In some implementations, a device may receive, from a client device, a first request for data that is accessible via an external data source of one or more external data sources, wherein the device includes one or more integration service components associated with respective external data sources of the one or more external data sources. The device may provide, to an integration service component of the one or more integration service components, the first request. The device may provide, to the external data source, a second request via the integration service component, wherein the second request is based on the first request. The device may receive, from the external data source, a response that includes the data indicated by the first request via the integration service component. The device may provide, to the client device, the data requested by the first request based on receiving the response.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 16/25 - Integrating or interfacing systems involving database management systems
G06F 40/284 - Lexical analysis, e.g. tokenisation or collocates
2.
COMPUTER-BASED SYSTEMS FOR ALERTING A USER VIA AT LEAST ONE MAGNETIC COMPONENT THAT AN ACTIVITY INSTRUMENT IS READY FOR USE OR BEING REMOVED, AND METHODS OF USE THEREOF
A method of an activity computing device having a first magnetic component switching between a first and a second mode includes receiving a first indication of an activity, and instructing the first magnetic component to generate: when in the first mode: a first magnetic field having a first polarity that is configured to interact with a second magnetic field generated by a second magnetic component of the activity instrument, wherein the second magnetic field has a second polarity that is the same as the first polarity so that the activity computing device generates a repulsive force, and when in the second mode: a third magnetic field having a third polarity that is configured to interact with the second magnetic field generated by the second magnetic component, wherein the third polarity is opposite to the second polarity so that the activity computing device generates a pulling magnetic force.
G06K 7/08 - Methods or arrangements for sensing record carriers by means detecting the change of an electrostatic or magnetic field, e.g. by detecting change of capacitance between electrodes
In some implementations, a physical card may capture sensor data indicating a touch profile along an outer edge of the physical card, where the touch profile is indicative of a finger placement of a hand holding the physical card. The physical card may compare the touch profile to one or more valid touch profiles. The physical card may determine that the touch profile sufficiently matches a valid touch profile, of the one or more valid touch profiles, based on comparing the touch profile to the one or more valid touch profiles. The physical card may transmit an indication that the physical card is enabled, based on determining that the touch profile sufficiently matches the valid touch profile.
In some implementations, a system may obtain behavior information that indicates one or more user interactions with web content presented on a user device. The system may generate, using an artificial intelligence or machine learning model, one or more predictions associated with the web content based on the behavior information. In some implementations, the one or more predictions include a predicted intent associated with the one or more user interactions with the web content. The system may identify, based on the behavior information, a current user engagement level with the web content presented on the user device. The system may generate an adapted version of the web content based on the one or more predictions and the current user engagement level. The system may deliver the adapted version of the web content to the user device for presentation on the user device in accordance with the current user engagement level.
In some embodiments, a request to execute, via a first user device, a secure operation with a computing system may be detected (e.g., where the first user device satisfies a proximity condition with respect to a second user device). Authentication data corresponding to a single use token may be retrieved from the second user device based on (i) the request and (ii) the proximity condition being satisfied (e.g., where the single use token corresponds to static information associated with an account used to perform secure operations). The authentication data corresponding to the single use token may be provided to the computing system. An indication that the secure operation has been authorized may be received based on a verification of the authentication data corresponding to the single use token. The secure operation with the computing system may be executed based on the indication being received.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
A device may include a processor, a wireless transceiver in communication with the processor, and a non-transitory memory. The memory may store instructions that, when executed by the processor, cause the processor to perform processing. The processing may include receiving a command configured to be executed by an external user device. The external user device and the user device may be members of a network of trust. The processing may include detecting, by the wireless transceiver, a plurality of member devices of the network of trust in communication range of the device. The processing may include sending, by the wireless transceiver, the command to each of the plurality of member devices.
Embodiments disclosed are directed to a computing system that performs operations for leveraging machine learning to automate capacity reservations for application failover in a cloud-based computing system. The computing system determines a simulated usage capacity of a set of applications executing in a first zone of a cloud-based computing system. The computing system then determines an amount of cloud-based computing instances in a second zone of the cloud-based computing system needed to maintain the simulated usage capacity in an event of a failover of the first zone. Subsequently, the computing system reserves the amount of cloud-based computing instances in the second zone.
Embodiments disclosed are directed to ensuring resource compliance within a cloud-based environment. The embodiments include steps for performing both pre-provisioning and post-provisioning checks of resources, such as network protocols, prior to and after their deployment within the cloud-based environment. These steps include using bitemporal analysis to determine the impact of deploying resources within the environment through the use of multiple execution timelines where the impact of deploying a resource may be evaluated on an alternative timeline that does not change the current resource scope of the cloud-based environment. The analysis may further include tracking the impact of the resource after it has been deployed to ensure resource compliance.
H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/0853 - Retrieval of network configurationTracking network configuration history by actively collecting configuration information or by backing up configuration information
H04L 67/00 - Network arrangements or protocols for supporting network services or applications
H04L 69/00 - Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
H04L 69/08 - Protocols for interworkingProtocol conversion
9.
QR CODE PAYOR TRACKING AND REPEAT PAYMENT PREVENTION
A computer implemented method, system, and non-transitory computer-readable device usable in a mobile transaction environment. A customer scans a purchasing code (e.g., a quickresponse (QR) code) using, for example, a mobile device. The QR code is encoded with a payment configuration ID and a merchant account token associated with bank account information for the merchant. Historical purchases for the customer, are analyzed in real time to alert a customer of potential duplicate purchases through a UI on the mobile device. The user may complete or cancel the current transaction by interacting with the UI.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
10.
DETERMINISTIC CRYPTO-RANDOM VALUES FOR CRYPTOGRAPHIC OPERATIONS
Systems, methods, and apparatuses are described for generating deterministic crypto-random values for cryptographic operations such as tokenization. A computing device may receive a plurality of unique character strings by receiving such strings from a server and/or by generating such strings based on a seed value. The computing device may define a seed table comprising a plurality of rows and a plurality of columns such that each row of the plurality of rows corresponds to a different character of the set of characters and each column of the plurality of columns corresponds to a different character of a unique character string, of the plurality of unique character strings, corresponding to the different character. The table may be expanded by processing sequential rows of the seed table to generate a tokenization table. That tokenization table may be used to generate tokenized versions of input data.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
A computer implemented method, system, and non-transitory computer-readable device that may be used in a remote deposit environment. Upon receiving a user request, based on interactions with the UI, the method implements an electronic deposit of a financial instrument by activating a camera on the client device to generate a live video stream of image data of a field of view of at least one camera, wherein the live video stream includes imagery of at least a portion of each side of the financial instrument. The method continues by extracting data fields based on the formation of image objects from one or both sides of the financial instrument from the live video stream of image data. The extracted data fields are converted, based on a payor agreement, into a recurring electronic funds transfer (EFT) schedule for future payments similar to the check.
A card, system, and method for validating a user's identity with card image steganography are provided. The system includes a card, a user device, and a processor. The card comprises a face with a steganographic pattern encrypted onto its substrate. The processor is configured to receive a request associated with the card, recognize the biometric data from the steganographic pattern on the card, and verify the user's identity by matching the user's biometric to the card's biometric.
Systems and methods for processing web platform source code to determine presence of one or more embedded digital product tools. In some aspects, the system is configured to receive navigation information associated with a web platform, extract source code of a first page, determine a hosting configuration template matching the web platform, determine navigation information for a plurality of search result pages of the web platform, extract source code of a search result page from the plurality of search result pages, determine that at least one search string, of a plurality of search strings associated with the target digital product tool, is included in the source code of the search result page, identify a first provider of the target digital product tool based on the at least one search string, and generate for display an indication of the target digital product tool and the identified first provider.
A computer implemented method, system, and non-transitory computer-readable device that may be used in a remote deposit environment. Upon receiving a user request, based on interactions with the UI, the method implements an electronic deposit of a financial instrument by activating a camera on the client device to generate a live video stream of image data of a field of view of at least one camera, wherein the live video stream includes imagery of at least a portion of each side of the financial instrument. The method continues by extracting data fields based on the formation of image objects from one or both sides of the financial instrument from the live video stream of image data. The extracted data fields are converted, based on a payor agreement, into a recurring electronic funds transfer (EFT) schedule for future payments similar to the check.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
A computer implemented method, system, and non-transitory computer-readable device that may be used in a remote deposit environment. Upon receiving a user request, based on interactions with the UI, the method implements an electronic deposit of a financial instrument by activating a camera on the client device to generate a live video stream of image data of a field of view of at least one camera, wherein the live video stream includes imagery of at least a portion of each side of the financial instrument. The method continues by extracting data fields based on the formation of image objects on one or more sides of the financial instrument from the live video stream of image data. An EFT conversion of extracted data fields may be processed during or subsequent to the extraction process. A message is sent from a payee to a payor requesting the EFT. Upon acceptance, an EFT to the payee occurs. Upon denial, the remote deposit process is completed.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
In some implementations, a device may obtain an indication of a proposed change to a subset of executable code from a set of executable code. The device may determine, via one or more models, first context information associated with the proposed change and second context information associated with at least one of the subset of executable code, the set of executable code, or a context of the subset of executable code within the set of executable code. The device may determine a scrutiny level for review of the proposed change based on at least one of the first context information or the second context information. The device may obtain, via the one or more models, review information associated with the proposed change, wherein the one or more models apply the scrutiny level to obtain the review information. The device may perform an action based on the review information.
A computer implemented method, system, and non-transitory computer-readable device usable in a mobile transaction environment. A customer scans a purchasing code (e.g., a quick-response (QR) code) using, for example, a mobile device. The QR code is encoded with a payment configuration ID and a merchant account token associated with bank account information for the merchant. Historical purchases for the customer, are analyzed in real time to alert a customer of potential duplicate purchases through a UI on the mobile device. The user may complete or cancel the current transaction by interacting with the UI.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Systems, methods, and apparatuses are described for generating deterministic crypto-random values for cryptographic operations such as tokenization. A computing device may receive a plurality of unique character strings by receiving such strings from a server and/or by generating such strings based on a seed value. The computing device may define a seed table comprising a plurality of rows and a plurality of columns such that each row of the plurality of rows corresponds to a different character of the set of characters and each column of the plurality of columns corresponds to a different character of a unique character string, of the plurality of unique character strings, corresponding to the different character. The table may be expanded by processing sequential rows of the seed table to generate a tokenization table. That tokenization table may be used to generate tokenized versions of input data.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A modular transaction card assembly includes a card frame having the traditional dimensions of a credit card, and a transaction card that is smaller than a traditional card and that fits into a receptacle of the card frame. Each of the card frame and the transaction card may be capable of performing contactless data transactions individually. In some instances, the combined assembly of the card frame with the transaction card may detect a proximity of a mobile device to the assembly and generate an authentication credential that is unique to the combination of the card frame, the transaction card, and the mobile device. The authentication credential may be used to authentic the transaction card when conducting a data transaction.
In some implementations, a device may load, from a code repository, a code file containing code for a plurality of object data structures that indicate respective values for a set of object parameters, where the code is in a form for interpretation by a code interpreter. The device may instantiate a plurality of objects in accordance with the plurality of object data structures. The device may retrieve a first template that provides a first formatting used for generating end-user documentation. The device may generate a documentation document using the plurality of objects and the first template. The device may retrieve a second template that provides a second formatting used for generating metadata for the documentation document. The device may generate the metadata using the second template. The device may insert the metadata into the documentation document.
In some embodiments, the present disclosure provides an exemplary method that may include steps of determining an identity of at least one user of a plurality of users based on a multi-factor authentication; utilizing an identity tokenizer to generate at least one temporary identity token associated with the identity of the user; transmitting the at least one temporary identity token to an external computing device for authentication; receiving an authenticated digital token from the external computing device; automatically utilizing the authenticated digital token to retrieve a plurality of data items of an account information; utilizing a security module to link the authenticated digital token and the plurality of data items; generating a unique-universal identifier associated with the security module and the authenticated digital token; and utilizing the unique-universal identifier and the security module associated with the authenticated digital token.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Techniques for artificial intelligence (AI) initiated generation of tokens with controls are provided. Systems and methods disclosed herein utilize cloud-based systems integrated with a virtual card platform to deliver controllable virtual card payment methods to a user device's secure element for in-personal or terminal payments. Systems and methods for management of virtual card numbers are also provided.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
Systems and methods for processing web platform source code to determine presence of one or more embedded digital product tools. In some aspects, the system is configured to receive navigation information associated with a web platform, extract source code of a first page, determine a hosting configuration template matching the web platform, determine navigation information for a plurality of search result pages of the web platform, extract source code of a search result page from the plurality of search result pages, determine that at least one search string, of a plurality of search strings associated with the target digital product tool, is included in the source code of the search result page, identify a first provider of the target digital product tool based on the at least one search string, and generate for display an indication of the target digital product tool and the identified first provider.
A computer implemented method, system, and non-transitory computer-readable device that may be used in a remote deposit environment. Upon receiving a user request, based on interactions with the UI, the method implements an electronic deposit of a financial instrument by activating a camera on the client device to generate a live video stream of image data of a field of view of at least one camera, wherein the live video stream includes imagery of at least a portion of each side of the financial instrument. The method continues by extracting data fields based on the formation of image objects on one or more sides of the financial instrument from the live video stream of image data. An EFT conversion of extracted data fields may be processed during or subsequent to the extraction process. A message is sent from a payee to a payor requesting the EFT. Upon acceptance, an EFT to the payee occurs. Upon denial, the remote deposit process is completed.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
25.
Systems and methods for processing financial articles
A system may include a housing having an external aperture, a plurality of financial article handling units each configured to form an interface with the external aperture, processor(s), an image capture device, and a memory in communication with the processor(s) and storing instructions configured to cause the system to process financial articles. The system may cause the image capture device to capture a first machine-readable code including a request having a first amount and a first currency. Responsive to capturing the first machine-readable code, the system may determine a first financial article handling unit that corresponds to the first currency, position the plurality of financial article handling units such that the first financial article handling unit is in communication with the external aperture, and dispense the first amount of the first currency from the first financial article handling unit via the external aperture.
G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
G07F 19/00 - Complete banking systemsCoded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
A system and method for authentication a user attempting access to a service is disclosed herein. When a user attempts to gain access, a client associated with the user generates a unique authentication code that is stored at a callback server associated with the client. The user accesses an authentication server associated with the service and provides the authentication server with standard login credentials. The authentication server also obtains the authentication code from the user. If the authentication server successfully verifies the user's credentials, then the authentication server transmits a code validation request to the callback server to validate the authentication code. The callback server verifies that the received code matches a stored code and is current, and then issues a reply message to the authentication server. The authentication server grants or denies the user's access request based on the reply.
Systems and methods for validating interactions are disclosed. For example, a dynamic code may be displayed on a display device for capture by a user device by periodically causing a display of a different frame from a plurality of frames of the dynamic code, where only one of the plurality of frames of the dynamic code is capable of use for verification. A verification indication may be received from a computer system in response to the user device capturing and transmitting the one of the plurality of frames of the dynamic code to the computer system for the verification. An interaction may be enabled based on the verification indication.
G06K 1/12 - Methods or arrangements for marking the record carrier in digital fashion otherwise than by punching
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
Methods and systems disclosed herein describe tokenizing potentially sensitive data fields and distributing the tokenized data across various enclaves associated with multi-tiered security levels. A user may request to unmask the tokenized data. By auditing the tokenized data and the various enclaves, an authorized user may determine that the tokenized data has been properly classified or improperly misclassified. After confirming the classification of the tokenized data, the data may be decoded and provided in plaintext in its appropriate enclave or permanently deleted from all corresponding enclaves.
Systems, methods, and apparatuses are described for secure transfer of tokenized data from a sender to a recipient without disclosing tokenization schemas of either party. A computing device may receive a detokenization algorithm associated with a sender and tokenized data. The computing device may generate plain data by processing the first tokenized data using the detokenization algorithm. The computing device may clear memory, receive a tokenization algorithm associated with a recipient, and generate tokenized data by processing the plain data using the tokenization algorithm. The computing device may then send the tokenized data to the recipient.
Methods and systems are described herein for decomposing attention values into event components and time components. The attention values may be generated by a transformer model based on time series data. The decomposed attention values can be used to identify instances where the transformer model classified a request into a first class based on an attention value that is influenced by its respective time component more than a threshold amount. In some embodiments, one or more modifications to those attention values may be applied to the influence of the time component on the attention values. The transformer model may reclassify the request based on the modified attention values.
Systems and methods for a dynamic communication coordination system based on intelligent and personalized communications. For example, as opposed to a conventional routing system, where the router receives a communication and determines an intended recipient as defined by the communication, the system described herein receives a communication and processes the data in that communication using a standardizing relay. The standardizing relay may then determine where to send the communication.
Methods and systems for continuous update of a machine learning workflow. In some aspects, a system may be used to maintain and update workflows utilizing machine learning. The system receives a request for deploying a workflow including (i) the workflow and (ii) criteria for modification of a timeout interval for the workflow. The system may initialize the workflow by executing a batch processing task that consumes data from a data store and builds a model state for a model and may generate a parameter configured to dynamically modify based on specific conditions of the workflow based on the given criteria. The system may deploy the workflow by generating instances, each configured with the parameter. The system may modify a value of a corresponding parameter based on the specific conditions of the workflow. When a compute instance has met/exceeded the time value, the instance may be terminated.
In some embodiments, the present disclosure provides an exemplary method that may include steps of receiving a permission from a user of a plurality of users to utilize a particular service associated with a device; identifying a predetermined plurality of authentication rules associated with a profile of the primary user; determining a plurality of parameters associated with the device at a particular time period; comparing a set of controls associated with a current utilization of the service of the device to the plurality of parameters associated with the device; generating an API call based on a comparison of the set of controls to the plurality of parameters; generating a plurality of unique schema-specific identifiers based on a generated API call associated with the set of controls established by the primary user; and generating a provision utilizing the unique schema-specific identifier to perform a particular action associated with the device.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Systems and methods for continual, automated vulnerability mediation and validation for application development systems are disclosed herein. In some aspects, the system may receive a user input for creating a rebuild code set corresponding to a code sample. The system may store the rebuild code set and the code sample in a container. The system may receive a modification request to generate a modified code sample. The system may execute the rebuild code set on the modified code sample. The system may validate the container based on the modified code sample.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
35.
SYSTEMS AND METHODS FOR FACILITATING INGESTION OF ENCRYPTED COMMUNICATIONS RECEIVED ACROSS CLOUD COMPUTING NETWORKS
Systems and methods for a document management system that uses a routing logic for ingesting encrypted communications received across the cloud computing network. By allowing ingested communications to be encrypted, the document management system does not subject the communications to the aforementioned vulnerabilities. Furthermore, using its routing logic, the system enables the document management system to maintain its functionality.
Systems and methods are described for using generative artificial intelligence to automatically label training prompts for training a classification model. Interaction data comprising communications between clients and a chatbot may be used to identify a representative set of topics. Each communication can be assigned a label associated with one or more topics from the set of topics. First training data comprising the set of labels and one or more of the communications assigned to that label may be generated and used to train a generative artificial intelligence model to generate metadata comprising a description of each label from the set of labels. Second training data comprising a plurality of sample prompts, the set of labels, and the metadata; may be generated and used to train a classification model to autonomously label each of the plurality of sample prompts with one or more labels from the set of labels.
In some aspects, methods and systems are described for a zoom technique for displaying ordinal data in a data visualization. The system calculates a first domain for displaying first data in a first user interface, wherein the first domain is associated with a first scaling factor, wherein the first data comprises ranges of ordinal values. In response to detecting a scroll event, the system records a cursor position. Based on the scroll event, the system determines a second scaling factor and calculates a second domain based on the second scaling factor and the cursor position, wherein the second domain includes ordinal values selected from the first data. The system thus displays the second domain in the first user interface.
G06F 3/04845 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
Systems and methods facilitate automated e-commerce checkouts using artificial intelligence (AI). An AI component, implemented via a processor and memory, processes content originating from a merchant server and presented on a client device, where the content identifies a purchasable item. The AI component also processes user data reflecting historical behavior or preferences. Based on analyzing the content and user data, the AI component determines if a predefined trigger condition for offering automated checkout is met. If the condition is met, a selectable interface element representing an automated checkout option is presented via the client device. Upon receiving user selection of the element, the AI component performs an operation.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06F 3/04842 - Selection of displayed objects or displayed text elements
Techniques for artificial intelligence (AI) initiated generation of tokens with controls are provided. Systems and methods disclosed herein utilize cloud-based systems integrated with a virtual card platform to deliver controllable virtual card payment methods to a user device's secure element for in-personal or terminal payments. Systems and methods for management of virtual card numbers are also provided.
Disclosed herein are system, method, and computer readable medium embodiments for machine learning systems to process interactive communications between at least two participants. Speech and text within the interactive communications are analyzed using machine learning models to infer insights located within the interactive communications. The inferred insights are converted to descriptive text or audio and tagged to the interactive communication as graphics or audio whispers reflecting the insights added to the interactive communication.
Methods and systems for controlling users' access to data available on blockchains are described herein, comprising: determining a first right for a first user to first data; determining a location in a permissioned blockchain comprising the first data, the location being a first fork of the permissioned blockchain; determining a first privilege required to access the first fork; determining that the first user corresponds to a first cryptographic address; and assigning the first privilege to the first cryptographic address.
Systems, methods, and apparatuses are described for secure transfer of tokenized data from a sender to a recipient without disclosing tokenization schemas of either party. A computing device may receive a detokenization algorithm associated with a sender and tokenized data. The computing device may generate plain data by processing the first tokenized data using the detokenization algorithm. The computing device may clear memory, receive a tokenization algorithm associated with a recipient, and generate tokenized data by processing the plain data using the tokenization algorithm. The computing device may then send the tokenized data to the recipient.
Systems and methods facilitate automated e-commerce checkouts using artificial intelligence (Al). An Al component, implemented via a processor and memory, processes content originating from a merchant server and presented on a client device, where the content identifies a purchasable item. The Al component also processes user data reflecting historical behavior or preferences. Based on analyzing the content and user data, the Al component determines if a predefined trigger condition for offering automated checkout is met. If the condition is met, a selectable interface element representing an automated checkout option is presented via the client device. Upon receiving user selection of the element, the Al component performs an operation.
In order to facilitate dynamic graphing of entity networks based on activity, systems and methods include a processor receiving entity-specific data records and a plurality of entity-related activity records for a plurality of entities, where each entity-specific activity record includes activity data regarding at least one activity associated with an entity. The processor generates graph nodes for an entity activity graph based on the plurality of entity-specific data records, where each graph node of the plurality of graph nodes represents the particular entity and then generating an activity data structure, including the graph nodes and edges between the graph nodes, where the edges represent characteristics of the activities between graph nodes based on the entity-related activity record.
In some implementations, a data management system may obtain, via a data interlocutor, a set of data intended for inclusion in a database, wherein the set of data is associated with at least one data type, wherein the set of data comprises at least one data value. The data management system may generate, via the data interlocutor, a set of data entities based on the set of data and a set of security metadata associated with the set of data, wherein the set of data entities comprises a data entity associated with a data value of the at least one data value, the data entity comprising transaction authorization information associated with the data value. The data management system may output, via the data interlocutor, the set of data entities for inclusion in the database.
A device and method for processing data records to train a machine learning model and modify data records based on predictive scoring are disclosed. Historical data may be partitioned into a training set and a validation set, with dimensionality reduction applied to the training set to create a minimum feature set. The trained model may predict outcomes and generate predictive scores for data records. A device may modify data records by updating parameters based on the predictive scores and may monitor performance metrics associated with the model. Updated parameters and predictive scores may be stored in a secure repository and displayed via a user interface. Systems and non-transitory computer-readable media storing instructions for executing these operations may also be disclosed. These implementations may improve prediction accuracy, model efficiency, and data integrity, and may conserve computational resources by leveraging automated data processing workflows across multiple data partitions and feature sets.
A synthetic identity network for detecting synthetic identities may receive a first request for credit including one or more user attributes, compare the one or more user attributes to one or more stored user identities, create a new user identity, flag the new user identity as a potentially synthetic identity based on comparing the one or more user attributes to the one or more stored user identities, receive a second request for credit including or more second user attributes, compare the one or more second user attributes to the one or more user attributes associated with the potentially synthetic identity, prepare a notice including the potentially synthetic identity and a credit request identifier, and transmit the notice to one or more servers.
Methods, systems, and apparatuses are described herein for protecting sensitive data even when Transport Layer Security (TLS) communication sessions are compromised. A computing device may send, via a web browser plugin of a web browser application executing on the computing device and to one or more remote servers, a request for a server secret that comprises a device fingerprint, an identification of the web browser application, and an identification of the web browser plugin. The computing device may receive the server secret and a public certificate associated with the remote server. The computing device may establish, via the web browser application, a TLS session with the one or more remote servers. The computing device may generate a session key. The computing device may receive data comprising unencrypted data and encrypted data. The computing device may decrypt the encrypted data based on the session key.
A method, a system, and a computer program product for providing a secure interface for execution of transactions. An audio signal receiving device detects and establishes a near-field communication (NFC) exchange communication link with a first device. The receiving device receives one or more signals from the first device. Each signal is responsive to one or more transmissions sent to the first device by a transceiver coil of the receiving device. Based on a determined signal strength of signals, the receiving device determines a first position of the first device in relation to the receiving device and generates one or more prompts to reposition the first device in relation to the receiving device from the first position to one or more second positions. At least one second position corresponds to a maximum signal strength of signals. The receiving device then extracts information from the first device.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
Methods, systems, and apparatuses are described herein for management of a Domain Name System (DNS) system. The system comprises numerous improvements, many related to CNAME records of the DNS. A computing device may manage authentication for a DNS using shared authentication credentials of a first authentication framework. In this manner, a wide variety of users might authenticate themselves using a first framework and use authentication credentials for a second framework to access a DNS. The computing device may further protect DNS servers from Denial of Service (DOS) attacks by bifurcating read and write requests to a DNS to different servers, such that attacks on read requests do not affect all of the DNS. The computing device may further validate DNS requests using, for example, natural language processing to avoid typographical errors inadvertently creating DNS zones.
H04L 61/4511 - Network directoriesName-to-address mapping using standardised directoriesNetwork directoriesName-to-address mapping using standardised directory access protocols using domain name system [DNS]
53.
DNS Validation to Avoid Inadvertent Subzone Creation
Methods, systems, and apparatuses are described herein for management of a Domain Name System (DNS) system. The system comprises numerous improvements, many related to CNAME records of the DNS. A computing device may manage authentication for a DNS using shared authentication credentials of a first authentication framework. In this manner, a wide variety of users might authenticate themselves using a first framework and use authentication credentials for a second framework to access a DNS. The computing device may further protect DNS servers from Denial of Service (DoS) attacks by bifurcating read and write requests to a DNS to different servers, such that attacks on read requests do not affect all of the DNS. The computing device may further validate DNS requests using, for example, natural language processing to avoid typographical errors inadvertently creating DNS zones.
A computer implemented method, system, and non-transitory computer-readable device for conducting a document type assessment. In some embodiments, a machine learning (ML) model (e.g., an image classification ML model) may be trained to determine a document type and/or document type acceptability from an image. In some embodiments, the ML model may determine the document type and/or document type acceptability in real-time, within a current customer transaction period before the customer submits a deposit or access request or immediately after in response to the customer submitting the deposit or access request. In some embodiments, document types determined by the ML model may be used to track user patterns and perform a comparison of past user patterns with a current deposit or access attempt, improving security. In some embodiments, document types determined by the ML model may be used to customize validation protocols for images.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
The systems and methods disclosed herein enable authentication of communication processing systems based on user profile information. The system may receive a network request associated with a user. The system may determine a subset of the user profile information corresponding to previous communications. The system may generate a plurality of queries that request parameters associated with the previous communications. The system may transmit the plurality of queries to the communication processing system. The system may receive a plurality of responses from the communication processing system. The system may determine an authentication status based on whether parameters of the plurality of responses match parameters associated with the previous communications. The system may transmit a communication request to an administrator system.
A method, a system and a computer program product for expediting activation of contactless cards. An application on a computing device is executed upon the computing device detecting a contactless card to be located within a predetermined distance of the computing device. The computing device stores one or more computing device activation keys. The contactless card is an inactive contactless card. The stored computing device activation keys are accessed upon verifying one or more user authentication keys received in response to the executing. One or more contactless card activation keys are received. The contactless card activation keys are stored by the contactless card. The contactless card is activated based on a determination that the received contactless card activation keys match the stored computing device activation keys.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
57.
MOBILE APPLICATION TO EXPEDITE ACTIVATION OF CONTACTLESS CARDS
A method, a system and a computer program product for expediting activation of contactless cards. An application on a computing device is executed upon the computing device detecting a contactless card to be located within a predetermined distance of the computing device. The computing device stores one or more computing device activation keys. The contactless card is an inactive contactless card. The stored computing device activation keys are accessed upon verifying one or more user authentication keys received in response to the executing. One or more contactless card activation keys are received. The contactless card activation keys are stored by the contactless card. The contactless card is activated based on a determination that the received contactless card activation keys match the stored computing device activation keys.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
The present disclosure describes a generative artificial intelligence-based solution for generating a narrative associated with a transaction. The generative artificial intelligence described herein acquires one or more data points associated with the transaction. Based on these data points, the generative artificial intelligence may generate one or more narratives for the transaction. The one or more narratives may be provided to a user device for a user's review and/or approval. After a narrative is approved, the narrative may be stored. If the transaction is later contested, the narrative may be provided to user to refresh their recollection about the circumstances regarding the transaction.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
In some implementations, a device may obtain, via a notebook repository, one or more training notebooks that are associated with respective pipeline types of the container orchestration platform. The device may extract, from the one or more training notebooks, one or more executable code elements, to obtain one or more sets of executable code for respective training notebooks of the one or more training notebooks. The device may insert testing information into respective sets of executable code of the one or more sets of executable code to generate one or more test pipelines. The device may perform, via the container orchestration platform, one or more cluster tests using respective test pipelines from the one or more test pipelines. The device may provide, for display, result information indicating results of the one or more cluster tests.
The present disclosure describes a method and apparatus for an error remediation recommendation process based on multiple data sources. Aspects of the disclosure may provide for processing of a knowledgebase to identify error remediation recommendations, processing of a chat log to identify error remediation recommendations, identification of errors from log data, determination of a corresponding error remediation recommendation from the knowledgebase and/or the chat log, and causing display of output indicating a corresponding error remediation recommendation. Further aspects described may also provide for training of an artificial neural network to determine a corresponding error remediation recommendation. Further aspects described may also provide for a browser extension which scrapes the Document Object Model (DOM) of a web page to identify errors.
In some implementations, an analytics platform may process a data lineage configuration to identify one or more data sources storing one or more data sets associated with a data analytics use case and identify one or more data relations associated with the one or more data sets. The analytics platform may parse a source code template defining one or more functions to build a data mart and a data pipeline that enables the data analytics use case. The source code template may include one or more tokens to specify elements that define the one or more data sources, data sets, and data relations identified in the data lineage configuration. The analytics platform may automatically generate source code that is executable to build a data mart and a data pipeline to enable the data analytics use case based on the data lineage configuration and the source code template.
In some implementations, a device may receive a request to obtain a set of data attributes. The device may generate one or more hierarchical lists for respective data attributes included in the set of data attributes. The device may identify an anchor hierarchical list, from the one or more hierarchical lists, that is associated with a highest order among the one or more hierarchical lists. The device may generate a first query to a first data source indicated by a first data attribute in a top position of the anchor hierarchical list, wherein the first query requests a first one or more data attributes including the first data attribute and any other data attributes, associated with the first data source, that are in top positions of respective hierarchical lists of the one or more hierarchical lists. The device may transmit, to the first data source, the first query.
In some implementations, a server device may obtain an indication of an incoming call, associated with a user device, to the call center service. The server device may perform a lookup in a database for information associated with the user device, wherein the information indicates the authentication status of a user that is established via the user device. The server device may determine whether an amount of time that the information has been stored in the database is less than or equal to a time threshold. The server device may generate an authentication token for the incoming call based on the authentication status and based on the amount of time being less than or equal to the time threshold.
Various embodiments are directed to securely generating and managing passwords using a near-field communication (NFC) enabled contactless smart card. For example, a secure password may be generated by generating a random number via a random number generator of the contactless smart card and converting the random number to one or more human-readable characters. In another example, a secure cryptographic hash function of the contactless smart card may generate a hash output value, which may be converted to one or more human-readable characters. The human-readable characters may be used as the secure password or it may be transformed to add more layers of security and complexity.
G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
G06F 7/58 - Random or pseudo-random number generators
G06F 21/46 - Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
A method, a system, and a computer program product for providing a secure interface for execution of transactions. An audio signal receiving device detects and establishes a near-field communication (NFC) exchange communication link with a first device. The receiving device receives one or more signals from the first device. Each signal is responsive to one or more transmissions sent to the first device by a transceiver coil of the receiving device. Based on a determined signal strength of signals, the receiving device determines a first position of the first device in relation to the receiving device and generates one or more prompts to reposition the first device in relation to the receiving device from the first position to one or more second positions. At least one second position corresponds to a maximum signal strength of signals. The receiving device then extracts information from the first device.
G06Q 20/30 - Payment architectures, schemes or protocols characterised by the use of specific devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G07F 7/08 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card
A computer implemented method, system, and non-transitory computer-readable device for conducting a document type assessment. In some embodiments, a machine learning (ML) model (e.g., an image classification ML model) may be trained to determine a document type and/or document type acceptability from an image. In some embodiments, the ML model may determine the document type and/or document type acceptability in real-time, within a current customer transaction period before the customer submits a deposit or access request or immediately after in response to the customer submitting the deposit or access request. In some embodiments, document types determined by the ML model may be used to track user patterns and perform a comparison of past user patterns with a current deposit or access attempt, improving security. In some embodiments, document types determined by the ML model may be used to customize validation protocols for images.
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
Systems and methods for dynamically evaluating metadata consistency and data reliability in a data management system are disclosed herein. The system may retrieve first metadata and second metadata. The system may retrieve a metadata ruleset. Based on the metadata ruleset, the system may generate a first metadata consistency metric indicating a first measure of consistency. The system may determine to process each record of the first metadata as a batch. The system may generate a second metadata consistency metric indicating a second measure of consistency. The system may determine to process each record of the second metadata independently.
Methods, systems, and apparatuses are described herein for management of a Domain Name System (DNS) system. The system comprises numerous improvements, many related to CNAME records of the DNS. A computing device may manage authentication for a DNS using shared authentication credentials of a first authentication framework. In this manner, a wide variety of users might authenticate themselves using a first framework and use authentication credentials for a second framework to access a DNS. The computing device may further protect DNS servers from Denial of Service (DOS) attacks by bifurcating read and write requests to a DNS to different servers, such that attacks on read requests do not affect all of the DNS. The computing device may further validate DNS requests using, for example, natural language processing to avoid typographical errors inadvertently creating DNS zones.
In some implementations, a user device may receive a web page that includes content organized in a plurality of containers of a document object model (DOM) associated with the web page. The user device may render, in connection with an initial page load, the web page for presentation in a user interface. The user device may monitor interaction data relating to a use of the user interface. The user device may identify, in accordance with the interaction data, a container of the plurality of containers of the DOM that contains original content that has been viewed. The user device may load, asynchronously to the initial page load, replacement content into the container of the DOM to replace the original content with the replacement content for presentation in the user interface.
In some implementations, a system may receive, at a first type of data structure, a set of data elements of a data stream. The system may forward the set of data elements to a second type of data structure and a third type of data structure. The system may receive, based on forwarding the set of data elements to the second type of data structure and the third type of data structure, a query for machine learning training data. The system may transmit, to a computational element associated with a machine learning processing platform, information relating to the set of data elements to train a machine learning model, wherein the information includes timing information relating to a set of instances of each data element of the set of data elements.
Aspects described herein may automatically generate threat models using large language model (LLM). A computing device may send, to LLM, one or more software modules associated with a computing system. The computing device may request the LLM to generate a threat model of the computing system. The computing device may receive, from the LLM, a first output based on the first prompt comprising first information for a first version of the threat model and a penetration test script for the computing system. The computing device may input, to the LLM, the result of the penetration test together with the LLM's previous output, to facilitate the LLM to generate a refined version of the threat model.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Aspects described herein may automatically generate adversarial examples configured to train a machine learning model. A computing device may receive a request to generate a plurality of adversarial examples for a first machine learning model. The plurality of adversarial examples may be configured to be input to the first machine learning model and cause misclassification by the first machine learning model. The plurality of adversarial examples may be generated using a second machine learning model modified from a ground truth example. The computing device may send, to the first machine learning model, the plurality of adversarial examples. The first machine learning model may be configured to be adjusted based on a comparison between a respective output classification for each of the plurality of adversarial examples; and data indicating a correct classification for each of the plurality of adversarial examples.
Systems and methods for augmenting feature selection for a first machine learning model using feature interactions from a preliminary feature set used for a second model. In some aspects, the system receives a first candidate set of features to train a machine learning model. The system also receives a precursor feature set used to train a precursor machine learning model in preparation for the machine learning model. Using the first candidate set of features and the precursor feature set, the system trains an algorithm to produce an interaction matrix, wherein the interaction matrix indicates an explanative power of each feature when combined with other features. Based on the interaction matrix, the system generates a subset of features from the first candidate set of features and the precursor feature set using a selection program. The system thus trains the machine learning model to use the subset of features as input.
A technique for correlating responses to user-specific data may include obtaining user-specific data having an item parameter and an interaction parameter set by the user; generating a user-specific score based on prequalification and interaction data; generating a classification of the user based on the score; identifying entities providing an item corresponding to the parameter; transmitting at least a portion of the user-specific data and the classification of the user to the plurality of entities; receiving responses from the plurality of entities, each response including parameters for a proposed interaction with the user in which at least one parameter is responsive to the user-specific data; determining an optimal response by inputting the user-specific data and the responses into a machine-learning model trained on historical interactions between users and entities; and causing a user interface of a user device to display a visual indication of the optimal response.
In some implementations, a data converter may initiate a plurality of worker nodes associated with a plurality of partitions. The data converter may query, for each worker node, a database storing the data stream. The data converter may receive, at each worker node, a portion of the data stream associated with one or more partitions, in the plurality of partitions, corresponding to the worker node. The data converter may convert the data stream into legacy format versions and upload a plurality of files. Each file in the plurality of files may encode a portion of the legacy format versions. The data converter may upload a done file based on uploading the plurality of files.
The present disclosure describes a method and apparatus for the modularization, management, and maintenance of extract, transform, and load (ETL) operations. Aspects of the disclosure may provide for a management module from which to initialize operations for each stage of an ETL operation, manage configuration parameters for each stage of an ETL operation, and coordinate order of execution of each stage in an ETL operation. Further aspects described may include methods for validating configuration parameters before executing an ETL operation, logging status updates during an ETL operation, and logging completion times of each stage within an ETL operation. Further aspects described may also include interfacing with a third-party data processing or ETL framework to realize specific advantages of the third-party framework for an ETL operation while maintaining the modularization and management benefits described in the disclosure.
A technique for correlating responses to user-specific data may include obtaining user-specific data having an item parameter and an interaction parameter set by the user; generating a user-specific score based on prequalification and interaction data; generating a classification of the user based on the score; identifying entities providing an item corresponding to the parameter; transmitting at least a portion of the user-specific data and the classification of the user to the plurality of entities; receiving responses from the plurality of entities, each response including parameters for a proposed interaction with the user in which at least one parameter is responsive to the user-specific data; determining an optimal response by inputting the user-specific data and the responses into a machine-learning model trained on historical interactions between users and entities; and causing a user interface of a user device to display a visual indication of the optimal response.
Various embodiments for contextual tapping engines. For example, an application executing on a computing device may authenticate credentials associated with an account and detect a tap of a contactless card to the computing device. The application may receive, from a communications interface of the contactless card, action data used to determine an action associated with the tap of the contactless card to the computing device. The application may determine a context of the application based on a current output of the application. The application may determine, based on the action data, the determined context, and data associated with the account, a first action associated with the tap of the contactless card to the computing device, the first action associated with at least one of the application and an operating system (OS). The application may initiate performance of the first action based on the tap of the contactless card.
G07F 7/10 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card together with a coded signal
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
G07F 7/08 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card
79.
DISTRIBUTED DATABASE WITH INTER-RELATED RECORDS RELATING TO A VEHICLE
In some implementations, a device may retrieve information relating to a vehicle in a vehicle exchange, where the information relating to the vehicle is in a distributed database that is particular to the vehicle, and where the distributed database includes a plurality of inter-related records relating to the vehicle. The device may receive, from a user device, an indication of an exchange amount for the vehicle. The device may cause, based on the indication, a smart contract to be added to the distributed database, the smart contract indicating the exchange amount.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
In some implementations, a device may receive, from one or more data sources, information indicating a plurality of data sets, where the plurality of data sets indicate information associated with respective physical locations or online locations. The device may identify a data set, from the plurality of data sets, that indicates information associated with an online location, where the information includes at least one of an entity name, an address, a phone number, a uniform resource locator, an entity identifier, or metadata. The device may parse the data set to identify information for a set of features. The device may analyze the information for the set of features to determine a brand associated with the online location. The device may pair the online location with the brand in the database such that the online location is linked with a first physical location of the brand in the database.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
81.
METHODS AND SYSTEMS FOR PARALLEL PROCESSING OF BATCH COMMUNICATIONS DURING DATA VALIDATION
Methods and systems for parallel processing of batch communications during data validation using a plurality of independent processing streams. For example, the system may receive a plurality of communications for batch processing during a predetermined time period. The system may process, with a batch configuration file, a first alphanumeric data string of a first communication of the plurality of communications. The system may process, with the batch configuration file, a second alphanumeric data string of a second communication of the plurality of communications. The system may direct the first communication to a first micro-batch for processing within the predetermined time period based on the first metadata tag, wherein the first micro-batch is processed using a first validation and enrichment protocol and a first micro-batch configuration file, wherein the first validation and enrichment protocol and the first micro-batch configuration file are specific to the first source.
Provided herein are system, apparatus, device, method and/or computer program product embodiments, and/or combinations and sub-combinations thereof for identifying a network issue in a cloud computing environment. In some embodiments, an analytics engine receives a stream of data packets being transmitted from an application to a cloud computing resource. The analytics engine inspects each data packet the stream of data packets and identifies a failure of transmission of a data packet of the stream of data packets. The analytics engine maps an occurrence of the failure of the transmission of the data packet on a graph of a cloud computing environment. The analytics engine identifies a network issue for an element associated with the cloud computing resource, inside the cloud computing environment, based on the mapping and independent of visibility of the stream of data packets inside the cloud computing environment.
Systems and methods for generating deployment databases based on preloaded data from heterogeneous sources are disclosed herein. The system may receive first structured data. The system may extract first data of a first format and second data of a second format. The system may determine that the first data has a first update rate. The system may determine that the second data has a second update rate. The system may preload the first data by retrieving a first identifier and by storing a first preloaded representation of a first parent dataset for the first data. The system may receive a first request for a deployment database. The system, based on the first request, may retrieve the first preloaded representation. The system may generate the deployment database.
In some embodiments, reducing usage of cache memory in connection with user queries may be facilitated. In some embodiments, in connection with a first query, (i) a first set of results received during a user session and (ii) a first output generated from the first set of results are stored in a session cache associated with the user session. In response to determining that a second query parameter of a second query corresponds to a first query parameter of the first query but fails to satisfy a match criterion: a cache lookup is performed on the session cache to retrieve a matching result subset of the first set of results, in lieu of retrieving the first output generated from the first set of results, where the matching result subset does not include a result corresponding to the first query parameter. A second output is then generated.
A computer implemented method, system, and non-transitory computer-readable device for a digital document verification process. In some embodiments, a split deposit tool may be provided in a mobile banking application to allow a customer to split a deposit and schedule deposit dates for various portions of the split deposit. In some embodiments, the split deposit tool may be provided in response to a determination that an amount of a check in an image exceeds a remaining remote deposit limit. In some embodiments, the amount may be determined using realtime optical character recognition (OCR), for example, active OCR performed on a live stream of check imagery.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
86.
SYSTEMS AND METHODS FOR VALIDATING AND SECURING TRANSACTIONS
Systems and methods for validating and securing transactions are provided. A registration process can include receiving, via a short-range communication antenna of a mobile device, encrypted data from a contactless card, successfully decrypting the encrypted data to authenticate the contactless card, receiving, via the mobile device, first biometric data, and storing the first biometric data in a biometric profile of a customer account associated with the contactless card. An authorization process can include transmitting a solicitation message to the mobile device responsive to receiving a request to authorize a digital transaction in connection with the customer account, receiving, via the mobile device, second biometric data responsive to the solicitation message, comparing the second biometric data with the biometric profile, authorizing the digital transaction when the second biometric data matches the biometric profile, and denying the digital transaction when the second biometric data fails to match the biometric profile.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
87.
SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS
Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key. Example embodiments of systems and methods can be used to provide further authentication and added levels of security for transactions.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
A processor may receive at least one test application corresponding to an application profile. The processor may simulate the at least one test application in a non-production environment for a plurality of infrastructure configurations to generate a plurality of test performance results. The processor may evaluate the plurality of test performance results to identify an optimal infrastructure configuration from among the plurality of infrastructure configurations for the application profile. The processor may apply the optimal infrastructure configuration to an application corresponding to the application profile that is deployed in a production environment.
Methods and systems are described herein for leveraging artificial intelligence to sanitize sensitive data and prevent the data from leaving the mobile device and/or be exposed to unauthorized third parties. More specifically, methods and systems are described for a novel and unconventional architecture for a data sanitization application, a novel and unconventional delivery format for the data sanitization model, and a novel and unconventional output format of the data sanitization model.
For multifactor authentication, a transaction device can receive encrypted data from a contactless card within a communication range of a short-range communication antenna, communicate the encrypted data to an authenticating device, solicit a user PIN in response to authentication of the encrypted data by the authenticating device, receive an input PIN, communicate the input PIN to a separate device storing a record PIN for the contactless card, and authorize a transaction initiated in connection with the contactless card in response to matching of the input PIN with the record PIN by the separate device. The input PIN can be received from the contactless card itself or a user interface, and the separate device can include the authenticating device or the contactless card itself. In different embodiments, the input PIN or the record PIN can include an EMV PIN stored in an EMV applet on the contactless card.
G07F 7/10 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card together with a coded signal
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
91.
Data Certification Process for Cloud Database Platform
Methods, systems, and apparatuses for providing access to records of a database stored on a database server in a cloud database platform are described herein. A data sharing platform may determine a shared view definition for access to the database. The data sharing platform may determine rules that specify criteria that limit access to the records stored by the database. The one or more first rules may be received via a user interface. The data sharing platform may perform, based on the rules, a data access certification process on the records stored by the database to generate a table of certification results. The data sharing platform may generate, based on the table of certification results, and without modifying the records stored by the database, a limited consumer view definition. Based on updates to the records, a new limited consumer view definition may be generated.
Methods, systems, and apparatuses for generating notifications corresponding to queries submitted for execution by virtual warehouses are described herein. A request to execute a query may be received. An execution plan, for the query, may be identified. A processing complexity for the query may be predicted based on the query and the execution plan. A notification may be generated based on the processing complexity meeting an alert threshold. A user device may display the notification. A response to the notification comprising a selection of a first virtual warehouse, of a plurality of virtual warehouses, to execute the query may be received.
In some embodiments, the present disclosure provides an exemplary method that may include steps of receiving a permission indicator from a computing device of a user identifying a permission by the user to detect a plurality of interaction sessions; registering the computing device of the user as a token for subsequent authentication of the user; instructing the computing device to monitor a plurality of activities associated with the detected plurality of interaction sessions initiated; receiving an indication of a current interaction session being initiated at a current period of time to a particular data point stored with the prestored database of token data; dynamically determining a risk metric associated with the computing device; automatically authenticating the computing device associated with the user; transmitting the current interaction session to a queue; and automatically generating a script for the at least one agent.
In some implementations, a device may configure, for a component that uses a platform, a logging library that is associated with a logging framework configured for the platform, wherein the logging library is configured to obfuscate the sensitive data. The device may obtain, for the component, component data via the platform, wherein the component data is associated with one or more operations of the component. The device may generate, via the logging framework, log data that includes obfuscated data generated via the logging library based on obtaining the component data, wherein the obfuscated data obfuscates any sensitive information in the log data. The device may perform, via the component, one or more actions using the log data.
In some implementations, a web server may receive a request associated with a URL that includes an indication of a subset of fields, of a set of fields, and an indication of a user. The web server may generate a registration form that includes the subset of fields and omits remaining fields in the set of fields. The web server may transmit, to a data source, a request for a set of preferences associated with the user and may receive, in response to the request, an indication of the set of preferences. The web server may pre-populate at least one field in the registration form based on the set of preferences, to generate a modified registration form. The web server may transmit, to a user device, the modified registration form and may receive, from the user device, a data structure encoding a completed version of the modified registration form.
H04L 51/07 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
In some implementations, a user device may transmit, to a quality checker, an identifier of the data stream. The data stream may include a sequence of characters. The user device may receive, from the quality checker, a report indicating whether the data stream is valid. The user device may detect an interaction based on the report. The user device may transmit, to the quality checker, a command to approve or reject the data stream based on the interaction.
In some implementations, a zero trust system may deploy one or more policies for controlling access to a service associated with a first machine entity. The zero trust system may issue a machine identity that uniquely identifies a workload associated with a second machine entity. The zero trust system may receive telemetry data related to interactions between the service associated with the first machine entity and the machine identity that uniquely identifies the workload associated with the second machine entity. The zero trust system may use a machine learning model to detect a security threat associated with the first machine entity and/or the second machine entity according to the telemetry data. The zero trust system may update the one or more policies to remediate the security threat. The zero trust system may provide the one or more updated policies to the first machine entity.
Systems and methods for validating and securing transactions are provided. A registration process can include receiving, via a short-range communication antenna of a mobile device, encrypted data from a contactless card, successfully decrypting the encrypted data to authenticate the contactless card, receiving, via the mobile device, first biometric data, and storing the first biometric data in a biometric profile of a customer account associated with the contactless card. An authorization process can include transmitting a solicitation message to the mobile device responsive to receiving a request to authorize a digital transaction in connection with the customer account, receiving, via the mobile device, second biometric data responsive to the solicitation message, comparing the second biometric data with the biometric profile, authorizing the digital transaction when the second biometric data matches the biometric profile, and denying the digital transaction when the second biometric data fails to match the biometric profile.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
In some implementations, a system may configure a set of compliance requirements for a secure communication service. The system may configure a key rotation component and a key fallback component. The system may store a key, generated by the key rotation component, using a key store. The system may periodically update, using the key rotation component, the key in the key store in accordance with the set of compliance requirements. The system may maintain, in connection with periodically updating the key, at least one fallback key using the key fallback component. The system may receive a request for a communication using the key. The system may determine whether the key is a valid current key or a valid fallback key. The system may communicate using the key based on determining whether the key is the valid current key or the valid fallback key.
H04L 9/16 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
Disclosed herein are system, apparatus, device, method and/or computer program product embodiments for determining, in a remote deposit system, whether a deposit attempt is illegitimate (e.g. fraudulent). Whether the deposit attempt is illegitimate may be assessed based on one or more of the following processes: comparing location data to a location parameter determined from past deposits, comparing an image capture location with a deposit location, and analyzing image-of-image characteristics obtained through image processing to identify whether an image associated with the deposit attempt is an image of an image. In some embodiments, a remote deposit status related to acceptance of the deposit attempt may be provided in real-time.