This disclosure describes techniques for analyzing network traffic to generate an actionable insight pertaining to a security threat to a network. In one example, this disclosure describes a method that includes obtaining, by a computing system, historical network activity data that includes information about authentication traffic within a network; determining, by the computing system and based on the historical network activity, a baseline of network activity; collecting, by the computing system, a set of network activity data; applying, by the computing system, an unsupervised algorithm to identify the set of network activity data as anomalous relative to the baseline of network activity; classifying, by the computing system, the network activity data into an identified threat category from among a plurality of threat categories; and taking action, by the computing system and based on the identified threat category, to mitigate a security threat posed by the network activity data.
Systems and methods for authenticating user identity using custom visual code is disclosed. One disclosed method includes determining user identification information based on received biometric data; generating a temporary one-time password; encrypting the user identification information and the temporary one-time password; and generating a visual code based in part on the encrypted temporary one-time password and user identification information. The method may further include generating a prompt requesting a passcode or biometric data when a user device is within a predetermined threshold range of an authenticating device.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
Systems and methods for authenticating user identity using custom visual code is disclosed. One disclosed method includes determining user identification information based on received biometric data; generating a temporary one-time password; encrypting the user identification information and the temporary one-time password; and generating a visual code based in part on the encrypted temporary one-time password and user identification information. The method may further include generating a prompt requesting a passcode or biometric data when a user device is within a predetermined threshold range of an authenticating device.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
A system and method for card control includes a card control computing system configured to enforce a card control rule based upon transactions made with a payment card. The card control computing system includes a memory unit configured to store information associated with a card control dashboard, and a processing unit configured to identify that an attempted electronic transaction involving a merchant and a payment card of a user is an out-of-pattern transaction. The processing unit is further configured to generate a proposed card control rule responsive to identifying the out-of-pattern transaction and transmit the card control rule to a card control dashboard. The processing unit is further configured to receive a user input via the card control dashboard to activate or deactivate the proposed card control rule. Activating the card control rule restricts subsequent electronic transactions that violate the activated card control rule.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
Systems, apparatuses, methods, and computer program products are disclosed for hyper-personalizing digital actions and interfaces. An example method includes receiving user narrative data associated with a user. The method also includes determining a pillars of understanding (POU) alignment dataset for the user based at least on the user narrative data. The method also includes determining an archetype dataset for the user based at least on a portion of the POU alignment dataset. The method also includes generating a hyper-personalized graphical user interface (GUI) based on the POU alignment dataset and the archetype dataset. The method also includes causing presentation of the hyper-personalized GUI at a user device associated with the user. The method also includes performing, based on at least one of the POU alignment dataset and the archetype dataset, an action set in connection with one or more user interactions with the hyper-personalized GUI.
A computing system is described that includes a memory storing a plurality of information assets and a processing system of an enterprise, the processing system comprising one or more processors implemented in circuitry. The processing system is configured to receive a query for metadata for an information asset stored in one or more data catalogs of the enterprise. The processing system determines a location of the metadata using a metadata registry that stores mapping data that maps information assets to locations of metadata for the information assets, the locations corresponding to the data catalogs of the enterprise. The processing system retrieves the metadata from the determined location and provides the metadata in response to the query.
Systems, apparatuses, methods, and computer program products are disclosed for evaluating a rental candidate for a rental event. An example method includes receiving, from a rental entity device, a rental initiation request comprising (a) a rental candidate item and (b) an indication of a rental candidate. The example method further includes receiving, from a rental candidate device, a mDL associated with the rental candidate. The example method further includes authenticating the rental candidate based on the mDL. In response to authenticating the rental candidate, the example method further includes determining a universal rental ID associated with the rental candidate, determining rental candidate information based on the universal rental ID, determining, using a risk determination model, a risk level, and providing, to the rental entity device, a rental candidate evaluation, wherein the rental candidate evaluation comprises a suitability indication of renting the rental candidate item to the rental candidate.
Systems and methods for structure enabled, model driven, channel integration and dispatch including: receiving, from a messaging client, model data; receiving from a template database a structured template, the template database comprising one or more templates that each comprise a static data element, a dynamic data element, and a channel configuration data element; generating a channel-specific message by applying the model data to the structured template; and transmitting, to a service associated with the channel configuration data element, the channel-specific message.
Systems and methods for large file upload, configurable with user workflows are disclosed. An upload service can receive a data file including metadata associated with a user, then upload the data file to a first database within a distributed computing environment. The upload service may identify an entitlement associated with the user based on the metadata and upload the data file to a second database. The upload service may determine a notification protocol based in part on the entitlement associated with the user, then generate one or more notifications based on the notification protocol. Each action performed by the upload service may be recorded and used to determine an event history of the data file. The upload service can store the event history.
A mesh communication network for providing random bits for key generation may comprise one or more network nodes. Random bitstreams may be generated by nodes in the network based upon environmental conditions, hardware in the node, quantum phenomena, and the like. In some examples, the system can generate a common set of random bits from a superset of bits and deliver the common set or the superset to communicating parties which can then be used by the communicating parties to generate a shared cryptographic key.
Systems, apparatuses, methods, and computer program products are disclosed for a secure peer-to-peer asset transfer. An example method includes receiving an asset transfer initiation request from a sender device, wherein the asset transfer initiation request comprises an indication of an asset to transfer and a sender account identifier associated with a sender account of a sender. The example method further includes receiving an indication of a recipient intended to receive the asset and selecting a recipient account associated with the recipient. The example method further includes authenticating the recipient based on a recipient mobile driver's license (mDL) associated with the recipient and in response to successfully authenticating the recipient, effectuating a transfer of the asset from the sender account to the recipient account.
Systems and method of dynamic sampling including: providing, to a client device, an instrumented application comprising an agent, wherein the agent is configured to log a set of telemetry data associated with performance metrics of the instrumented application and a time period associated with the set of telemetry data; determining an overall data throughput associated with the instrumented application based on the set of telemetry data; and comparing the overall data throughput to a first and second threshold, wherein when the overall data throughput exceeds the first threshold: update an application performance monitoring server to set a sampling rate of the application performance monitoring server to a reduced sampling rate; and when the overall data throughput is lower than the second threshold: update the application performance monitoring server to set the sampling rate to the increased sampling rate.
This disclosure describes techniques for client-controlled and secure disclosure of attestations of identifying information of subjects. For example, a method includes obtaining, by a computing system, identifying information associated with a subject. The method also includes generating, by the computing system and based on the identifying information associated with the subject, a decentralized identifier (DID) associated with the subject and one or more attested claims of the identifying information associated with the subject. The method further includes receiving, by the computing system and from the subject, a request to send the identifying information to one or more relying parties, and in response, recording, by the computing system, the DID in a verifiable data registry, and sending, by the computing system, the one or more attested claims to the one or more relying parties.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
The present disclosure is directed to systems, methods, and non-transitory computer-readable media including generating a token using an electronic file, the electronic file having a title and a content, and the token including a title hash based on the title of the electronic file and a file hash based on the content of the file and verifying the token based on at least one of the title hash, the file hash, and the signature.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
A method that includes a service computing system generating a virtual meeting space within a virtual environment and the service computing system receiving from a first party computing system a first party entrance request of a first party to enter into the virtual meeting space. The method further includes the service computing system comparing the first party identifier to a recorded first party identifier and, based on the first party identifier matching the recorded first party identifier, authorizing the first party into the virtual meeting space. The method further includes, in response to authorizing the first party into the virtual meeting space, the service computing system projecting information on a virtual display screen within the virtual meeting space. The method further includes the service computing system recording input from the first party within the virtual meeting space into an artifact and tokenizing at least a portion of the artifact.
Systems and techniques for are described herein. A data change event is received that is related to account activity of a user in a computer application. The data change event is logged in an event table stored within a transactional database. The data change event is processed to determine an updated count related to a UI badge. A message is sent that contains the updated count from a batch process to a message broker. The message broker distributes the message to a real-time database system. The updated count is transmitted from the real-time database system to a user interface. The user interface displays the UI badge. The updated count is displayed in real-time on the UI badge.
G06F 9/451 - Execution arrangements for user interfaces
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
17.
SYSTEMS AND METHODS FOR EXCHANGE PROTECTION USING CONTROLLING FRAMEWORK
Various examples, systems and methods are disclosed relating modeling exchanges. One system is a data processing system including memory and processing circuits configured to maintain an operating account data structure including a plurality of funds of a recipient provider. The processing circuits further configured to receive, from a sender provider computing system, a signed exchange package for an exchange of funds. The processing circuits further configured to model the signed exchange package using a first controlling framework to generate an exchange flag, the exchange flag is generated based on a detection of a discrepancy. The processing circuits further configured to freeze the funds by routing the signed exchange package from the operating account data structure to an escrow wallet. The processing circuits further configured to monitor the funds within the escrow wallet. The processing circuits further configured to process a controlled release of the funds.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
18.
SYSTEMS AND METHODS FOR PROVIDING FLEXIBLE LIMIT SHARE ACCOUNTS
Systems, apparatuses, methods, and computer program products are disclosed for providing a flexible limit share account (FLSA) to one or more smart mobile wallets associated designated and/or secondary users. An example method includes generating an FLSA associated with an existing payment account of a primary user, where the FLSA may be utilizable only in alignment with various predetermined conditions set forth by the primary user. The example method further includes authenticating, based on an FLSA share request, the primary user and at least one designated user based on a first mobile driver’s license (mDL) associated with the primary user and a second mDL associated with the designated user. The example method further includes providing the FLSA to a smart mobile wallet associated with the designated user such that the FLSA may be utilized to complete various types of approved transactions.
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
19.
SYSTEMS AND METHODS FOR MESSAGE-BASED DATA RETRIEVAL
A method may include detecting a scheduled transaction change for a future event with respect to a user account, the user account associated with a user account identifier; generating an electronic message according to a schema of a message streaming system, the electronic message include a topic identifier and the user account identifier; publishing the electronic message to the message streaming system; processing the electronic message from the message streaming system, wherein processing includes: parsing a payload of the electronic message to retrieve the user account identifier; accessing transaction details of the scheduled transaction change for the future event; and storing the transaction details in a staging database; in response to receiving a request to update an analysis of the user account, generating an analysis of a future state of the user account based in part on the data in the staging database; and storing the analysis.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
Securing digital assets in a vault that interfaces with multiple different third-party wallets to store keys/mnemonics. The vault interface accepts input from multiple different party wallets to combine multiple encryptions and secure storage techniques. Numerous cryptographic mechanisms are employed to securely pull a mnemonic phrase from a third-party wallet and into an institution's vault. A customer's mnemonic phrase is securely transported from a personal wallet into a secured institution's encrypted vault using the power of HSM to encrypt and decrypt a customer's mnemonic phrase securely.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
An example credit line adjustment system includes: at least one processor; and memory encoding instructions that, when executed by the at least one processor, causes the at least one processor to generate a graphical user interface including: a first section identifying a first credit line owned by a user, the first section providing a first credit limit amount for the first credit line, and the first section including a first control that receives input from the user to manipulate the first credit line; a second section identifying a second credit line, the second section including a second control that receives input to transfer at least a portion of the first credit line to the second credit line.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
G06Q 30/0226 - Incentive systems for frequent usage, e.g. frequent flyer miles programs or point systems
22.
SYSTEMS AND METHODS FOR REDEEMING REWARDS FOR CASH AT AN ATM
Systems and methods for redeeming rewards for cash via an automated teller machine (ATM) are disclosed. An ATM can receive account information for a user and display a graphical user interface including multiple reward indications associated with the account and an option to redeem a user-specified amount of currency corresponding to a portion of a total reward value. The ATM can detect a selection of the option and an additional input specifying the portion to withdraw as cash, transmit a reward redemption request based on the inputs, and receive a redemption authorization. In response, the ATM can dispense, via a cash dispenser, a cash amount corresponding to the specified portion.
G06Q 30/0226 - Incentive systems for frequent usage, e.g. frequent flyer miles programs or point systems
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G07F 7/10 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card together with a coded signal
G07F 19/00 - Complete banking systemsCoded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
23.
MULTI-DIMENSIONAL IMAGES FOR SECURE DATA VISUALIZATION
An example computer system for securing data with multidimensional images can include a computer system for securing sensitive data, the computer system comprising: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: receive the sensitive data; generate a multidimensional image, encrypt the multidimensional image; determine whether an access attempt is authenticated; and responsive to a determination that the access attempt is not authenticated, regenerate the multidimensional image.
Systems, apparatuses, methods, and computer program products are disclosed for dynamically identifying bias in a dataset. An example method includes receiving a fine-tuning request and retrieving a machine learning model and a training dataset. The example method further includes during a model training session, determining, using a Uniform Discretized Integrated Gradient (UDIG) technique, that a data element corresponds to biased data and in response to determining that the data element corresponds to biased data, determining a bias identification event. The example method further includes determining a bias mitigation action and causing performance of the bias mitigation action.
An electronic online system is configured to receive, at the electronic online system, an expression of a use case; determine, using a first machine-learning technique with the expression of the use case as input, a data source to satisfy the use case; determine, using a second machine-learning technique with the expression of the use case and the inference of the first machine-learning technique as inputs, a data destination to satisfy the use case; and construct a data pipeline from the data source to the data destination for the use case.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
A system includes a processing circuit includes a processor and memory where the memory is configured to store instructions that are executable by the processor to cause the processing circuit to determine that an actual amount of currency received by a teller money drawer is a discrepancy amount different than an expected amount of currency, determine a potential source of the discrepancy based on the discrepancy amount, cause a display device of a teller computing device to display a selectable indication of the discrepancy within a first window indicating that the actual amount of currency is the discrepancy amount different than the expected amount of currency, and cause, based on receiving a selection of the selectable indication of the discrepancy within the first window, the display device of the teller computing device to display an indication of the potential source of the discrepancy within a second window.
Systems, methods, and computer-readable storage media to track provenance of assets utilizing non-fungible tokens (NFTs). One method includes receiving a provenance request, generating a first non-fungible token (NFT) encapsulated with a first control structure, generating a second NFT encapsulated within a second control structure, and tracking provenance of assets utilizing the first NFT and second NFT.
An example computer system for facilitating transactions using commercial profiles can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: create a commercial profile for a first party to a transaction; cryptographically secure the commercial profile; allow the commercial profile to be selected by a second party to initiate the transaction; facilitate the transaction between the first party and the second party using information in the commercial profile of the first party.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
29.
SYSTEMS AND METHODS FOR AUTOMATIC MOBILE DRIVER'S LICENSE-BASED TRANSACTION MANAGEMENT
Systems, apparatuses, methods, and computer program products are disclosed for providing automatic mobile driver's license (mDL)-based transaction verification. An example method includes receiving a transaction attempt associated with a user device of a user. The example method further includes determining whether the transaction attempt is associated with one or more restricted items. The example method further includes determining whether the transaction attempt indicates that an mDL associated with the user is comprised in the user device in an instance in which the transaction attempt is associated with the one or more restricted items. The example method further includes authenticating, based on the one or more restricted items, the user based on the mDL associated with the user and handling the transaction attempt based on authenticating the user.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
An example computer system for extending secure information stored within a mobile wallet can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: store a mobile driver's license of an individual in the mobile wallet; add extended information to the mobile wallet that is associated with the mobile driver's license, the extended information being additional authentication information associated with the individual; receive a request to authenticate the individual, the request including request information; calculate an authentication score based upon a comparison of the request information to the extended information; and return a determination of authentication in response to the request.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
31.
PROACTIVE IDENTIFICATION OF GROUP MEMBERSHIP FOR DISCOUNTED TRANSACTIONS
A computer system and method for assessing a probability of a user belonging to a class of users eligible for discount. The method comprises determining if a user has self-identified as belonging to a class of users eligible for discount; determining if the user has received a financial transaction from an organization restricted to the class of users; determining if the user is using a financial product restricted to the class of users; determining if a financial account of the user is linked with a financial institution or account restricted to the class of users; reviewing the transaction history to identify transactions made at locations with access limited to the class of users; identifying recurring transactions with values consistent with applied discounts; and determining a score indicating the probability of the user belonging to the class of users eligible for discount.
Systems, apparatuses, methods, and computer program products are disclosed for providing improved account transaction control and management. An example method includes receiving a transaction attempt associated with a payment account of a user, where the payment account includes an initial transaction limit and a secondary transaction limit. The example method further includes determining whether a transaction amount of the transaction attempt exceeds the initial transaction limit. The example method also includes providing a first limit violation notification to the user and receiving a limit override confirmation in response to the limit violation notification, where the limit override confirmation comprises a mobile driver's license (mDL) associated with the user. The example method also includes authenticating the user based on the mDL and, in response to successfully authenticating the user based on the mDL, enabling the secondary transaction limit associated with the payment account.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
As the number of applications developed by the organization increases, the computing resource costs for storing and maintaining applications may also increase significantly. The disclosed content claiming system provides a solution to reducing computing resources necessary to maintain and store content that is no longer needed by allowing users to claim ownership over content and confirm whether the content is still in use. For example, in the disclosed content claiming system, a user initiates the process of content claiming by accessing a user interface associated with a content claiming application, wherein the user interface displays a listing of content currently maintained by the organization. The user may then select unclaimed content objects based one or more preferences and provide attestations regarding ownership and usage. Content claiming helps organization make informed decisions regarding continued storage and maintenance of content.
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
Various systems and methods for managing a business mobile driver's license (BmDL) are described herein. A verifier system for managing digital employment records may be configured to transmit a request for a data element from a user device of a user, the data element included in a business mobile driver's license (BmDL) data structure and receive a response from the user device, the response including: an issuer certificate and a data element that satisfies the request.
Systems and methods for server-to-device secure data exchange are disclosed. A system generates a device access token for a smart device based on a device identifier, a financial account identifier, a user identifier, and a software application identifier for a first service provider. The token is stored in secure storage on the smart device. When a transaction request is received from the software application, the system accesses the stored token. The device access token is validated for the software application and transmitted with the transaction request to a computing system associated with the financial account. The computing system verifies the transaction request by parsing the software application identifier within the token, responds with an electronic message, and a response to the transaction request is provided to the software application based on the message.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04L 67/133 - Protocols for remote procedure calls [RPC]
36.
COMPRESSION OF MODELS FOR NATURAL LANGUAGE PROCESSING
An example electronic computing device can include: a processor; and a system memory, the system memory including instructions which, when executed by the processor, cause the electronic computing device to: receive a model for natural language processing of data, the model including a plurality of self-attention heads; prune the model by removing one or more of the plurality of self-attention heads of the model to create a pruned model; and evaluate a classification accuracy of the pruned model to maintain a performance level.
Systems, apparatuses, methods, and computer program products are disclosed for providing interoperability between private and public blockchains. An example method for providing interoperability between private and public blockchains includes, by a key exchange controller (KEC): receiving access key generation instructions; generating, based on the key generation instructions, an access key comprising access credentials; transmitting the access key to an access key target on a public blockchain network; receiving, from the access key target, a access request including the access credentials and information indicating a private blockchain on a private blockchain network; and providing, in response to receiving the access request, access for the access key target to access the private blockchain of the private blockchain network.
Systems, apparatuses, methods, and computer program products are disclosed for quantum random number generation (QRNG). An example method includes generating, by encoding circuitry of a QRNG chip, a set of time-bin qubits based on a first optical path length. The example method further includes transmitting, by the encoding circuitry of the QRNG chip, the set of time-bin qubits over an optical line. The example method further includes receiving, by decoding circuitry of the QRNG chip, the set of time-bin qubits over the optical line. The example method further includes measuring, by the decoding circuitry of the QRNG chip and based on a second optical path length different from the first optical path length, the set of time-bin qubits to generate a decoded set of bits. In some embodiments, the example method further includes generating, by session authentication circuitry, a session key based on the decoded set of bits.
Systems, methods, and computer-readable storage media of activating a card having a contactless chip are provided. One method includes receiving, from a mobile device via a wireless transmission from the card having the contactless chip to the mobile device, a cryptogram, and decrypting the cryptogram to reveal information. The method further includes comparing the revealed information regarding at least one of the card or the user to information in a customer database, confirming the revealed information, and updating the customer database to indicate that the revealed information regarding the at least one of the card or the user is confirmed. The method further includes activating the card for an initial card transaction based on updating the customer database, and providing, to the mobile device, a payment card token associated with the card as part of a mobile wallet transaction using the mobile device involving the card.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Initiating payments using identity verification. A personal identifier that uniquely identifies a prospective payor can also initiate a requested payment without the need for a payment mechanism other than the personal identifier itself. Whether payment is initiated by the personal identifier can depend on a context in which the payment request is made.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
A computer system and method for identifying price outliers among bonds within a class of similarly situated bonds. The system comprises one or more processors and non-transitory computer-readable storage media, enabling the system to: identify a group of nearest neighbor bonds that share similar attributes using a k-nearest neighbor algorithm; assess the volatility of each bond within this group; create a filtered group by excluding bonds with volatilities above a predefined threshold; calculate correlation coefficients between each pair of bonds in the filtered group; and sort this group based on the correlation coefficients to select a predetermined number of bonds that form an index group. Additionally, the system computes a weighted average index price for the index group and determines the variance for each bond relative to this index price. This approach allows for the effective detection of price outliers, facilitating more informed investment decisions.
A computer system for classifying financial data as fraudulent can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: receive a financial data set associated with an organization; automatically select optimal attributes of the financial data set using an optimization algorithm to extract optimal features required to classify the financial data set; dynamically determine a number of layers of a fraud detection model while training the fraud detection model with the financial data set and the optimal features; and classify the financial data set to indicate fraud by executing the fraud detection model in the number of layers using the optimal features.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
Disclosed in some examples are methods, systems, devices, and machine-readable mediums for a dependency tracking service which automatically identifies and tracks information about dependencies of a software component and provides one or more visualizations displaying that information. The system may identify the dependencies through automated metadata analysis of the software component, behavior analysis of the software component, or source code analysis of the software component. The system may track status of the software component by reference to one or more code management systems, vulnerability reporting systems, or the like.
Systems and methods for performing multi-stage contactless payment authorization are disclosed. A system can receive a first payment authorization request generated in response to a contactless communication between a contactless card and a user device. The system can also receive, from the user device, a second payment authorization request generated in response to receiving card information associated with the contactless card. The system can verify that the contactless card is present at a generation of the second payment authorization request based on a condition between the first and second payment authorization requests being met. The system can transmit an approval of the second payment authorization request to the user device in response to verifying that the contactless card is present.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A method may include determining suspicious activity with respect to a user account, the suspicious activity including at least one transaction on the user account; transmitting a notification to a computing device associated with the user account, the notification identifying the suspicious activity and including a link into an application installed on the computing device to confirm the suspicious activity; receiving, from the application, an indication that the notification was activated on the computing device; and in response to the indication: selecting a subset of queries of a plurality of queries to present on a display device of the computing device via the application; receiving answers to the subset of queries via the application; processing the answers to generate a resolved status of the suspicious activity.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Systems and methods for a subscribable information locker are disclosed. One disclosed method includes receiving first secure user information associated with a user, updating a secure record associated with the user to include the first secure user information, determining a security level associated with the first secure user information, determining an authorization level associated with a subscriber, and upon determining that the authorization level meets the security level, transmitting data associated with the first secure user information to the subscriber.
A method, apparatus, and system are disclosed. A method includes receiving, by a computing system, an application of a user for a product or service. The application can include user information associated with a user input via a user device. The method further includes: transmitting a message to a third party computing system based on a contactless communication between a contactless card and the user device; receiving, by the computing system from the third party computing system, an indication that at least a portion of the user information matches information stored by the third party computing system based on the message; and approving, by the computing system, the application for the product or service based at least in part on the indication.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Systems and methods for an adaptable user interface based on a user's neurological condition, user experience level, and emotional state including: selecting a neurological condition associated with a user; determining, based on historical user data, a user experience level; generating a user interface based on the selected neurological condition and the user experience level; receiving, from a tracer configured to log a user's activity, a tracking log comprising information regarding the user's activity; determining a behavioral metric by analyzing the tracking log using a machine learning model trained by processing prior user activity, wherein the behavioral metric represents an emotional state of the user; and modifying one or more elements of the user interface based on the behavioral metric.
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 9/451 - Execution arrangements for user interfaces
A method for preventing the double-spending of digital currency that transfers between multiple distributed ledger technology (DLT) networks. The method includes detecting a request to transfer a first digital currency from the a DLT network of a first type to a second DLT network of a second type. The method further includes, in response to an indication from an exchange node that the first digital currency is to be destroyed, destroying the first digital currency from the first DLT network. The method further include creating a second digital currency on the second DLT network. Creating the second digital currency on the second DLT network further includes attaching a serial number to the second digital currency.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
50.
SYSTEMS AND METHODS FOR LOCATION-BINDING AUTHENTICATION
A system for authenticating a login request includes a computing device including a processing circuit configured to receive the login request including a user identifier associated with a user, transmit a request for location information of a user device associated with the user to indicate a location of the user device, receive, from the user device, a location-based modifiable digital fingerprint comprising an encoded value for a location of the user device where the updated location-based modifiable digital fingerprint is received by the computing device based on a change in the location of the user device, verify the user device based on a change to the encoded value for the location of the user device, and provide the user access to the computing device.
This disclosure describes techniques that include assessing whether various service providers, such as cloud service providers or SaaS providers, are properly maintaining sensitive data (e.g., private, confidential, and/or non-public information) that is entrusted to them. In one example, this disclosure describes a method that includes collecting, by a computing system, information about interactions with a service provider computing system; identifying, based on the information about the interactions, a plurality of network paths, each associated with a data object accessed at the service provider computing system; requesting, based on the plurality of network paths, data from the service provider computing system; receiving a response; determining, based on the response, whether the response includes sensitive information; and taking action based on whether the response includes sensitive data.
An example computer system for updating user account information can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: receive a virtual identification (ID), the virtual ID including user information; store the virtual ID within a smart wallet; connect one or more user accounts to the smart wallet; compare the user information of the virtual ID with second user information of the one or more user accounts; determine if the user information and the second user information are different; and update the one or more user accounts by replacing the second user information with the user information.
Systems and methods are described herein for detecting and responding to transaction threats caused by geopolitical events. Such systems and methods may use a provider computing system to receive a transaction request and to receive third-party data from one or more third-party data sources. The provider computing system may identify, using a trained artificial intelligence (AI) model configured to ingest the third-party data, one or more geopolitical events based on the third-party data. The provider computing system may determine, based on the one or more identified geopolitical events, a threat associated with the transaction request and a severity of the threat. In response to the transaction request and based on the severity of the threat, the provider computing system may initiate a remedial action. The remedial action may include denying the transaction request, delaying the transaction request, or requiring a user-verification of the transaction request.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
An example computer system for ingestion of data can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: authenticate a user to allow for definition of a configuration file for the ingestion of the data; receive the configuration file, with the configuration file defining parameters for the ingestion of the data; extract the data through an application programming interface according to the parameters of the configuration file; and perform remediation on an error record in the data according to an error code associated with the error record.
Systems and methods are directed to automatic tracking and categorization of transactions in real-time for transaction record regeneration. A smart wallet system receives, via a smart wallet mobile system activated on a mobile device, transaction data for a transaction. Responsive to receiving the transaction data, a tracker component performs, in real-time as the transaction is completed, operations comprising determining whether an item of the transaction is to be categorized into a tracker category and categorizing the item of the transaction into the tracker category in response to determining that the item of the transaction is to be categorized into the tracker category. Responsive to a record trigger event, a record component of the smart wallet system generates or updates a transaction record for the tracker category. A submission component submits the transaction record to a third-party system, which triggers the third-party system to process the transaction record.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
56.
SYSTEMS AND METHODS FOR CURRENCY EXCHANGES USING A LEDGER ARCHITECTURE
Various examples, systems and methods are disclosed relating to managing currency exchanges. One system is a data processing system including memory and one or more processing circuits configured to identify one or more assets of an asset class corresponding to an asset grouping framework and generate one or more smart contracts including executable code to monitor an off-chain condition of the one or more assets and exchanges rates. The one or more processing circuits are further configured to broadcast the one or more smart contracts to one or more distributed ledgers and receive, from the one or more smart contracts, an indication the off-chain condition is satisfied. The one or more processing circuits are further configured to process an exchange conversion from the first currency to the second currency based on the current exchange rate and transferring the second currency to a wallet of the receiving party.
G06Q 40/04 - Trading Exchange, e.g. stocks, commodities, derivatives or currency exchange
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
57.
ENHANCING BUSINESS INTERACTIONS USING A SMART WALLET
An example computer system for enhancing device interaction can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: receive a virtual identification (ID) by a smart wallet; determine an interaction process to initiate with a client device; query the smart wallet to access user information of the virtual ID based on a determined interaction process; and initiate the interaction process with the client device using the user information of the virtual ID.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
58.
System and methods for classification of unstructured data using similarity metrics
Systems, apparatuses, methods, and computer program products are disclosed for obtaining relevant data from an unstructured data source. An example method includes extracting relevant data that is intermixed with extraneous data using natural language processing. In order to do so, text from the unstructured data source may be tokenized and each token may be compared to an identifier associated with the relevant data. A similarity metric may be determined between each token and the identifier in order to classify tokens as similar or dissimilar to the identifier. All tokens classified as similar to the identifier may be aggregated in order to obtain relevant data.
Systems and methods for operating an artificial intelligence and machine learning model to generate annotations of data and to generate training datasets is disclosed. One disclosed system includes one or more processors configured to: assign a task to a machine learning model; receive an output from the machine learning model associated with the task; compare the output to task data associated with a user performing the assigned task; and when there is a difference between the output of the machine learning model and the task data, generate an annotation.
Systems and techniques are provided to facilitate autonomous financing decision-making by deploying an autonomous decision bot within a client system. These systems and techniques enable the autonomous decision bot to access financial data relevant to a financing decision directly from the client system. The autonomous decision bot analyzes the accessed financial data according to financing rules established by a financial institution associated with the client system to determine a financing decision without transmitting the accessed financial data to the financial institution. The system facilitates the communication of the financing decision to the financial institution and, upon receipt of a confirmation from the financial institution, outputs an indication of the financing decision to the client system.
Various systems and methods for analyzing business compliance are described herein. An electronic online system is configured to receive, from a user of the electronic online system, an indication of a law for analysis; parse the law to produce law chunks; receive, from the user, an indication of a business policy for analysis; parse the business policy to produce policy chunks; compare the law chunks with the policy chunks to determine similarity scores for respective pairs of law chunks and policy chunks; and present law chunks that have similarity scores less than a threshold similarity score to the user.
Systems, apparatuses, methods, and computer program products are disclosed for automatic change evidence processing and change implementation using a three-level data taxonomy. An example method includes receiving a change request comprising a project identifier and a change request type. The example method further includes generating a support container, wherein the support container references the project identifier, and the support container is associated with a support container identifier. The example method further includes generating one or more evidentiary requirements that reference the support container identifier and are each associated with an evidentiary domain. The example method further includes receiving an evidentiary data record associated with the change request and identifying an evidentiary requirement associated with the evidentiary data record. The example method further includes updating the identified evidentiary requirement to reference the evidentiary data record.
System and techniques to use a document repository to enhance natural language processing are described herein. Text can be obtained from a conversation between two entities (e.g., a person, chatbot, etc.) in which one entity is making a request that may not be clear. The nature of the request is determined by semantically matching a part of the text to a document in a document repository. The nature of the document reveals the nature of the request in the text. The fields of the document can be used to provide prompts to continue the conversation to gather information used to fulfill the now identified request.
G06F 16/383 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
Systems, apparatuses, methods, and computer program products are disclosed for simulating future asset performance based on consumable media content. An example method includes monitoring a user device for receipt of a data stream comprising media content. The example method further includes receiving a simulation request requesting a prediction model for an asset of a user portfolio based on the media content. The example method further includes generating a prediction model output indicating future performance of the asset of the user portfolio based on the media content and historical data. The example method further includes generating a natural language report representative of the future performance of the asset of the user portfolio. The example method may further include transmitting the natural language report to the user device.
Systems, apparatuses, methods, and computer program products are disclosed for establishing an ad hoc group and performing autonomous ad hoc group operations. An example method includes creating an ad hoc digital representation and selecting an invitation region to transmit an ad hoc group invitation to devices associated with individuals within the invitation region. The example method further includes receiving response decisions from the devices associated with the individuals within the invitation region and performing a digital authentication operation to authenticate devices for which the response decisions indicate acceptance of the invitation. The example method further includes adding authenticated devices to the ad hoc group and performing autonomous group operations. The autonomous group operations may comprise at least one or more of a group message broadcast, a group fund transaction, a group member geolocation tracking, a group member request handling, or a group feedback collection.
Systems and methods are described herein for prevalidating transactions using application programming interfaces (APIs). Such systems and methods may use a provider computing system to receive a transaction request from a user device associated with a user account held by a provider associated with the provider computing system. The user account may include account information, and the transaction request may include first transaction data and second transaction data. The provider computing system may determine an objective of the transaction request based on the account information. The provider computing system may perform a first verification including verifying, using a first API, the first transaction data based on the account information. The provider computing system may perform a second verification including verifying, using a second API, the second transaction data based on the objective. The provider computing system may validate the transaction request based on the first verification and the second verification.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
67.
SYSTEM AND METHOD FOR CONTEXT-AWARE VIRTUAL ASSISTANT
Systems and methods are provided. In one example, a method includes presenting, via a graphical user interface (GUI), a GUI screen on a display of a computing device, wherein the GUI screen is configured to present textual information, and capturing an annotation made by a user on a portion of the GUI screen, wherein the annotation comprises a textual annotation, a drawing annotation, or a combination thereof. The method also includes deriving a context for the annotation based at least on the portion of the GUI screen having the annotation, wherein the context comprises a subset of the presented textual information, and creating a data store query based on the context and on the annotation. The method further includes querying, via the data store query, a data store, and presenting, via the GUI, a result based on the querying of the data store.
G06F 3/04845 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
G06F 3/04883 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
A system includes a processing circuit configured to receive a first input from a user device. The processing circuit is further configured to determine a first task that the processing circuit is authorized to autonomously perform based on the first input. The processing circuit is further configured to autonomously perform the first task based on determining the processing circuit is authorized to autonomously perform the first task. The processing circuit is further configured to receive a second input from the user device. The processing circuit is further configured to determine a second task that the processing circuit is unauthorized to autonomously perform based on the second input. The processing circuit is further configured to provide the second input to a human agent device associated with a human agent based on determining the processing circuit is unauthorized to autonomously perform the second task.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
Examples are directed to systems and methods that provide a token having a corresponding token identifier. The token is associated with a user and stores electronic data having a plurality of data sets associated with the user. The token is configured to interface with each of a plurality of disparate electronic platforms and map relationships of the user with ones of the plurality of disparate electronic platforms. The token can be used to identify a first data set of the plurality of data sets having data that corresponds to the data request and provide the first data set to a recipient while simultaneously masking a second data set of the plurality of data sets from the recipient.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
70.
EXCHANGE MODELER USING AN EXCHANGE PROTECTION ARCHITECTURE
Systems, methods, and computer-readable storage media for exchange modeling. One system includes a processing circuit. The processing circuits includes one or more processors and memory storing instructions that, when executed, cause the processing circuit to train a plurality of protection models of an entity using a training input to output a plurality of protection responses. The instructions further cause the processing circuit to receive exchange data of an exchange of a first entity. The instructions further cause the processing circuit to model, using an entity protection model, the exchange data and third-party data to generate an entity protection response. The instructions further cause the processing circuit to model, using at least one of an entity relationship model or an entity sector model, to generate at least one strategy response. The instructions further cause the processing circuit to receiving a feedback response to the entity protection response or the strategy response.
Systems and techniques for are described herein. Profile data is obtained for a user and an organization and preprocessed to generate a normalized data set. A generative adversarial network is trained using features extracted from the normalized data set. A set of synthetic profiles are generated using the generative adversarial network. A set of healthcare plan recommendations are derived using the set of synthetic profiles. Justification context is determined for each healthcare plan recommendation. An interactive healthcare plan recommendation user interface is generated comprising the set of healthcare plan recommendations and the justification context for output on a display device.
G16H 50/20 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for computer-aided diagnosis, e.g. based on medical expert systems
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G16H 50/30 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for calculating health indicesICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for individual health risk assessment
System and techniques to track the ingestion of resources described herein. A device can receive a connection from a reporting entity at an intake interface of the device. A set of data that includes a representation of a resource involved in a transaction can be received over the connection. This received data can be mapped via an intake interface into fields of a template. Based on a first field of the template, a connection to an external service can be made to retrieve a value to complete a second field of the template. A ruled engine can be applied to modify the first field of the template or the second field of the template to create a compliant template that can be aggregated with other compliant templates to produce a report of a class of transactions that includes the transaction.
Systems, apparatuses, methods, and computer program products are disclosed for tracking NFT-backed instruments. An example method includes identifying a plurality of NFTs on a distributed blockchain ledger, associating an instrument with the cryptographic NFTs, determining a value of the cryptographic NFTs based on transactions on the distributed blockchain ledger that are associated with one or more of the cryptographic NFTs, monitoring the distributed blockchain ledger to detect transaction data of a block of the distributed blockchain ledger, the transaction data indicative of a transaction associated with a first cryptographic NFT of the cryptographic NFTs, determining a modified value of the cryptographic NFTs responsive to the transaction data, and terminating the instrument associated with the cryptographic NFTs in response to a comparison of the modified value to a predetermined threshold value indicating that the modified value is less than the predetermined threshold value.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
An electronic online system is configured to receive, at the electronic online system, an expression of a use case; determine, using a machine-learning technique with the expression of the use case as input, a data source and a time-to-live (TTL) value to satisfy the use case; and configure a data cache to store data received from the data source with the TTL value.
Systems and techniques may be used to perform multi-capture for remote deposit via scanner. For example, a technique may include scanning a first side and a second side of a plurality of checks, and comparing geometrical features of the first side of each check of the plurality of checks to geometrical features of the second side of each check of the plurality of checks. Based on the comparison, the technique may include selecting an image from a first set of respective individual images that corresponds to an image from a second set of respective individual images to form a pair of images, the pair of images representing a single check of the plurality of checks, and outputting the pair of images.
G06T 7/62 - Analysis of geometric attributes of area, perimeter, diameter or volume
G06T 7/70 - Determining position or orientation of objects or cameras
G06V 10/44 - Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersectionsConnectivity analysis, e.g. of connected components
Systems and techniques may be used to perform multi-capture for remote deposit via video. For example, a technique may include capturing a first video of a first side and a second video of the second side of each of a plurality of checks, and extracting a first set of respective individual images of the first side and the second side of each check of the plurality of checks. The technique may include comparing geometrical features of the first side of each of the plurality of checks to geometrical features of the second side of each of the plurality of checks, and based on the comparison, selecting an image from the first set of respective individual images that corresponds to an image from the second set of respective individual images to form a pair of images.
G06T 7/62 - Analysis of geometric attributes of area, perimeter, diameter or volume
G06T 7/70 - Determining position or orientation of objects or cameras
G06V 10/44 - Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersectionsConnectivity analysis, e.g. of connected components
Various examples are directed to systems and methods for detecting potentially fraudulent voice calls to a financial services institution. A computing system may receive an indication of a voice call placed by a voice caller to an operator. The computing system may generate a network address indicator describing a network location. The network address indicator may be provided to the voice caller. The computing system may receive an indication of a financial services account indicated by the voice caller. The computing system may also receive an indication of an access to the network location by a remote device. The computing system may determine, using the indication of the access to the network location, a first location associated with the remote device and determine that the first location does not match a second location associated with the financial services account. The computing system may generate an alert indicating that the voice call is potentially fraudulent.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04W 4/14 - Short messaging services, e.g. short message service [SMS] or unstructured supplementary service data [USSD]
78.
MULTI-TIERED SYSTEM FOR DETECTING AND REDUCING UNAUTHORIZED NETWORK ACCESS
Embodiments are disclosed for detecting and responding to potentially fraudulent transactions and other network access events via a system comprising a three-tiered network architecture. An example system comprises one or more user equipment devices configured with a thin client application (a first tier). The one or more user equipment devices are capable of communicating with a respective local authority controller and a local knowledge base (the second tier). The one or more local authority controllers and local knowledge bases are configured to interact with a master authority controller and master knowledge base (the third tier) to enable the efficient assessment of potentially localized fraudulent network activity and the passing of network access rule sets amongst the devices in each tier. Corresponding apparatuses and methods are also provided.
Various examples are directed to computer-implemented systems and methods for providing a home lending data control product. A method includes receiving data from one or more data sources, and constructing a configuration framework for ingesting, conforming and curation of data processing of the received data. Confirmation of receipt and correct format of the data is provided based on the configuration framework. The method also includes determining that the data has not been modified in transit, and confirming that the data is from a proper timeframe based on a file header or content of the data. The method further includes determining that the data has not been previously processed based on a comparison with previously processed data, transforming a format of the data based on the configuration framework and based on the one or more data sources, and storing the data in a data lake configured for centralized processing.
A data protection system includes non-transitory memory storing instructions that, when executed by a processing circuit comprising one or more processors, cause the processing circuit to designate, for a user profile, at least one experience provider with which to share user data, generate an access token including a configuration enabling access to the data protection system for the at least one experience provider to access the user data, and provide the access token to the at least one experience provider.
Systems, apparatuses, methods, and computer program products are disclosed for secure utilization of quick response (QR) codes. An example method includes obtaining a key known to the initiating device and a participating device, and identifying, by QR code processing circuitry of the initiating device, a payload to be encoded in a QR code. The example method further includes generating, by security circuitry of the initiating device and based on the payload and the key, a secure character string, creating, by the QR code processing circuitry of the initiating device, the QR code using the secure character string, and outputting the QR code by the communications hardware of the initiating device.
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
Systems, apparatuses, methods, and computer program products are disclosed for providing interoperability between private and public blockchains. An example method for providing interoperability between private and public blockchains includes, by a key exchange controller (KEC): receiving access key generation instructions; generating, based on the key generation instructions, an access key comprising access credentials; transmitting the access key to an access key target on a public blockchain network; receiving, from the access key target, a access request including the access credentials and information indicating a private blockchain on a private blockchain network; and providing, in response to receiving the access request, access for the access key target to access the private blockchain of the private blockchain network.
Systems and methods are disclosed herein for providing entropy to clients. An example method includes receiving a first datagram comprising a first request for entropy and a set of requirements comprising an indication of an endpoint device, an indication of a number of bits of entropy, and an indication of a quality of the entropy. The example method further includes determining, by routing circuitry, whether a first entropy source from a set of entropy sources meets the set of requirements and determining, by priority circuitry, a first priority value based on the first request. The example method further includes determining, by the priority circuitry, whether the first priority value is a greatest available priority value and causing generation, by entropy quality circuitry, of an admixture of a plurality of entropy sources from the set of entropy sources. The example method further includes providing the admixture to the endpoint device.
Systems, methods, and computer-readable storage media for global modeling. One system includes a first data structure, a second data structure, a machine learning (ML) system and a processing circuit. The processing circuits includes one or more processors and memory storing instructions that, when executed, cause the processing circuit to determine trends corresponding to the one or more accounts for a third-party entity of the plurality of entities and transaction types. The instructions further cause the processing circuit to receive a request for a report. The instructions further cause the processing circuit to retrieve an exchange history. The instructions further cause the processing circuit to determine the corresponding data item. The instructions further cause the processing circuit to generate the report according to the request, the report including a content item including information corresponding to the trend map for the subset of third-party entities.
G06F 30/27 - Design optimisation, verification or simulation using machine learning, e.g. artificial intelligence, neural networks, support vector machines [SVM] or training a model
85.
SYSTEMS AND METHODS FOR DYNAMIC INCOMING RESOURCE ALLOCATION DELAY
A provider computing system includes at least one processing circuit. The processing circuit performs operations including receiving an indication of an incoming resource allocation associated with a user; retrieving user information relating to the incoming resource allocation; generating, based on the user information, a scale including a movable element for display via a user device associated with the user, the scale including one or more durations and one or more rewards associated with each of the one or more durations; updating and providing the generated scale based on at least one of the user information or contextual information; receiving, from the user via the user interface, a selected duration of the one or more durations; withholding the incoming resource allocation for the selected duration; and transmitting the incoming resource allocation and a reward subsequent to the selected duration.
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06Q 30/0207 - Discounts or incentives, e.g. coupons or rebates
86.
DATA ENHANCEMENTS FOR REMOTE PROCEDURE CALL FRAMEWORKS
An application management system using Remote Procedure Call (RPC) frameworks can include enhancements. These enhancements can be used on files that are distributed to engines throughout the RPC framework. Enhancements can be stored in an enhancement server. The enhancements can include password detection, logo detection, cleartext detection, or other checks or modifications that may be useful to a variety of engines in the RPC framework. The enhancements can be used to ensure that unencrypted sensitive data, passwords, or files with confidential information (as indicated by logos or other pictorial markings) are not distributed throughout the RPC framework.
Systems and methods are described herein for generating improved graphical user interfaces for displaying account information. Such systems and methods may use a provider computing system to identify one or more accounts associated with a user. The provider computing system may retrieve account information for each of the one or more accounts including an account balance, a scheduled transaction, or a predicted transaction. The provider computing system may monitor the account information for real-time updates. The provider computing system may cause a user interface to be displayed as an overlay on a user device including one or more selectable elements indicative of at least one of the account balance, the scheduled transaction, or the predicted transaction, and including one or more of the real-time updates. Each selectable element is configured to cause, when selected, the user interface to display additional information relating to an account associated with the selectable element.
Systems and methods for capturing and tracking requests are provided. A method includes receiving a communication from a third-party computing device including request to interact with an application hosted by an enterprise and transforming the communication into a structured format thereby generating a request data object. The request data object includes a unique user identifier and user metadata associated with the request. The method also includes generating an enhanced request data object and storing the enhanced request data object into a transaction tracking database. The method includes processing the request data object, updating the enhanced request data object responsive to the processing, and outputting a control signal associated with one or more status indicators of the enhanced request data object.
Aspects of this technical solution can include registering a first non-fungible token (NFT) account of a customer to a first public and private key pair, registering a second NFT account of a financial institution to a second public and private key pair, receiving a request to transfer to the first NFT account an NFT having a quantitative value, generating a second quantitative value of the NFT based on the quantitative value of the NFT and a quantitative value of fiat currency, transferring the NFT to a smart contract, linking the first public and private key pair to the smart contract and a fractional value of the NFT, and linking the second public and private key pair to the smart contract and the second quantitative value of the NFT.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
90.
Method, apparatus, and computer program product for secure facilitation of package transfer
Systems, apparatuses, methods, and computer program products are disclosed for securely facilitating a package transfer between parties. An example method includes receiving a package offer indication and providing a control signal to a storage locker compartment of a storage locker in response to determining a package drop-off indication. The example method may further include generating a package purchase data object and determining a package sale indication associated with the package offer indication. The example method may further include providing a control signal to the storage locker compartment housing a package associated with the package offer indication in response to determining a package pick-up indication and updating the package purchase data object based on the package sale indication. The example method may further include transmitting a payment to a seller account based on the package purchase data object in response to a payment trigger event.
Methods, apparatuses, and computer program products are provided for dynamically determining a trust score for an authentication action request. An example method includes receiving an authentication action request from a user device. The method further includes determining a device trust score associated with the user device and generating an action trust score for the authentication action request based at least in part on the device trust score. The method further includes providing an authentication action response to the user device based at least in part on the trust score for the authentication request. The authentication action request metadata may include one or more of event data, user device information, location data, user biometric information, user device interaction information.
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
92.
SYSTEMS AND METHODS FOR A TRANSACTION CARD HAVING A CRYPTOGRAPHIC KEY
A method of accessing an account includes receiving, from a device, randomly generated seed information and an encrypted key or token generated by a card using the randomly generated seed information via a contactless communication between the card and the device; decrypting the encrypted key or token using a decryption process that includes the randomly generated seed information and the encrypted key or token as inputs in response to determining that the randomly generated seed information does not match previously received seed information; and providing, to the device and based on the decrypted key or token, access to the account.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
93.
SYSTEMS AND METHODS FOR GEOFENCE-BASED INDUCTION CHARGING
Systems, apparatuses, methods, and computer program products are disclosed for geofence-based induction charging system. An example method includes identifying an EV by validating vehicle parameters using vehicle identification circuitry and identifying a geofence charging area by comparing vehicle geolocation data with geofence area data using geofence circuitry. The example method further includes generating an entry token and an exit token for the EV using token generation circuitry, and generating a charging transaction for the EV based on the entry token and the exit token using payment transaction circuitry. The entry token comprises at least one or more of a vehicle identifier, an entry timestamp, an entry location, or an entry power level, and the exit token comprises at least one or more of the vehicle identifier, an exit timestamp, an exit location, an updated self-charging rate, an updated power consumption rate, or an exit power level.
B60L 53/38 - Means for automatic or assisted adjustment of the relative position of charging devices and vehicles specially adapted for charging by inductive energy transfer
B60L 53/65 - Monitoring or controlling charging stations involving identification of vehicles or their battery types
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
94.
SYSTEM AND METHOD FOR DUAL-DEVICE COMMUNICATION SYNCHRONIZATION
A method may include: receiving voice user interaction data via a virtual assistant from a first device of a user; processing, the voice user interaction data to determine an intent of the user associated with a task type; determining that a dual-device-communication session should be established based on the intent; transmitting a notification to a second device of the user including an electronic link to establish the session; receiving an indication of activation of the electronic link; in response to receiving the indication, establishing the session with the first device and the second device, the session associated with an instance of the task type; receiving task data from the first device via the virtual assistant associated with the task type; and in response to receiving the task data, presenting an outcome of processing the task data, the outcome presented on a user interface on the second device.
A method may include: receiving, using a processing unit, a plurality of interactions with an electronic service from a computing device; detecting, with the processing unit, a lack of subsequent interaction with the electronic service that continues longer than a threshold period; after the detecting, inputting contextual data of the plurality of interactions into an intervention machine learning model, the intervention machine learning model including weights based on contextual data of past user interaction data and user requests for assistance; after the inputting, retrieving an output value from the trained machine learning model; determining that the output value is above a threshold value; based on the determining, transmitting a message to the computing device to initiate a communication session with a user associated with the plurality of interactions; receiving an indication that the message was accepted by the user; and establishing the communication session in response to receiving the indication.
This disclosure describes techniques for managing both batch and streaming data and managing the efficient and timely calculation of features that are based on such data. In one example, this disclosure describes a method that includes receiving, by a computing system, batch and streaming data; generating, by the computing system and based on the batch and streaming data, a preliminary set of calculated features; receiving, by the computing system, a request to score input data; identifying, by the computing system and based on information included in the request, a model and input features for the model; generating, by the computing system and using the preliminary set of calculated features, the input features; applying the model, by the computing system, to the input features to generate model output data; and outputting, by the computing system, the model output data.
Systems, apparatuses, methods, and computer program products are disclosed for estimating vulnerability related to network blast radius of a network asset. An example method includes receiving a network graph and selecting a first network node from the set of network nodes. The example method further includes computing a difficulty score based on the difficulty for an attacker to compromise a second network node in an instance in which the attacker compromises the first network node and computing a cumulative difficulty score for the attacker to compromise the second network node based on a set of difficulty scores for the first network node and each other network node from the set of network nodes. The example method further includes adding the second network node to a set of blast radius nodes and determining a total vulnerability score for the first network node based on the set of blast radius nodes.
A computing system is configured to manage and synchronize indicators-of-attack (IOA) rules across multiple tenants of an Endpoint Detection and Response (EDR) tool. The computing system is configured to compare rules between an indicated source tenant and a destination tenant. The computing system may then generate output indicating common rules, updated rules, and missing rules between the source and destination tenants. A user, or the system itself, may update the rules at the destination tenant based on the rules at the source tenant. Such an endpoint security synchronization system avoids problems that may occur with manually transferring IOA rules across multiple tenants of an EDR tool which may result in errors that result in false or misleading security alerts.
Systems, apparatuses, methods, and computer program products are disclosed for constructing a foundational identity to establish the identity of an individual and linking the foundational identity to various other identities of the individual in virtual spaces. An example method includes linking identities across virtual spaces. The example method further includes verifying identity activity associated with the various other identities using the link between the various other identities and the foundational identity, and based on the verification of the identity activity, generate outputs.
Systems, apparatuses, methods, and computer program products are disclosed for exfiltrating an indication of a query related to a computing resource. An example method includes transmitting, by quantum generator circuitry of a transmitter device at a first time, a stream of quantum particles to a second location and monitoring, by embedded access detection circuitry of a first computing device at a second time after the first time, the computing resource for the query. The example method further includes, in an instance in which the query relating to the computing resource is detected, causing, by quantum noise generator circuitry, a microscopic change in a condition of the transmission of the stream of quantum particles, wherein the microscopic change results in a change in an error rate derived from a detection of the stream of quantum particles at the second location.