, such as the stability of a computing system over time.
G06F 17/18 - Complex mathematical operations for evaluating statistical data
G06F 18/22 - Matching criteria, e.g. proximity measures
G06F 18/2411 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on the proximity to a decision surface, e.g. support vector machines
62.
METHODS OF EXPLAINING AN INDIVIDUAL PREDICTIONS MADE BY PREDICTIVE PROCESSES AND/OR PREDICTIVE MODELS
A computer-implemented method that includes obtaining a plurality of values each corresponding to one of a plurality of variables. The plurality of variables include variables of interest. The method includes obtaining a prediction for the values from a model, determining metric(s) for each of the variables of interest, and determining one or more of the variables of interest to be one or more influential variables based on the metric(s) determined for each of the variables of interest. The variables include one or more non-influential variables that is/are different from the influential variable(s). The influential variable(s) has/have a greater influence on the prediction than the non-influential variable(s). The method also includes displaying in a graphical user interface or printing in a report an explanation identifying the influential variable(s) and/or a justification of the determination that the influential variable(s) has/have a greater influence on the prediction than the non-influential variable(s).
Disclosed are systems and techniques for dynamically providing real-time offers. For instance, user eligibility for one or more offers can be determined based on a plurality of dynamic user attributes associated with the user and one or more data sets corresponding to similarly situated users. An input can be received corresponding to an acceptance by the user of at least one offer selected from the one or more offers. In response to receiving the input, an updated plurality of the dynamic user attributes can be retrieved, wherein the dynamic user attributes are constantly updated in real time based on user activity. Based on the updated plurality of dynamic user attributes and the one or more data sets corresponding to the similarly situated user, it can be determined whether the user remains eligible for the at least one offer. An offer confirmation can be sent upon confirming eligibility.
Systems and methods for global account identifier translation. Embodiments described herein include a service provider system configured to receive API calls that include an initial identifier, which may be issued by the service provider system and/or associated with a third-party entity. The service provider system may use the initial identifier from the API call to obtain a primary identifier associated with an account. The primary identifier is then used to service the API call to obtain an API call result. The API call result may be transmitted to the device from which the API call was received.
Systems and methods for a dynamic encryption model in which dynamic encryption keys are associated with an access token having an expiration time. The access token is generated for a user session of a user application seeking to make API calls to a service provider system. When the access token expires, or becomes otherwise invalid, the dynamic encryption keys are discarded, and any further API calls are made using an updated access token and updated dynamic encryption keys. The dynamic encryption keys are used to encrypt specially designated fields of API calls and/or API call results.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
The electronic device may invoke a host application. The device may display a first host user interface on the display, the first host user interface including a first host user interface component associated with a child application. In response, the device may invoke, using the host application, the child application executed at the electronic device. The device may transmit, using the host application, a request for data associated with a child user interface component to the child application. The device may transmit, using the child application, the request for data associated with the child user interface component to a child application server, wherein the data associated with the child user interface component is inaccessible by the host application. The device may receive, using the child application, the data associated with the child user interface component from the child application server. The device may display the child user interface component.
Examples described herein include systems, methods, instructions, and other implementations for data security with integrated installment payment systems. In one example, account security system receives a checkout communication that includes data describing a validated checkout system of a merchant system. A client token is transmitted in response to an authentication that the checkout communication is from the validated checkout system, and an account communication including the client token and secure client information is received from a client device. An installment payment communication associated with the secure transaction is received from a system other than a merchant system involved in the transaction. The secure transaction is then facilitated following receipt of the installment payment communication.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Systems and methods for automatic and dynamic pre-qualification determinations associated with secured and unsecured payment instruments are provided. The systems and methods are used to automatically generate and provide pre-qualification determinations for different payment instruments based on various factors. The systems and methods further provide these pre-qualification determinations along with any applicable terms and conditions corresponding to the payment instruments a user is pre-qualified for.
A data management system identifies data stores that store transaction datasets associated with transactions. The data stores are configured based on respective parameters, and continue to receive additional transaction data over time. The system generates scripts based on the data stores' parameters and based on a filtering scheme. The system uses the scripts to extract subsets of the transaction datasets according to the filtering scheme in real-time as the data stores continue to receive additional transaction data. The system merges the extracted subsets of the transaction datasets into an output dataset according to an output scheme, and analyzes the output dataset, all in real-time as the data stores continue to receive the additional transaction data and the system continues to merge the extracted subsets. By analyzing the output dataset, the system recognizes a pattern in the output dataset. The system outputs an alert indicative of the recognized pattern.
In one aspect, a distributed ledger system include a first network node configured to detect a triggering condition for processing a claim; collect user and broker information for processing the claim; convert the information from a first computer-readable format to a second computer-readable format; validate the converted information based on corresponding digital signatures; generate claim state objects based on the validated information to be used by each node of the distributed ledger system to execute a smart contract for processing the claim; receive one or more updated claim state objects from a second network node reflecting updated processing status of the claim to be used by each node of the distributed ledger system to execute the smart contract for processing the claim; and process the claim based on results of execution of the smart contract using the one or more updated claim state objects.
G06F 16/25 - Integrating or interfacing systems involving database management systems
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G16H 40/20 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the management or administration of healthcare resources or facilities, e.g. managing hospital staff or surgery rooms
Systems and methods for resource disbursements associated with secured and unsecured payment instruments. In response to either a request to graduate or cancel a secured payment instrument, a deposit disbursement system can automatically disburse an amount corresponding to a deposit provided for issuance of the secured payment instrument. The disbursement of this amount can be performed automatically according to selection of one or more disbursement options from a set of disbursement options that are automatically, and dynamically, provided using a machine learning algorithm according to various factors corresponding to an account associated with the secured payment instrument.
Systems and methods for generating dynamically definable gift objects are provided. A gift service may train a gift object algorithm and a gift selection algorithm using sample datasets. A gift request may be received and the gift service may generate a gift object with an undefined set of gift object using the gift object algorithm. A redemption request may be received and the gift service may generate a custom set of gift selection options using the gift selection algorithm in response to the redemption request. A selection from the custom set of gift selection options may be received and the gift object algorithm and the gift selection algorithm may be updated based on the redemption request, the custom set of gift selection options, and the selection.
Systems and methods are provided for persistent login. Such persistent login may be based on linking user identity across accounts of different entities to allow each entity to maintain control over their respective sets of user data, while providing a streamlined user experience that avoids much of the repetitive need to login to different services with different login credentials (e.g., during periods of heavy use). Such persistent login may utilize a set of tokens issued and exchanged between devices of the partnering entities. Such tokens may include an access token, refresh token, and identity token. When a user associated with a first entity requests access to information secured by a second entity, such request may be associated with the access token. If the access token is determined to be expired, the refresh token may be used to refresh the access token, which may also trigger issuance of a new refresh token. The refreshed access token may be used in conjunction with the identity token to access the requested information secured by the second entity.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A method performed by at least one computing device. The method includes receiving a credit request from a self-checkout device before a customer completes an instore checkout process and sending a request for a Uniform Resource Locator (“URL”) to one or more authentication computing devices. The authentication computing device(s) send the URL to the mobile device. The method includes sending a credit application to the mobile device after the customer selects the URL, receiving a submission of the credit application from the mobile device, approving credit based on the submission, and forwarding a code to the mobile device. The code indicates that the credit is to be used to complete the instore checkout process when scanned by the scanner.
A system and method for processing promotions in connection with digital purchasing. Data associated with a digital purchase request made by a consumer (the data comprising a token, an amount associated with the transaction, a promotional code for each item included in the digital purchase request associated with a promotion, a default transaction amount, and a single default promotional code) is received from a merchant server. The single default promotional code is assigned to all items included in the digital purchase request that are associated with promotions. Using the token, account information associated with the consumer is retrieved from a database. For each promotional code received, promotional information is retrieved. The retrieved promotional information is displayed. The digital purchase request is submitted for processing using the single default promotional code.
Systems, devices, methods, instructions, and other implementations are described for network data management. One embodiment involves request data received at a device associated with a digital lockbox, where the request data includes identifying information for an originating device associated with a location and is associated with a user device. A unique token is generated with the identifying information. The unique token can be used to tokenize a network link to create a secure one-time link. The system transmits the one-time link, which can then be used to facilitate secure communications between a computing system associated with the originating device and the user device.
G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
Systems and methods for predictive gift subscriptions are provided. A gift subscription service may store a gift subscription and a profile associated with a gift recipient. The gift subscription service may then identify a time to send a gift to the gift recipient and associate a computational model with the gift recipient and the profile. When the gift subscription service determines a change in the profile, the gift subscription service may then update the computational model associated with the gift recipient in real-time by applying a machine learning algorithm to the change in the profile and use the updated computation model to formulate a prediction for the gift recipient that may then be used to identify a set of gifts to present to the gift recipient. The gift subscription service may then present the set of gifts to the gift recipient.
Systems and methods describe providing alternate redemption options. One aspect involves receiving an order, analyzing consumer information using a redemption options algorithm to obtain redemption options including an alternate redemption option, providing an initial gift notification to a recipient device based on the gift order, the initial gift notification including the alternate redemption option, receiving an alternate redemption request, transmitting an alternate redemption information request, receiving alternate redemption information, adding alternate redemption information to the historical consumer information to obtain updated historical consumer information, training the redemption options algorithm using the updated historical consumer information to obtain an updated redemption options algorithm, and performing an alternate redemption action set using the alternate redemption information. Alternate redemption options may include an option to regift a gift, to donate the value of a gift to a donation recipient, and/or to donate a positive balance remaining after the redemption of a gift.
Systems and methods for dynamic redemption are provided. A redemption request associated with an online gifting platform may be received, and one or more conditions applicable to the redemption request may be dynamically determined in real-time. Further, a plurality of gifting entities may be dynamically determined to be associated with the applicable conditions in real-time. A menu display of options corresponding to the plurality of gifting entities may be dynamically generated. A selection regarding one of the displayed options may be received, and portions of the selected option may be allocated across the plurality of gifting entities. Data regarding the selected option and one or more of the allocated portions may be routed to the plurality of gifting entities.
Examples describe data security and routines structured to avoid conflicts. One example includes accessing data for a merchant website including a framework with a first routine for a function, and accessing an account security element for the merchant website with a second routine associated with an account security system for the function. The second routine is optimized to avoid conflicts with the first routine. The framework is automatically updated while the second routine is maintained with no changes. The merchant website data is then transmitted with the updated first routine and the account security element with the second routine, where the updated first routine and the second routine facilitate data security on the client device without framework conflicts when the updated first routine for the function and the second routine for the function operate concurrently on the client device.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04L 41/0873 - Checking configuration conflicts between network elements
81.
Systems and methods for optimizing allocation of points
In one aspect of the present disclosure, a device includes one or more memories having computer-readable instructions stored therein and one or more processors. The one or more processors are configured to execute the computer-readable instructions to receive, over a period of time, information regarding transactions conducted in association with a user account; identify a category associated with one or more of the transactions based on the information, wherein identifying yields a number of categories; generate a ranking of the categories based on a transaction parameter; assign a different number of points to corresponding transactions in one or more of the categories based on the ranking, with a highest number of points assigned to the corresponding transactions in at least one category with highest ranking; and apply the corresponding number of points to the user account.
In one aspect, a microservice based method of processing a request includes receiving a request for a service from an end terminal; identifying one or more microservices for servicing the request; deploying the one more microservices for processing the request; and servicing the request using the one or more microservices, wherein the one or more microservices operate in a combination of synchronous and asynchronous steps to service the request.
A system architecture of a gift transaction system is disclosed. The gift transaction system can include a buyer interface module, a recipient interface module, a merchant backend interface module, a store front interface module, a curation module, a reminder module, an analytics module, or a media plug-in interface module. A method of operating the gift transaction system under the system architecture includes: providing an embedded widget on a website to determine gift intent to initiate a gift transaction by a buyer account for a recipient account; generating a gift buyer interface for a first client device to personalize a gift package including a gift item; generating a gift recipient interface for a second client device to customize the gift package; and communicating with a merchant backend system to complete the gift transaction to ship the gift package.
Systems and method are provided for sharing access to a resource. A computing device may receive a request to share access to a resource that includes a user identifier. The computing device may generate a sharetoken that is linked to the resource and provides a limited access credential to access to the resource. The computing device may facilitate transmission of a provisioning link to a device associated with the user identifier. In response to the provisioning link being executed by the device associated with the user identifier, the computing device may transmit the sharetoken. The sharetoken may be stored in an application configured to access the resource using the sharetoken.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
An application executed on a user device receives a request to initiate a transaction with an entity associated with a device implemented at a point-of-sale. The application detects that the user device is proximate to the device and detects an audial tone that encodes information corresponding to an entity associated with the device. The application transmits a request to transfer a payment to the entity, wherein the request includes the information and a payment amount for the payment. When the request is received by a payment processing system, the payment processing system transfers the payment to the entity and provides a confirmation for the payment. The application broadcasts a confirmation audial tone that encodes the confirmation. When the confirmation audial tone is received at the device, the device demodulates the confirmation audial tone to provide the confirmation to the entity.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A system determines an amount of time available for responding to a request regarding eligibility for a client account for a modification based on a confidence grade for the client. The system transmits a first query and a second query. The system uses trained machine learning model(s) to determine respective estimated receipt times of first and second datasets responsive to the first and second queries, and to determine respective importance levels of the first and second datasets to determining the confidence grade. The system generates a preliminary confidence grade based on the first dataset, and delays generation of the confidence grade until the second dataset is received based on the estimated receipt times and importance levels. The system updates the preliminary confidence grade using the second dataset to generate the confidence grade, determines the eligibility determination, and updates the training of the machine learning models.
A transaction classification system obtains a data set including first data associated with a first characteristic and second data associated with a second characteristic. In response to obtaining the data set, the system uses a classification model to generate a classification by classifying the first data into majority data and the second data into minority data. From the classification and using the classification model, the system determines a cost. The system modifies the classification model based on this cost to generate an updated classification model. The system uses the updated classification model to re-classify a subset of the first data into the minority data and a subset of the second data into the majority data.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06F 18/2413 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on distances to training or reference patterns
88.
SYSTEMS AND METHODS FOR FACILITATING GIFT SELECTION, ATTRIBUTION, AND DISTRIBUTION
Systems and methods for gift selection, attribution, and distribution are provided. The systems and methods may detect a gifting signal that is associated with an event corresponding to a recipient. The systems and methods can provide an option to generate a gift for the recipient. If the option is selected, the systems and methods can identify a set of product criteria associated with the event and the recipient. Based on the criteria, the systems and methods can obtain product selection options for the gift and provide these options to a gift sender. In response to a selection from the gift sender, the systems and methods can generate the gift, which includes a redemption option for the selection.
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
A computer-implemented method that includes obtaining a plurality of values each corresponding to one of a plurality of variables. The plurality of variables include variables of interest. The method includes obtaining a prediction for the values from a model, determining metric(s) for each of the variables of interest, and determining one or more of the variables of interest to be one or more influential variables based on the metric(s) determined for each of the variables of interest. The variables include one or more non-influential variables that is/are different from the influential variable(s). The influential variable(s) has/have a greater influence on the prediction than the non-influential variable(s). The method also includes displaying in a graphical user interface or printing in a report an explanation identifying the influential variable(s) and/or a justification of the determination that the influential variable(s) has/have a greater influence on the prediction than the non-influential variable(s).
Computer-implemented methods are provided for receiving information corresponding to a transaction, where the information is received one time. Two or more functions associated with the information can be determined, and two or more functions can be concurrently and automatically executed without additional interaction.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Provided are systems, methods, and computer-program products for a proxy network that can determine, for a set of objects, an initial differential, where the initial differential is determined using a rules data store of a host network. The proxy network can further determine a supplemental differential for the set of objects. The proxy network can further determine a final differential that is the sum of the initial differential and the supplemental differential. The proxy network can further determine a final sum for the set of objects that is the object value less the final differential. The proxy network can further generate an outbound data packet that includes values corresponding to the set of objects and the final sum. When the host network receives the outbound data packet, the host network can modify an object data store using the values corresponding to the set of objects and the final sum.
H04L 1/00 - Arrangements for detecting or preventing errors in the information received
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
H04L 61/2521 - Translation architectures other than single NAT servers
H04L 61/5076 - Update or notification mechanisms, e.g. DynDNS
H04L 67/561 - Adding application-functional data or data for application control, e.g. adding metadata
H04L 67/564 - Enhancement of application control based on intercepted application data
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
The disclosure is directed to a continuously and automatically updated authentication mechanism for authentication, in real-time, the processing of transactions at point of sales devices based on corresponding target-specific identifiers. In one aspect, a processing server includes one or more memories having computer-readable instructions stored therein, and one or more processors. The one or more processors are configured to execute the computer-readable instructions to receive a request for processing a transaction; identify a merchant-specific identifier for a merchant associated with the transaction; determine, in real-time and using a machine trained model, whether the merchant-specific identifier is a valid merchant-specific identifier or not; and process the transaction based on whether the machine trained model indicates that the merchant-specific identifier is valid or not.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A system architecture of a gift transaction system is disclosed. The gift transaction system can include a buyer interface module, a recipient interface module, a merchant backend interface module, a store front interface module, a curation module, a reminder module, an analytics module, or a media plug-in interface module. A method of operating the gift transaction system under the system architecture includes: providing an embedded widget on a website to determine gift intent to initiate a gift transaction by a buyer account for a recipient account; generating a gift buyer interface for a first client device to personalize a gift package including a gift item; generating a gift recipient interface for a second client device to customize the gift package; and communicating with a merchant backend system.
Systems, methods, devices, instructions, and other aspects are provided for a multi-product platform. In one aspect, a computer implemented method is provided that includes receiving request data at a multiple-product placement server, where when the request data is received from a customer device, the request data includes dynamic customer data customized based on user selections, and dynamically selecting a product system from a plurality of product systems using a set of system rules and the dynamic customer data. The method further involves receiving product data from the product system, configuring the product data from the product system using the set of system rules and the dynamic customer data to generate customer compatible data, and facilitating a transaction between the customer device and a merchant system using the customer compatible data.
Systems, methods, devices, instructions, and other aspects are provided for unique device identification. In one aspect, a method is providing including receiving, at a server computer, transaction data associated with a client device, wherein the transaction data includes device configuration data, aggregating the device configuration data for the client device received within a threshold time period to generate a unique set of device configuration characteristics, receiving, at the server computer, transaction request data associated with the client device, verifying the client device using the unique set of device configuration characteristics, and facilitating a transaction associated with the transaction request data based on verification of the client device using the unique set of device configuration characteristics.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
96.
Methods and system for providing customized acquisition protocols
A computing device may customize the presentation of webpages according to alternative acquisition protocols. The computing device may receive a webpage identifying an object for acquisition by a user using a first acquisition protocol. The computing device may then execute a call to a server that includes an identification of a user interacting with the webpage and a request for an identification of one or more alternative acquisition protocols based on the identification of the user. In response, the computing device may receive JavaScript code configured to provide information associated with the one or more alternative acquisition protocols. The computing device may generate a modified webpage that includes a modification to a portion of the webpage based on at least one of the one or more alternative acquisition protocols. The modified webpage may be displayed to a user.
G06F 3/00 - Input arrangements for transferring data to be processed into a form capable of being handled by the computerOutput arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
Aspects of a dynamic offer system are described. In one example, a method involves receiving a data feed of offer data, generating a set of current offers in a database using a set of offer rules and the data feed, receiving merchant configuration data associated with a merchant portal, and dynamically selecting current merchant offers from the set of current offers in the database using the merchant configuration data. A request is received for the current merchant offers, where when the request for the current merchant offers is received from a customer device, the request includes dynamic customer data customized based on user selections, one or more offers of the current merchant offers based on the dynamic customer data are dynamically selected, and a transaction between the customer device and the merchant portal associated with the one or more offers dynamically selected by the computing device is facilitated.
Systems and method are provided for providing a waterfall gateway configured to enable communication between disparate devices. The waterfall gateway receives an indication that a first resource request was denied by a server. In response, the waterfall gateway identifies two or more client devices configured to provide services to the user. The waterfall gateway generates a resource request waterfall that includes a sequence of client devices of the two or more client devices. The resource request waterfall is configured to facilitate resource request transmissions to the one or more client devices according to the sequence of client devices. The waterfall gateway facilitates a transmission of a second resource request to a first client device in the sequence of client devices.
H04L 69/40 - Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
H04L 67/142 - Managing session states for stateless protocolsSignalling session statesState transitionsKeeping-state mechanisms
99.
System, method, and non-transitory computer-readable storage medium for dynamically definable gift objects
Systems and methods for generating dynamically definable gift objects are provided. A gift service may train a gift object algorithm and a gift selection algorithm using sample datasets. A gift request may be received and the gift service may generate a gift object with an undefined set of gift object using the gift object algorithm. A redemption request may be received and the gift service may generate a custom set of gift selection options using the gift selection algorithm in response to the redemption request. A selection from the custom set of gift selection options may be received and the gift object algorithm and the gift selection algorithm may be updated based on the redemption request, the custom set of gift selection options, and the selection.
The electronic device may invoke a host application. The device may display a first host user interface on the display, the first host user interface including a first host user interface component associated with a child application. In response, the device may invoke, using the host application, the child application executed at the electronic device. The device may transmit, using the host application, a request for data associated with a child user interface component to the child application. The device may transmit, using the child application, the request for data associated with the child user interface component to a child application server, wherein the data associated with the child user interface component is inaccessible by the host application. The device may receive, using the child application, the data associated with the child user interface component from the child application server. The device may display the child user interface component.