Systems and methods for providing and executing a data processing tool are disclosed. The data processing tool may include an attribute processing agent which may be embedded in a database system. The attribute processing agent can receive input data and a custom-made attribute as an input and process the input data in accordance with the custom-made attribute. In some embodiments, there may be multiple attribute processing agents distributed in multiple computing nodes. Each attribute processing agent may be configured to process a portion of a data set based on the storage location of the portion of the data set.
Systems and methods are provided for adjustment of difficulty level, quantity, and/or other parameters of knowledge-based authentication. The questions may be asked of a consumer based on one or more generated risk scores associated with the consumer's behavior, which may be derived from information received from the consumer, a representative responsible for entering information regarding the consumer, and/or from the consumer's computing device.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations
3.
Methods and apparatuses for customized credit card recommendations
A credit card recommendation system for recommending credit cards to a user can be based on the consumer's estimated monthly spend, estimated spend across a plurality of categories, and user credit data. The credit card recommendation system can filter credit cards based on a likelihood of approval for the user. The credit card recommendation can determine a reward valuation and an adjustment valuation by assessing user spend and the characteristics corresponding to the credit card. The credit card recommendation can train a model to score credit cards for users, and apply specific user data to the model to determine a credit card score particular to the user.
Quantitative estimate accuracy scoring is provided. An estimate scoring engine uses estimate scoring model logic to quantitatively measure the accuracy of an estimate for healthcare services relative to actual values associated with an adjudication of a claim for the services. Scores are determined for various factors that impact estimate accuracy, and a total estimate accuracy score may be determined. A report may be generated and displayed in a user interface including information received and/or determined by the estimate scoring engine. A plurality of estimates may be evaluated, and the report may include a summary and details associated with the accuracy of a range of estimates. An accuracy rate associated with the range of estimates may be measured against the accuracy rate of other healthcare services providers, payers, and/or estimation models in an ‘apples-to-apples’ comparison. Accordingly, issues associated with estimate inaccuracies may be identified and addressed to improve estimate accuracy.
G16H 40/00 - TIC spécialement adaptées à la gestion ou à l’administration de ressources ou d’établissements de santé; TIC spécialement adaptées à la gestion ou au fonctionnement d’équipement ou de dispositifs médicaux
36 - Services financiers, assurances et affaires immobilières
Produits et services
Credit card services; providing credit card pre-qualification review; matching available credit cards to consumers; providing personalized credit card offers based on credit profiles; analysis of credit card offerings and qualifications; credit card approval processing; financial services; financial consultation, analysis of credit and available credit cards; downloadable computer software for matching available credit cards to consumers, for credit card application filing and for credit card approval and pre-qualification review; credit monitoring, credit scores reporting; downloadable computer software for assessing consumer credit, consumer credit reporting, assessing and comparing credit cards for consumers; downloadable computer application software for mobile phones, namely, software for matching available credit cards to consumers and for providing personalized credit card offers based on credit profiles and for assessing and comparing credit cards; direct to consumer financial information provided by electronic means
6.
METHODS AND SYSTEMS FOR PERSISTENT CROSS-APPLICATION MOBILE DEVICE IDENTIFICATION
Systems and methods are provided for persistent cross-application mobile device identification. A mobile device may have a plurality of sandboxes in memory containing applications. The mobile device may have a shared storage which may accessible by applications from different sandboxes. A storage location identifier may be used to access information in shared storage. A universal device identifier may be stored in the shared storage to identify the mobile device and may be accessible by multiple applications and updates to applications. The universal device identifier may be used to track the mobile device for advertising, fraud detection, reputation tracking, or other purposes.
G06F 21/53 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p.ex. "boîte à sable" ou machine virtuelle sécurisée
G06F 21/73 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information par création ou détermination de l’identification de la machine, p.ex. numéros de série
H04W 12/069 - Authentification utilisant des certificats ou des clés pré-partagées
H04W 12/086 - Sécurité d'accès utilisant les domaines de sécurité
7.
SYSTEM AND METHOD FOR GENERATING A FINANCE ATTRIBUTE FROM TRADELINE DATA
Embodiments of a system and method are described for generating a finance attribute. In one embodiment, the systems and methods retrieve raw tradeline data from a plurality of credit bureaus, retrieve industry code data related to each of the plurality of credit bureaus, determine one or more tradeline leveling characteristics that meet at least one pre-determined threshold, and generate a finance attribute using the selected leveling characteristics.
G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
G06Q 10/04 - Prévision ou optimisation spécialement adaptées à des fins administratives ou de gestion, p. ex. programmation linéaire ou "problème d’optimisation des stocks"
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
8.
DATABASE SYSTEM FOR TRIGGERING EVENT NOTIFICATIONS BASED ON UPDATES TO DATABASE RECORDS
A data processing system is disclosed for accessing databases and updated data items and triggering event notifications. The data processing system may comprise a first database including a plurality of records, and a second database including a plurality of trigger indicators. The database system may further include a hardware processor configured to execute computer-executable instructions in order to: receive an update data item; identify a record corresponding to the update data item; cause an update to the record based on information included with the update data item; identify a trigger indicator corresponding to the update to the record; determine that a type of the trigger indicator matches a type of the update to the record; and generate an event notification including information included in the update.
G06F 16/21 - Conception, administration ou maintenance des bases de données
G06F 16/215 - Amélioration de la qualité des données; Nettoyage des données, p.ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
One aspect of the subject matter described herein comprises a database management system. The database management system comprises a communication circuit, an interface, and a processor. The communication circuit receives information from databases via a communication network. The interface allows user operation and interaction via the communication network and the database management system. The processor provides data to and receives data from the interface, including a plurality of alphanumeric records comprising at least one unique identifier, obtains database records from other databases for each unique identifier, identifies a number of alphanumeric records in the plurality having events in their histories, determines a percentage of alphanumeric records in the plurality having negative events in their histories, generates a report including the determined percentages, and conveys the report to the user.
G06F 16/248 - Présentation des résultats de requêtes
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
G06F 16/951 - Indexation; Techniques d’exploration du Web
Systems and methods are provided for assessing an account takeover risk for one or more accounts of an individual. The account security procedures for each of a number of services with which the user has an account may be analyzed. Publicly accessible information regarding the user may also be collected and analyzed. The collected information and security procedures may be compared in order to determine one or more vulnerabilities to hostile account takeover of one or more of the analyzed accounts. An alert may be generated regarding a determined takeover risk, which may include suggested actions for remedying the risk.
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
Features for providing a secure method of symmetric encryption for private smart contacts among multiple parties in a private peer-to-peer network. The features include a master key representing a unique blockchain ledger. The master key may be shared among multiple participants in a private peer-to-peer network. Sharing of the master key may include communicating the master key in an encrypted message (e.g., email) using public key infrastructure (PKI). In some implementations, more complex distribution features may be includes such as quantum entanglement. The features support instantiation of a smart contract using a specific master key. The request may be submitted as an entry to the ledger with appropriate metadata and/or payload information for identifying and processing the request.
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
H04L 9/16 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes qui sont changés pendant l'opération
H04L 67/1074 - Réseaux de pairs [P2P] pour la prise en charge des mécanismes de transmission de blocs de données
Systems and methods for fraud containment are provided in accordance with an embodiment of the invention. A fraud event may be detected. One or more devices that may be used in perpetrating the fraud event may be detected. Additionally one or more potential fraud victims, who may be grouped into victim circles may be detected. The threat level to the victims and/or victim circles may be assessed. In some instances, behavioral profiles may be utilized to make fraud assessments. Based on the threat level, recommendations for fraud containment responses may be provided.
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
Embodiments of the present invention assist in the development, management, and deployment of aggregated data attributes for multiple data sources. One embodiment provides a development interface that allows for elements of attributes, including filters, to be moved into a coding area in which an attribute or an attribute element is being edited. In another embodiment, the user interface presents data fields to assist in the development of filters for multiple data sources with divergent formats. The application further provides a validation interface through which users can validate attributes and trace the results returned by various elements referenced by the attributes under validation. Another embodiment provides a system for managing attributes and deploying them to various systems by creating a deployment file that is used by an attribute calculation system. In one embodiment, the attribute calculation system is a scalable system that dynamically calculates attributes for multiple data sources.
G06F 1/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES - Détails non couverts par les groupes et
G06F 11/07 - Réaction à l'apparition d'un défaut, p.ex. tolérance de certains défauts
G06F 11/22 - Détection ou localisation du matériel d'ordinateur défectueux en effectuant des tests pendant les opérations d'attente ou pendant les temps morts, p.ex. essais de mise en route
G06F 16/90 - Recherche d’informations; Structures de bases de données à cet effet; Structures de systèmes de fichiers à cet effet - Détails des fonctions des bases de données indépendantes des types de données cherchés
G06Q 40/04 - Transactions; Opérations boursières, p.ex. actions, marchandises, produits dérivés ou change de devises
14.
SYSTEMS AND METHODS OF PRESENTING SIMULATED CREDIT SCORE INFORMATION
In an embodiment, a computer system receives credit information relating to a consumer, and calculates a credit score associated with the consumer. The system constructs a credit score scenario user interface. The system maintains a plurality of credit score simulation scenarios, and calculates a plurality of simulated credit scores associated with respective credit score simulation scenarios. The system also constructs a credit score simulation control interface. The system maintains a plurality of credit score simulation parameters, and generates a user interface with a graphical indication of the calculated credit score and a plurality of sliders, each slider being divided into segments that are colored to graphically indicate the likely effect of repositioning the slider within the respective segment. When the user repositions the sliders, the graphical indication of the calculated credit score is adjusted, based on a recalculation of the credit score.
One embodiment of a system for automatically generating code for attributes includes a credit bureau data store that stores credit bureau convention information and an attribute generation system that communicates with the credit data store to detect rules associated with respective credit bureaus. The system may include an input module which receives, from a user system, a document comprising pseudo-code defining attributes including credit bureau specific logic; an error checking module which automatically performs error checking and provides error correcting information on the document; an attribute verification module which parses the document to identify attributes and automatically retrieves rules associated with the respective credit bureaus; a document generation module which generates an attribute specification document based on the retrieved rules as applied to the attributes in the document; and a code generation module which generates an executable code set based on the retrieved plurality of attributes and credit bureau specific rules.
The features relate to artificial intelligence directed detection of user behavior based on complex analysis of user event data including language modeling to generate distributed representations of user behavior. Further features are described for reducing the amount of data needed to represent relationships between events such as transaction events received from card readers or point of sale systems. Machine learning features for dynamically determining an optimal set of attributes to use as the language model as well as for comparing current event data to historical event data are also included.
Embodiments of a security and identity verification system are disclosed. The security and identity verification system may comprise a system that conducts automated identify verification of tax filers and generates electronic alerts to send to tax filers upon filing of a tax form with a tax service provider. The tax fraud alert system may also provide remediation services in coordination with tax service providers in the event a fraudulent form is filed; and/or validate tax identity information and the corresponding good or best tax filer contact information in order to notify the tax filer in a timely manner.
One embodiment of the system and method described herein provides a computer system configured to provide an interface for operation by a user at a remote computing device, receive a request from the user for a vehicle history report of a vehicle. The computer system is further configured to prompt the user for interest in a prequalification for a financing offer. The computer system is further configured to receive the indication of the user's interest in the prequalification. The system also includes a data storage module, accessible by the computer system, configured to retrieve data corresponding to the vehicle, store the retrieved data, retrieve data corresponding to a determination regarding the prequalification for the financing offer, and store the retrieved determination. The computer system is further configured to convey the vehicle history report to the user and convey the prequalification determination to the user.
G07C 5/08 - Enregistrement ou indication de données de marche autres que le temps de circulation, de fonctionnement, d'arrêt ou d'attente, avec ou sans enregistrement des temps de circulation, de fonctionnement, d'arrêt ou d'attente
A card registry system is configured to automatically identify financial card information in one or more credit files associated with a consumer and populate a card registry account of the consumer with the identified financial card information. Once the financial card information has been obtained from the credit file(s), the card registry system may transmit cancellation and/or reissuance requests to the respective card issuers in the instance that one or more cards are compromised, so that the financial cards may be easily and efficiently cancelled and/or reissued at the request of the consumer.
G06Q 20/24 - Schémas de crédit, c. à d. de "paiement différé"
G06Q 20/26 - Schémas de débit, c. à d. de "paiement immédiat"
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
20.
Data architecture for supporting multiple search models
Embodiments include a search and match computing system configured to: access, from a third party computing system, a query regarding at least one entity; determine if the query is a structured query or an unstructured query; process the query with at least one of an application programming interface configured to receive structured queries or a second application programming interface receive unstructured queries; initiate a search and match application configured to execute queries on at least one of: a relational data scheme or a non-relational data scheme; receive search results from the at least one of: the relational data scheme or the non-relational data scheme; and process the received search results to generate an output data packet for access by the third party computing system.
G06F 16/248 - Présentation des résultats de requêtes
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
G06F 16/9535 - Adaptation de la recherche basée sur les profils des utilisateurs et la personnalisation
21.
SYSTEMS AND METHODS FOR ACCESSING RECORDS VIA DERIVATIVE LOCATORS
Systems and methods are provided for accessing records using derivative locators. An open financial transaction may be initiated by a consumer at a merchant. The merchant may provide transaction information to the acquiring bank, which may provide transaction to the global financial network, which may provide transaction information to an issuing bank. One or more requesting party (e.g., one or more of the acquiring bank, global financial network, or issuing bank) may formulate a derivative locator based on the transaction information received. The derivative locator may function as an index through which records in the repository may be accessed by the requesting party. A time comparison may be made in assisting with accessing the correct record in the repository. The requesting party may determine whether to accept or decline the transaction, optionally with the aid of the information accessed from the repository.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
The present disclosure describes systems and methods for determining correlation codes for tree-based decisioning models. In one embodiment, a method for determining correlation codes in a tree-based decision model includes: assigning each decision node in a tree-based decision model to a correlation code; initializing a risk sum for each correlation code; calculating, for all decision nodes in the tree-based decision model, a difference in risk between child nodes and respective parent nodes; updating the risk sum for each correlation code associated with the decision node used in the decision for the node; determining the feature with the highest risk sum; and determining the correlation code associated with the determined decision node.
A method for providing pre-data breach monitoring provides information to businesses that is useful to predict portions of the company data that may not be secured well enough and other risks associated with data breaches, such as employees that may not be trustworthy.
G06Q 50/00 - Systèmes ou procédés spécialement adaptés à un secteur particulier d’activité économique, p.ex. aux services d’utilité publique ou au tourisme
G06Q 50/26 - Services gouvernementaux ou services publics
24.
System and method for device identification and uniqueness
Systems and methods for determining uniqueness of device identifiers are provided are provided. The uniqueness of a device identifier may be indicated by a device quality score or grade that is calculated based on a plurality of parameters associated with a device identifier as well as evaluation rules derived based on historical data. The plurality of parameters may be associated with a network event or transaction associated with the device identifier. The evaluation rules may be derived using machine learning techniques. Based on uniqueness of a device identifier, a suitable action or measure may be taken.
The invention provides one or more consortia of networks that identify and share information about users and/or user devices interacting with the consortia. User devices may be identified, at least in part, by a delta of time parameter between a user device used and a reference time. Other parameters may be analyzed to identify a computer user and/or device and noteworthy transactions. The invention may be used for identity-based applications such as network security, the detection of fraudulent transactions, identity theft, ratings-based communities and law enforcement. User may be permitted to register user devices in order to control access for performing transactions.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06F 21/44 - Authentification de programme ou de dispositif
26.
Systems and methods of sharing information through a tag-based consortium
The invention provides one or more consortia of networks that identify and share information about users and/or user devices interacting with the consortia. User devices may be identified, at least in part, by tag-based computer information. Computers and other devices accessing the Web carry device tags with date and time information describing when they were issued by a security tag server. A server time stamp may be inserted into time based computer tags such as a cookies indicating when they were created. Such time stamp information can be encrypted and analyzed during future attempts to access a secure network such as a customer attempting to log into an online banking account. When the time stamp information from the tag is compared to other selected information about the user, device and/or account, including but not limited to last account log-in date/time or account creation date, the invention may be used to detect suspicious activity. The invention may be use for identity-based applications such as network security, the detection of fraudulent transactions, identity theft, reputation-based communities, and law enforcement.
Aspects include a system that provides an end to end, digital self-registration experience to significantly limit and/or eliminate the time a user must spend in a registrar or waiting area checking in and filling out paperwork prior to a scheduled appointment, while also increasing accuracy of the user information obtained. For example, once an appointment has been scheduled for the user, the system may generate and transmit a push notification, such as a text message, to the user's device. The text message may include a selectable link directing the user to an application that guides the user seamlessly through a self-registration process. The self-registration process includes, among other steps, identity verification, payer verification, provision of demographic information, appointment confirmation, and post-confirmation steps (e.g., form completion, reminders, and day of appointment instructions and directions). Additionally, the system may monitor and facilitate an authorization process associated with the appointment.
G06Q 10/1093 - Ordonnancement basé sur un agenda pour des personnes ou des groupes
G01C 21/34 - Recherche d'itinéraire; Guidage en matière d'itinéraire
G06Q 10/02 - Réservations, p.ex. pour billetterie, services ou manifestations
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Aspects include a system and method of automatic data segmentation to optimize a client's collection efforts against individuals serviced by the client. At least accounts receivables data, historical payment data, and credit related data associated with an individual may be provided to a model as input data to predict a recovery value for the individual. The recovery value may be a weighted average of a unit yield and recovery rate. Based on the predicted recovery value and client-provided segmentation boundaries that define segments as a range of recovery values, the individual may be assigned to a segment. The segment may inform the client of a particular collection strategy for the individual to optimize collection efforts. Additionally, recovery values for the individuals serviced by the client may be provided to a comparison system and utilized to directly compare collection efforts across a plurality of clients nationally and/or demographically.
In one embodiment, a method includes receiving, from a requestor, a request for an on-demand identity product in relation to an identity of a consumer, the request comprising personally identifying information (PII) of the consumer. The method also includes executing, using the PII, a partial registration of the consumer for the on-demand identity product, the partial registration omitting satisfaction of at least one security requirement. The method additionally includes determining whether delayed authentication is enabled for the on-demand identity product. Moreover, the method includes, responsive to a determination that delayed authentication is enabled for the on-demand identity product: conditionally suspending the at least one security requirement; initiating provision of the on-demand identity product to the requestor; and restricting the requestor' s access to determined sensitive data resulting from the initiated provision at least until the at least one security requirement is satisfied.
Embodiments of a system may comprise databases and a processor that receives a first filter item and a database filter item, generates a first database based on the first filter item, integrate data from the first database into the user database to create an updated plurality of user records, generate a second database based on a selected set of records, in the updated plurality of user records, corresponding to the database filter item, determine metrics that correspond to the second database, generate a model to segregate the second database using the metrics, receive criteria, compare the segregated second database with the criteria to remove records that do not meet the criteria, cause a subsequent update to the updated second database to integrate data from the event database to create an updated diminished second database, and generate a notification including information included in the updated diminished second database.
G06F 16/00 - Recherche d’informations; Structures de bases de données à cet effet; Structures de systèmes de fichiers à cet effet
G06F 16/21 - Conception, administration ou maintenance des bases de données
G06F 16/9035 - Filtrage basé sur des données supplémentaires, p.ex. sur des profils d'utilisateurs ou de groupes
G06F 16/904 - Navigation; Visualisation à cet effet
G06F 16/909 - Recherche caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des informations géographiques ou spatiales, p.ex. la localisation
Systems and methods are provided for credit dispute processing, resolution, and reporting. Credit dispute resolution requests may be received, processed, and sent to a credit bureau for submission to creditors. Status of credit dispute resolutions may be reported to consumers. If a creditor's response time is longer than its average response time or if a creditor does not respond to a credit dispute resolution request within a regulatory response period, alerts and reports may be sent to consumers to provide consumers with further options.
Several credit score management user interfaces that may comprise a credit score thresholds user interface, a credit score alert settings user interface, and several credit score alert notification user interfaces, enable a consumer to set and/or adjust credit score goals and warnings, and credit score alert settings. The credit score threshold visual interface may present one or more credit score thresholds (for credit score goals and/or warnings) for the consumer on a line graph. The consumer may set and/or adjust the credit score thresholds based on touch input. The user interfaces may be updated automatically in real-time in response to the touch input. Alerts may be generated and provided to the consumer based on alert settings, changes to the consumer's credit information, the credit score thresholds, and/or macroeconomic events or factors.
G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
G06F 3/041 - Numériseurs, p.ex. pour des écrans ou des pavés tactiles, caractérisés par les moyens de transduction
G06F 3/048 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI]
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p.ex. des menus
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
G06F 3/0488 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p.ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p.ex. des gestes en fonction de la pression exer utilisant un écran tactile ou une tablette numérique, p.ex. entrée de commandes par des tracés gestuels
G06Q 40/00 - Finance; Assurance; Stratégies fiscales; Traitement des impôts sur les sociétés ou sur le revenu
Methods and systems are disclosed that identify and locate debt settlement candidates based on credit data associated with the consumer. For example, candidacy may be based on a debt score, generated by an assessment of the consumer's credit data. Credit data may include the consumer's credit score rank, credit score, revolving credit to debit ratio, credit available, delinquent accounts, negative accounts, instances of negative information on their credit report, public record data, average account age, debit, or a combination thereof.
Certain consumers may not have a credit report and, thus, may not be able to enroll in a credit monitoring service. A credit report monitoring system requests a credit report of consumers that are attempting to enroll in a credit monitoring service. If no credit report is located for the consumer, a credit report of the consumer is automatically periodically requested by the system. When a credit report is later located, the consumer may continue with enrollment in a credit report monitoring service. In this way, the consumer is alerted of the (possibly fraudulent) creation of a credit report and is quickly able to enroll in a credit monitoring service.
One embodiment of an existing customer lead generation system comprises a vendor customer information database, a vendor criteria database, a web server, a matching engine, and a transmission component. The vendor customer information database identifies vendor's existing customers. The vendor criteria database determines which leads each vendor wants to receive. Separate criteria may be specified for consumers that are existing customers and consumers that are not existing customers. The web server receives characteristics of a consumer and a product or service. The matching engine compares the consumer characteristics with the vendor customer information database to identify vendors for which the consumer is an existing customer. The matching engine applies existing customer criteria to match the consumer with existing vendors. The matching engine applies non-existing customer criteria to match the consumer with other vendors. The transmission component transmits a lead identifying the consumer to the matched vendors.
The invention provides methods and apparatus for detecting when an online session is compromised. A plurality of device fingerprints may be collected from a user computer that is associated with a designated Session ID. A server may include pages that are delivered to a user for viewing in a browser at which time device fingerprints and Session ID information are collected. By collecting device fingerprints and session information at several locations among the pages delivered by the server throughout an online session, and not only one time or at log-in, a comparison between the fingerprints in association with a Session ID can identify the likelihood of session tampering and man-in-the middle attacks.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Aspects include a pre-service optimization system that provides timely and accurate estimate information to clients. Responsive to an indication of an order for a service, the system may generate an estimate of service costs, including the client responsibility amount, generate an elasticity estimate corresponding to the estimate including an indication of how likely the estimate is to change, a range within which the estimate is likely to change, and information about trigger points that affect the possible variability of the estimate. The system may push a notification to the client that includes a link to access the estimate and elasticity estimate. The notification may be delivered to the client in real time or near-real time as the estimate is generated. The system may further provide a user interface via which the client can access the estimate and elasticity estimate, and to access scheduling, payment, and financial assistance functionalities.
G16H 10/00 - TIC spécialement adaptées au maniement ou au traitement des données médicales ou de soins de santé relatives aux patients
G16H 40/00 - TIC spécialement adaptées à la gestion ou à l’administration de ressources ou d’établissements de santé; TIC spécialement adaptées à la gestion ou au fonctionnement d’équipement ou de dispositifs médicaux
Methods and systems are provided for generating alerts in association with a request to open an account for an individual. For example, information identifying an individual may be received from a financial entity in association with the financial entity receiving a request to open an account for the individual from a requesting entity. The requesting entity may be a vendor or service provider associated with the financial entity. An electronic notification may then be sent to the individual, which may include a selectable option to indicate that the individual does not authorize opening of the account. In response to receiving an indication that the individual does not authorize opening of the account, notifications may be sent to both the financial entity and the requesting entity indicating that the individual has not authorized opening of the account.
G06Q 20/00 - Architectures, schémas ou protocoles de paiement
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/42 - Confirmation, p.ex. contrôle ou autorisation de paiement par le débiteur légal
H04M 1/72436 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles avec des moyens de soutien local des applications accroissant la fonctionnalité avec des moyens interactifs de gestion interne des messages pour la messagerie textuelle, p.ex. SMS ou courriel
H04M 1/72448 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles avec des moyens permettant d’adapter la fonctionnalité du dispositif dans des circonstances spécifiques
H04M 1/72484 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles où les fonctions sont activées par la réception d’une démarche de communication
39.
ACCESS CONTROL SYSTEM FOR IMPLEMENTING ACCESS RESTRICTIONS OF REGULATED DATABASE RECORDS WHILE IDENTIFYING AND PROVIDING INDICATORS OF REGULATED DATABASE RECORDS MATCHING VALIDATION CRITERIA
A digital targeting system is configured to access data to determine users that satisfy content factors, such as pre-validation criteria, based on user information stored in a database having restrictions on sharing of user data, such as government regulations on sharing of the user information. The digital targeting system may then generate a pre-validated user ID list indicating those users that match the content factors. Users on the pre-validated user ID list may then be matched to users in other databases, such as a digital ID database, to identify digital IDs for the users that are usable by a digital display entity.
Embodiments of an electronic fraud analysis platform system are disclosed which may be used to analyze tax returns for potential fraud. Analysis of tax return data using the tax return analysis platform computing systems and methods discussed herein may provide insight into whether a tax return may be fraudulent based on, for example, an initial screening component configured to filter tax returns which appear fraudulent due to missing or inaccurate information provided with the return; a device activity analysis component configured to identify whether a device used to submit a tax return or to provide further authentication information needed to complete processing of the return may have been used in other fraudulent activities; and a knowledge-based authentication component configured to identify potential fraudsters using dynamically generated questions for which fraudsters typically do not know the answers.
G06Q 40/00 - Finance; Assurance; Stratégies fiscales; Traitement des impôts sur les sociétés ou sur le revenu
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Systems and methods are described for generating record clusters. The methods comprise receiving a plurality of records from data sources and providing at least a subset of the records to a scoring model that determines scores for various pairings of the records, a score for a given pair of the records representing a probability that the given pair of records contain data elements about the same entity. The method further comprises generating a graph data structure that includes a plurality of nodes, individual nodes representing a different record from the records. The method also comprises assigning a different unique identifier to individual clusters of the final clusters and responding to a request for data regarding a given entity by providing aggregated data elements from those records of the records associated with a cluster of the final clusters having an identifier that represents the given entity.
The invention provides systems and methods for risk assessment using a variable risk engine. A method for risk assessment may comprise setting an amount of real-time risk analysis for an online transaction, performing the amount of real-time risk analysis based on the set amount, and performing an amount of time-delayed risk analysis. In some embodiments, the amount of real-time risk analysis may depend on a predetermined period of time for completion of the real-time risk analysis. In other embodiments, the amount of real-time risk analysis may depend on selected tests to be completed during the real-time risk analysis.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations
43.
Methods and systems for persistent cross-application mobile device identification
Systems and methods are provided for persistent cross-application mobile device identification. A mobile device may have a plurality of sandboxes in memory containing applications. The mobile device may have a shared storage which may accessible by applications from different sandboxes. A storage location identifier may be used to access information in shared storage. A universal device identifier may be stored in the shared storage to identify the mobile device and may be accessible by multiple applications and updates to applications. The universal device identifier may be used to track the mobile device for advertising, fraud detection, reputation tracking, or other purposes.
G06F 21/53 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p.ex. "boîte à sable" ou machine virtuelle sécurisée
G06F 21/73 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information par création ou détermination de l’identification de la machine, p.ex. numéros de série
H04W 12/069 - Authentification utilisant des certificats ou des clés pré-partagées
H04W 12/086 - Sécurité d'accès utilisant les domaines de sécurité
44.
MASSIVE SCALE HETEROGENEOUS DATA INGESTION AND USER RESOLUTION
This disclosure relates to data association, attribution, annotation, and interpretation systems and related methods of efficiently organizing heterogeneous data at a massive scale. Incoming data is received and extracted for identifying information (“information”). Multiple dimensionality reducing functions are applied to the information, and based on the function results, the information are grouped into sets of similar information. Filtering rules are applied to the sets to exclude non-matching information in the sets. The sets are then merged into groups of information based on whether the sets contain at least one common information. A common link may be associated with information in a group. If the incoming data includes the identifying information associated with to the common link, the incoming data is assigned the common link. In some embodiments, incoming data are not altered but assigned into domains.
Systems and methods for data aggregation and processing are provided in manner that is decentralized and preserves privacy. A data aggregation and computation system may include an interface, a controller, and one or more clusters of computation nodes. The interface may receive an inquiry from a requesting entity for computing information regarding an individual based on pieces of information held by a plurality of entities. The controller may communicate an identifier for the individual to a processor system associated with each of the entities based on the inquiry. The clusters of computation nodes may each receive encrypted data fragments from each of the processor systems, the data fragments comprising unrecognizable fragments that no individual processor system can re-assemble to recover the information, perform secure, multi-party computations based on the data fragments, and generate a result based on the secure, multi-party computations for the individual.
Features for providing a secure method of symmetric encryption for private smart contacts among multiple parties in a private peer-to-peer network. The features include a master key representing a unique blockchain ledger. The master key may be shared among multiple participants in a private peer-to-peer network. Sharing of the master key may include communicating the master key in an encrypted message (e.g., email) using public key infrastructure (PKI). In some implementations, more complex distribution features may be includes such as quantum entanglement. The features support instantiation of a smart contract using a specific master key. The request may be submitted as an entry to the ledger with appropriate metadata and/or payload information for identifying and processing the request.
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
H04L 9/16 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes qui sont changés pendant l'opération
H04L 67/1074 - Réseaux de pairs [P2P] pour la prise en charge des mécanismes de transmission de blocs de données
47.
Realtime access and control of secure regulated data
The systems and methods described herein allow users to control access to regulated data of the user (stored in a secured third party database) through interaction on a mobile device (or other computing device), such as to provide a touch gesture on the mobile device that causes the users regulated data to be accessible to a third party. The regulated data may include credit data of the user, such as a credit report or credit file. Access rights to the regulated data may be provided in real-time (or near real-time) in response to a request for the data from a third party, for example. The system may allow a user to respond to an alert or notification that is automatically sent to the computing device of the user in response to a request for a secure regulated data of the user.
An electronic device identifier mapping and resolution system are disclosed which may be used to analyze various device identifiers associated with an online event initiated by a particular device in applying a matching algorithm to determine a unique device identifier and/or device profile for the device. Device identifiers provided from disparate sources (such as web browser cookies, network IP addresses, device-specific identifiers, application-specific identifiers, custom identifiers, probabilistic identifiers, etc.), including both deterministic and/or probabilistic identifiers, may be analyzed according to the matching algorithm to determine a device identifier associated with the device. Matching algorithms may be customized and configured to a high degree of complexity for respective entities, such as to analyze disparate device identifiers according to a variety of identifier comparison functions and matching tiers. Matching algorithms may include conditional requirements that streamline execution of such algorithms, e.g., which may reduce processor load and increase execution time, such as conditional requirements that bypass portions of the matching algorithm based on particular identifiers associated with the online event that are initially analyzed.
One aspect of the subject matter described herein comprises a database management system. The database management system comprises a communication circuit, an interface, and a processor. The communication circuit receives information from databases via a communication network. The interface allows user operation and interaction via the communication network and the database management system. The processor provides data to and receives data from the interface, including a plurality of alphanumeric records comprising at least one unique identifier, obtains database records from other databases for each unique identifier, identifies a number of alphanumeric records in the plurality having events in their histories, determines a percentage of alphanumeric records in the plurality having negative events in their histories, generates a report including the determined percentages, and conveys the report to the user.
G06F 16/00 - Recherche d’informations; Structures de bases de données à cet effet; Structures de systèmes de fichiers à cet effet
G06F 16/951 - Indexation; Techniques d’exploration du Web
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
G06F 16/248 - Présentation des résultats de requêtes
Systems and methods for fraud containment are provided in accordance with an embodiment of the invention. A fraud event may be detected. One or more devices that may be used in perpetrating the fraud event may be detected. Additionally one or more potential fraud victims, who may be grouped into victim circles may be detected. The threat level to the victims and/or victim circles may be assessed. In some instances, behavioral profiles may be utilized to make fraud assessments. Based on the threat level, recommendations for fraud containment responses may be provided.
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
Systems and methods are described for identifying a target entity that a user intends to refer to based on input that may include only a partial name of the entity. A system may receive a user's entity search query, which may include a partial entity name, then may determine initial candidate matching entities and associated name match scores for each of the initial candidate matching entities relative to the input string, such as using string matching or fuzzy matching techniques. The system may apply a probability match model to generate an overall match score for individual ones of the initial candidate matching entities, then may generate a response to the entity search query that includes information regarding one or more of the initial candidate matching entities with an overall match score exceeding a threshold.
The systems and methods described herein allow consumers to lock or unlock their credit files at multiple credit bureaus in real-time or near real-time. The service may allow a consumer to provide identifying information, such as a personal identifier to lock or unlock credit files at a plurality of credit bureaus over a network. Upon receiving the personal identifier, the system may use the personal identifier to translate the identifier into a plurality of access codes for respective credit bureaus, for example by accessing a data structure, such as a database or table, which stores a personal identifier and access codes that are associated with a consumer. The system may then use the access codes to automatically initiate locking or unlocking of credit files for the consumer at the respective credit bureaus.
Systems and methods are described for identifying a subset of interest from a general population and for monitoring a database of daily activity logs associated with the general population in order to identify database entries indicative of an occurrence of a pre-defined trigger event that is associated with a member of the subset of interest. In particular, systems and methods are described that allow a massive database of daily activity logs to be monitored to identify trigger events that have occurred within the past twenty-four hours or other very recent time period. Embodiments are described that may be advantageously used by a provider of credit-related products and/or services who wishes to accurately target prospective customers, identified by the system, based on occurrence of a trigger event, as being in a decision-making phase of credit shopping, for purposes of making a timely and targeted offering relevant to the customers' current activities.
G06Q 90/00 - Systèmes ou méthodes spécialement adaptés à des fins administratives, commerciales, financières, de gestion ou de surveillance, n'impliquant pas de traitement significatif de données
A computing device is configured to acquire or access credit or reporting data associated with a consumer. The computing device then is configured to analyze the credit or reporting data to determine reporting cycles for accounts associated with the consumer. For example, the computing device may determine that credit information for a particular account may be updated at a regular interval (e.g., once a month on the 3rd) or some other more complex cycle. The computing device can subsequently used the determined reporting cycles to predict the next reporting dates for respective accounts and provide the information, for instance, to the consumer.
A system for aggregating a user's web browsing data which may include cookies placed on a user's computing device from various websites. The system receives authorization from a user to retrieve cookie and other data associated with the user. The system then accesses cookie data and personal data associated with the user. In some embodiments, the aggregation system communicates with websites that placed the cookie data on the user's computer to determine one or more characteristics of the user based on the cookie data (which may be understandable only by the placing website). The system may then provide the user's aggregated data or a portion thereof to requesting entities. The user may have access to a user interface which provides information about the user's aggregated data and allows the user to determine how much information to share with requesting entities.
Embodiments include a method for providing tokens which includes: receiving from a user system an encrypted data packet including user credentials and a request for an authentication token to access protected resources; extracting the user's security information; transmitting a data packet to a security and access management system, where the data packet includes the user's security information and a request for user validation; receiving, from the security and access management system, user validation and additional data; generating a thin token and a fat token; storing the thin token in association with the fat token; transmitting the thin token to the user system; receiving, from the user system, a request to access protected resources from a protected resource system, the request including the thin token; validating the received thin token; accessing the fat token associated with the thin token; and transmitting the fat token to the protected resource system.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Embodiments of a system and method are described for generating a finance attribute. In one embodiment, the systems and methods retrieve raw tradeline data from a plurality of credit bureaus, retrieve industry code data related to each of the plurality of credit bureaus, determine one or more tradeline leveling characteristics that meet at least one pre-determined threshold, and generate a finance attribute using the selected leveling characteristics.
G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
G06Q 10/04 - Prévision ou optimisation spécialement adaptées à des fins administratives ou de gestion, p. ex. programmation linéaire ou "problème d’optimisation des stocks"
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
One embodiment of a system for automatically generating code for attributes includes a credit bureau data store that stores credit bureau convention information and an attribute generation system that communicates with the credit data store to detect rules associated with respective credit bureaus. The system may include an input module which receives, from a user system, a document comprising pseudo-code defining attributes including credit bureau specific logic; an error checking module which automatically performs error checking and provides error correcting information on the document; an attribute verification module which parses the document to identify attributes and automatically retrieves rules associated with the respective credit bureaus; a document generation module which generates an attribute specification document based on the retrieved rules as applied to the attributes in the document; and a code generation module which generates an executable code set based on the retrieved plurality of attributes and credit bureau specific rules.
The present disclosure describes systems and methods that apply artificial intelligence to augmented reality for enhanced user experience. A sensor, such as a camera, on a mobile phone can capture output data of a laptop computer or other computing device, such as a user interface. The captured image can be assessed by the mobile phone to determine an intent of a user and to display a three dimensional rendering, such as an avatar, on the mobile phone overlaid on top of the user interface of the laptop. The avatar can help navigate the user, such as pointing to areas of a webpage of interest, or inviting the user to scroll down on a webpage to a portion of the webpage that may not be in current view.
G06T 19/00 - Transformation de modèles ou d'images tridimensionnels [3D] pour infographie
G06T 13/40 - Animation tridimensionnelle [3D] de personnages, p.ex. d’êtres humains, d’animaux ou d’êtres virtuels
H04N 13/279 - Générateurs de signaux d’images à partir de modèles 3D d’objets, p.ex. des signaux d’images stéréoscopiques générés par ordinateur les positions des points de vue virtuels étant choisies par les spectateurs ou déterminées par suivi
G06N 3/047 - Réseaux probabilistes ou stochastiques
60.
Systems and methods for providing a direct marketing campaign planning environment
Embodiments of system are disclosed in which selection strategies for a direct marketing campaign that identify consumers from a credit bureau or other consumer database can be planned, tested, and/or refined on a stable subset of the credit database. In some embodiments, once refined, consumer selection criteria may be used to execute the direct marketing campaign on the full consumer/credit database, which is preferably updated approximately twice weekly. In one preferred embodiment, the data for the test database represents a random sampling of approximately 10% of the full database and the sampling is regenerated approximately weekly in order to provide a stable set of data on which campaign developers may test their campaign. For each consumer in the sampling, the environment may allow a client to access and use both attributes calculated by the credit bureau and proprietary attributes and data owned by the client. The system allows for a plurality of clients to use the system substantially simultaneously while protecting the privacy and integrity of the client's proprietary data and results.
A digital identity, which may include a user interface that may be displayed on a mobile computing device, may be generated to include information extracted from a physical identification card (e.g., driver license or passport), as well as information regarding validation of the physical identification card and of the consumer's identity. The digital identity may be used in place of the physical identification card.
Features are described for efficiently and accurately identifying a user of an electronic device with limited user interaction. The features include receiving a mobile device identifier from the mobile device. The features include transmitting the mobile device identifier to a service provider associated with the mobile device. The features include receiving information identifying the user from the service provider. The features include identifying a set of candidates associated with at least a portion of the information. The features include generating a metric for the candidates included in the set of candidates. An individual metric indicates a degree of relatedness between a value for the user for the at least one data field and a value for a candidate for the at least one data field. The features include identifying the user as a specific candidate included in the set of candidates based on the metric corresponding to a threshold.
Embodiments of a system may comprise databases and a processor that accesses a first database and verifies that each of the plurality of client records conforms to a set of formatting guidelines and filters the records in the first database into a vehicle data subfile and a client data subfile, monitors the records in the vehicle and client data subfiles for a trigger event, generates one or more dynamic models for determining a likelihood that a client will perform an action based on the trigger event, applies the generated dynamic model(s) to generate at least one score value associated with the record including the trigger event, and generates a notification including one or more of the generated at least one score value, the one or more trigger event records, and information associated with the one or more trigger event records for transmission to a user.
In an embodiment, a computing system, such as a monitoring computer, receives a request from a user to monitor an account of the user with an online service provider. The request may include personal information and user preferences for one or more protective actions. The system periodically monitors external data sources for indications of changes to personal information associated with the account, and detects changes or attempted changes to personal information associated with the account. The system may determine risk levels associated with detected changes or attempted changes, and transmit a notification to the user via a communication channel selected based on the determined risk level and/or the user preferences. The system may also initiate protective actions, so that further unauthorized access to the account may be prevented.
H04L 67/025 - Protocoles basés sur la technologie du Web, p.ex. protocole de transfert hypertexte [HTTP] pour la commande à distance ou la surveillance à distance des applications
Systems and methods are provided for adjustment of difficulty level, quantity, and/or other parameters of knowledge-based authentication. The questions may be asked of a consumer based on one or more generated risk scores associated with the consumer's behavior, which may be derived from information received from the consumer, a representative responsible for entering information regarding the consumer, and/or from the consumer's computing device.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations
66.
RISK ASSESSMENT SYSTEMS AND METHODS FOR PREDICTING AND REDUCING NEGATIVE HEALTH OUTCOMES ASSOCIATED WITH SOCIAL DETERMINANTS OF HEALTH
Embodiments of a risk assessment system is disclosed, where the risk assessment system can receive patient related data (for example, patient records) and social determinants of health data to generate a risk model to predict potential health outcomes, such as, for example readmission risk, with accompanying social determinants of health insight, which may include actionable insights and deployed systems that follow interventions. The risk model can be used to calculate a risk score for a patient based on patient records and social determinants of health data associated with the patient to predict potential negative health outcome for the patient proactively so that actions can be taken using social determinants of health insights to prevent that outcome.
G16H 50/30 - TIC spécialement adaptées au diagnostic médical, à la simulation médicale ou à l’extraction de données médicales; TIC spécialement adaptées à la détection, au suivi ou à la modélisation d’épidémies ou de pandémies pour l’évaluation des risques pour la santé d’une personne
G16H 50/70 - TIC spécialement adaptées au diagnostic médical, à la simulation médicale ou à l’extraction de données médicales; TIC spécialement adaptées à la détection, au suivi ou à la modélisation d’épidémies ou de pandémies pour extraire des données médicales, p.ex. pour analyser les cas antérieurs d’autres patients
Systems and methods are provided for assessing an account takeover risk for one or more accounts of an individual. The account security procedures for each of a number of services with which the user has an account may be analyzed. Publicly accessible information regarding the user may also be collected and analyzed. The collected information and security procedures may be compared in order to determine one or more vulnerabilities to hostile account takeover of one or more of the analyzed accounts. An alert may be generated regarding a determined takeover risk, which may include suggested actions for remedying the risk.
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
Access control system for implementing access restrictions of regulated database records while identifying and providing indicators of regulated database records matching validation criteria
A digital targeting system is configured to access data to determine users that satisfy content factors, such as pre-validation criteria, based on user information stored in a database having restrictions on sharing of user data, such as government regulations on sharing of the user information. The digital targeting system may then generate a pre-validated user ID list indicating those users that match the content factors. Users on the pre-validated user ID list may then be matched to users in other databases, such as a digital ID database, to identify digital IDs for the users that are usable by a digital display entity.
Embodiments include a search and match computing system configured to: access, from a third party computing system, a query regarding at least one entity; determine if the query is a structured query or an unstructured query; process the query with at least one of an application programming interface configured to receive structured queries or a second application programming interface receive unstructured queries; initiate a search and match application configured to execute queries on at least one of: a relational data scheme or a non-relational data scheme; receive search results from the at least one of: the relational data scheme or the non-relational data scheme; and process the received search results to generate an output data packet for access by the third party computing system.
G06F 16/21 - Conception, administration ou maintenance des bases de données
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
Methods and systems are provided for generating alerts in association with a request for credit data or an update to credit data. For example, information identifying an individual may be received from a credit bureau when an individual applies for a product or service from a requesting entity. The requesting entity may be a product or service provider that requests credit data of potential purchasers of its products. An electronic notification may then be sent in association with an event object generated by a notification system that is broadcast for delivery to one or more other systems, where the event object may be broadcast substantially in real time, such as via an enterprise server bus, relative to the requesting entity's initial request.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 65/611 - Diffusion en flux de paquets multimédias pour la prise en charge des services de diffusion par flux unidirectionnel, p.ex. radio sur Internet pour la multidiffusion ou la diffusion
Embodiments of various systems, methods, and devices are disclosed for generating artificial intelligence or machine learning models for predicting denials of medical claims, predicting approvals of resubmitted medical claims, as well as automatic workflow clustering processes for automatically assigning medical claims to workflow queues using predictive segmentation and smart resource allocation.
09 - Appareils et instruments scientifiques et électriques
35 - Publicité; Affaires commerciales
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
45 - Services juridiques; services de sécurité; services personnels pour individus
Produits et services
Downloadable computer software for credit, identity protection, accessing financial information, identification, tracking, management and negotiation of bills and subscriptions and for financial management, digital checking credit monitoring, credit scores reporting and identity theft protection; downloadable computer software for assessing consumer credit, consumer credit reporting, assessing and comparing credit cards and financial loans for consumers; downloadable computer application software for mobile phones, namely, software for assessing consumer credit, consumer credit reporting, assessing and comparing credit cards and financial loans for consumers Monitoring consumer credit scores and providing an alert as to any changes therein for business purposes; negotiation of business contracts for others, namely, bill negotiation services for consumers and businesses Personal financial services; financial consultation, analysis of consumer bills, credit cards and bank accounts to review recurring spending and bills; financial transaction services including the identification, tracking and management of subscriptions and bills; bill negotiation services for consumers and businesses; providing information in the field of personal finance and credit; providing credit score monitoring, reporting and tracking; providing digital checking account and debit card services; financial information provided by electronic means; providing on-line financial score factor assessments; credit consultation; fraud reimbursement services in the field of credit, debit and ATM cards purchases against liability for unauthorized charges; identity theft and loss protection and reimbursement services in the nature of fraud reimbursement in the field of credit and debit card purchases and ATM uses; consumer credit consultation services, namely, collecting traditional and non-traditional consumer credit, credit scores and consumer loan accounts data, evaluation and comparison of available consumer loans and consumer credit cards; credit reporting services; consumer financial loan consultation; providing financial consultation on consumer credit, consumer credit scores and consumer credit cards; consumer credit reporting services; direct to consumer financial information provided by electronic means; providing credit, financial health and awareness and identity protection services as a unit in a single bundle package; product services offering that combines credit, identity, and financial health features into one bundle Providing temporary use of non-downloadable software in the field of credit, identity protection, personal finance for the identification, tracking, management and negotiation of bills and subscriptions and for financial management, digital checking, credit monitoring, credit scores reporting and identity theft protection; electronic monitoring of personally identifying information to detect identity theft via the internet; providing an online database in the field of computer security information concerning data theft and identity theft; providing computer security information concerning electronically monitoring consumer credit report and credit score information to facilitate the detection identity theft and fraud via the internet; computer security consultation concerning computer security services for protecting against data theft and identity theft; computer security services, namely, electronic monitoring of credit report and credit score information to facilitate the detection and prevention of identity theft and fraud; computer security services for protecting data and information from unauthorized access; computer security threat analysis for protecting data; computer security consultancy Providing consumer credit report monitoring information and providing results from Internet scans and change of address to facilitate the detection and prevention of identity theft and fraud perpetrated via the Internet; consultation in the field of credit, identity protection, data theft and identity theft; financial identity monitoring service for the detection and prevention of identity theft and fraud and to identify changes in credit reports, results of Internet scan alerts from dark web searches, and national changes of address; providing consumer credit report monitoring information to facilitate the detection and prevention of identity theft and fraud perpetrated via the Internet; detection of identity threats, namely, monitoring of credit reports allowing the use of lock and unlock of credit reports; monitoring consumer credit reports and scores and providing an alert as to any changes therein for the detection and prevention of identity theft and fraud; consumer credit fraud and identity theft and access protection services in the nature of blocking or restricting access by others to credit files through credit bureaus
Methods and systems are disclosed that generate life scores for individuals based on various information associated with the individuals. For example, life scores may be based on data associated with several aspects of the individual's life, such as work, family, hobbies, education, etc. The life scores may be generated in realtime and/or periodically and provided to the individual and/or shared with others in various formats.
G06Q 50/00 - Systèmes ou procédés spécialement adaptés à un secteur particulier d’activité économique, p.ex. aux services d’utilité publique ou au tourisme
H04L 51/52 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p.ex. courriel pour la prise en charge des services des réseaux sociaux
74.
System and method for device identification and uniqueness
Systems and methods for determining uniqueness of device identifiers are provided. The uniqueness of a device identifier may be indicated by a device quality score or grade that is calculated based on a plurality of parameters associated with a device identifier as well as evaluation rules derived based on historical data. The plurality of parameters may be associated with a network event or transaction associated with the device identifier. The evaluation rules may be derived using machine learning techniques. Based on uniqueness of a device identifier, a suitable action or measure may be taken.
Features for providing a secure method of symmetric encryption for private smart contacts among multiple parties in a private peer-to-peer network. The features include a master key representing a unique blockchain ledger. The master key may be shared among multiple participants in a private peer-to-peer network. Sharing of the master key may include communicating the master key in an encrypted message (e.g., email) using public key infrastructure (PKI). In some implementations, more complex distribution features may be includes such as quantum entanglement. The features support instantiation of a smart contract using a specific master key. The request may be submitted as an entry to the ledger with appropriate metadata and/or payload information for identifying and processing the request.
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
H04L 9/16 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes qui sont changés pendant l'opération
H04L 67/1074 - Réseaux de pairs [P2P] pour la prise en charge des mécanismes de transmission de blocs de données
Several credit score management user interfaces that may comprise a credit score thresholds user interface, a credit score alert settings user interface, and several credit score alert notification user interfaces, enable a consumer to set and/or adjust credit score goals and warnings, and credit score alert settings. The credit score threshold visual interface may present one or more credit score thresholds (for credit score goals and/or warnings) for the consumer on a line graph. The consumer may set and/or adjust the credit score thresholds based on touch input. The user interfaces may be updated automatically in real-time in response to the touch input. Alerts may be generated and provided to the consumer based on alert settings, changes to the consumer's credit information, the credit score thresholds, and/or macroeconomic events or factors.
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
G06F 3/0488 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p.ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p.ex. des gestes en fonction de la pression exer utilisant un écran tactile ou une tablette numérique, p.ex. entrée de commandes par des tracés gestuels
The present disclosure describes systems and methods for providing new credit files for individuals without a credit file by generating header information and assigning a personal identifier (or PIN) for the newly created header file without any negative impacts on the new credit file (such as a credit inquiry). The credit system can recommend the addition of new tradelines, such as through review of transaction data from financial institutions to identify a new tradeline, or recommending new credit cards curated for individuals with new credit files. The credit system can infer an open date for a new tradeline found in the transaction data by identifying the earliest transaction date for the set of transactions that correspond to a particular category.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
78.
METHODS AND APPARATUSES FOR GENERATING A NEW CREDIT FILE AND ADDING TRADELINES
The present disclosure describes systems and methods for providing new credit files for individuals without a credit file by generating header information and assigning a personal identifier (or PIN) for the newly created header file without any negative impacts on the new credit file (such as a credit inquiry). The credit system can recommend the addition of new tradelines, such as through review of transaction data from financial institutions to identify a new tradeline, or recommending new credit cards curated for individuals with new credit files. The credit system can infer an open date for a new tradeline found in the transaction data by identifying the earliest transaction date for the set of transactions that correspond to a particular category.
Embodiments of a system may comprise databases and a processor that receives a first filter item and a database filter item, generates a first database based on the first filter item, integrate data from the first database into the user database to create an updated plurality of user records, generate a second database based on a selected set of records, in the updated plurality of user records, corresponding to the database filter item, determine metrics that correspond to the second database, generate a model to segregate the second database using the metrics, receive criteria, compare the segregated second database with the criteria to remove records that do not meet the criteria, cause a subsequent update to the updated second database to integrate data from the event database to create an updated diminished second database, and generate a notification including information included in the updated diminished second database.
G06F 16/909 - Recherche caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des informations géographiques ou spatiales, p.ex. la localisation
The systems and methods described herein allow consumers to lock or unlock their credit files at multiple credit bureaus in real-time or near real-time. The service may allow a consumer to provide identifying information, such as a personal identifier to lock or unlock credit files at a plurality of credit bureaus over a network. Upon receiving the personal identifier, the system may use the personal identifier to translate the identifier into a plurality of access codes for respective credit bureaus, for example by accessing a data structure, such as a database or table, that stores a personal identifier and access codes that are associated with a consumer. The system may then use the access codes to automatically initiate locking or unlocking of credit files for the consumer at the respective credit bureaus.
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
G06Q 40/00 - Finance; Assurance; Stratégies fiscales; Traitement des impôts sur les sociétés ou sur le revenu
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
81.
System and method for generating a finance attribute from tradeline data
Embodiments of a system and method are described for generating a finance attribute. In one embodiment, the systems and methods retrieve raw tradeline data from a plurality of credit bureaus, retrieve industry code data related to each of the plurality of credit bureaus, determine one or more tradeline leveling characteristics that meet at least one pre-determined threshold, and generate a finance attribute using the selected leveling characteristics.
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
G06Q 10/04 - Prévision ou optimisation spécialement adaptées à des fins administratives ou de gestion, p. ex. programmation linéaire ou "problème d’optimisation des stocks"
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
A card registry system is configured to automatically identify financial card information in one or more credit files associated with a consumer and populate a card registry account of the consumer with the identified financial card information. Once the financial card information has been obtained from the credit file(s), the card registry system may transmit cancellation and/or reissuance requests to the respective card issuers in the instance that one or more cards are compromised, so that the financial cards may be easily and efficiently cancelled and/or reissued at the request of the consumer.
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
G06Q 20/26 - Schémas de débit, c. à d. de "paiement immédiat"
G06Q 20/24 - Schémas de crédit, c. à d. de "paiement différé"
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
09 - Appareils et instruments scientifiques et électriques
35 - Publicité; Affaires commerciales
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
45 - Services juridiques; services de sécurité; services personnels pour individus
Produits et services
Downloadable computer software for identification, tracking, management and negotiation of bills and subscriptions and for financial management, digital checking, credit monitoring, credit scores reporting and identity theft protection; downloadable computer software for assessing consumer credit, consumer credit reporting, assessing and comparing credit cards and financial loans for consumers; downloadable computer application software for mobile phones, namely, software for assessing consumer credit, consumer credit reporting, assessing and comparing credit cards and financial loans for consumers Monitoring consumer credit scores and providing an alert as to any changes therein for business purposes; negotiation of business contracts for others, namely, bill negotiation services for consumers and businesses Personal financial services, namely, consumer credit, consumer credit scores and consumer credit card review and financial impact assessment; financial consultation, namely, analysis of consumer bills, credit cards and bank accounts to review recurring spending and bills; financial transaction services namely, the identification, tracking and management of subscriptions and bills; debt negotiation services for consumers and businesses; providing financial information in the field of personal finance and credit; providing digital checking and debit account review services; financial information provided by electronic means; providing financial assessment services to consumers and employees, namely, providing on-line financial score factor assessments; credit consultation; fraud reimbursement services in the field of credit, debit and ATM cards purchases against liability for unauthorized charges; fraud reimbursement services in the field of credit and debit card purchases and ATM uses; consumer credit consultation services, namely, collecting traditional and non-traditional consumer credit, credit scores and consumer loan accounts data, evaluation and comparison of available consumer loans and consumer credit cards; credit reporting services; consumer financial loan consultation; providing financial consultation on consumer credit, consumer credit scores and consumer credit cards; consumer credit reporting services; direct to consumer financial information provided by electronic means Providing temporary use of non-downloadable software in the field of personal finance for the identification, tracking, management and negotiation of bills and subscriptions and for financial management, digital checking, credit monitoring, credit scores reporting and identity theft protection; electronic monitoring of personally identifying information to detect identity theft via the internet; providing an online database in the field of computer security information concerning data theft and identity theft; providing computer security information concerning electronically monitoring consumer credit report and credit score information to facilitate the detection identity theft and fraud via the internet; computer security consultation concerning computer security services for protecting against data theft and identity theft; computer security services for protecting data and information from unauthorized access; computer security threat analysis for protecting data; computer security consultancy; monitoring consumer credit scores and providing an alert as to any changes therein for fraud detection and prevention; electronic monitoring of personally identifying information to detect identity theft via the internet, namely, providing results from Internet scans and change of address to facilitate the detection and prevention of identity theft and fraud perpetrated via the Internet; computer security consultation in the field of data theft and identity theft; computer security services for protecting data and information from unauthorized access, namely, financial identity monitoring service for the detection and prevention of identity theft and fraud and to identify changes in credit reports, results of Internet scan alerts from dark web searches, and national changes of address; computer security services for protecting data and information from unauthorized access, namely, consumer credit fraud and identity theft and access protection services in the nature of blocking or restricting access by others to credit files through credit bureaus Providing information related to consumer credit report monitoring to facilitate the detection and prevention of identity theft and fraud perpetrated via the Internet; legal consultation in the field of data theft and identity theft; providing information related to consumer credit report monitoring to facilitate the detection and prevention of identity theft and fraud perpetrated via the Internet; monitoring consumer credit reports and scores and providing an alert as to any changes therein for the detection and prevention of identity theft and fraud; electronic monitoring of credit report and credit score information to facilitate the detection and prevention of identity theft and fraud
84.
Mobile device sighting location analytics and profiling system
The present disclosure describes systems and methods for providing enhanced location analysis and consumer insights using mobile sightings data. An approximate geographic location is useful to mobile service providers and advertisers who wish to provide targeted content to consumers based on their location. The location analysis described herein provides more depth and detail about the detected geographic location of the consumer and also insights into business locations visited by the user of the device, consumer/market segments and patterns of behavior (for an individual consumer and/or for aggregated group of consumers), retail trends and patterns, and other profile information. For example, a location profile analytics system as described herein can determine a probability that an approximate geographic location actually corresponds to a specific geographic location, such as a business location. The analysis performed by the location profile analytics system may be further refined based on a number of additional input parameters.
Consumers often desire to compare themselves to other individuals. Disclosed herein are systems and methods of generating and displaying comparison information to users so that they can determine if they are “keeping up with the Joneses.”
Embodiments of the present invention assist in the development, management, and deployment of aggregated data attributes for multiple data sources. One embodiment provides a development interface that allows for elements of attributes, including filters, to be moved into a coding area in which an attribute or an attribute element is being edited. In another embodiment, the user interface presents data fields to assist in the development of filters for multiple data sources with divergent formats. The application further provides a validation interface through which users can validate attributes and trace the results returned by various elements referenced by the attributes under validation. Another embodiment provides a system for managing attributes and deploying them to various systems by creating a deployment file that is used by an attribute calculation system. In one embodiment, the attribute calculation system is a scalable system that dynamically calculates attributes for multiple data sources.
G06Q 40/04 - Transactions; Opérations boursières, p.ex. actions, marchandises, produits dérivés ou change de devises
G06F 16/90 - Recherche d’informations; Structures de bases de données à cet effet; Structures de systèmes de fichiers à cet effet - Détails des fonctions des bases de données indépendantes des types de données cherchés
G06F 1/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES - Détails non couverts par les groupes et
G06F 11/07 - Réaction à l'apparition d'un défaut, p.ex. tolérance de certains défauts
G06F 11/22 - Détection ou localisation du matériel d'ordinateur défectueux en effectuant des tests pendant les opérations d'attente ou pendant les temps morts, p.ex. essais de mise en route
In one embodiment, a method includes receiving, from a requestor, a request for an on-demand product. The method further includes determining an eligibility token format applicable to the request, wherein the eligibility token format comprises a plurality of partial segments of identifying information. The method also includes prompting the requestor to provide a plurality of partial-segment values corresponding to the plurality of partial segments. In addition, the method includes receiving the plurality of partial-segment values in response to the prompting. Moreover, the method includes generating an eligibility token from the plurality of partial-segment values. The method also includes determining the requestor's eligibility for the on-demand product based, at least in part, on a lookup of the eligibility token in an eligibility token repository. The eligibility token repository includes a plurality of eligibility tokens of the eligibility token format.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
The invention provides one or more consortia of networks that identify and share information about users and/or user devices interacting with the consortia. User devices may be identified, at least in part, by a delta of time parameter between a user device used and a reference time. Other parameters may be analyzed to identify a computer user and/or device and noteworthy transactions. The invention may be used for identity-based applications such as network security, the detection of fraudulent transactions, identity theft, ratings-based communities and law enforcement. User may be permitted to register user devices in order to control access for performing transactions.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06F 21/44 - Authentification de programme ou de dispositif
89.
Methods and apparatuses for customized credit card recommendations
A credit card recommendation system for recommending credit cards to a user can be based on the consumer's estimated monthly spend, estimated spend across a plurality of categories, and user credit data. The credit card recommendation system can filter credit cards based on a likelihood of approval for the user. The credit card recommendation can determine a reward valuation and an adjustment valuation by assessing user spend and the characteristics corresponding to the credit card. The credit card recommendation can train a model to score credit cards for users, and apply specific user data to the model to determine a credit card score particular to the user.
Embodiments of various systems and methods described herein provide an identity security database analytics system which is configured to provide security alerts to a user. The security alerts can include for personalized metrics related to potential identity theft incidents. The personalized metrics can include user specific information on security breaches of the user's personal information as well as depersonalized statistics generated based on information of other users having one or more similar characteristics of the user.
A method for providing pre-data breach monitoring provides information to businesses that is useful to predict portions of the company data that may not be secured well enough and other risks associated with data breaches, such as employees that may not be trustworthy.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
G06Q 50/26 - Services gouvernementaux ou services publics
G06F 16/958 - Organisation ou gestion de contenu de sites Web, p.ex. publication, conservation de pages ou liens automatiques
G06Q 50/00 - Systèmes ou procédés spécialement adaptés à un secteur particulier d’activité économique, p.ex. aux services d’utilité publique ou au tourisme
One aspect of the subject matter described herein comprises a database management system. The database management system comprises a communication circuit, an interface, and a processor. The communication circuit receives information from databases via a communication network. The interface allows user operation and interaction via the communication network and the database management system. The processor provides data to and receives data from the interface, including a plurality of alphanumeric records comprising at least one unique identifier, obtains database records from other databases for each unique identifier, identifies a number of alphanumeric records in the plurality having events in their histories, determines a percentage of alphanumeric records in the plurality having negative events in their histories, generates a report including the determined percentages, and conveys the report to the user.
G06F 16/00 - Recherche d’informations; Structures de bases de données à cet effet; Structures de systèmes de fichiers à cet effet
G06F 16/951 - Indexation; Techniques d’exploration du Web
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
G06F 16/248 - Présentation des résultats de requêtes
A data processing system communicates with a secure third-party database to obtain information about a user that is usable to determine one or more items associated with the user. The system then coordinates gathering and identification of additional data relevant to the user from other third-party data sources, to potentially update the user's information stored with the secure third-party database. The updated information may then be accessed at the secure third-party database to determine items associated with the user, which may include additional items in view of the additional data
Systems and methods are provided for credit dispute processing, resolution, and reporting. Credit dispute resolution requests may be received, processed, and sent to a credit bureau for submission to creditors. Status of credit dispute resolutions may be reported to consumers. If a creditor's response time is longer than its average response time or if a creditor does not respond to a credit dispute resolution request within a regulatory response period, alerts and reports may be sent to consumers to provide consumers with further options.
One embodiment of the system and method described herein provides a computer system configured to provide an interface for operation by a user at a remote computing device, receive a request from the user for a vehicle history report of a vehicle. The computer system is further configured to prompt the user for interest in a prequalification for a financing offer. The computer system is further configured to receive the indication of the user's interest in the prequalification. The system also includes a data storage module, accessible by the computer system, configured to retrieve data corresponding to the vehicle, store the retrieved data, retrieve data corresponding to a determination regarding the prequalification for the financing offer, and store the retrieved determination. The computer system is further configured to convey the vehicle history report to the user and convey the prequalification determination to the user.
One or more implementations include methods, systems, and/or devices to help protect consumers from fraudulent activity using compromised PII. For example, systems and methods can be implemented that enable the detection and prevention of consumer-focused identity theft, generates a risk score and is powered by a predictive model using machine learning techniques and tools and presents information and recommended action a user can take in reports.
One or more implementations include methods, systems, and/or devices to help protect consumers from fraudulent activity using compromised PII. For example, systems and methods can be implemented that enable the detection and prevention of consumer-focused identity theft, generates a risk score and is powered by a predictive model using machine learning techniques and tools and presents information and recommended action a user can take in reports.
A data processing system is disclosed for accessing databases and updated data items and triggering event notifications. The data processing system may comprise a first database including a plurality of records, and a second database including a plurality of trigger indicators. The database system may further include a hardware processor configured to execute computer-executable instructions in order to: receive an update data item; identify a record corresponding to the update data item; cause an update to the record based on information included with the update data item; identify a trigger indicator corresponding to the update to the record; determine that a type of the trigger indicator matches a type of the update to the record; and generate an event notification including information included in the update.
G06F 16/215 - Amélioration de la qualité des données; Nettoyage des données, p.ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
99.
Automated analysis of data to generate prospect notifications based on trigger events
Systems and methods are described for identifying a subset of interest from a general population and for monitoring a database of daily activity logs associated with the general population in order to identify database entries indicative of an occurrence of a pre-defined trigger event that is associated with a member of the subset of interest. In particular, systems and methods are described that allow a massive database of daily activity logs to be monitored to identify trigger events that have occurred within the past twenty-four hours or other very recent time period. Embodiments are described that may be advantageously used by a provider of credit-related products and/or services who wishes to accurately target prospective customers, identified by the system, based on occurrence of a trigger event, as being in a decision-making phase of credit shopping, for purposes of making a timely and targeted offering relevant to the customers' current activities.
G06Q 90/00 - Systèmes ou méthodes spécialement adaptés à des fins administratives, commerciales, financières, de gestion ou de surveillance, n'impliquant pas de traitement significatif de données
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
100.
SYSTEMS AND METHODS OF GENERATING RISK SCORES AND PREDICTIVE FRAUD MODELING
One or more implementations include methods, systems, and/or devices to help protect consumers from fraudulent activity using compromised PII. For example, systems and methods can be implemented that enable the detection and prevention of consumer-focused identity theft, generates a risk score and is powered by a predictive model using machine learning techniques and tools and presents information and recommended action a user can take in reports.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives