A computerized method for integrating a conversational agent with a payment application programming interface (API) is provided. A large language model (LLM) custom agent receives a request to book a travel itinerary. The user is prompted, in a user interface of the conversational agent, to authorize one-time permission to access a digital wallet associated with the user. Upon receiving the one-time permission to access the digital wallet, the travel itinerary comprising the plurality of bookings is provided to the user. If a confirmation to book the travel itinerary is received, the LLM custom agent books, using the payment API and the digital wallet associated with the user, the provided travel itinerary comprising the plurality of bookings. A confirmation of booking the provided travel itinerary is provided in the user interface of the conversational agent.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
A method can include providing a bill detail for a bank-as-biller account within a graphical user interface of a banking application, wherein the bank-as-biller account has a biller identifier for electronic payment and an open banking identifier; establishing a connection with the bank-as-biller account using the open banking identifier; receiving a request to view transaction detail history for the bank-as-biller account; and in response to the request to view transaction detail history for the bank-as-biller account: calling a first open banking application programming interface (API) over the established connection with the bank-as-biller account to obtain the transaction detail history for the bank-as-biller account; receiving the transaction detail history; and generating a transaction history view using the received transaction detail history. The method can further include, after performing payment operations, confirming payment to the bank-as-biller account is reflected in a balance for the bank-as-biller account using the open banking identifier.
An artificial intelligence (AI)-based prediction recommender system is provided. The system includes a processor configured to generate a first matrix using a large language merchant transaction model including transaction data associated with a first plurality of users; generate a second matrix using a large language product transaction model including transaction data associated with a second plurality of users; generate a third matrix including transaction data associated with a third plurality of users; generate a preference vector associated with at least one accountholder wherein the preference vector representing historical purchases initiated by the accountholder with a second plurality of merchants; iteratively calculate a propagated activation vector by mathematically combining the first matrix, the second matrix, the third matrix and the preference vector; and output a recommendation associated with the at least one accountholder using the propagated activation vector.
A system and method for reducing financial fraud by suspending access to financial accounts due to a user's incapacitation. A fall detection alert is received from a device worn or carried by the user, and first status values are recorded. After a pre-established period of time, second status values are recorded, and the first and second status values are compared. An incapacitation of the user is inferred if the second status values are within a pre-established range of the first status values, and access to the accounts is suspended for at least some purchases based on this inferred incapacitation. Prior to suspending access, a notification may be sent to the user to allow the user to act to avoid the suspension. Access to the accounts may not be suspended for medical or other relevant purchases. Subsequent to suspending access, the user may request and access may be reinstated.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
5.
SYSTEM AND METHOD FOR VERIFYING SIGNATURE WHEN AUTHENTICATING CARD-BASED TRANSACTION
A system and method for verifying a signature in real-time when authenticating a card-based transaction. Initially, a digital reference signature is captured on a mobile device, sent in hashed form to a rules engine, and evaluated for features such as length, time, orientation, area, and pressure changes. Subsequently, a digital transaction signature is captured on a POS terminal, sent in hashed form to the rules engine via an acquirer, and evaluated for the same features. The rules engine compares the features of the signatures. If the transaction signature is verified, the rules engine sends an authentication token to the acquirer, and the acquirer sends the token and an authorization request to an issuer. If not, the acquirer sends a denial message to the merchant. If the power level of the POS terminal is insufficient to properly capture the transaction signature for effective evaluation, then an alternative authentication method is used.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
6.
SYSTEMS AND METHODS FOR PASSIVE MULTI-FACTOR AUTHENTICATION OF DEVICE USERS
A passive Multi-Factor Authentication (MFA) system includes a passive MFA server that receives, from a user computing device, passive biometrics data and device data collected during a current session on a remote site; submits the passive biometrics data to a user profile model, and in response receives a user authentication confidence score; and submits the device data to a device profile model, and in response receives a device authentication confidence score. The passive MFA server is also configured to receive a user authentication request for a current payment transaction associated with the current session on the remote site, and transmit the user authentication confidence score and the device authentication confidence score to an Access Control Server (ACS) configured to determine that the scores satisfy a predefined threshold for passively authenticating a user of the user computing device during the current session, without conducting an active authentication process with the user.
A computerized method for integrating a conversational agent with a payment application programming interface (API) is provided. A large language model (LLM) custom agent receives a request to book a travel itinerary. The user is prompted, in a user interface of the conversational agent, to authorize one-time permission to access a digital wallet associated with the user. Upon receiving the one-time permission to access the digital wallet, the travel itinerary comprising the plurality of bookings is provided to the user. If a confirmation to book the travel itinerary is received, the LLM custom agent books, using the payment API and the digital wallet associated with the user, the provided travel itinerary comprising the plurality of bookings. A confirmation of booking the provided travel itinerary is provided in the user interface of the conversational agent.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 10/02 - Reservations, e.g. for tickets, services or events
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/14 - Payment architectures specially adapted for billing systems
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
8.
SYSTEMS AND METHODS FOR TOKENIZATION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) AND PERSONAL HEALTH INFORMATION (PHI)
Described herein is a system for enabling tokenized access to sensitive data. In particular, rather than providing data directly to a service provider, a data subject who is also a subject and/or an originating source of the sensitive data, may request a token, to be securely provided to the service provider, that enables the service provider to securely access selected sensitive data. The service provider uses the token to access selected data that is accurately stored and accurately transmitted to the service provider. If a service provider's management application is an integrated system, the service provider's management application is automatically populated with the selected data. In a service provider's management application is a non-integrated system, the service provider, the service provider is able to access to the selected data and may copy-to-clipboard and paste the data copied-to-clipboard into the service provider's management application.
G06F 21/46 - Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
9.
METHODS AND SYSTEMS FOR MANAGING PROGRAMMABLE CURRENCY-BASED TRANSACTIONS THROUGH NESTED SMART CONTRACT-BASED WALLETS
Methods and systems for managing programmable currency-based transactions through nested smart contract-based wallets are disclosed. Method performed by a server system includes receiving fund transfer of a digital currency associated with a smart contract including a set of predefined instructions from a first wallet to a second wallet. Method includes determining a transaction category of the digital currency based on the set of predefined instructions. Transaction category indicates purpose of the fund transfer as per the smart contract. Method includes generating and depositing the digital currency to new sub-wallet(s) associated with the second wallet based on the transaction category of the digital currency. Each of the new sub-wallet(s) is eligible to hold the digital currency for a specific transaction category. Alternatively, the method includes depositing the digital currency to preexisting sub-wallet(s). Each of the preexisting sub-wallet(s) is eligible to hold the digital currency for the specific transaction category.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
10.
AUTOMATED PERFORMANCE TESTING IN A CONTAINERIZED ENVIRONMENT
The disclosure relates to systems and methods for automated performance testing in a containerized environment. For example, a system may invoke one or more PTSs (PTSs) that each manage a respective type of performance test, such as a load test, a stress test, and a soak test. Each PTS may instantiate one or more dynamic clusters in a container to execute performance test scripts that execute operations to conduct the performance test. The PTS may estimate a testing capacity of each dynamic cluster so that the load during testing does not exceed those limits. The dynamic clusters may perform client-side load balancing that approximates real-world load profiles to more accurately simulate real-world loads based on user behaviors that would occur throughout a test session. The system may use logging and metrics from a diverse set of services that monitor target systems during the automated performance test.
Methods and systems for managing programmable currency-based transactions through nested smart contract-based wallets are disclosed. Method performed by a server system includes receiving fund transfer of a digital currency associated with a smart contract including a set of predefined instructions from a first wallet to a second wallet. Method includes determining a transaction category of the digital currency based on the set of predefined instructions. Transaction category indicates purpose of the fund transfer as per the smart contract. Method includes generating and depositing the digital currency to new sub-wallet(s) associated with the second wallet based on the transaction category of the digital currency. Each of the new sub-wallet(s) is eligible to hold the digital currency for a specific transaction category. Alternatively, the method includes depositing the digital currency to preexisting sub-wallet(s). Each of the preexisting sub-wallet(s) is eligible to hold the digital currency for the specific transaction category.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
36 - Financial, insurance and real estate services
Goods & Services
Financial services, namely, credit and debit card transaction and payment processing services, payment verification services, credit and debit payment card authorization, payment transaction clearance and debt settlement services between financial institutions, switching services in the nature of electronic funds transfer for credit cards, debit cards, charge cards and prepaid cards offered through cards with stored value; Financial services, namely, credit card, debit card, charge card and prepaid card payment transaction authorization and debt settlement services; credit, debit, charge and prepaid card transaction processing services; automated teller machine services, namely, cash disbursement via automated teller machines; ATM banking services, namely, processing services for financial transactions by cardholders via automatic teller machines; financial merchant services, namely, the provision of contactless mobile payment transaction processing through merchants at retail, online and wholesale locations; financial consulting services regarding payment solutions, banking, credit card, debit card and payment card; information, advisory and consultancy services relating to all the aforesaid services
36 - Financial, insurance and real estate services
Goods & Services
Financial services, namely, credit and debit card transaction and payment processing services, payment verification services, credit and debit payment card authorization, payment transaction clearance and debt settlement services between financial institutions, switching services in the nature of electronic funds transfer for credit cards, debit cards, charge cards and prepaid cards offered through cards with stored value; Financial services, namely, credit card, debit card, charge card and prepaid card payment transaction authorization and debt settlement services; credit, debit, charge and prepaid card transaction processing services; automated teller machine services, namely, cash disbursement via automated teller machines; ATM banking services, namely, processing services for financial transactions by cardholders via automatic teller machines; financial merchant services, namely, the provision of contactless mobile payment transaction processing through merchants at retail, online and wholesale locations; financial consulting services regarding payment solutions, banking, credit card, debit card and payment card; information, advisory and consultancy services relating to all the aforesaid services
36 - Financial, insurance and real estate services
Goods & Services
Financial services, namely, credit and debit card transaction and payment processing services, payment verification services, credit and debit payment card authorization, payment transaction clearance and debt settlement services between financial institutions, switching services in the nature of electronic funds transfer for credit cards, debit cards, charge cards and prepaid cards offered through cards with stored value; Financial services, namely, credit card, debit card, charge card and prepaid card payment transaction authorization and debt settlement services; credit, debit, charge and prepaid card transaction processing services; automated teller machine services, namely, cash disbursement via automated teller machines; ATM banking services, namely, processing services for financial transactions by cardholders via automatic teller machines; financial merchant services, namely, the provision of contactless mobile payment transaction processing through merchants at retail, online and wholesale locations; financial consulting services regarding payment solutions, banking, credit card, debit card and payment card; information, advisory and consultancy services relating to all the aforesaid services
36 - Financial, insurance and real estate services
Goods & Services
Financial services, namely, credit card, debit card, charge card and prepaid card payment transaction authorization and debt settlement services; credit, debit, charge and prepaid card transaction processing services; automated teller machine services, namely, cash disbursement via automated teller machines; ATM banking services, namely, processing services for financial transactions by cardholders via automatic teller machines; financial merchant services, namely, the provision of contactless mobile payment transaction processing through merchants at retail, online and wholesale locations; financial consulting services regarding payment solutions, banking, credit card, debit card and payment card; information, advisory and consultancy services relating to all the aforesaid services; Financial services, namely, credit and debit card transaction and payment processing services, payment verification services, credit and debit payment card authorization, payment transaction clearance and debt settlement services between financial institutions, switching services in the nature of electronic funds transfer for credit cards, debit cards, charge cards and prepaid cards offered through cards with stored value
36 - Financial, insurance and real estate services
Goods & Services
Financial services, namely, credit and debit card transaction and payment processing services, payment verification services, credit and debit payment card authorization, payment transaction clearance and debt settlement services between financial institutions, switching services in the nature of electronic funds transfer for credit cards, debit cards, charge cards and prepaid cards offered through cards with stored value; Financial services, namely, credit card, debit card, charge card and prepaid card payment transaction authorization and debt settlement services; credit, debit, charge and prepaid card transaction processing services; automated teller machine services, namely, cash disbursement via automated teller machines; ATM banking services, namely, processing services for financial transactions by cardholders via automatic teller machines; financial merchant services, namely, the provision of contactless mobile payment transaction processing through merchants at retail, online and wholesale locations; financial consulting services regarding payment solutions, banking, credit card, debit card and payment card; information, advisory and consultancy services relating to all the aforesaid services
36 - Financial, insurance and real estate services
Goods & Services
Financial services, namely, credit card, debit card, charge card and prepaid card payment transaction authorization and debt settlement services; credit, debit, charge and prepaid card transaction processing services; automated teller machine services, namely, cash disbursement via automated teller machines; ATM banking services, namely, processing services for financial transactions by cardholders via automatic teller machines; financial merchant services, namely, the provision of contactless mobile payment transaction processing through merchants at retail, online and wholesale locations; financial consulting services regarding payment solutions, banking, credit card, debit card and payment card; information, advisory and consultancy services relating to all the aforesaid services; Financial services, namely, credit and debit card transaction and payment processing services, payment verification services, credit and debit payment card authorization, payment transaction clearance and debt settlement services between financial institutions, switching services in the nature of electronic funds transfer for credit cards, debit cards, charge cards and prepaid cards offered through cards with stored value
36 - Financial, insurance and real estate services
Goods & Services
Financial services, namely, credit and debit card transaction and payment processing services, payment verification services, credit and debit payment card authorization, payment transaction clearance and debt settlement services between financial institutions, switching services in the nature of electronic funds transfer for credit cards, debit cards, charge cards and prepaid cards offered through cards with stored value; Financial services, namely, credit card, debit card, charge card and prepaid card payment transaction authorization and debt settlement services; credit, debit, charge and prepaid card transaction processing services; automated teller machine services, namely, cash disbursement via automated teller machines; ATM banking services, namely, processing services for financial transactions by cardholders via automatic teller machines; financial merchant services, namely, the provision of contactless mobile payment transaction processing through merchants at retail, online and wholesale locations; financial consulting services regarding payment solutions, banking, credit card, debit card and payment card; information, advisory and consultancy services relating to all the aforesaid services
19.
SYSTEMS AND METHODS FOR USE IN POINTING OF DATASETS
Systems and methods are provided for pointing associated with datasets. One example method comprises loading data to a first dataset and accessing, by one or more objects of a platform, data from the first dataset, via a connector including an intermediate dataset and extraction, transformation, and load (ETL) process or a dataset view of the platform, where each of the ETL process and the dataset view includes a first dataset pointer specific to the first dataset. The example method also includes, in response to an update requirement: loading data, which is consistent with the update, to a duplicate dataset, and after the duplicate dataset is complete, changing the first dataset pointer in the ETL of the intermediate dataset or the dataset view, to a second dataset pointer specific to the duplicate dataset.
An access mapping computing device is configured to build an identification database storing data records, each data record including (i) a verified device identifier identifying a corresponding client computing device, the verified device identifier including tokenized device data of the corresponding client computing device, and (ii) an access profile associated with the verified device identifier and with at least one previous access instance of the corresponding client computing device. The access mapping computing device is further configured to: receive, during a current access instance, device data associated with a candidate client computing device accessing or attempting access to computing resources of a computing network, tokenize the device data to generate a candidate device identifier for the candidate client computing device, query the identification database with the candidate device identifier, and, in response to a successful query, return the verified device identifier retrieved from the identification database.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
There is provided a computer implemented method for training and validating a machine learning model. The method comprises receiving a dataset (111) comprising multiple datapoints, wherein each datapoint has associated with it one or more features, determining a noise level of each datapoint of the dataset (111), and categorising each datapoint of the dataset (111) into one of a plurality of data subsets (113-123), said categorising such that each data subset (113-123) comprises datapoints having a specific range of noise level, wherein the specific range of noise level is different for each subset (113-123). The method further comprises training a plurality of machine learning models (125-135), each machine learning model of the plurality of machine learning models (125-135) is trained on a specific one of the data subsets (113-123), and validating an output of each of the trained plurality of machine learning models (125-135) to determine a performance of the trained machine learning models (125-135) through comparing the output to a predetermined value.
An access mapping computing device is configured to build an identification database storing data records, each data record including (i) a verified device identifier identifying a corresponding client computing device, the verified device identifier including tokenized device data of the corresponding client computing device, and (ii) an access profile associated with the verified device identifier and with at least one previous access instance of the corresponding client computing device. The access mapping computing device is further configured to: receive, during a current access instance, device data associated with a candidate client computing device accessing or attempting access to computing resources of a computing network, tokenize the device data to generate a candidate device identifier for the candidate client computing device, query the identification database with the candidate device identifier, and, in response to a successful query, return the verified device identifier retrieved from the identification database.
Methods and systems are provided for predicting reward liability data of reward programs. A method includes accessing, by a server system, historical reward related data associated with one or more reward programs administered by a reward program provider of reward program providers. The historical reward related data includes past redeemed reward points for each reward program aggregated on a particular time basis. Method includes identifying first seasonality patterns and second seasonality patterns associated with the historical reward related data. Method includes training a reward liability prediction model based on first and second seasonality patterns, wherein the trained time-series prediction model is configured to predict future reward liability data associated with the one or more reward programs. Upon training the model, the method includes modifying reward rules associated with the one or more reward programs based on predicted future reward liability data and one or more reward liability criteria.
A modelling platform including at least one processor in communication with a memory device and a payment processor is provided. The at least one processor is configured to retrieve subsets of data from a transaction history database, derive training data sets from the subsets, apply model input data fields of each training data set as inputs to one or more machine learning models, and apply a machine learning algorithm to adjust parameters of the one or more machine learning models. The at least one processor is also configured to upload at least one trained machine learning model to an operational predictive model module, apply a stream of real-time authorization request messages as inputs to the at least one trained machine learning model, and transmit, to the payment processor in real-time or near real-time, values of at least one output obtained by applying the stream.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
25.
SYSTEMS AND METHODS FOR PREDICTING PARAMETERS AND TIMING OF A COMPUTER MESSAGE
A modelling platform comprising at least one processor in communication with at least one memory device and a payment processor is disclosed. The at least one processor is programmed to apply one or more data fields of an authorization request message received from a payment processor as one or more inputs to at least one trained machine learning model to generate a first output and a second output. The at least one processor is further programmed to transmit, to an issuer computing device, in real-time as part of an enhanced authorization request message, the first output and the second output. The enhanced authorization request message instructs the issuer computing device to cause a value to be displayed that is viewable by the account holder based upon the first output for a period of time that is based upon the second output.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A method for generating fraud and approval rules for a decision engine for detecting fraud in electronic transactions includes: receiving transaction data for a plurality of electronic transactions, the transaction data including a fraud determination and data values for the respective electronic transaction; applying a first rule of a plurality of rules to the electronic transactions to identify a first subset of transactions that satisfy the first rule and include a fraud determination indicative of fraud; filtering the first subset of transactions out of the plurality of electronic transactions; repeating the application step and filtering step using additional rules of the plurality of rules until a threshold criteria is met; and generating a rule order for the first rule and the additional rules based on at least a size of the subset of transactions identified using the respective rule.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
27.
METHOD AND SYSTEM OF ASSOCIATING CUSTOM CARD DESIGNS WITH NON-FUNGIBLE TOKENS
A method for performing dual verification to combine a non-fungible token (NFT) with a digital payment instrument includes: receiving a first set of authentication credentials and a second set of authentication credentials, the first including a transaction account identifier, and the second set including an NFT identifier and a public key of a cryptographic key pair; performing a first verification process using the first set of authentication credentials based on at least a comparison of the first set of authentication credentials with data associated with a transaction account identified using the transaction account identifier; performing a second verification process using at least the second set of authentication credentials based on validation of a digital signature using the public key, the digital signature being identified using the NFT identifier; and transmitting a result of the first verification process and the second verification process to a computing device.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
28.
SYSTEMS AND METHODS FOR PREDICTIVE MODELLING OF CLEARING MESSAGES
A modelling platform including at least one processor in communication with a memory device and a payment processor is provided. The at least one processor is configured to retrieve subsets of data from a transaction history database, derive training data sets from the subsets, apply model input data fields of each training data set as inputs to one or more machine learning models, and apply a machine learning algorithm to adjust parameters of the one or more machine learning models. The at least one processor is also configured to upload at least one trained machine learning model to an operational predictive model module, apply a stream of real-time authorization request messages as inputs to the at least one trained machine learning model, and transmit, to the payment processor in real-time or near real-time, values of at least one output obtained by applying the stream.
G06Q 20/14 - Payment architectures specially adapted for billing systems
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A method for scoring authenticity of a non-fungible token (NFT) using multiple, disparate data sets includes: receiving a scoring request for the NFT; determining a marketplace authenticity score for a marketplace where the NFT is available for purchase based on marketplace metrics; determining a visual authenticity score based on a comparison of visual features of the NFT to visual features of trusted NFTs; determining a wallet authenticity score for a blockchain wallet associated with ownership of the NFT based on a transaction history for the blockchain wallet; calculating a confidence score for the NFT based on a combination of the marketplace, visual, and wallet authenticity scores, the confidence score representing a likelihood that the NFT is authentic; and transmitting the calculated confidence score in response to the received scoring request.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
A method for scoring authenticity of a non-fungible token (NFT) using multiple, disparate data sets includes: receiving a scoring request for the NFT; determining a marketplace authenticity score for a marketplace where the NFT is available for purchase based on marketplace metrics; determining a visual authenticity score based on a comparison of visual features of the NFT to visual features of trusted NFTs; determining a wallet authenticity score for a blockchain wallet associated with ownership of the NFT based on a transaction history for the blockchain wallet; calculating a confidence score for the NFT based on a combination of the marketplace, visual, and wallet authenticity scores, the confidence score representing a likelihood that the NFT is authentic; and transmitting the calculated confidence score in response to the received scoring request.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
A method of processing, at an authentication server, content data provided during an interaction between a user and a third party platform, the method comprising: receiving, at the authentication server, user verification data and content data from the third party platform; verifying the identity of the user by comparing the received user verification data against verification data stored in a user profile in order to generate a user identity status; analysing received content data against pre-existing user data in order to generate a content data notification message; sending, from the authentication server to the third party platform, an authentication message, the authentication message comprising the user identity status and the content data notification message.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
Systems and methods are provided for verifying attributes of users in connection with network interactions involving the users. An example computer-implemented method includes receiving an authentication request (AReq) in connection with an interaction related to an age-restricted product, where the AReq includes an account number for a user and an age verification signal. The method also includes, in response to the age verification signal, retrieving a birthdate of the user, determining an age of the user based on the birthdate of the user, and determining the age of the user satisfies a defined threshold. The method then includes, in response to the age of the user satisfying the defined threshold, causing a challenge question to be issued to the user, whereby authentication of the user is initiated through a mobile device of the user.
A method of generating a content library includes receiving a generate command that indicates a design application file to generate a content library, identifying a set of primitives from the design application file, and generating a content library from the set of primitives. In some cases, the method further includes receiving an import command to import content from a file that is a same format type as the content library and in response to receiving the import command, extracting appropriate values from associated primitives in the file and importing the appropriate values to the design application file. In some cases, the method further includes receiving an export command to export content from the design application file to a different application file of a specified format type and providing the content library in the specified format type.
A computer-implemented method for updating stored cardholder account data is provided. The method is implemented using an account updating server in communication with a memory. The method includes receiving, from an issuer computer system, cardholder account update information associated with a plurality of cardholder accounts, identifying a merchant associated with at least one of the plurality of cardholder accounts based, at least in part, on the cardholder account update information, generating a merchant update file for the identified merchant including the cardholder account update information for the at least one of the plurality of cardholder accounts, and transmitting the merchant update file.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Systems, methods, and computer readable media may facilitate buy-now-pay-later (BNPL) transactions at brick-and-mortar locations of merchants that otherwise lack an ability to interface with financial institutions (FIs) that finance BNPL transactions. Likewise, the system may be used to conduct BNPL transactions for merchants that lack an electronic commerce presence. For example, a payment network used to process payment cards such as credit cards may be leveraged to communicate with user devices, merchant point of sale (POS) terminals, and BNPL servers operated by FIs to mediate BNPL transactions. In particular, the payment network may receive, from merchants, a list of items that are eligible for BNPL transactions and installment offers from FIs to pay for BNPL transactions. The payment network may match eligible items with installment offers, select the best installment offers for the buyer, and mediate exchanges between the parties to settle payments for the BNPL transaction.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 30/0238 - Discounts or incentives, e.g. coupons or rebates at point-of-sale [POS]
G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
A method of enrolling a payment card as a card on file by a payment processing platform. The method comprising the steps of: receiving, from a card issuer platform associated with the payment card, a registration request comprising data associated with the payment card; storing, on a secure storage means, the data associated with the payment card; sending, to the card issuer platform, a registration receipt; receiving, from a merchant platform, the registration receipt; generating a merchant token; and sending, to the merchant platform, the merchant token useable as a card on file.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
37.
CAPACITY TRACKING AND FORECAST MODELING ACROSS MULTIPLE PLATFORMS
Systems and methods track capacity and model forecasts across multiple platforms. A flow of data traffic from a first device to a second device is monitored. A future flow of data traffic is forecast based on the monitored flow, the future flow of data traffic including additional data traffic in addition to the monitored flow of data traffic. A threshold is anticipated to be reached in the forecasted future flow of data traffic. A corrective action is determined to mitigate the anticipated threshold being reached and then implemented.
A computer implemented method of training a model, using a machine learning process, to predict whether a transaction of a digital currency stored in a blockchain is fraudulent, comprises: unpacking (202) a block in the blockchain into a table comprising one or more rows of input and output data for a previous transaction stored in the block and aggregating (204) the one or more rows of input and output data to form an aggregated row of transaction data for the previous transaction. The method further comprises labelling (206) the aggregated row of transaction data for the previous transaction according to whether the previous transaction was fraudulent and using (208) the aggregated row of transaction data and the label as training data with which to train the model.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A computer implemented method of decomposing a blockchain comprising transactions in digital currency for analysis and display is described. The method comprises first determining a range of blocks in the blockchain. Each block in the range of blocks in the blockchain is then unpacked into a table comprising one or more rows of input and output data for each transaction stored in the block. For the range of blocks in the blockchain, entity information and transaction information are then aggregated into a block analysis table. A node of a computing network and a computer program product adapted for implementation of such a method are also described.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
H04L 69/04 - Protocols for data compression, e.g. ROHC
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
40.
PREDICTING WHETHER A TRANSACTION OF A DIGITAL CURRENCY STORED IN A BLOCKCHAIN IS FRAUDULENT
A computer implemented method of training a model, using a machine learning process, to predict whether a transaction of a digital currency stored in a blockchain is fraudulent, comprises: obtaining (202) transaction data for a first transaction of first funds in the digital currency, wherein the transaction data further comprises information related to a second transaction of the first funds that preceded the first transaction. The method further comprises labelling (204) the transaction data for the first transaction according to whether the first transaction was fraudulent and using (206) the transaction data and the label as training data with which to train the model.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
A computer implemented method of training a model, using a machine learning process, to predict whether a transaction of a digital currency stored in a blockchain is fraudulent, comprises: obtaining (202) transaction data for a first transaction of first funds in the digital currency, wherein the transaction data further comprises information related to a second transaction of the first funds that preceded the first transaction. The method further comprises labelling (204) the transaction data for the first transaction according to whether the first transaction was fraudulent and using (206) the transaction data and the label as training data with which to train the model.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Systems and methods are provided for backing up a data file. One example computer-implemented method includes generating an L4 key and, for each contact attribute of the data file, generating an L3 file including the L4 key and an identifier of a user and encrypting the L3 file with an un-masked version of the contact attribute. The method also includes compiling the encrypted L3 file(s) and the masked version(s) of the contact attribute(s) into an L2 file, generating an L2 key, encrypting the L2 file with the L2 key, compiling the encrypted L2 file and L2 key into an L1 file, generating an L1 key, encrypting the L1 file with the L1 key, compiling an L4 file to include identity attributes of the user, encrypting the L4 file with the L4 key, and combining the encrypted L4 file and the encrypted L1 file.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
43.
METHOD AND SYSTEM FOR IDENTIFYING TYPE OF ACCOUNT WHILE MAINTAINING ANONYMITY IN BLOCKCHAIN TRANSACTIONS
A method for account type registration for blockchain wallets includes: receiving, by a receiver of a processing server, a public key of a cryptographic key pair of a blockchain wallet associated with a blockchain; receiving, by the receiver of the processing server, an account identifier of a transaction account; identifying, by a processor of the processing server, an account type for the transaction account; and storing, in a data entry, at least the public key and an identifier associated with the identified account type.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
A computer implemented method of training a model, using a machine learning process, to predict whether a transaction of a digital currency stored in a blockchain is fraudulent, comprises: unpacking (202) a block in the blockchain into a table comprising one or more rows of input and output data for a previous transaction stored in the block and aggregating (204) the one or more rows of input and output data to form an aggregated row of transaction data for the previous transaction. The method further comprises labelling (206) the aggregated row of transaction data for the previous transaction according to whether the previous transaction was fraudulent and using (208) the aggregated row of transaction data and the label as training data with which to train the model.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A computer implemented method of decomposing a blockchain comprising transactions in digital currency for analysis and display is described. The method comprises first determining a range of blocks in the blockchain. Each block in the range of blocks in the blockchain is then unpacked into a table comprising one or more rows of input and output data for each transaction stored in the block. For the range of blocks in the blockchain, entity information and transaction information are then aggregated into a block analysis table. A node of a computing network and a computer program product adapted for implementation of such a method are also described.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
46.
METHOD AND SYSTEM FOR IDENTIFYING TYPE OF ACCOUNT WHILE MAINTAINING ANONYMITY IN BLOCKCHAIN TRANSACTIONS
A method for account type registration for blockchain wallets includes: receiving, by a receiver of a processing server, a public key of a cryptographic key pair of a blockchain wallet associated with a blockchain; receiving, by the receiver of the processing server, an account identifier of a transaction account; identifying, by a processor of the processing server, an account type for the transaction account; and storing, in a data entry, at least the public key and an identifier associated with the identified account type.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
09 - Scientific and electric apparatus and instruments
36 - Financial, insurance and real estate services
39 - Transport, packaging, storage and travel services
41 - Education, entertainment, sporting and cultural services
43 - Food and drink services, temporary accommodation
44 - Medical, veterinary, hygienic and cosmetic services; agriculture, horticulture and forestry services
45 - Legal and security services; personal services for individuals.
Goods & Services
(1) Magnetic encoded cards and cards containing an integrated circuit chip in the nature of smart cards all containing programming used to process payments; cards encoded with security features for authentication purposes; cards encoded with security features for identification purposes; charge cards, bank cards, credit cards, debit cards, chip cards, stored value cards, electronic data carrier cards, payment cards and payment cards all encoded; banking cards, namely, magnetically encoded banking cards and banking cards using magnetic memories and integrated circuit memories (1) Financial services, namely, transaction and payment processing services, payment verification services, payment card authorization, payment clearance and settlement services between financial institutions, switching services for credit cards, debit cards, charge cards and prepaid cards offered through cards with stored value; Financial services, namely, credit card, debit card, charge card and prepaid card transaction authorization and settlement services; credit, debit, charge and prepaid card transaction processing services; cash disbursement via automated teller machines; ATM banking services, namely, processing services for financial transactions by card holders via automatic teller machines; financial services, namely, the provision of contactless mobile payments processing through merchants at retail, online and wholesale locations; consulting services regarding payment solutions, banking, credit card, debit card and payment card; information, advisory and consultancy services relating to all the aforesaid services
(2) Personal services rendered by others to meet the needs of individuals, namely, travel and tour ticket reservation services and making reservations and bookings for transportation; booking and arranging of access to airport lounges for premier customer card holders and travelers; concierge services to meet the individual needs of premier customer card holders and travelers, namely, travel and tour ticket reservation services, making reservations and bookings for transportation, and providing customer-specific information related thereto
(3) Personal services rendered by others to meet the needs of individuals, namely, party and special event planning, arranging for ticket reservations for shows and other entertainment, sporting, or cultural events; concierge services to meet the individual needs of premier customer card holders and travelers, namely, party and special event planning, arranging for ticket reservations for shows and other entertainment, sporting, or cultural events, and providing customer-specific information related thereto
(4) Personal services rendered by others to meet the needs of individuals, namely, making restaurant and hotel reservations; providing bar and cocktail lounges also featuring related amenities being temporary accommodations in the nature of conference rooms, shower facilities, and work stations for relaxation to premier customer card holders and travelers in transit lounges; concierge services to meet the individual needs of premier customer card holders and travelers, namely, making restaurant and hotel reservations and providing customer-specific information related thereto
(5) Personal services rendered by others to meet the needs of individuals, namely, making reservations and bookings for physical and beauty treatments at salons and health spas; concierge services to meet the individual needs of premier customer card holders and travelers, namely, making reservations and bookings for physical and beauty treatments at salons and health spas, and providing customer-specific information related thereto
(6) Personal and social services rendered by others to meet the needs of individuals, namely, personal shopping services; hotel concierge services; concierge services to meet the individual needs of premier customer card holders and travelers, namely, personal shopping services and providing customer-specific information related thereto; security printing, namely, encoding identification information on products; monitoring of computer systems for security purposes; fraud detection services in the field of payment cards for on-line purchasing; investigation and surveillance services relating to identity theft as it relates to the safety of persons and entities
48.
METHOD AND SYSTEM FOR GENERATING AN ADVANCED STORAGE KEY IN A MOBILE DEVICE WITHOUT SECURE ELEMENTS
A method for building an advanced storage key includes: storing, in a mobile device, at least (i) device information associated with the mobile device, (ii) program code associated with a first program including an instance identifier, and (iii) program code associated with a second program including a first key; generating a device fingerprint associated with the mobile device based on the device information via execution of the code associated with the first program; generating a random value via execution of the code associated with the first program; building a diversifier value based on the generated device fingerprint, the generated random value, and the instance identifier included in the code associated with the first program; and decrypting the built diversifier value using the first key stored in the code associated with the second program via execution of the code associated with the second program to obtain a storage key.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A method for enabling the use of blockchain smart contracts as part of a traditional payment transaction includes: receiving, by a receiver of a processing server, a transaction message for a payment transaction, wherein the transaction message is formatted according to one or more standards and includes a plurality of data elements storing transaction data, the transaction data including at least a bank identification value; determining, by a processor of the processing server, a routing plan for the transaction message based on at least the bank identification value; and transmitting, by a transmitter of the processing server, the transaction message to (i) a first computing system using a first communication port of the processing server, and (ii) a second computing system using a second communication port of the processing server, based on the determined routing plan.
A computer-implemented method is disclosed for generating a digital signature for a participant entity (102, 104) of a secure communications network system comprising a central signing service (106) in a public network, the method performed by the central signing service, comprising: receiving (216) an endpoint signature request from the participant entity for an endpoint associated with the participant entity, the endpoint signature request comprising a domain name and an access token; validating (218) the access token and looking up the domain name in a data store of the central signing service; retrieving (220) a domain name system, DNS, signature of the participant entity; and validating (222) the DNS signature using a private key of the central signing service, where on successful validation of the DNS signature, the method further comprises the steps of: retrieving (226) a configuration of the endpoint; generating (230) an endpoint signature from the configuration; and sending the endpoint signature to the participant entity.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 61/4511 - Network directoriesName-to-address mapping using standardised directoriesNetwork directoriesName-to-address mapping using standardised directory access protocols using domain name system [DNS]
A computer-implemented method is disclosed for performing secure communications between a first participant (102) of a central signing service (106) and a second participant (104) of the central signing service over a public network, wherein the first participant and the second participant each generate respective key pairs having a predetermined validity time period, and wherein the sending (320) of a signed request message from the first participant and the sending (346) of the signed response message from the second participant are each within both predetermined validity time periods of the respective key pairs.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 61/4511 - Network directoriesName-to-address mapping using standardised directoriesNetwork directoriesName-to-address mapping using standardised directory access protocols using domain name system [DNS]
A method for generating payment credentials in a payment transaction includes storing, in a memory, at least a card master key associated with a transaction account. The method also includes generating, by a processing device, a first session key based on at least the stored card master key; generating, by the processing device, a second session key; generating, by the processing device, a first application cryptogram based on at least the first session key; generating, by the processing device, a second application cryptogram based on at least the second session key; and transmitting, by a transmitting device, at least the first application cryptogram and second application cryptogram for use in a payment transaction.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A computer-implemented method is disclosed for onboarding a participant entity (102, 104) to a secure communications network system comprising a central signing service (106) in a public network, the method performed by the central signing service and comprising the steps of: obtaining (202) a domain name for the participant entity; storing (204) the domain name in a data store of the central signing service; generating (204) a domain name system, DNS, signature and an access token for the domain name; and sending (206) the DNS signature and the access token to the participant entity.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 61/4511 - Network directoriesName-to-address mapping using standardised directoriesNetwork directoriesName-to-address mapping using standardised directory access protocols using domain name system [DNS]
09 - Scientific and electric apparatus and instruments
36 - Financial, insurance and real estate services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Software; software apps; software platforms; software, apps and platforms in the field of sports, football, finance and financial literacy; credit and debit cards; electronic payment cards; downloadable electronic publications; downloadable electronic publications in the field of sports, football, finance and financial literacy. Financial services; personal finance services; payment processing services; credit card and debit card services; information, advisory and consultancy services relating to all the aforesaid services. Entertainment services; educational services; training services; sporting services; entertainment, educational and training services in the field of sports, football, finance and financial literacy; educational and training services for adolescents relating to adult life, including in relation to finance, financial literacy and financial health; sports and football club services; sporting skills camps; sporting and football clinics; sports and football coaching; arranging, organising, conducting and hosting entertainment, sports, educational and training workshops, programs, clubs, camps, games, competitions and events; issuing of entertainment, educational and training certificates, awards and qualifications; arranging and conducting awards ceremonies; non-downloadable electronic publications; non-downloadable electronic publications in the field of sports, football, finance and financial literacy; information, advisory and consultancy services relating to all the aforesaid services. PaaS (platform-as-a-service); SaaS (software-as-a-service); provision of non-downloadable software; PaaS (platform-as-a-service), SaaS (software-as-a-service) and provision of non-downloadable software in the field of sports, football, finance and financial literacy; information, advisory and consultancy services relating to all the aforesaid services.
09 - Scientific and electric apparatus and instruments
36 - Financial, insurance and real estate services
39 - Transport, packaging, storage and travel services
41 - Education, entertainment, sporting and cultural services
43 - Food and drink services, temporary accommodation
44 - Medical, veterinary, hygienic and cosmetic services; agriculture, horticulture and forestry services
45 - Legal and security services; personal services for individuals.
Goods & Services
Magnetic encoded cards and cards containing an integrated circuit chip in the nature of smart cards all containing programming used to process payments; cards encoded with security features for authentication purposes; cards encoded with security features for identification purposes; charge cards, bank cards, credit cards, debit cards, chip cards, stored value cards, electronic data carrier cards, payment cards and payment cards all encoded; banking cards, namely, magnetically encoded banking cards and banking cards using magnetic memories and integrated circuit memories. Financial services, namely, transaction and payment processing services, payment verification services, payment card authorization, payment clearance and settlement services between financial institutions, switching services for credit cards, debit cards, charge cards and prepaid cards offered through cards with stored value; Financial services, namely, credit card, debit card, charge card and prepaid card transaction authorization and settlement services; credit, debit, charge and prepaid card transaction processing services; cash disbursement via automated teller machines; ATM banking services, namely, processing services for financial transactions by card holders via automatic teller machines; financial services, namely, the provision of contactless mobile payments processing through merchants at retail, online and wholesale locations; consulting services regarding payment solutions, banking, credit card, debit card and payment card; information, advisory and consultancy services relating to all the aforesaid services. Personal services rendered by others to meet the needs of individuals, namely, travel and tour ticket reservation services and making reservations and bookings for transportation; booking and arranging of access to airport lounges for premier customer card holders and travelers; concierge services to meet the individual needs of premier customer card holders and travelers, namely, travel and tour ticket reservation services, making reservations and bookings for transportation, and providing customer-specific information related thereto. Personal services rendered by others to meet the needs of individuals, namely, party and special event planning, arranging for ticket reservations for shows and other entertainment, sporting, or cultural events; concierge services to meet the individual needs of premier customer card holders and travelers, namely, party and special event planning, arranging for ticket reservations for shows and other entertainment, sporting, or cultural events, and providing customer-specific information related thereto. Personal services rendered by others to meet the needs of individuals, namely, making restaurant and hotel reservations; providing bar and cocktail lounges also featuring related amenities being temporary accommodations in the nature of conference rooms, shower facilities, and work stations for relaxation to premier customer card holders and travelers in transit lounges; concierge services to meet the individual needs of premier customer card holders and travelers, namely, making restaurant and hotel reservations and providing customer-specific information related thereto. Personal services rendered by others to meet the needs of individuals, namely, making reservations and bookings for physical and beauty treatments at salons and health spas; concierge services to meet the individual needs of premier customer card holders and travelers, namely, making reservations and bookings for physical and beauty treatments at salons and health spas, and providing customer-specific information related thereto. Personal and social services rendered by others to meet the needs of individuals, namely, personal shopping services; hotel concierge services; concierge services to meet the individual needs of premier customer card holders and travelers, namely, personal shopping services and providing customer-specific information related thereto; security printing, namely, encoding identification information on products; monitoring of computer systems for security purposes; fraud detection services in the field of payment cards for on-line purchasing; investigation and surveillance services relating to identity theft as it relates to the safety of persons and entities.
56.
METHODS AND SYSTEMS FOR TRAINING ARTIFICIAL INTELLIGENCE-BASED MODELS USING LIMITED LABELED DATA
Methods and systems for training artificial intelligence (AI)-based models using limited labeled data are disclosed. The method performed by a server system includes accessing a tabular dataset including tabular data that further labeled data and unlabeled data. Method includes generating labeled features including labeled numerical features and labeled categorical features based on the labeled data and generating unlabeled features including unlabeled numerical features and unlabeled categorical features based on the unlabeled data. Method includes determining, via a first transformer model, a contextual numerical embeddings based on the labeled numerical features and the unlabeled numerical features. Method includes determining, via a second transformer model, a contextual categorical embeddings based on the labeled categorical features and the unlabeled categorical features. Method includes generating a concatenated embeddings based on concatenating the contextual numerical embeddings and the contextual categorical embeddings. Method includes generating a third transformer model based on the concatenated embeddings.
A method of authenticating an accountholder for relaxing payment transaction authorization rules is provided. The method is implemented using an authentication computing device in communication with a memory device. The method includes receiving a transaction decline message from an issuer via a transaction message channel, transmitting an authorization rules relaxation message to an accountholder computing device via an authentication message channel separate from the transaction message channel, receiving an authorization rules relaxation response message via the authentication message channel, authenticating the authorization rules relaxation response message as originating from the accountholder, receiving an authorization request message associated with a reattempted payment transaction, inserting a rules relaxation identifier into the authorization request message, providing the authorization request message to the issuer computing device, causing modification of transaction decline systems, and receiving an approval message denoting authorization rules relaxation and acceptance of the second payment transaction by the issuer.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Financial services, namely, transaction and payment processing services, payment verification services, payment card authorization, payment clearance and settlement services between financial institutions, switching services for credit cards, debit cards, charge cards and prepaid cards offered through cards with stored value; Financial services, namely, credit card, debit card, charge card and prepaid card transaction authorization and settlement services; credit, debit, charge and prepaid card transaction processing services; cash disbursement via automated teller machines; ATM banking services, namely, processing services for financial transactions by card holders via automatic teller machines; financial services, namely, the provision of contactless mobile payments processing through merchants at retail, online and wholesale locations; consulting services regarding payment solutions, banking, credit card, debit card and payment card; information, advisory and consultancy services relating to all the aforesaid services. Providing online non-downloadable software for use in connection with payment services that allow users to access multiple funding sources via a single account; providing online non-downloadable software for facilitating and administering electronic payments; providing online non-downloadable application programming interface (API) software for facilitating and administering electronic payments; application service provider featuring application programming interface software for routing credit and debit card payments for authorization and clearing; software as a service (Saas) for credit and debit card payment processing.
59.
Identification of mismatch geodata based on an ensemble of weak supervision-based match labels and geo similarity models
The disclosure relates to methods and systems of generating geodata match classifications based on an ensemble of weak supervision-based match labels and geo-similarity models. The system may generate at least two match classifiers that are ensembled together. The match classifiers may include a location name classifier and a geo-similarity classifier. The location name classifier may generate a match classification that is based on a similarity of characters of the location names. The geo-similarity classifier may generate a match classification that is based on a proximity of the geolocations defined by the location names. The match classifications may be aggregated together to generate a geodata match classification.
G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
G06F 18/2413 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on distances to training or reference patterns
60.
VISUAL ASSIST CHATBOT FOR IMPROVED ACCESSIBILITY OF CONTENT BY A VISUALLY IMPAIRED USER
Examples provide a system for automatically identifying a user with a visual impairment and providing assistance navigating a website. A visual assist (VA) manager monitors user interactions with a webpage, such as zooming-in to increase the size of text and graphics and navigation errors, such as clicking on an area outside a clickable icon, failing to enter text in the correct field, etc. A trained machine learning model analyzes the user interaction data using visual assist criteria to predict whether the user has a visual impairment. If the VA manager predicts a visual impairment, an audible VA activation prompt is provided to the user. If the user activates the VA manager, a chatbot is provided to assist the user in performing tasks while navigating the webpage. The VA manager optionally applies user-specific VA settings adjusting the webpage layout and appearance to accommodate the user's visual impairment.
A system for detecting fraud within a payment card network includes a memory storing historical transaction data and a processor configured to identify a set of historical transaction data, the set of historical transaction data include one or more test transactions labeled as having been used to test validity of an underlying account, train a model using the identified set of historical transaction data as labeled training data, the model is configured to accept transaction data associated with an input transaction and to classify the input transaction as a test transaction, apply a suspect transaction of a cardholder account as the input transaction to the model, the model generates an indication that the suspect transaction is a test transaction, mark the cardholder account as compromised based on having experienced test transaction activity, and reject a pending transaction based on the cardholder account being marked as compromised.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Examples provide a system for automatically identifying a user with a visual impairment and providing assistance navigating a website. A visual assist (VA) manager monitors user interactions with a webpage, such as zooming-in to increase the size of text and graphics and navigation errors, such as clicking on an area outside a clickable icon, failing to enter text in the correct field, etc. A trained machine learning model analyzes the user interaction data using visual assist criteria to predict whether the user has a visual impairment. If the VA manager predicts a visual impairment, an audible VA activation prompt is provided to the user. If the user activates the VA manager, a chatbot is provided to assist the user in performing tasks while navigating the webpage. The VA manager optionally applies user-specific VA settings adjusting the webpage layout and appearance to accommodate the user's visual impairment.
G06F 9/451 - Execution arrangements for user interfaces
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
G06F 16/954 - Navigation, e.g. using categorised browsing
09 - Scientific and electric apparatus and instruments
36 - Financial, insurance and real estate services
39 - Transport, packaging, storage and travel services
41 - Education, entertainment, sporting and cultural services
43 - Food and drink services, temporary accommodation
44 - Medical, veterinary, hygienic and cosmetic services; agriculture, horticulture and forestry services
45 - Legal and security services; personal services for individuals.
Goods & Services
(1) Magnetic encoded cards and cards containing an integrated circuit chip in the nature of smart cards all containing programming used to process payments; cards encoded with security features for authentication purposes; cards encoded with security features for identification purposes; charge cards, bank cards, credit cards, debit cards, chip cards, stored value cards, electronic data carrier cards, payment cards and payment cards all encoded; banking cards, namely, magnetically encoded banking cards and banking cards using magnetic memories and integrated circuit memories (1) Financial services, namely, transaction and payment processing services, payment verification services, payment card authorization, payment clearance and settlement services between financial institutions, switching services for credit cards, debit cards, charge cards and prepaid cards offered through cards with stored value; Financial services, namely, credit card, debit card, charge card and prepaid card transaction authorization and settlement services; credit, debit, charge and prepaid card transaction processing services; cash disbursement via automated teller machines; ATM banking services, namely, processing services for financial transactions by card holders via automatic teller machines; financial services, namely, the provision of contactless mobile payments processing through merchants at retail, online and wholesale locations; consulting services regarding payment solutions, banking, credit card, debit card and payment card; information, advisory and consultancy services relating to all the aforesaid services
(2) Personal services rendered by others to meet the needs of individuals, namely, travel and tour ticket reservation services and making reservations and bookings for transportation; booking and arranging of access to airport lounges for premier customer card holders and travelers; concierge services to meet the individual needs of premier customer card holders and travelers, namely, travel and tour ticket reservation services, making reservations and bookings for transportation, and providing customer-specific information related thereto
(3) Personal services rendered by others to meet the needs of individuals, namely, party and special event planning, arranging for ticket reservations for shows and other entertainment, sporting, or cultural events; concierge services to meet the individual needs of premier customer card holders and travelers, namely, party and special event planning, arranging for ticket reservations for shows and other entertainment, sporting, or cultural events, and providing customer-specific information related thereto
(4) Personal services rendered by others to meet the needs of individuals, namely, making restaurant and hotel reservations; providing bar and cocktail lounges also featuring related amenities being temporary accommodations in the nature of conference rooms, shower facilities, and work stations for relaxation to premier customer card holders and travelers in transit lounges; concierge services to meet the individual needs of premier customer card holders and travelers, namely, making restaurant and hotel reservations and providing customer-specific information related thereto
(5) Personal services rendered by others to meet the needs of individuals, namely, making reservations and bookings for physical and beauty treatments at salons and health spas; concierge services to meet the individual needs of premier customer card holders and travelers, namely, making reservations and bookings for physical and beauty treatments at salons and health spas, and providing customer-specific information related thereto
(6) Personal and social services rendered by others to meet the needs of individuals, namely, personal shopping services; hotel concierge services; concierge services to meet the individual needs of premier customer card holders and travelers, namely, personal shopping services and providing customer-specific information related thereto; security printing, namely, encoding identification information on products; monitoring of computer systems for security purposes; fraud detection services in the field of payment cards for on-line purchasing; investigation and surveillance services relating to identity theft as it relates to the safety of persons and entities
09 - Scientific and electric apparatus and instruments
36 - Financial, insurance and real estate services
39 - Transport, packaging, storage and travel services
41 - Education, entertainment, sporting and cultural services
43 - Food and drink services, temporary accommodation
44 - Medical, veterinary, hygienic and cosmetic services; agriculture, horticulture and forestry services
45 - Legal and security services; personal services for individuals.
Goods & Services
Magnetic encoded cards and cards containing an integrated circuit chip in the nature of smart cards all containing programming used to process payments; cards encoded with security features for authentication purposes; cards encoded with security features for identification purposes; charge cards, bank cards, credit cards, debit cards, chip cards, stored value cards, electronic data carrier cards, payment cards and payment cards all encoded; banking cards, namely, magnetically encoded banking cards and banking cards using magnetic memories and integrated circuit memories. Financial services, namely, transaction and payment processing services, payment verification services, payment card authorization, payment clearance and settlement services between financial institutions, switching services for credit cards, debit cards, charge cards and prepaid cards offered through cards with stored value; Financial services, namely, credit card, debit card, charge card and prepaid card transaction authorization and settlement services; credit, debit, charge and prepaid card transaction processing services; cash disbursement via automated teller machines; ATM banking services, namely, processing services for financial transactions by card holders via automatic teller machines; financial services, namely, the provision of contactless mobile payments processing through merchants at retail, online and wholesale locations; consulting services regarding payment solutions, banking, credit card, debit card and payment card; information, advisory and consultancy services relating to all the aforesaid services. Personal services rendered by others to meet the needs of individuals, namely, travel and tour ticket reservation services and making reservations and bookings for transportation; booking and arranging of access to airport lounges for premier customer card holders and travelers; concierge services to meet the individual needs of premier customer card holders and travelers, namely, travel and tour ticket reservation services, making reservations and bookings for transportation, and providing customer-specific information related thereto. Personal services rendered by others to meet the needs of individuals, namely, party and special event planning, arranging for ticket reservations for shows and other entertainment, sporting, or cultural events; concierge services to meet the individual needs of premier customer card holders and travelers, namely, party and special event planning, arranging for ticket reservations for shows and other entertainment, sporting, or cultural events, and providing customer-specific information related thereto. Personal services rendered by others to meet the needs of individuals, namely, making restaurant and hotel reservations; providing bar and cocktail lounges also featuring related amenities being temporary accommodations in the nature of conference rooms, shower facilities, and work stations for relaxation to premier customer card holders and travelers in transit lounges; concierge services to meet the individual needs of premier customer card holders and travelers, namely, making restaurant and hotel reservations and providing customer-specific information related thereto. Personal services rendered by others to meet the needs of individuals, namely, making reservations and bookings for physical and beauty treatments at salons and health spas; concierge services to meet the individual needs of premier customer card holders and travelers, namely, making reservations and bookings for physical and beauty treatments at salons and health spas, and providing customer-specific information related thereto. Personal and social services rendered by others to meet the needs of individuals, namely, personal shopping services; hotel concierge services; concierge services to meet the individual needs of premier customer card holders and travelers, namely, personal shopping services and providing customer-specific information related thereto; security printing, namely, encoding identification information on products; monitoring of computer systems for security purposes; fraud detection services in the field of payment cards for on-line purchasing; investigation and surveillance services relating to identity theft as it relates to the safety of persons and entities.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Promoting the services of others; promoting the goods and services of others; business analytics; advertising, promotion and marketing services; promotional services; business assistance, advisory and consulting services in the field of financial technology; data processing services; business records management; business data analytics; business management and business strategy development; provision of business management information; business appraisals; advisory services for business management; business administration; providing business information; business consultancy services; business organisation and administration services; office functions; market research; market research data analysis; marketing studies; statistical information (business); business research; computer database management; database management; data management; data processing; data collection and management services; electronic data processing; compilation of computer databases; provision of business information; information, advisory and consultancy services relating to all the aforesaid services. Providing small business use technology resources to digitize their operations; technological consultancy services for digital transformation.
66.
DATA MATCHING AND MATCH VALIDATION USING A MACHINE LEARNING BASED MATCH CLASSIFIER
The disclosure relates to methods and systems of generating matches between unmatched descriptors and known entities and training and using a machine learning-based match classifier (ML match classifier) to generate match classifications. For example, a system may access an unmatched descriptor having unstructured content and extract one or more data elements from the unmatched descriptor. The system may compare each of the extracted data elements with data records of known entities to identify candidate matches. The system may train and use the ML match classifier to validate the candidate matches. The ML match classifier may be trained based on labeled features derived from similarity metrics between two strings such as a name associated with the unmatched descriptor and a name of a candidate entity.
The disclosure relates to methods and systems of performing entity discovery based on an entity discovery model. Entity discovery refers to one or more computational processes that attempt to identify an entity when the identity of the entity is unknown. The entity discovery model may include multiple discovery stages. Each discovery stage of the entity discovery model may independently attempt to identify an entity. The entity discovery model may execute the discovery stages in a waterfall execution in which a discovery stage is executed only if a prior discovery stage failed to identify the entity, potentially reducing the computational overhead of executing all discovery stages. In other examples, the entity discovery model may execute the discovery stages in a parallel execution to minimize the time it takes to perform entity discovery.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A system is configured to retrieve a set of raw transaction data. A transaction categorization model is applied to the raw transaction data. The transaction categorization model infers a category from each transaction and labels each transaction with the inferred category. An entity recognition model is applied to the labelled transaction data. The entity recognition model extracts an entity from each transaction and labels each transaction with the extracted entity. The system generates a plurality of transaction streams from the labelled transactions based on the category and entity labels. The system also labels each transaction stream with either a loan label or a non-loan label based on an analysis of the types of transactions defining the transaction stream. The system trains a supervised-based neural network using the labelled transaction streams to generate a credit stacking classifier model.
09 - Scientific and electric apparatus and instruments
16 - Paper, cardboard and goods made from these materials
35 - Advertising and business services
36 - Financial, insurance and real estate services
38 - Telecommunications services
39 - Transport, packaging, storage and travel services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Scientific, nautical, surveying, photographic, cinematographic, weighing, measuring, signaling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; compact discs, DVDs and other digital recording media; mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment, computers; computer software and computer programs (downloadable/recorded computer software); computer operating programs, recorded; computer hardware and software (recorded and/or downloadable) for facilitating and administering payment, banking, credit card, debit card, payment card, automatic teller machine, stored value, electronic funds transfer, electronic payments, electronic processing and transmission of bill payment data, cash disbursement, transaction authentication, routing, authorization and settlement services, fraud detection and control, disaster recovery and encryption services; telecommunication and electrical apparatus and instruments, namely, apparatus for the recording, transmission and reproduction of data including sound and images; accounting machines; apparatus for tracking, management and analysis of financial accounts via a global computer network; computer hardware and software, namely, for the development, maintenance and use of local and wide area computer networks; systems for reading memory cards and systems for reading data in memories, namely, integrated circuit memories and banking card memories; downloadable electronic publications; printing apparatus including printing apparatus for data processing systems and financial transaction systems; encoders and decoders; modems; computer hardware and software for facilitating payment transactions by electronic means over wireless networks, global computer networks and/or mobile telecommunications devices; computer hardware and encryption software, encryption keys, digital certificates, digital signatures, software for secure data storage and retrieval and transmission of confidential customer information used by individuals, banking and financial institutions; computer software and hardware that facilitates the identification and authentication of near field communication (NFC) devices and radio frequency identification (RFID) devices; computer hardware and software comprising a digital wallet that stores customer account information to access coupons, vouchers, voucher codes and rebates at retailers and to obtain loyalty or monetary rewards that can be credited to their accounts; downloadable computer programs and application software for mobile phones and other digital devices comprising a digital wallet that allow users to access price-comparison information, product reviews, links to the retail websites of others, and discount information; software application for use in connection with contactless payment terminals for the purpose of allowing merchants to accept contactless mobile commerce transactions, contactless presentation of loyalty credentials, and contactless redemption of coupons, rebates, discounts, vouchers and special offers; software application that allows merchants to deliver coupons, rebates, discounts, vouchers and special offers directly to the mobile telecommunications devices of consumers delivered by contactless RFID or NFC communications; software application that allows merchants to deploy smart posters in retail and wholesale in-store locations that consumers can tap with their mobile telecommunications devices to access coupons, rebates, discounts, vouchers and special offers delivered by contactless RFID or NFC communications; integrated circuit chips for use in mobile phones and NFC and RFID devices; magnetic encoded cards and cards containing an integrated circuit chip (smart cards); security encoded cards; cards encoded with security features for authentication purposes; cards encoded with security features for identification purposes; hologram impregnated cards (encoded); charge cards, bank cards, credit cards, debit cards, chip cards, stored value cards, electronic data carrier cards, payment cards and payment cards all encoded; banking cards, namely, magnetically encoded banking cards and banking cards using magnetic memories and integrated circuit memories; payment card readers; magnetic coded card readers, electronic data carrier card readers, electronic encryption units, computer hardware, computer terminals, computer software for use in the financial services, banking and telecommunications industries; computer software designed to enable smart cards to interact with terminals and readers; computer chips embedded in telephones and other communication devices; telecommunications equipment; point of sale transaction terminals and computer software for transmitting, displaying and storing transaction, identification and financial information for use in the financial services, banking and telecommunications industries; radio frequency identification devices (transponders); electronic verification apparatus for verifying authentication of charge cards, bank cards, credit cards, debit cards and payment cards; cash dispensing machines; computer peripheral devices and electronic goods, namely, calculating machines, electronic organizers, electronic notepads, pocket planners, mobile telephones, mobile telephone handsets, tablet computers, digital readers and personal digital assistants (PDAs) and alarms; mouse pads; fire-extinguishing apparatus; parts and fittings for all the aforesaid goods; Downloadable computer software for the processing or exchange of cryptocurrencies and blockchain transactions; downloadable computer software for managing and verifying cryptocurrency transactions using blockchain technology; downloadable computer software for maintaining cyber security for the processing or exchange of cryptocurrencies and blockchain transactions; downloadable music files authenticated by non-fungible tokens (NFTs); downloadable multimedia files containing artwork, text, audio, and video authenticated by non-fungible tokens (NFTs); downloadable computer software and applications for mobile devices for facilitating and administering banking, payment by credit card, debit card, or virtual payment card, automatic teller machine services, stored value card services, electronic funds transfer services, electronic payment processing services; downloadable computer software and applications for electronic processing and transmission of bill payment data, cash disbursement services, transaction authentication services, routing, authorization and settlement services, and fraud detection and control services in the metaverse and other virtual worlds; downloadable computer software and applications for mobile devices comprising a digital wallet that stores customer account information and permits consumers to access coupons, vouchers, voucher codes, discount codes, and rebates at retailers and to obtain loyalty or monetary rewards that can be credited to their accounts in the metaverse and other virtual worlds; downloadable computer e-commerce software to allow users to perform electronic business transactions in the metaverse and other virtual worlds. Printed materials including publications, periodicals, operating manuals, user guides; Instructional and teaching materials; Printed advertising materials; Printed cards, newsletters, manuals, advertisements; office supplies and printed matter, pens, pencils, note pads, business card holders; Printed publications for accounting and financial personnel and for banks and retailers. Advertising; business management; business administration; office functions; business advisory services; business investigations; commercial information agencies; presentation of goods on communication media for retail purposes; price comparison services; organization of exhibitions for commercial or advertising purposes; marketing consulting services; market research services; tracking, analyzing, forecasting and reporting cardholder purchase behavior; promoting the sale of the goods and services of others by means of rewards and incentives generated in connection with the use of credit, debit and payment cards; business administration of loyalty and rewards programs; commercial, industrial and business management assistance; business appraisals; advisory services for business management; marketing studies; statistical information (business); preparation of statements of accounts; book-keeping; business research; public relations; publication of publicity texts; issuing of publicity leaflets; computer database management; promoting concerts and cultural events of others, organization of expositions having commercial or advertising purposes; advertising for transport, travel, hotels, lodging, food and meals, sports, entertainment and sightseeing; providing information regarding purchase of goods and services on-line via the Internet and other computer networks; financial records management; data processing and data verification services; data retrieval services; information, advisory and consultancy services related to all the aforesaid services; Provision of an online marketplace for buyers and sellers of downloadable digital goods and media authenticated by non-fungible tokens (NFTs); promoting the goods and services of others by means of coupons, discounts, advertisements, rewards, incentives and loyalty programs in the metaverse and other virtual worlds; promoting the cultural events, charitable events, sporting events, travel experiences, fine dining events, festivals, award shows, and special events of others in the metaverse and other virtual worlds; business services, namely, business networking via virtual environments in which users can interact; information, advisory and consultancy services relating to all the aforesaid services. Insurance; financial affairs; monetary affairs; real estate affairs; financial consultancy; financial information; financial sponsorship; financial services, namely, banking, credit card services, debit card services, charge card services, pre-paid card services offered through cards with stored value, electronic credit and debit transactions, bill payment and presentment services, cash disbursement, check verification, check cashing, deposit access and automated teller machine services; financial services, namely transaction authorization and settlement services, transaction reconciliation, cash management, consolidated funds settlement, consolidated dispute processing, financial information with respect to data repository and client profile information services and related switching, gateway, settlement/reconciliation, and funds movement services in the field of payment cards, electronic payment processing services, payment transaction authentication and verification services; financial services, namely value exchange services, namely, secure electronic cash transactions and electronic cash transmissions over public computer networks to facilitate electronic commerce; providing financial information, namely credit and debit card data and reports, electronic funds transfer and currency exchange services, financial assessment and risk management services for others in the field of consumer credit; dissemination of financial information via a global computer network, financial information rendered by computer by means of a secure information computer network and advisory services regarding all of the foregoing services; the provision of financial services for the support of retail services provided through mobile telecommunications means, namely, payment services through wireless devices; the provision of financial services for the support of retail services provided on-line, through electronic networks; financial analysis and consultation; banking and credit services; banking, payment, credit, debit, charge, cash disbursement and stored valued deposit access services; cheque verification; processing of financial transactions both on-line via a computer database or via telecommunications and at point of sale; processing services for financial transactions by card holders via automatic teller machines; the provision of balance details, deposits and withdrawals of money to card holders via automatic teller machines; financial settlement and financial authorization services in connection with the processing of financial payment transactions; travel insurance services; issuing and redemption of travelers cheques and travel vouchers; payer authentication services; verification of financial information; maintenance of financial records; remote payment services; stored value electronic purse services, electronic payments services and transaction authorization and settlement services; provision of debit and credit services by means of radio frequency identification devices (transponders); provision of debit and credit services by means of communication and telecommunication devices; the provision of financial services for the support of retail services provided through mobile telecommunications means, including payment services through wireless devices; processing of credit and debit transactions by telephone and telecommunication link; the provision of financial services for the support of retail services provided on-line, through networks or other electronic means using electronically digitized information; value exchange services, namely, the secure exchange of value, including electronic cash, over computer networks accessible by means of smartcards; bill payment services provided through a website; electronic banking via a global computer network, electronic mobile banking, electronic payment services involving electronic processing and transmission of bill payment data; financial clearing house services; inter-bank transfer services, namely, direct bank-to-bank electronic transfers of money and providing bank account information by telephone; on-line banking; financial services provided over the telephone and by means of a global computer network or the Internet; financial services, namely, the provision of contactless mobile payments through merchants at retail, online and wholesale locations; financial services, namely, providing a cloud-based digital wallet that stores customer account information to access coupons, vouchers, voucher codes and rebates at retailers and to obtain loyalty or monetary rewards that can be credited to their accounts via a cash-back system; real estate property services; real estate valuations; real estate investment management; real estate investment services; real estate insurance services; insurance for property owners; insurance services relating to property; real estate financing; real estate brokerage; real estate appraisals; real estate agency services; evaluation of real estate; real estate administration; administration of financial affairs relating to real estate; provision of real estate loans; financing services relating to real estate development; financial brokerage services for real estate; financial services relating to real estate property and buildings; financial services for the purchase of real estate; arranging of loan agreements secured on real estate; arranging of shared ownership of real estate; arranging the provision of finance for real estate purchase; assisting in the acquisition of and interests in real estate; capital investment in real estate; commercial property investment services; financial services relating to the acquisition of property; financial services relating to the sale of property; financial valuation of freehold property; financial valuation of leasehold property; arranging letting of real estate; arranging of leases of real estate; leasing of property; leasing of real estate property; leasing of freehold property; estate management services relating to transactions in real property; valuation of property; property portfolio management; management of property; advisory services relating to real estate ownership; advisory services relating to real estate valuations; corporate real estate advisory services; computerized information services relating to real estate; consultation services relating to real estate; provision of information relating to real estate property; provision of information relating to the property market; research services relating to real estate acquisition; research services relating to real estate selection; mortgage financing and asset securitization; consulting services regarding payment solutions, banking, credit card, debit card and payment card; financial records management; providing information relating to financial services via a computer database or the Internet; computerised customer financial information; information, advisory and consultancy services relating to all the aforesaid services; Processing of virtual credit card, virtual debit card, virtual prepaid card, and virtual payment card transactions in the metaverse and other virtual worlds; payment processing services, namely, credit card, debit card, prepaid card, gift card and payment card transaction processing services in the metaverse and other virtual worlds; providing financial information in the metaverse and other virtual worlds; charitable fundraising services in the metaverse and other virtual worlds; financial sponsorship of cultural events, charitable events, concerts, sporting events, travel experiences, fine dining events, festivals and awards shows in the metaverse and other virtual worlds; cryptocurrency payment processing; cryptocurrency exchange services featuring blockchain technology; financial consultation and information in the field of cryptocurrency, digital currency, virtual currency, digital and blockchain assets, digital tokens, crypto tokens and utility tokens; blockchain-based payment verification services; financial services, namely providing a financial exchange for the trading of digital currency, virtual currency, cryptocurrency, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; payment verification and payment transaction authentication in the metaverse and other virtual worlds. Telecommunications; mobile telecommunication services; Internet based telecommunication services; data communication services; electronic data transmission over a global remote data processing network, including the Internet; services for the transmission, provision or display of information from a computer-stored data bank or via the Internet in the field of financial services; transmission of data through the use of electronic image processing by mobile telephone link; electronic mail, message sending and receiving services; television, radio and Internet broadcasting services; providing multi-user access to a secure computerized information network for the transfer and dissemination of a range of information in the field of financial services; telephone telecommunications services via prepaid telephone calling card; leasing access time to a computer database; information, advisory and consultancy services relating to all the aforesaid services. Transport; packaging and storage of goods; travel arrangement; tourist information and travel services, organization and management of tours and provision of transportation information; booking agency services; ticket reservation services; agency services for arranging the rental of cars; provision of information relating to travel and transport; arranging and booking of holidays, excursions and visits; air transportation services and air transportation ticketing services; arranging airline tickets, cruise tickets and train tickets; escorting of travellers and their luggage; tourist offices; travel agency services; namely, making reservations and bookings for transportation; air transportation; tour guide services; car rental services; advisory and consultancy relating to all the aforesaid; arranging travel and information therefor, all provided on-line from a computer database or the Internet; computerized reservation services for travel; provision of travel information by computer; collation of data relating to travel. Education; providing of training; entertainment; sporting and cultural activities; booking of seats for shows; books (publication of -); education information; electronic desktop publishing; entertainment information; information (education -); information (entertainment -); information (recreation -); layout services, other than for advertising purposes; modelling for artists; movie projectors and accessories (rental of -); providing on-line electronic publications, not downloadable; publication of books; publication of electronic books and journals on-line; publication of texts, other than publicity texts; radio and television sets (rental of -); recorders (rental of video cassette -); recreation information; rental of audio equipment; rental of camcorders; rental of lighting apparatus for theatrical sets or television studios; rental of movie projectors and accessories; rental of radio and television sets; rental of video cameras; rental of video cassette recorders; show scenery (rental of -); sports events (timing of -); television sets (rental of radio and -); texts (publication of -), other than publicity texts; videotaping; arranging and conducting of symposiums; lending libraries; training services provided via simulators; providing films, not downloadable, via video-on-demand transmission services; Entertainment and educational services, namely, providing entertainment and educational information in the metaverse and other digital worlds; arranging and hosting cultural events, concerts, sporting events, festivals, and awards shows in the metaverse and other digital worlds, all being for educational and educational purposes; entertainment and educational services in the metaverse and other digital worlds; presentation of seminars, programs, events, and performances in the metaverse and other digital worlds, all being for entertainment or educational purposes; entertainment services and educational services, namely, recreation, education, leisure or entertainment via virtual environments in which users can interact; information, advisory and consultancy services relating to all the aforesaid services. Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software; conversion of data or documents from physical to electronic media; computer hardware and software consulting services; computer programming; support and consultation services for managing computer systems, databases and applications; providing temporary use of non-downloadable software and applications for managing, locating, activating and revoking authentication and digital credentials of near field communication (NFC) devices; design and development of computer hardware and application software for mobile digital devices; design, development, maintenance and update of downloadable computer programs and application software for mobile phones and other digital devices that allows users to access coupons, vouchers, voucher codes, rebates, price-comparison information, product reviews, links to the retail websites of others, and discount information; design, development, maintenance and update of downloadable computer programs and application software that allows users to access sales promotion offers and obtain monetary rewards that can be credited to their accounts via a cash-back system; application software provider (ASP) featuring software for receiving, transmitting and displaying vouchers, coupons, voucher codes, special offers, reviews, product information, price comparison information, links to websites, and receiving and transmitting data for the purchase of goods and services; application service provider featuring software for providing consumers with information regarding discounts, vouchers and special offers for the goods and services of others; application service provider services concerning social networking software; graphic design for the compilation of web pages on the Internet; information relating to computer hardware or software provided on-line from a global computer network or the Internet; creating and maintaining web-sites; hosting the web-sites of others; creation of web pages; the design, creation and hosting of merchant websites; the designing, creation and hosting of bill payment websites; computer and Internet related services, namely, providing on-line electronic databases via a global computer network in the field of identity authentication and verification; data encryption and decryption of financial information; digital signature authentication services for authentication of others, namely, data encryption and data integrity; providing for others encrypted and digitally signed and authenticated data for use in issuance, and validation of digital certificates in the field of document authentication; digital certificate verification, authentication, issuance, distribution and management; technical consultation services in the fields of computer programming, financial computer networks, data processing, secure communications, data encryption and decryption and local area network security; dissemination of information over a global computer network in the fields of computer software, computer hardware, financial computer networks and local area networks; data storage services; data repository services; data storage; rendering of computer graphics (digital imaging services); security services relating to computerised data; information, advisory and consultancy services relating to all the aforesaid services; Application service provider featuring application programming interact (API) software powered by blockchain for purchasing and transferring digital currency between wallets; application service provider featuring application programming interface (API) software powered by blockchain for supply chain management; technological consulting in the field of cryptocurrency; providing user authentication services using blockchain-based software technology for transactions involving cryptocurrency or digital files, images, videos, animations, games and artwork authenticated by non-fungible tokens (NFTs); authentication of data in the field of financial transactions using blockchain technology; providing online non-downloadable software for use as a cryptocurrency wallet; providing online non-downloadable cybersecurity software for the processing or exchange of cryptocurrencies and blockchain transactions; providing on-line non-downloadable software for the creation, production and modification of digital animated and non-animated designs and characters, avatars, and virtual goods in the form of digital files, images, videos, animations and artwork authenticated by non-fungible tokens (NFTs), for access and use in the metaverse and other virtual worlds; creating and hosting an on-line community for digital assets in metaverses and virtual worlds, authenticated by non-fungible tokens (NFTs); designing and hosting virtual environments in which users can interact for recreational, educational, networking, leisure or entertainment purposes. Legal services; security services for the physical protection of tangible property and individuals; personal and social services rendered by others to meet the needs of individuals, namely security assessment of risks, reviewing standards and practices to assure compliance with laws and regulations, identity verification and validations services, consultancy in the field of data theft and identity theft; consultancy (security -); Authentication of identity to reduce fraud in payment card transactions; financial transaction authentication and verification services; financial service to combat fraud, namely, fraud detection service in the field of banking; providing services to individuals and financial institutions to address identity restoration and security after identity theft or fraud, namely, analysis of potential identity theft.
70.
ANALYTICS RULES ENGINE FOR CREDIT TRANSACTION STACKING IDENTIFICATION
A system is configured to retrieve a set of raw transaction data. A transaction categorization model is applied to the raw transaction data. The transaction categorization model infers a category from each transaction and labels each transaction with the inferred category. An entity recognition model is applied to the labelled transaction data. The entity recognition model extracts an entity from each transaction and labels each transaction with the extracted entity. The system generates a plurality of transaction streams from the labelled transactions based on the category and entity labels. The system also labels each transaction stream with either a loan label or a non-loan label based on an analysis of the types of transactions defining the transaction stream. The system trains a supervised-based neural network using the labelled transaction streams to generate a credit stacking classifier model.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A system is configured to retrieve a set of raw transaction data. A transaction categorization model is applied to the raw transaction data. The transaction categorization model infers a category from each transaction and labels each transaction with the inferred category. An entity recognition model is applied to the labelled transaction data. The entity recognition model extracts an entity from each transaction and labels each transaction with the extracted entity. The system generates a plurality of transaction streams from the labelled transactions based on the category and entity labels. The system also labels each transaction stream with either a revenue label or a non-revenue label based on an analysis of the types of transactions defining the transaction stream. The system trains a supervised-based neural network using the labelled transaction streams to generate a revenue stream classifier model.
The disclosure relates to methods and systems of match classification based on ensemble modeling. Match classification based on ensemble modeling is a prediction that two or more data records match or mismatch one another based on the output of two or more classifiers trained to make this prediction. A first match classifier may include an ensemble of decision trees, which may be trained via gradient boosting, and in particular using extreme gradient boosting to generate a first match classification. The first match classifier, which is itself an ensembled model, may be ensembled together with at least a second match classifier trained via weak supervision to generate a second match classification, which may be aggregated with the first match classification. The aggregated classification may be used to determine whether or not two or more match candidates match one another.
There is provided a computer-implemented method for establishing a communication channel for exchanging messages securely between an initiator device and an endpoint device using an intermediary server. The initiator device is in communication with the intermediary server via a first session encrypted according to a cryptographic protocol. The endpoint device is in communication with the intermediary server via a second session encrypted according to a cryptographic protocol. A request for a handover token via the first session is sent to intermediary server. The handover token includes data that has been generated at the endpoint device and is configured to be used in setting up the communication channel between the initiator device and the endpoint device. The handover token is received from the intermediary server via the first session encrypted according to a cryptographic protocol. The communication channel is established between the initiator device and the endpoint device.
A system is configured to retrieve a set of raw transaction data. A transaction categorization model is applied to the raw transaction data. The transaction categorization model infers a category from each transaction and labels each transaction with the inferred category. An entity recognition model is applied to the labelled transaction data. The entity recognition model extracts an entity from each transaction and labels each transaction with the extracted entity. The system generates a plurality of transaction streams from the labelled transactions based on the category and entity labels. The system also labels each transaction stream with either a revenue label or a non-revenue label based on an analysis of the types of transactions defining the transaction stream. The system trains a supervised-based neural network using the labelled transaction streams to generate a revenue stream classifier model.
The disclosure relates to methods and systems of performing entity discovery based on an entity discovery model. Entity discovery refers to one or more computational processes that attempt to identify an entity when the identity of the entity is unknown. The entity discovery model may include multiple discovery stages. Each discovery stage of the entity discovery model may independently attempt to identify an entity. The entity discovery model may execute the discovery stages in a waterfall execution in which a discovery stage is executed only if a prior discovery stage failed to identify the entity, potentially reducing the computational overhead of executing all discovery stages. In other examples, the entity discovery model may execute the discovery stages in a parallel execution to minimize the time it takes to perform entity discovery.
H04L 67/51 - Discovery or management thereof, e.g. service location protocol [SLP] or web services
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G08B 21/00 - Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
G06Q 30/06 - Buying, selling or leasing transactions
36 - Financial, insurance and real estate services
Goods & Services
Business information and consultancy; business consulting services regarding credit card, debit card, and payment card acceptance, payment services, payment solutions, and related services; providing business information regarding credit card, debit card, and payment card acceptance, payment services, payment solutions, and related services. Financial services; financial services, namely, payment card transaction processing services; payment services; payment solution services; payment verification services; payment card transaction authorization and settlement services; payment transaction authentication, namely, providing secure commercial transactions and payment options and debt settlement services; secure electronic payment transactions over computer networks to facilitate electronic commerce; processing of financial transactions online via a global computer network or via telecommunication, mobile or wireless devices; providing financial information and electronic payment data via a global computer network or via telecommunication, mobile or wireless devices.
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Financial services, namely, transaction and payment processing services, payment verification services, payment card authorization, payment clearance and settlement services between financial institutions, switching services for credit cards, debit cards, charge cards and prepaid cards offered through cards with stored value; Financial services, namely, credit card, debit card, charge card and prepaid card transaction authorization and settlement services; credit, debit, charge and prepaid card transaction processing services; cash disbursement via automated teller machines; ATM banking services, namely, processing services for financial transactions by card holders via automatic teller machines; financial services, namely, the provision of contactless mobile payments processing through merchants at retail, online and wholesale locations; consulting services regarding payment solutions, banking, credit card, debit card and payment card; information, advisory and consultancy services relating to all the aforesaid services Providing online non-downloadable software for use in connection with payment services that allow users to access multiple funding sources via a single account; providing online non-downloadable software for facilitating and administering electronic payments; non-downloadable application programming interface (API) software for facilitating and administering electronic payments; application service provider featuring application programming interface software for routing credit and debit card payments for authorization and clearing; software as a service (Saas) for credit and debit card payment processing
09 - Scientific and electric apparatus and instruments
36 - Financial, insurance and real estate services
39 - Transport, packaging, storage and travel services
41 - Education, entertainment, sporting and cultural services
43 - Food and drink services, temporary accommodation
44 - Medical, veterinary, hygienic and cosmetic services; agriculture, horticulture and forestry services
45 - Legal and security services; personal services for individuals.
Goods & Services
Magnetic encoded cards and cards containing an integrated circuit chip in the nature of smart cards all containing programming used to process payments; cards encoded with security features for authentication purposes; cards encoded with security features for identification purposes; charge cards, bank cards, credit cards, debit cards, chip cards, stored value cards, electronic data carrier cards, payment cards and payment cards all encoded; banking cards, namely, magnetically encoded banking cards and banking cards using magnetic memories and integrated circuit memories Financial services, namely, transaction and payment processing services, payment verification services, payment card authorization, payment clearance and settlement services between financial institutions, switching services for credit cards, debit cards, charge cards and prepaid cards offered through cards with stored value; Financial services, namely, credit card, debit card, charge card and prepaid card transaction authorization and settlement services; credit, debit, charge and prepaid card transaction processing services; cash disbursement via automated teller machines; ATM banking services, namely, processing services for financial transactions by card holders via automatic teller machines; financial services, namely, the provision of contactless mobile payments processing through merchants at retail, online and wholesale locations; consulting services regarding payment solutions, banking, credit card, debit card and payment card; information, advisory and consultancy services relating to all the aforesaid services Personal services rendered by others to meet the needs of individuals, namely, travel and tour ticket reservation services and making reservations and bookings for transportation; booking and arranging of access to airport lounges for premier customer card holders and travelers; concierge services to meet the individual needs of premier customer card holders and travelers, namely, travel and tour ticket reservation services, making reservations and bookings for transportation, and providing customer-specific information related thereto Personal services rendered by others to meet the needs of individuals, namely, party and special event planning, arranging for ticket reservations for shows and other entertainment, sporting, or cultural events; concierge services to meet the individual needs of premier customer card holders and travelers, namely, party and special event planning, arranging for ticket reservations for shows and other entertainment, sporting, or cultural events, and providing customer-specific information related thereto Personal services rendered by others to meet the needs of individuals, namely, making restaurant and hotel reservations; providing bar and cocktail lounges also featuring related amenities being temporary accommodations in the nature of conference rooms, shower facilities, and work stations for relaxation to premier customer card holders and travelers in transit lounges; concierge services to meet the individual needs of premier customer card holders and travelers, namely, making restaurant and hotel reservations and providing customer-specific information related thereto Personal services rendered by others to meet the needs of individuals, namely, making reservations and bookings for physical and beauty treatments at salons and health spas; concierge services to meet the individual needs of premier customer card holders and travelers, namely, making reservations and bookings for physical and beauty treatments at salons and health spas, and providing customer-specific information related thereto Personal and social services rendered by others to meet the needs of individuals, namely, personal shopping services; hotel concierge services; concierge services to meet the individual needs of premier customer card holders and travelers, namely, personal shopping services and providing customer-specific information related thereto; security printing, namely, encoding identification information on products; monitoring of computer systems for security purposes; fraud detection services in the field of payment cards for on-line purchasing; investigation and surveillance services relating to identity theft as it relates to the safety of persons and entities
36 - Financial, insurance and real estate services
Goods & Services
(1) Consulting services regarding credit card, debit card, and payment card acceptance, payment services, payment solutions, and related services; providing information regarding credit card, debit card, and payment card acceptance, payment services, payment solutions, and related services
(2) Financial services, namely, payment card transaction processing services; payment services; payment solution services; payment verification services; payment card transaction authorization and settlement services; payment transaction authentication, namely, providing secure commercial transactions and payment options and debt settlement services; secure electronic payment transactions over computer networks to facilitate electronic commerce; processing of financial transactions online via a global computer network or via telecommunication, mobile or wireless devices; providing financial information and electronic payment data via a global computer network or via telecommunication, mobile or wireless devices
Systems and methods for enabling biometric transactions are provided. One example computer-implemented method includes receiving a request to provision a biometric for biometric transactions to a payment account of a user, where the request includes a cryptogram associated with a transaction to the payment account, and checking with an issuer of the payment account whether the payment account is supported for biometric transactions. In response to the payment account not being supported for biometric transactions, the method includes validating the cryptogram, receiving from the issuer an eligibility code for the payment account, receiving a verification result for the cryptogram, and requesting a biometric from the user. The method then includes receiving biometric data indicative of a biometric of the user and transmitting a request to the issuer to enable biometric transactions for the payment account, where the request includes an identifier of the payment account and the verification result.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
The present invention discloses a method of processing a data transfer request securely over a network, the method comprising the steps of obtaining, by a first entity, a first token associated with sensitive data received from a user; associating the first token with a token reference and storing the token reference; sending the token reference to a second entity; requesting a second token from a second entity upon receiving a data transfer request from a third entity, wherein the second token is derived from the first token using an ad hoc logic; and processing the data transfer request using the second token.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A system and method for using user-selected transactions preferences stored on a payment card in a transaction includes transmitting a cold reset signal to the payment card. An answer-to-reset message is received from the payment card. The answer-to-reset message includes governing rules for performing a transaction, including user-selected transaction preferences data associated with one or more user-selected transaction preferences for performing the transaction. The process also includes receiving payment account details for a payment account associated with the payment card. A payment authorization request message is transmitted to an interchange network. The request message includes one or more data elements associated with the user-selected transaction preferences data. A payment authorization request response message is then received from the interchange network, based on the transaction preferences. One or more of the user-selected transaction preferences is then executed.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
83.
SYSTEMS AND METHODS FOR SIMPLIFIED SUPPLY CHAIN MANAGEMENT
Examples provide methods for managing inventory exchanges between suppliers and merchants. The method includes transmitting a unit code associated with a unit of product to a supplier, where the unit code is a machine-readable image that embeds a unit identifier (ID) allocated to individual units of product; receiving a message that includes the unit ID having been extracted from the unit code by a first scanning device; automatically performing a procurement transaction from the merchant to the supplier for a stocking price, being a first portion of a wholesale price associated with the unit of product; receiving, from the merchant upon detection of a retail sale of the unit of product, a sale message that includes the unit ID; and automatically performing a supplier share transaction from the merchant to the supplier for a remainder price, the remainder price being a second portion of the wholesale price.
Disclosed are example embodiments of systems and methods for generating one or more recommendations based on, at least in part, unstructured data. In an example embodiment, a method generally includes accessing transaction data representative of a plurality of transactions, the transaction data including unstructured data describing ones of the plurality of transactions and structured data indicative of the transactions, where at least a portion of the transactions involve a user. The method also includes compiling, by a computing device, using a convolution neural network (CNN) with the unstructured data from the transaction data and a recurrent neural network (RNN) with structure data of the transaction data, one or more feature vector indicative of the user. The method then includes generating a recommendation based on the feature vector for the user and publishing the recommendation.
The disclosure herein describes causing a database operation to be performed via a microservice. A translation layer exposes a translation API that is configured to receive commands in an API command format. A command in the API command format is received from a command sender that includes a database type. A microservice configured to perform the received command based on the included database type is identified. The command is transferred to the identified microservice, which is configured to translate the transferred command to a database command format associated with the database type and perform the translated command in association with a database. A response is received from the microservice based on performance of the command by the microservice, wherein the received response is in a response format that is compatible with the exposed translation API, and the received response is provided, via the exposed translation API, to the command sender.
A computer-implemented method generates a requested image based on an image style. An image style is selected, and an image generation model is trained using the selected image style. In some examples, the image generation model is a diffusion model. An image request input is received (e.g., text input, drawing input, and/or voice input) and, based on the received image request input, an image is generated using the trained image generation model. The generated image is in the selected image style. The generated image is then output in response to the received image request input. Further, in some examples, feedback associated with the generated image is received and the image generation model is further trained based on the received feedback to improve the quality of its image generation. Additionally, in some examples, the generated image is applied to an item for sale, enabling users to personalized items with generated images.
Disclosed are example embodiments of systems and methods for provisioning and/or using tokens for unsupported accounts. In an example embodiment, a method generally includes receiving, by a token host computing device, from a wallet application in a mobile device, a provisioning request to provision a token for an account, where the account is unsupported by the wallet application. The method also includes generating a token for the account and storing the token in a memory in association with an account number for the account. The method then further includes returning the token to the wallet application, whereby the token is stored in the mobile device for use in initiating transactions to the account.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
89.
IDENTIFYING THREATS USING AGGREGATED SECURITY DATA AND TRAINED MODELS
A computerized system and method for receiving security data from a plurality of security data sources, such as security tools, platforms, and/or other applications that are running in an enterprise system or other complex system is provided. The security data is then processed and analyzed to detect anomalous events and to automatically perform remedial operations in response to anomalous events. Security data from multiple sources is obtained. The security data is normalized such that it is compatible with a model trained for a use case. The model is used in combination with the normalized data to detect anomalous events and/or predict future security events associated with the use case of the model. Then, data associated with the detected anomalous events and/or predicted future security events are presented using a visualization layer and/or a remedial operation is performed.
Disclosed are example embodiments of systems and methods for generating one or more recommendations based on, at least in part, unstructured data. In an example embodiment, a method generally includes accessing transaction data representative of a plurality of transactions, the transaction data including unstructured data describing ones of the plurality of transactions and structured data indicative of the transactions, where at least a portion of the transactions involve a user. The method also includes compiling, by a computing device, using a convolution neural network (CNN) with the unstructured data from the transaction data and a recurrent neural network (RNN) with structure data of the transaction data, one or more feature vector indicative of the user. The method then includes generating a recommendation based on the feature vector for the user and publishing the recommendation.
Disclosed are example embodiments of systems and methods for provisioning and/or using tokens for unsupported accounts. In an example embodiment, a method generally includes receiving, by a token host computing device, from a wallet application in a mobile device, a provisioning request to provision a token for an account, where the account is unsupported by the wallet application. The method also includes generating a token for the account and storing the token in a memory in association with an account number for the account. The method then further includes returning the token to the wallet application, whereby the token is stored in the mobile device for use in initiating transactions to the account.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
09 - Scientific and electric apparatus and instruments
36 - Financial, insurance and real estate services
37 - Construction and mining; installation and repair services
Goods & Services
Charging stations for electric vehicles; battery charging apparatus and fittings; software; software applications; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; data processing equipment, computers; computer software and computer programs (downloadable/recorded computer software); computer operating programs, recorded; computer hardware and software (recorded and/or downloadable) for facilitating and administering payment, banking, credit card, debit card, payment card, automatic teller machine, stored value, electronic funds transfer, electronic payments, electronic processing and transmission of bill payment data, cash disbursement, transaction authentication, routing, authorization and settlement services, fraud detection and control, disaster recovery and encryption services; apparatus for tracking, management and analysis of financial accounts via a global computer network; computer hardware and software for facilitating payment transactions by electronic means over wireless networks, global computer networks and/or mobile telecommunications devices; payment card readers; magnetic coded card readers, electronic data carrier card readers, electronic encryption units, computer hardware, computer terminals, computer software for use in the financial services, banking and telecommunications industries; computer software designed to enable smart cards to interact with terminals and readers; computer chips embedded in telephones and other communication devices; telecommunications equipment; point of sale transaction terminals and computer software for transmitting, displaying and storing transaction, identification and financial information for use in financial services; electronic verification apparatus for verifying authentication of charge cards, bank cards, credit cards, debit cards and payment cards. Financial services; electronic payment processing; electronic payment services; e-wallet services; electronic funds transfer services; financing relating to cars and electric vehicles. Recharging services; recharging of batteries for electric vehicles; recharging of accumulators for electric vehicles; recharging services for electric vehicles; maintenance and repair services for batteries for electric vehicles, accumulators for electric vehicles and electric vehicles.
93.
PERSONALIZING ARTICLES USING GENERATIVE ARTIFICIAL INTELLIGENCE
A computer-implemented method generates a requested image based on an image style. An image style is selected, and an image generation model is trained using the selected image style. In some examples, the image generation model is a diffusion model. An image request input is received (e.g., text input, drawing input, and/or voice input) and, based on the received image request input, an image is generated using the trained image generation model. The generated image is in the selected image style. The generated image is then output in response to the received image request input. Further, in some examples, feedback associated with the generated image is received and the image generation model is further trained based on the received feedback to improve the quality of its image generation. Additionally, in some examples, the generated image is applied to an item for sale, enabling users to personalized items with generated images.
An authentication platform for authenticating an online user is provided. The authentication platform includes a memory device and at least one processor coupled to the memory device. The at least one processor is programmed to generate an authentication model using historical data. The at least one processor is further configured to receive, from a merchant computing device, an authentication request message for a current transaction, the authentication request message including consumer identity data for the current transaction and extract the consumer identity data from the authentication request message. The at least one processor is further configured to generate, based on the extracted consumer identity data, identity insight result data using the authentication model, inject the identity insight result data into an authorization request message to generate an enhanced authorization request message, and transmit the enhanced authorization request message to an issuer computing device.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Systems and methods are provided for use in verifying an interaction, between a user and a first party, in which the user is physically present at the first party. One example computer-implemented method includes receiving a data tag request for a transaction, from a first party, and generating a data tag for the transaction where the data tag includes an indicator of a type of user verification for the transaction. The method also includes storing the data tag in a data structure and transmitting the data tag to the first party, in response to the data tag request. The method then includes receiving, by a processing network, an authorization request including a data tag, verifying that the data tag from the authorization request matches the stored data tag, and in response to failed verification of the data tag in the authorization request, removing the data tag from the authorization request.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A system and method for auto-enrolment of a user's payment device in an e-commerce payments system upon activation of the payment device, where the enrolment of the payment device follow sequentially from the activation of the payment device.
Cryptocurrency based malware and ransomware detection systems and methods are disclosed herein. An example method includes analyzing a plurality of malware or ransomware attacks to determine cryptocurrency payment address of malware or ransomware attacks, building a malware or ransomware attack database with the cryptocurrency payment addresses of the plurality of malware or ransomware attacks, identifying a proposed cryptocurrency transaction that includes an address that is included in the malware or ransomware attack database, and denying the proposed cryptocurrency transaction.
G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
98.
SYSTEMS AND METHODS FOR REMOTE ACCESS LATENCY REDUCTION
Systems and methods are provided for use in providing remote access across multiple regions. One example method includes receiving a remote access request from a user terminal associated with a remote user, where the request is specific to a first data center of a network, and opening, by a front-end firewall, a first IP security (IPSec) tunnel with the user terminal. The method also includes forwarding, by the front-end firewall, the request to a distribution firewall and routing, by the distribution firewall, the request to a back-end firewall, which is specific to the first data center. The method then further includes opening, by the back-end firewall, a second IPSec tunnel with the network and forwarding the request, through the second IPSec tunnel, to the network to thereby support communication between the user terminal and the network, via the first and second IPSec tunnels.
Fraud transactions are detected in peer-to-peer payments without an intermediary. Audit trails associated with a chain of transactions to transfer digital currency from an initial sending wallet to a final receiving wallet are generated and associated with a token of the digital currency. Each token maintains an audit trail of intermediate digital wallets through which that token transacted before being received by the final receiving wallet. A request is received to identify whether a first transaction, of the chain of transactions, is a fraud transaction. In response to the request, a first audit trail associated with a first token associated with the first transaction is retrieved. When wallet cloning or value manipulation is detected, by analyzing the first audit trail, in the first token associated with the first transaction, the first transaction is determined as the fraud transaction.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
H04L 9/12 - Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system