A method may include: sharing, by a client computer program and a server computer program, a set of identification keys, each identification key associated with a key label, and an authentication key; selecting, by the client computer program and the server computer program, one of the key labels; preparing, by the client computer program, quantum systems using a basis, randomly chosen bit values, and intensities; sending, by the client computer program, the quantum systems to the server computer program over a quantum communication channel, wherein the server computer program may be configured to measure the quantum systems using the basis and to announce quantum systems with photon detection; and generating, by the client computer program, a client tag using a shared keyed hash function executed on the authentication key and chosen bit values from the quantum systems with photon detection, and forwarding the client tag to the server computer program.
2.
SYSTEM AND METHOD FOR PROVIDING LARGE LANGUAGE MODEL FOR SANCTIONS ARTIFICIAL INTELLIGENCE ASSISTED AUTOMATION
A method and system for reducing false-positives using a neural network are disclosed. The method includes receiving a data envelope, scanning the data envelope and detecting a presence of data corresponding to a value in a list of sanctioned entities. The method further includes transforming format of the data envelope into a text format, identifying and extracting target information including the data corresponding to the value in the list of sanctioned entities and surrounding information, and reformatting the extracted target information and surrounding information into a natural language question. Once the natural language question is provided, the natural language question is processed by a neural network model for determining whether a sanctioned entity is included or not based on context provided by the natural language question.
Systems and methods for secure cryptographic secret distribution are disclosed. In one embodiment, a method for secure cryptographic secret distribution may include: (1) receiving, at a key relay station, a cryptographic secret from a webserver over a first communication network; (2) storing, by the key relay station, the cryptographic secret; (3) authenticating, by the key relay station, an end user via an end user electronic device; and (4) securely communicating, by the key relay station, the cryptographic secret to the end user electronic device. The end user electronic device is configured to store the cryptographic secret in secure storage on the end user electronic device, to encrypt data with the cryptographic secret, and to communicate the encrypted data to the webserver over a second communication network.
4.
SYSTEMS AND METHODS FOR LOW-COST SIMULATION OF QUANTUM ALGORITHMS
Systems and methods for low-cost simulation of quantum algorithms are disclosed. A method may include a quantum computer simulator computer program: (1) receiving a compact description of a problem and an objective to evaluate, a first circuit parameter, and a second circuit parameter; (2) precomputing a diagonal vector comprising diagonal elements of a phase Hamiltonian; (3) initializing a state vector; (4) applying a phase operator to the state vector with the first circuit parameter; (5) applying a mixing operator to the state vector with the second circuit parameter; (6) reading the state vector; (7) computing a quality of the state vector based on the objective; and (8) updating the first circuit parameter and the second circuit parameter based on the quality.
5.
SYSTEMS AND METHODS FOR MOBILE-MEDIATED SECURE KEY EXCHANGE FOR GENERAL END-USER CONNECTIVITY
A method may include: receiving, by a webserver computer program, shared key material shared with a client application; receiving from a browser, a request for a secure connection; establishing a session with the browser over a first secure connection; establishing a shared secret key with the browser, wherein the browser creates a browser secret key encrypted with the shared secret key, encrypts the browser secret key with the shared secret key, and provides the browser secret key encrypted with the shared secret key and session information the client application over a second secure connection that is protected with the shared key material; decrypting the browser secret key encrypted with the shared secret key using the shared secret key; identifying the session with the browser from the session information; and establishing, end-to-end encryption on top of the second secure connection using the browser secret key or a derivation thereof.
System and method for generating time series forecasts based on probabilistic data are disclosed. A processor receives a request to identify at least one feature of a dataset that is most closely correlated to a single feature specified in the received request. The dataset includes the probabilistic data of the time series. The processor identifies a set of original features within the dataset and derives a degree of dependency between a single specified feature and each original feature by using a temporally first portion of the dataset. After deriving a degree of dependency between all the features including the single specified feature and each engineered feature of the set of original features, the processor identifies an original feature or an engineered feature with the highest degree of dependency as the at least one feature of the dataset that is most closely dependent to the single specified feature.
Systems and methods for automated geolocation tagging for location coordinates in customer profiles are disclosed. A method may include: (1) receiving, at a safe space computer program and from a customer electronic device associated with a customer, safe space locations, wherein the safe space locations require a lower level of customer authentication than other locations; (2) receiving, by the safe space computer program and from the customer electronic device, a transaction; (3) determining, by the safe space computer program, the customer electronic device is in one of the safe space locations; and (4) authorizing, by the safe space computer program, the transaction with the lower level of customer authentication.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
In some aspects, the techniques described herein relate to a method including: receiving, at a threat mitigation platform, payment information from a payment product application; providing the payment information to a threat analysis engine of the threat mitigation platform as input to the threat analysis engine; generating, as output of the threat analysis engine and based on the payment information, a threat identifier; querying, by an authorization engine, a threat repository using the threat identifier as a lookup key; receiving, by the authorization engine and from the threat repository, information associated with the threat identifier; and communicating the information associated with the threat identifier to the payment product application.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
9.
METHOD AND SYSTEM FOR IMPLEMENTING A TOOL FOR DETECTING BAD ACTORS THAT UNFAIRLY PROFIT FROM CONFIDENTIAL INFORMATION
A system for detecting bad actors that unfairly profit from confidential information. The system may include a processor and memory that stores instructions that, when executed by the processor, cause the processor to: obtain news articles from at least one news media source; categorize, by pertinent events, each news article according to the pertinent events to which the news articles pertain; score each news article according to a respective impact of each news article; designate, for each of the pertinent events to which the news articles pertain, a corresponding made-public-date; and calculating, for each event of the pertinent events to which the news articles pertain, a corresponding event impact score by aggregating a weighted set of the article impact scores that pertain to the corresponding event.
G06Q 10/0631 - Planification, affectation, distribution ou ordonnancement de ressources d’entreprises ou d’organisations
10.
SYSTEMS AND METHODS FOR TOKENIZATION, RECORDATION, PAYMENT, SETTLEMENT, INSTRUCTION, RETIREMENT, DATA MANAGEMENT, AND OUTPUT OF INTELLIGENT DATA RELATED TO ASSETS AND ASSET ATTRIBUTES
Systems and methods for tokenization, recordation, payment, settlement, instruction, retirement, data management, and output of intelligent data related to assets and asset attributes are disclosed. A method may include: (1) generating or receiving, by a computer program for an asset producer or seller, an asset; (2) storing, by the computer program for the asset producer or seller, the asset; (3) tokenizing, by the computer program for the asset producer or seller, the asset on a distributed ledger network; (4) making, by the computer program for the asset producer or seller, the asset available to a consumer on a marketplace; (5) purchasing, by a computer program for the consumer, the asset with tokenized currency; (6) exchanging, by a smart contract executed on the distributed ledger network, the tokenized asset for the tokenized currency; and (7) causing, by the smart contract, the stored asset to be transferred to the consumer.
G06Q 20/06 - Circuits privés de paiement, p. ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
In some aspects, the techniques described herein relate to a method and a system comprising one or more processors and one or more storage devices storing instructions that when executed by one or more processors, cause the processor to receive a text of a plurality of conversations between a plurality of customers and an agent; identify a context of one conversation of the plurality of conversation from one or more conversational insights; identify an intent of the one conversation from one or more conversational insights; and identify an area for training the agent based on the intent and the context.
Disclosed techniques relate to a method of securing a distributed ledger system, comprising: receiving, from a user application executed on an electronic user device and at a shared security platform executed on a backend, a request for a private key, the private key capable of accessing an account of a distributed ledger network; generating and storing a first shard of the private key on a smart card using the protocol; generating and storing a second shard of the private key on at least one institution backend using a protocol; receiving, from a merchant point of sale system, a request for a transaction associated with the account and the first shard; retrieving, from the at least one institution backend, the second shard; and generating the private key from partial signatures of the first shard and the second shard, and upon generating the complete signature, executing the transaction.
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
13.
SYSTEMS AND METHODS FOR PROVIDING AN ARTIFICIAL INTELLIGENCE-BASED PLANNING ASSISTANT
In some aspects, the techniques described herein relate to a method including: receiving, from a user interface, input travel data; providing the input travel data to a machine learning engine as input to the machine learning engine; receiving, as output from the machine learning engine, predictions of travel services, where the predictions of travel services are based on the input travel data; formatting a digital itinerary including the predictions of travel services as line-item recommendations for the user on the digital itinerary; and presenting the digital itinerary to the user via the interface.
In some aspects, the techniques described herein relate to a method including: tokenizing a text string into utterance tokens; vectorizing the utterance tokens; providing the utterance tokens to a machine learning model as input to the machine learning model; receiving, as output from the machine learning model, a predicted intent; formatting a query of a content repository, wherein the query includes the predicted intent; receiving, based on the query, an artifact from the content repository; and displaying the artifact via an interface.
In some aspects, the techniques described herein relate to a method for a secure transaction comprising: receiving a transaction request comprising payment information, at a payments platform executed by a server and from a sender interface executed on a sender's device; generating, at the payments platform, a link with a unique payment identification token specific to the transaction request; sending the link with the unique payment identification token to a receiver; receiving an API call when the link is activated by the receiver using a receiver interface executed on a receiver's device; in response to the payments platform determining the link is activated, sending available payment details to the receiver and a request for a receiver detail; receiving the receiver detail; conducting a assessment based on the payment information and the receiver detail; and based on the assessment exceeding a threshold, executing a payment according to the transaction request.
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p. ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
16.
SYSTEMS AND METHODS FOR BRIDGING GAPS IN CRYPTOGRAPHIC SECRET DISTRIBUTION USING LINE-OF-SIGHT-SECURED NETWORKS
Systems and methods for bridging gaps in cryptographic secret distribution using line-of-sight-secured networks are disclosed. In one embodiment, a system may include: a first physical location providing a cryptographic secret; a second physical location comprising a space-based vehicle transceiver that receives the cryptographic secret from the first physical location over a secure communication channel; a space-based vehicle that receives the cryptographic secret from the second physical location over a first line-of-sight communication channel; and a third physical location that receives the cryptographic secret from the space-based vehicle over a second line-of-sight communication channel, encrypts data with the cryptographic secret, and communicates the encrypted data to the first physical location over a communication network; wherein the first physical location receives the encrypted data and decrypts the encrypted data using the cryptographic secret.
Systems and methods for quantum key distribution (QKD) secured vault-based application-to-application communication are disclosed. A method may include: receiving, at a vault application at a first facility, a request for a shared quantum key for communication of a secret in a vault at the first facility to an application at a second facility; distilling, by quantum devices at the first and the second facility and over a quantum communication channel, a shared quantum key using a QKD protocol; receiving, by an encryptor at the first facility, the secret; encrypting, by the encryptor at the first facility, the secret with the shared quantum key, communicating, the encrypted secret to the second facility over a communication network; decrypting, by an encryptor at the second facility, the encrypted secret with the shared quantum key; and receiving, by the application at the second facility, the secret from the encryptor at the second facility.
In some aspects, the techniques described herein relate to a method including: providing, on a peer-to-peer distributed network, an aggregation server; implementing, at a first node of the peer-to-peer distributed network, a machine learning (ML) model, wherein the ML model is trained on a first private data set; sending the ML model to the aggregation server; replicating the ML model to a second node of the peer-to-peer distributed network, wherein the ML model is retrained on a second private data set to generate a retrained model; sending the retrained model to the aggregation server; aggregating the ML model and the retrained model to generate an aggregated model; and replicating the aggregated model to the first node of the peer-to-peer distributed network, wherein the ML model is promoted to a production model at the first node of the peer-to-peer distributed network.
Systems and methods for efficient presentation of payment options at point of sale devices are disclosed. A method may include: identifying a plurality of stored or provisioned payment cards in customer wallets for a merchant; (2) pre-qualifying each of the customers associated with the stored/provisioned payment cards for one or more installment payment options for a purchase from the merchant; and (3) communicating a list of token reference identifiers for stored/provisioned payment cards that have been pre-qualified and the one or more pre-qualified installment payment options to a merchant computer program executed by a merchant backend, wherein the merchant computer program receives a token reference identifier for a stored or provisioned payment card in one of the customer wallets, determines that the token reference identifier is on the list of pre-qualified token reference identifiers, and presents the one or more installment payment options in a checkout user interface.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
20.
SYSTEMS AND METHODS FOR RESTRICTED RESOURCE ACCESS MANAGEMENT
Systems and methods for restricted resource access management are disclosed. A method may include: a user application executed by a user electronic device receiving a request for access to a restricted resource, generating a machine-readable code comprising a unique identifier and a uniform resource locator, communicating the machine-readable code to a backend computer program, and presenting the machine-readable code to an access device for the restricted resource. The access device may communicate the machine-readable code to the backend computer program using the uniform resource locator. The backend computer program may compare the machine-readable code received from the user application to the machine-readable code received from the access device, and may send a control signal to the access device to grant access in response to a match. The access device may grant access to the restricted resource in response to receiving the first control signal.
Systems and methods for self-service data structure discovery are disclosed. In one embodiment, a method may include: (1) retrieving, by a data crawler, data from one or more data sources; (2) storing, by the data crawler, the data to a data catalog; (3) receiving, at a search dashboard, a query from a user, the query comprising a search field; (4) submitting, by the search dashboard and using a query tool, the query to a data catalog, wherein the query tool searches the search field by data structure, datatype, field journey, primary key details, and/or multi-value column detail across layers, data lineage controls in the data catalog; (5) receiving, at the search dashboard, a result of the query from the data catalog; and (6) presenting, by the search dashboard, the results.
In some aspects, the techniques described herein relate to a method including: providing a plurality of inputs to a payload engine; providing a machine learning engine, wherein the machine learning includes a machine learning model, and wherein the machine learning model is configured to generate output based on the plurality of inputs; providing a rules engine, wherein the rules engine includes a logic tree based on the plurality of inputs; receiving, at the payload engine, a transaction and associated transaction details; generating, by the machine learning engine and based on the transaction, the associated transaction details, and the plurality of inputs, a first transaction processing parameter; generating, by the rules engine, and based on the transaction, the associated transaction details, and the plurality of inputs, a second transaction processing parameter; and combining the transaction, the first transaction processing parameter and the second transaction processing parameter into a transaction payload formula.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06N 20/20 - Techniques d’ensemble en apprentissage automatique
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
23.
SYSTEMS AND METHODS FOR SEEDED NEURAL TOPIC MODELING
A method may include: receiving a seed topic word distribution; receiving a corpus of documents; generating bag of words representations for the corpus of documents; converting the corpus of documents to vector representations; training a topic modeling system using the seed topic word distribution and concatenated bag of words representations and the vector representations resulting in a topic word distribution and a document word distribution; generating a plurality of new generated topics based on the topic word distribution; precomputing a topic word distribution penalty and a topic word distribution reward for the plurality of topics; penalizing the topic modeling system in response to a divergence and rewarding the topic modeling system in response to a similarity; determining a total loss from a neural network loss, the topic word distribution penalty, and the topic word distribution reward; and training the topic modeling system based on the total loss.
A method for dynamic risk-assessed serialization of user challenges may include a computer program: receiving, from a requesting system, a challenge request for a user action; identifying a first challenge type to present based on the user action; presenting a first challenge for the first challenge type to a user electronic device; receiving, from the user electronic device, a response to the first challenge; verifying the response to the first challenge; determining that a second challenge is necessary based on the response to the first challenge; identifying a second challenge type to present based on the response to the first challenge; presenting a second challenge for the second challenge type to the user electronic device; receiving, from the user electronic device, a response to the second challenge; verifying the response to the second challenge; and returning, to the requesting system, a notification that the challenge request was successful.
A method for generating keys in a multi-cloud environment that minimizes the impact of a breach may include: generating and storing a first key encryption key (KEK) in a first environment key management service (KMS); generating a first data encryption key (DEK) using the first KMS; generating a second DEK for a second environment using the first KMS; encrypting the first DEK with the first KEK and the second DEK with the first KEK; storing the encrypted first DEK and the encrypted second DEK in a database; generating a second KEK and storing the second KEK in a second environment KMS; encrypting the first DEK with the second KEK and the second DEK with the second KEK; and storing the encrypted first DEK and the encrypted second DEK in the database.
Systems and methods for key synchronization in multi-cloud environments are disclosed. A method may include: (1) generating, by a synching computer application and using a first key management service in a first cloud environment, a data encryption key and storing the data encryption key in the first key management service; (2) generating, by the synching computer application and using a second key management service in a second cloud environment, a key encryption key pair comprising a private key and a public key and storing the key encryption key pair in the second key management service; (3) fetching, by the synching computer application, the public key from the second key management service; (4) encrypting, by the synching computer application, the data encryption key with the public key; and (5) storing, by the synching computer application, the encrypted data encryption key in a database in the second cloud environment.
In one example, a method for prediction future network anomaly events is disclosed. The method includes generating a machine learning model for a computer communication network. Generation of the machine learning model can be by applying a historical set of time series data metrics of the computer communication network to train the machine learning model. The method may determine a data metric threshold that indicates a limit for future data metrics associated with the computer communication network. The method may analyze current data metrics associated with the computer communication network, and predict a future time when the data metrics associated with the computer communication network will meet or exceed the data metric threshold value. The method may flag the prediction of the future time to avoid a network anomaly.
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04L 43/067 - Génération de rapports en utilisant des rapports de délai
28.
SYSTEMS AND METHODS FOR COMMUNICATION AND NEGOTIATION OF REQUEST FOR PAYMENT OVER PAYMENT NETWORKS
A method may include a first party computer program: (1) receiving, a first real-time communication comprising a first offer for a first amount from a second party computer program; (2) partially accepting the first offer, causing first funds to be transferred to a second party account from a first party account; sending a second real-time communication to the second computer program comprising a partial acceptance of the first offer and a second offer for a second amount; (3) receiving, from the second computer program, partial acceptance of the second offer and a third offer for a third amount, causing second funds to be transferred to the second party account from the first party account; and (4) accepting the third offer, causing third funds to be transferred to the second party account associated from the first party account.
G06Q 50/00 - Technologies de l’information et de la communication [TIC] spécialement adaptées à la mise en œuvre des procédés d’affaires d’un secteur particulier d’activité économique, p. ex. aux services d’utilité publique ou au tourisme
29.
SYSTEMS AND METHODS FOR CAPTURING SENTIMENTS AND DELIVERING ELEVATED PROACTIVE USER EXPERIENCE
Systems and methods for capturing sentiments and delivering elevated proactive user experience are disclosed. In one embodiment, a method may include a solution recommendation computer program: receiving, from a user electronic device, a message comprising an identifier for a computer issue; identifying, using a trained machine learning engine, a solution category for the computer issue, wherein the trained machine learning engine is trained using historical service data and historical sentiment scores; retrieving a custom solution for the solution category from a knowledge base; determining whether the custom solution was successful; in response to the custom solution being unsuccessful, requesting feedback on the custom solution from the user electronic device; receiving the feedback from the user electronic device; assigning a sentiment score to the custom solution based on the feedback, wherein the sentiment scores is positive, neutral, or negative; and retraining the trained machine learning engine using the sentiment score.
G06Q 30/016 - Fourniture d’une assistance aux clients, p. ex. pour assister un client dans un lieu commercial ou par un service d’assistance après-vente
G06Q 50/00 - Technologies de l’information et de la communication [TIC] spécialement adaptées à la mise en œuvre des procédés d’affaires d’un secteur particulier d’activité économique, p. ex. aux services d’utilité publique ou au tourisme
H04L 51/02 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p. ex. courriel en utilisant des réactions automatiques ou la délégation par l’utilisateur, p. ex. des réponses automatiques ou des messages générés par un agent conversationnel
G06N 5/022 - Ingénierie de la connaissanceAcquisition de la connaissance
Systems and methods for dynamically switching payment mechanisms for outgoing payments are disclosed. A method may include: receiving, by a payment mechanism selection computer program, a payment request from an electronic device associated with a payor to pay a payee comprising payment parameters; presenting, by the payment mechanism selection computer program, a plurality of payment features to the payor electronic device; receiving, by the payment mechanism computer program and from the payor electronic device, a selection of a subset of the plurality of payment features; determining, by the payment mechanism selection computer program, a payor payment intent from the selection of the subset of payment features; selecting, by the payment mechanism selection computer program, a payment mechanism from a plurality of available payment mechanisms that is consistent with the payor payment intent; and executing, by the payment mechanism selection computer program, the payment using the payment mechanism.
A method and system for performing dynamic provisioning of augmented reality information is provided. The method includes acquiring, from a user device of a user, user device-based information, retrieving rebate information corresponding to the user device-based information, and retrieving user information of the user of the user device. Based on the acquired and retrieved information, the method further tracks movement or activity of the user device, and determines whether a predetermined condition is met. When the predetermined condition is determined to have been met, the method displays one or more rebates in augmented reality over image information displayed on a display of the user device. However, when the predetermined condition is determined not to have been met, the method continues the tracking of movement or activity of the user device until the predetermined condition is determined to be met.
Systems and methods for enhancing digital wallet security are disclosed. In one embodiment, a method may include a service provider computer program: (1) receiving a request from a computer program executed by a user electronic device for user authentication with a product identifier for a product; (2) generating a verification code; (3) communicating the product identifier and the verification code to a verification computer program, wherein the verification computer program is configured to retrieve user contact information for a user associated with the product identifier and communicate the verification code to the user electronic device; (4) receiving, by the service provider computer program, a received verification code from the computer program, wherein the received verification code was received at the user electronic device; and (5) communicating authorization for an action involving the product to the computer program in response to the received verification code matching the verification code.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/42 - Confirmation, p. ex. contrôle ou autorisation de paiement par le débiteur légal
33.
METHOD AND SYSTEM FOR AUTOMATIC LOAN ORIGINATION APPLICATION ROUTING AND PRIORITIZATION
A method for automating a loan origination process by optimizing parameters used for routing loan origination applications to underwriters and prioritizing the handling of the applications is provided. The method includes: receiving first information that relates to a loan origination application; obtaining parameter values from the first information; retrieving second information that relates to candidate underwriters; generating, based on the parameter values and the second information, a task procedure for processing the loan origination application, including an identification of a target underwriter and requirements for completion of the processing of the loan origination application; transmitting, to the target underwriter, a request message that includes the first information and the task procedure; and receiving a confirmation message indicating that the task procedure is acceptable. The generating of the task procedure uses an artificial intelligence (AI) / machine learning (ML) model that leverages real time insights and adjusts for changing conditions.
A method and a computing apparatus for authenticating an identification to prevent fraud are provided. The method includes: receiving a request for an interaction from a user; displaying a user interface that includes options for proving an identity of the user; receiving, from the user via the user interface, a selection of one of the options; accessing, from a card or a smart phone of the user, first information that corresponds to the selected option; retrieving, from an external database, second information that independently corresponds to the selected option; comparing the accessed first information with the retrieved second information; and determining whether to authenticate the identity of the user based on a result of the comparison.
G06F 21/30 - Authentification, c.-à-d. détermination de l’identité ou de l’habilitation des responsables de la sécurité
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p. ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes
35.
SYSTEMS AND METHODS FOR MANAGING ESCROW FOR PEER-TO-PEER TRANSACTIONS
Systems and methods for managing escrow for peer-to-peer transactions are disclosed. A method may include: receiving, at a payment agreement computer program executed by a backend and from a buyer computer program, a selection of a payment agreement option for a purchase involving a good from a seller; receiving, by the payment agreement computer program and from the buyer computer program, a transaction amount and a seller account identifier; transferring, by the payment agreement computer program, the transaction amount from a buyer account to an escrow account; notifying, by the payment agreement computer program, a seller computer program for the seller that the transaction amount is in the escrow account; receiving, by the payment agreement computer program and from the seller computer program, verification that the transaction amount is correct; and transferring, by the payment agreement computer program, the transaction amount from the escrow account to a seller account.
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p. ex. une autorité de certification, un notaire ou un tiers de confiance
36.
SYSTEMS AND METHODS FOR TOKENIZING ASSETS VIA BLOCKCHAIN-TO-BLOCKCHAIN BRIDGE USING UNDERLYING ASSETS HELD AT A TRIPARTY AGENT OR CUSTODIAN
A method for tokenizing assets via a blockchain-to-blockchain bridge may include: receiving a first instruction from a client to mint first tokens for a client asset; encumbering the client asset on a custody ledger; creating a balance of the first tokens on a first distributed ledger; receiving a second instruction to lock and mint the first tokens to a second distributed ledger as second tokens; receiving verification from a custodian that the first tokens are locked on a lock ledger for the custodian; instructing a blockchain bridge computer program to mint second tokens to a client address on the second distributed ledger; receiving a third instruction to return the second tokens to the first distributed ledger; executing a public burn of the second tokens on the second distributed ledger; and instructing the custodian to unlock the first tokens and move the first tokens to the first distributed ledger.
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p. ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 40/04 - TransactionsOpérations boursières, p. ex. actions, marchandises, produits dérivés ou change de devises
In one example of the present disclosure, a method for determining false positive and active indications is disclosed. The method may apply anomaly network event data to a machine learning model. The machine learning model is trained with historic and correlated anomaly network event data. The method then determines which one of the anomaly network event data is a false positive indication and which one is an active indication.
H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
G06N 5/025 - Extraction de règles à partir de données
G06N 5/047 - Réseaux de filtrage par motifsRéseaux de Rete
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
38.
METHOD AND SYSTEM FOR FRICTIONLESS APPLICATION AUTHENTICATION
A method for facilitating application authentication bypass based on proximate with time using device authentication is disclosed. The method includes receiving a request from a user to access an application on a user device, the request including an application authentication request; accessing the user device via a device application programming interface; retrieving, via the device application programming interface, device authentication data, the device authentication data including a timeline of successful device authentications; determining whether the device authentication data is within a predetermined threshold; authenticating the request by using the device authentication data when the device authentication data is within the predetermined threshold; and permitting access to the application based on a result of the authenticating.
Systems and methods for using single or multi-chain deposit tokens are disclosed. According to an embodiment, a method for deposit tokenization may include: (1) receiving, by a deposit tokenization service for a token issuer and from an authorized party, an instruction for tokenizing an amount of non-tokenized funds in a deposit account; (2) verifying, by the deposit tokenization service, an identity of the authorized party using a verifiable credential; (3) screening, by the deposit tokenization service and using an information oracle, the deposit account and/or the verifiable credential; (4) debiting, by the deposit tokenization service, the deposit account for the amount and crediting the amount to an omnibus account; (5) tokenizing, by the deposit tokenization service, the amount of the non-tokenized funds on a blockchain network as deposit tokens; and (6) crediting, by the deposit tokenization service, a wallet address on the blockchain network with the deposit tokens.
G06Q 20/06 - Circuits privés de paiement, p. ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
40.
METHOD, SYSTEM AND COMPUTER READABLE MEDIUM FOR THE AUTOMATED RECONSTRUCTION OF AN APPLICATION
A method, system and non-transitory computer-readable medium for automated reconstruction of an application. The method, the system, and the non-transitory computer-readable medium cause a processor: receive a workflow that comprises a sequence of microservice operations that correspond to the application; transfer, from a current host platform that is associated with the application, to a backup memory, a copy of an active database that is associated with the application; deactivate the active database from the current host platform; rebuild an operating system of the application; remove a pre-build configuration of the application; install a recovery mode of the application on the current host platform; deploy a post-build configuration of the application; perform a quality assurance process that comprises validating the post-build configuration of the application; and transfer from the backup memory to the current host platform, the copy of the active database.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projetsPlanification d’entreprise ou d’organisationModélisation d’entreprise ou d’organisation
G06F 11/07 - Réaction à l'apparition d'un défaut, p. ex. tolérance de certains défauts
Implementations generally relate to an image-based login and authentication system. In some implementations, a method includes displaying a plurality of random images to a user and receiving from the user a selection of at least one target image from the plurality of random images. The method further includes generating a hash number for the at least one target image, where the hash number identifies the at least one target image, and concealing the hash number in the at least one target image, where the concealing of the hash number provides security in an authentication of the at least one target image. The method further includes generating an encrypted identification token, where the encrypted identification token includes the hash number. The method further includes associating the encrypted identification token with the user, and storing the encrypted identification token in a database for authentication of at least one target image and the user.
G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p. ex. des menus
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p. ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
42.
SYSTEMS AND METHODS FOR DETERMINISTIC ORDERING AND ENFORCING INTRA-BLOCK FAIRNESS IN DISTRIBUTED LEDGER IMPLEMENTATIONS
Systems and methods for deterministic ordering and enforcing intra-block fairness in distributed ledger implementations are disclosed. According to one embodiment, a method for deterministic ordering and enforcing intra-block fairness in distributed ledger implementations may include: (1) receiving, at a hardware security module at one of a plurality of nodes in a distributed ledger network, arbitrary ordering logic based on a definition of fairness agreed to by the plurality of nodes; (2) receiving, by the hardware security module, a plurality of transactions for execution; (3) ordering, by the hardware security module, the plurality of transactions based on the arbitrary ordering logic; and (4) outputting, by the hardware security module, the plurality of transactions as an ordered set of transactions; wherein a consensus algorithm executed by the distributed ledger network commits the ordered set of transactions to the distributed ledger as a block.
Systems and methods for check image deposit are disclosed. In one embodiment, a method for bulk check image deposit may include: (1) capturing, by a computer application executed by an electronic device, a plurality of check images for a plurality of checks comprising an image of a first side of each check and an image of a second side of each check; (2) submitting, by the computer application, the plurality of check images to a backend in a deposit transaction; (3) matching, by a check recognition computer program at the backend, the images of the first side of the checks with the images of the second sides of the checks; (4) validating, by a deposit service computer program executed by the backend, the matched images for each of the checks; and (5) depositing, by the deposit service computer program, the validated checks.
A method for identifying valid change points includes plotting original timeseries data; plotting a scaled cumulative sum of deviance from a mean applied on the timeseries data for generating a cumulative sum (CUSUM) chart; applying a piecewise linear fit (PWLF) on the CUSUM chart for generating a PWLF segment chart; identifying potential change points on the PWLF segment chart; determining an angle formed at each of the potential change points; comparing the determined angle for each of the potential change points against a reference angle limit; when the determined angle is less than the reference angle limit, discarding a corresponding potential change point, and when the determined angle is greater than the reference angle limit, calculating a significance value for the corresponding potential change point; and identifying a valid change point based on the significance value.
G06F 18/21 - Conception ou mise en place de systèmes ou de techniquesExtraction de caractéristiques dans l'espace des caractéristiquesSéparation aveugle de sources
G06F 17/18 - Opérations mathématiques complexes pour l'évaluation de données statistiques
A method and system for using a configuration-based framework for testing an application programming interface (API) are provided. The method includes receiving identification information about one or more APIs to be tested; defining, based on the first information, at least two API endpoints and one or more dependencies to be tested; retrieving an authentication model to be used for accessing the APIs; generating a testing plan based on the API endpoints, the dependencies, and the authentication model; executing a test of the APIs based on the testing plan; and displaying at least one result of the executed test on a graphical user interface (GUI).
Systems and methods for using digital identity frameworks to access and interact with decentralized applications are disclosed. A method may include a proxy smart contract: receiving a trade from an authorized trader and an on-chain format of a verifiable credential, wherein the on-chain format of the verifiable credential comprises a flattened array of an authorized trader verifiable credential, a trusted entity verifiable credential, and root issuer verifiable credential; verifying, using a verifier smart contract, the on-chain format of the verifiable credential, wherein the verifier smart contract queries a digital identifier registry to verify that an authorized trader digital identifier, a trusted entity digital identifier, and a root issuer digital identifier associated with the root issuer verifiable credential are active; and in response to the authorized trader digital identifier, the trusted entity digital identifier, and root issuer digital identifier being active, executing, with a decentralized finance smart contract, the trade.
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p. ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/06 - Circuits privés de paiement, p. ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
47.
SYSTEM AND METHOD FOR IMPLEMENTING AN INTELLIGENT DATA PROCESSING MODULE
Various methods, apparatuses/systems, and media for data processing and analysis report generation are disclosed. A processor establishes a communication link between the processor and a system of record via a communication network. The system of record stores raw data corresponding to one or more trades. The processor receives the raw data from the system of record; analyzes the received raw data; identifies, in response to analyzing, revenue drivers data and revenue change drivers data in connection with the raw data corresponding to the one or more trades; decomposes revenue data by computing the revenue drivers data; decomposes the revenue data by computing the revenue change drivers data; generates, in response to decomposing, a custom GUI having a plurality of display screens; and displays an analysis report on data corresponding to the identified drivers data onto the plurality of display screens in a desired format.
Systems and methods for state management and workflow completion are disclosed. An exemplary method may include receiving a request and data at an onboarding service; sending the request and data to an initiator service; initiating, by the initiator service and at a workflow orchestration engine, a workflow, wherein the workflow is initiated based on the request, and wherein the workflow includes a plurality of activities; registering, by the workflow orchestration engine, the workflow in a unique namespace; generating a worker instance in an application-level container at a compute node; sending, to the worker instance, an activity of the plurality of activities for completion of the activity by the worker instance; communicating, by the worker instance with at least one service, indicating, by the worker instance and to the workflow orchestration engine, that the activity is complete; and persisting, by the workflow orchestration engine, state data for the workflow.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projetsPlanification d’entreprise ou d’organisationModélisation d’entreprise ou d’organisation
49.
SYSTEM AND METHOD FOR DETECTING LOGIN FRAUD BASED ON A MACHINE LEARNING MODEL
Various methods, apparatuses/systems, and media for detecting login fraud based on a machine learning model are disclosed. A processor creates a machine learning model configured to be trained to generate a score based on user's biometrics data and a pattern of activity logs data of the user; trains the machine learning model with the user biometrics data and the pattern of activity logs data in real-time; receives user credentials data from the user for login attempt into a system; compares the received user credentials data with the biometrics data and the pattern of activity logs data of the user stored on a database and the machine learning model; and generates the score, in response to comparing, by utilizing the trained machine learning model. The score is a value that the processor compares with a predetermined threshold value to determine in real-time whether the login attempt is fraudulent.
G06F 21/30 - Authentification, c.-à-d. détermination de l’identité ou de l’habilitation des responsables de la sécurité
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
A method for facilitating automated rule-based asset allocation is disclosed. The method includes onboarding, via a graphical user interface, clients based on corresponding client information; generating rules that correspond to the clients, the rules relating to asset allocation rules; retrieving, via an application programming interface, asset portfolio information that corresponds to the clients; determining an allocation action based on the generated rules and the asset portfolio information; and automatically initiating, in real-time, the allocation action.
Systems and methods for distributed ledger-based check verification are disclosed. In one embodiment, a method may include a bank backend computer program: (1) receiving, from a computer application executed by an electronic device, an image of a presented check as part of an electronic check deposit process; (2) performing optical character recognition on the image of the presented check; (3) generating a text file based on the optical character recognition; (4) querying a distributed ledger in a distributed ledger network to determine whether the presented check has been presented or cleared before; (5) determining that the presented check has not been presented or cleared before; (6) processing the presented check for deposit; and (7) writing the text file for the presented check to the distributed ledger.
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
52.
SYSTEMS AND METHODS FOR PROCESSING CHECKS WITH MACHINE-READABLE OPTICAL LABELS
Systems and methods for processing checks with machine-readable optical labels are disclosed. In one embodiment, a method for processing checks with machine-readable optical labels may include (1) receiving, by a presenting bank computer program executed by an electronic device, a check comprising a machine-readable optical label printed thereon, wherein the machine-readable optical label comprises a payor bank routing number that is encrypted with a private key for a payor bank; (2) reading, by the presenting bank computer program, the machine-readable optical label; (3) decrypting, by the presenting bank computer program, the machine-readable optical label using a public key corresponding to the private key; (4) identifying, by the presenting bank computer program, the payor bank routing number from the machine-readable optical label; and (5) routing, by the presenting bank computer program, the check to the payor bank associated with the payor bank routing number.
An automatically self-healing multi-tier system for providing seamless resiliency for end users is provided. The system includes a plurality of tiers of elements; a processor; a memory; and a communication interface. The processor is configured to determine whether each respective tier of elements satisfies each of a plurality of intrinsic observer capabilities, a plurality of intrinsic reactor capabilities, a plurality of first health checks received from an internal tier, and a plurality of second health checks received from an external tier. When any of the intrinsic observer capabilities and the intrinsic reactor capabilities are not satisfied, an extrinsic observer capability and/or an extrinsic reactor capability is used to compensate for the unsatisfied capability. When any of health checks discover a degradation of service, communication flows are routed so as to fully or partially avoid the affected tier of elements.
A method and a system for solving transactions reconciliation tasks by integrating clustering and optimization are provided. The method includes: receiving first information that relates to a plurality of transactions; extracting, from the first information, a set of transaction-specific features and a set of transaction-specific textual information; generating at least one meta-transaction by clustering a subset of the plurality of transactions based on the extracted set of transaction-specific features and the extracted set of transaction-specific textual information; and matching transactions from within the clustered subset based on the amounts of the transactions.
A method for facilitating automated participant record augmentation via a secured repository is disclosed. The method includes aggregating, via an application programming interface, employee data from sources according to a predetermined schedule, the employee data including data elements; associating the data elements with a corresponding employee; persisting the association and the data elements in the secured repository; receiving an indication that an interaction has been initiated, the interaction corresponding to a telecommunications interaction between several participants; identifying the persisted data elements that correspond to each of the participants based on the association; and automatically augmenting an interaction record that corresponds to the interaction with the identified data elements.
Systems and methods for frictionless payments in Web 3.0 and the Metaverse are disclosed. A method may include a buyer bot: monitoring a buyer interaction with a merchant of a digital collectable via a buyer vault/digital wallet, the digital collectable having a cryptocurrency price in a cryptocurrency; determining a fiat currency price in a fiat currency for the cryptocurrency price; receiving, from the buyer vault/digital wallet, conformation of a purchase of the digital collectable at the fiat currency price; executing payment for the digital collectable in the fiat currency at the fiat currency price; transforming the payment in the fiat currency to a digital collectable concierge service designated account; engaging a fiat-to-crypto on-ramp to convert the fiat currency to the cryptocurrency; and providing the payment in the cryptocurrency to a digital collectable smart contract that mints or delivers the digital collectable to the buyer.
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p. ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/06 - Circuits privés de paiement, p. ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/42 - Confirmation, p. ex. contrôle ou autorisation de paiement par le débiteur légal
A63F 13/792 - Aspects de sécurité ou de gestion du jeu incluant des données sur les joueurs, p. ex. leurs identités, leurs comptes, leurs préférences ou leurs historiques de jeu pour le paiement, p. ex. d’abonnements mensuels
H04L 51/21 - Surveillance ou traitement des messages
G06F 16/38 - Recherche caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement
SYSTEMS AND METHODS FOR PRIVACY PRESERVING, NETWORK ANALYTICS, AND ANOMALY DETECTION ON DECENTRALIZED, PRIVATE, PERMISSIONED DISTRIBUTED LEDGER NETWORKS
A method for privacy preserving machine learning model sharing may include a computer program for a first institution of a plurality of institutions in a distributed ledger network: receiving transaction data for a transaction; training a local machine learning model using the transaction data; submitting parameters for the local machine learning model to the distributed ledger network as a private transaction with a trusted entity, wherein the trusted entity receives parameters for a plurality of local machine learning models from the distributed ledger network for the plurality of institutions in the distributed ledger network and aggregates the parameters into an aggregated machine learning model and submits the aggregated parameters to the distributed ledger network as one or more transactions; receiving, from the distributed ledger network, the aggregated parameters for the aggregated machine learning model; and updating the local machine learning model with the aggregated parameters.
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p. ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
58.
SYSTEMS AND METHODS FOR CROSS-PLATFORM CONVERSION AND EXCHANGE OF VIRTUAL ASSETS
Systems and methods for cross-platform conversion and exchange of virtual assets are disclosed. An exemplary method includes receiving, at an external API gateway of a financial institution backend, an API call, including completed-objective data from an entertainment platform, wherein the completed-objective data represents an in-game objective completed by a user of the entertainment platform; processing, as input to a conversion engine, the completed objective data, wherein the conversion engine includes a conversion table, and wherein the conversion table includes conversion rates that specify a value of the in-game objective in a plurality of different assets; crediting the value of the in-game objective to an account of the user; and displaying, as output of the conversion engine, the value of the in-game objective in the plurality of different assets to the user in electronic form.
G07F 17/32 - Appareils déclenchés par pièces de monnaie pour la location d'articlesInstallations ou services déclenchés par pièces de monnaie pour jeux, jouets, sports ou distractions
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
G06Q 40/02 - Opérations bancaires, p. ex. calcul d'intérêts ou tenue de compte
59.
SYSTEM AND METHOD FOR IMPLEMENTING A DIGITAL DEED AND TITLE VIA NON-FUNGIBLE TOKEN (NFT) AND BLOCKCHAIN
An embodiment of the present invention is directed to extending the use of NFTs to digital deeds to validate and/or verify ownership of real estate. An embodiment of the present invention seeks to streamline validation for low risk transactions, e.g., refinancing when the same financial institution is involved. Accordingly, an embodiment of the present invention seeks to avoid a complex and burdensome title search and further eliminate a need for title insurance. As a result, there is less of a barrier to home ownership.
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p. ex. une autorité de certification, un notaire ou un tiers de confiance
G06F 3/00 - Dispositions d'entrée pour le transfert de données destinées à être traitées sous une forme maniable par le calculateurDispositions de sortie pour le transfert de données de l'unité de traitement à l'unité de sortie, p. ex. dispositions d'interface
G06Q 20/00 - Architectures, schémas ou protocoles de paiement
60.
SYSTEMS AND METHODS FOR MERCHANT INTEGRATION TO TRACK ORDERS AND SHIPMENT STATUS
A method for merchant authorization and transaction notification may include: receiving, financial institution computer program for a financial institution and from a merchant system, a transaction involving a customer of the financial institution; authorizing, by the financial institution computer program, the transaction; communicating, by the financial institution computer program, a notification to a messaging address associated with the customer, transaction information and an option to report the transaction as unauthorized; receiving, by the financial institution computer program and from an electronic device associated with the customer, a report that the transaction was unauthorized; notifying, by the financial institution computer program, the merchant system that the transaction was unauthorized, wherein the merchant system is configured to cancel the transaction; and executing, by the financial institution computer program, a fraud prevention action with a financial instrument used to conduct the transaction in response to the report that the transaction was unauthorized.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/42 - Confirmation, p. ex. contrôle ou autorisation de paiement par le débiteur légal
61.
SYSTEM AND METHOD FOR COMPARING BEHAVIOR OF SOFTWARE COMPONENTS
A method for performing workflow comparisons for determining data migration readiness is provided. The method includes initiating a comparison run for a batch file, and splitting the batch file into multiple component workflows. Each of the component workflows are then scheduled for processing across multiple processing stages. When a component workflow is determined to have completed all of the processing stages: compute a difference between a baseline and a target system for the component workflow, and cross reference the difference generated with prestored rules as well as machine learning techniques to determine whether the difference can be ignored (e.g., excluded) or explained (e.g., already encompassed in the book of work). When all of the component workflows originating from the batch file passes, merging reports for all of the component workflows for generating a merged report.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
G06F 9/46 - Dispositions pour la multiprogrammation
62.
SYSTEMS AND METHODS FOR COLLECTION AND PROCESSING OF TRANSACTIONAL DATA
Techniques for collection and processing of transactional data are disclosed. An exemplary method includes receiving, at a capture module, a document; determining, by an aggregation engine, a plurality of transactions recorded in the document; categorizing, by the aggregation engine, the plurality of transactions into categorized transactional data; storing the categorized transactional data in a storage module; publishing consumption application programming interfaces (APIs); and providing the categorized transactional data for consumption via the consumption APIs.
A method for providing geospatial information for clustered merchants based on proximate transactional data is disclosed. The method includes retrieving, via an application programming interface, transaction data for a geographical location that corresponds to the clustered merchants based on a predetermined parameter; identifying, from the transaction data, the proximate transactional data that correspond to the clustered merchants; linking transactions in the proximate transactional data to each of the clustered merchants; computing a weighted score for each of the transactions based on a characteristic; calculating a transaction centroid for each of the clustered merchants by using the corresponding weighted score and a result of the linking; and determining the geospatial information for each of the clustered merchants based on a distance to the corresponding transaction centroid.
Various methods, apparatuses/systems, and media for automating sponsored-search data pipelines are disclosed. A processor generates keyword-level metrics data based on received bidder input data that includes cost-per-acquisition (CPA) data and total spending data for each keyword; determines campaign-level CPA threshold data chosen at previous iteration of search campaign and a target CPA data used for current search campaign; calculates, campaign-level metrics data that includes the CPA data and adjusted total spending data; quantifies a final campaign-level reward data based on the calculated campaign-level metrics data, adjusted total spending data, and the target CPA data; updates a distribution corresponding to CPA-threshold data chosen at previous iteration using the final campaign-level reward data; samples CPA-threshold distributions and determines CPA-threshold data chosen at current iteration; executes campaign-level heuristics using the keyword-level metrics data, campaign-level metrics data, and the CPA-threshold data chosen at current iteration; and displaying final heuristic-execution data onto a GUI.
G06N 5/02 - Représentation de la connaissanceReprésentation symbolique
G06N 5/04 - Modèles d’inférence ou de raisonnement
G06N 7/00 - Agencements informatiques fondés sur des modèles mathématiques spécifiques
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projetsPlanification d’entreprise ou d’organisationModélisation d’entreprise ou d’organisation
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
65.
METHOD AND SYSTEM FOR PROVIDING HIGH-SPEED STORAGE AND RETRIEVAL OF INFORMATION
A method for providing high-speed storage and retrieval of information from a plurality of sources is disclosed. The method includes retrieving data from the sources; identifying a deterministic perfect hash function based on the retrieved data for stock symbols and corresponding stock information, the perfect hash function relating to a mapping of distinct elements in the corresponding stock information with the stock symbols; generating, by using the retrieved data, a parameter that relates to an instruction to calculate the identified perfect hash function, the parameter including a host file, a simulation file, and a hash state file; programming a register and a memory that are associated with the processor by using the parameter; and determining, via the programmed register and the programmed memory, a hash value for incoming stock symbols, the hash value relating to a symbol index that locates information corresponding to the incoming stock symbols.
A method for facilitating usage and storage of bi-temporal data is disclosed. The method includes receiving, via an application programming interface, an update request, the update request relating to an update of a data object with a new data object; identifying a builder pattern that corresponds to the data object based on a data type of the data object; automatically generating, by using the identified builder pattern, a delta object based on the request, the delta object relating to a difference between the data object and the new data object; associating the delta object with an axial value, the axial value including a reported time and an effective time; and persisting the delta object and the corresponding association as an event that represents the difference between the data object and the new data object.
A method for distributing data process according to technical resource capacity availability and constraints across a network is disclosed. The method includes receiving, at a database, a feed request for processing by a computing resource, among a network of computing resources that are geographically dispersed. Further, the method includes identifying, among the network of computing resources, a computing resource for processing the feed request based on the at least one attribute and processing capacity of the computing resources, and assigning the feed request for processing to the identified computing resource in real-time and without predetermined assignment to process increase in data volume by leveraging remotely located and/or underutilized computing resources.
H04L 47/76 - Contrôle d'admissionAllocation des ressources en utilisant l'allocation dynamique des ressources, p. ex. renégociation en cours d'appel sur requête de l'utilisateur ou sur requête du réseau en réponse à des changements dans les conditions du réseau
H04L 47/70 - Contrôle d'admissionAllocation des ressources
Systems and methods for federated model validation and data verification are disclosed. A method may include: (1) receiving, by a local computer program executed by client system, a federated machine learning model from a federated model server; (2) testing, by the local computer program and using a policy service, the federated machine learning model for vulnerabilities to attacks; (3) accepting, by the local computer program, the federated machine learning model in response to the federated machine learning model passing the testing; (4) training, by the local computer program, the federated machine learning model using input data comprising local data and outputting training parameters; (5) identifying, by the local computer program using the policy service, accidental leakage and/or contamination by comparing the training parameters to the input data; and (6) providing, by the local computer program, the training parameters to the federated model server.
A method for using encryption and tokenization to protect confidential data that is stored in a public cloud database is provided. The method includes: receiving a first data set; tokenizing the first data set; obtaining a first token for at least one attribute of the first data set; encrypting an original value of the attribute and the first data set; storing each of the original value of the at least one attribute, the encrypted value of the at least one attribute, and the first token in a first memory; storing each of the first token and the encrypted first data set in a second memory; and storing the tokenized first data set in a third memory that is hosted on a public cloud server.
A method and a computing apparatus for allocating space in a building are provided. The method includes: receiving a first input that includes information that relates to a plurality of persons that intend to occupy the building; receiving a second input that includes information that relates to building specifications; receiving a third input that includes information that relates to constraints that are mandatory and preferences that are not mandatory; and determining, based on each of the first input, the second input, and the third input, an allocation of each person to a corresponding space within the building and a respective schedule for each person to occupy the corresponding space. The determination of the allocation and the respective schedule may be effected by applying an artificial intelligence (AI) algorithm that is configured to satisfy all of the mandatory constraints and to optimize a satisfaction of the preferences.
A method for providing data blocking to facilitate distributed entity resolution is disclosed. The method includes receiving data sets from a source, the data sets including records that correspond to an entity; grouping each of the records into a block based on a shared characteristic, the block including a blocking key; converting the block into a data file, the data file corresponding to a predetermined file format; partitioning the data file based on the corresponding blocking key; determining, via a worker node, a potential record pair by using the partitioned data file; and persisting the potential record pair.
G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
G06F 16/28 - Bases de données caractérisées par leurs modèles, p. ex. des modèles relationnels ou objet
G06F 16/907 - Recherche caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement
G06F 16/16 - Opérations sur les fichiers ou les dossiers, p. ex. détails des interfaces utilisateur spécialement adaptées aux systèmes de fichiers
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuéesArchitectures de systèmes de bases de données distribuées à cet effet
G06F 16/9035 - Filtrage basé sur des données supplémentaires, p. ex. sur des profils d'utilisateurs ou de groupes
72.
SYSTEMS AND METHODS FOR RESOLVING INTERDEPENDENCIES BETWEEN USER INTERFACES IN A DOMAIN DRIVEN DESIGN MICROSERVICE ARCHITECTURE
A method may include a monitoring computer program: receiving a first message with a first unique identifier and first user data from a first service as part of a multi-step transaction; recording the first message and the first unique identifier and associating the first message with the first unique identifier; receiving, from a second service, a completion message for consumption of the first user data and the first unique identifier; recording the completion message and the first unique identifier; recording a status for the first message; receiving a status query for the first message with the first unique identifier from the first service; returning the status to the first service; receiving a second message comprising a second unique identifier and second user data from the second service; and recording the second message and the second unique identifier and associating the second message with the second unique identifier.
Systems and methods for detecting code duplication are disclosed. In one embodiment, a method for detecting exact code snippet duplicates may include: (1) representing, by a code duplication detection computer program, each of a plurality of code snippets in a codebase as an abstract syntax trees; (2) featurizing, by the code duplication detection computer program, the abstract syntax trees into corpus feature vectors by converting the abstract syntax tree into vector representations; (3) generating, by the code duplication detection computer program, dense feature vectors from the corpus feature vectors using a dimension reduction technique; (4) identifying, by the code duplication detection computer program, exact duplicate code snippet matches by apply density-based clustering to the dense feature vectors; and (5) tagging, by the code duplication detection computer program, the exact duplicate code snippets.
G06F 8/75 - Analyse structurelle pour la compréhension des programmes
G06F 18/2321 - Techniques non hiérarchiques en utilisant les statistiques ou l'optimisation des fonctions, p. ex. modélisation des fonctions de densité de probabilité
G06F 18/231 - Techniques hiérarchiques, c.-à-d. la division ou la fusion d'ensembles de manière à obtenir un dendrogramme
74.
SYSTEMS AND METHODS FOR COLLECTING AND PROCESSING APPLICATION TELEMETRY
A method for collecting and processing application telemetry may include: collecting, by a telemetry insights computer program, first telemetry data from computer applications, network appliances, and hardware devices in a distributed architecture; generating, by the telemetry insights computer program and based on the first telemetry data, a CPU operating service level, a memory operating service level, and a latency service level; collecting, by the telemetry insights computer program, second telemetry data from the computer applications, the network appliances, and the hardware devices; identifying, by the telemetry insights computer program, an anomaly by comparing the second telemetry data to the CPU operating service level, the memory operating service level, and the latency service level; generating, by the telemetry insights computer program, an event for the anomaly and communicating the event to an event manager; and executing, by the event manager, an automated proactive action in response to the anomaly.
Systems and methods for systems and methods for cryptocurrency checkout are disclosed. According to one embodiment, a method may include a financial institution backend: receiving, from a merchant backend, control of a checkout flow for a transaction comprising an identification of a good or service to purchase, wherein the merchant backend accepts payment in cryptocurrency; receiving login credentials for the customer from the computer program; retrieving a plurality of customer accounts for the customer; receiving selection of one or more of the plurality of customer accounts to fund the cryptocurrency for the transaction; deducting a payment amount for the transaction from the one or more selected customer accounts; confirming payment to the merchant backend; returning control of the checkout flow to the merchant backend, wherein the merchant backend completes the transaction with the customer; and settling the transaction by providing a settlement amount in cryptocurrency to the merchant backend.
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
A method for facilitating management of a plurality of statement events is disclosed. The method includes receiving an event, the event relating to an agreement status of a statement; retrieving a profile that corresponds to the statement, the profile including a statement dependency and a rule; mapping the statement based on the statement dependency and the rule; aggregating data that corresponds to the statement from a source; determining a completion status that corresponds to the statement; and publishing a ready event that corresponds to the statement based on a result of the mapping, the aggregated data, and the completion status.
G06Q 20/14 - Architectures de paiement spécialement adaptées aux systèmes de facturation
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/42 - Confirmation, p. ex. contrôle ou autorisation de paiement par le débiteur légal
77.
METHOD AND SYSTEM FOR PROVIDING PORTFOLIO DEVIATION ANALYTICS
A method for providing portfolio deviation analytics to facilitate collateral management is disclosed. The method includes retrieving trade data from a source based on a predetermined schedule, the trade data including transaction information and valuations information; retrieving reference data from a reference data hub; parsing the reference data to identify portfolios and corresponding parameters; identifying a deviation amount for each of the portfolios based on the corresponding trade data and the corresponding parameters; determining a resolution action for each of the portfolios based on the corresponding deviation amount; and automatically initiating the resolution action.
In some aspects, the techniques described herein relate to a method including: providing a host application that provides a native service of a host organization to an end user of the application, and wherein the application integrates and provides an augmented reality service of a third party to the end user of the application; determining, by the data center of the host organization, a location-relevant incentive offer based on location telemetry data; sending the location-relevant incentive offer to a data center of the third party; monitoring, by the data center of the third party, the physical location of the end user; sending to the augmented reality service, the location-relevant incentive offer; and presenting, by the augmented reality service and to the end user via the application, the location-relevant incentive offer when the end user is within a predefined proximity to a vendor associated with the location-relevant incentive offer.
Various methods, apparatuses/systems, and media for automatically fixing health of a certain component of an application are disclosed. A processor establishes a communication link between an application and a plurality of data sources each storing raw data related to a certain strategy contract data, wherein the raw data includes a header data and a leg data; accesses the plurality of data sources to obtain the raw data from each data source; identifies from the raw data corresponding leg data based on corresponding leg assignment data associated with the strategy contract data; assigns each identified leg data of the strategy contract data a sub key; combines each sub key to generate a unique combination ID; implements the unique combination ID to derive a character string; and executes the derived character string to link together each strategy contract data received from the corresponding data source based on the corresponding leg assignment data.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
80.
SYSTEMS AND METHODS OF DETERMINING CONTRAST FOR ACCESSIBILITY
Systems, methods, and devices for determining a contrast of colors displayed by a digital user interface are disclosed, In one embodiment, in an electronic device including a processor, a compliance module is configured to receive a user selection of a graphical element displayed on a user interface of the electronic device; determine first color data associated with a background of the selected graphical element; determine second color data associated with a text string within the selected graphical element; determine a luminosity associated with the first color data and a luminosity associated with the second color data; calculate a color contrast ratio based on the luminosity associated with the first color data and the luminosity associated with the second color data; and display, at the user interface of the electronic device, the calculated color contrast ratio.
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect
G06F 3/04817 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect utilisant des icônes
A method may include a centralized recommendation engine computer program receiving a request for content to display on a mobile electronic device from an ad framework, and requesting offers for the customer based on the customer context from an offer interface platform; the offer interface platform querying a plurality of offer providers for offers, receiving a plurality of ranked offers and an offer identifier for each ranked offer from each of the plurality of offer providers and caching the plurality of ranked offers and an offer identifier for each ranked offer; the centralized recommendation engine computer program receiving the offer identifiers for the ranked offers and providing the offer identifiers for the ranked offers to the ad framework. The ad framework requests content for the ranked offers associated with the offer identifiers from the offer interface platform and generates a webpage with the content in the spaces.
A method for providing participant status to facilitate video teleconferencing management is disclosed. The method includes receiving a starting indication that a video teleconference has been initiated, the video teleconference including a plurality of participants; generating a video histogram for each of the plurality of participants, the video histogram corresponding to an image that is captured for each of the plurality of participants; capturing an audio signature for each of the plurality of participants; determining, in real-time, a status for each of the plurality of participants based on the corresponding video histogram and the corresponding audio signature, the status relating to a connectivity status for the video teleconference; generating an indicator for each of the plurality of participants based on the corresponding status; and displaying, via a graphical user interface, the indicator for the plurality of participants, the graphical user interface corresponding to the initiated video teleconference.
Various methods, apparatuses/systems, and media for generating a data model are disclosed. A processor receives data from a plurality of data sources; displays, onto a graphical user interface (GUI), a plurality of selectable icons for receiving user input in selecting a set of attributes data related to generating a desired data model; receives user input of the selected set of attributes data; automatically creates an executable custom code based on the received data from the plurality of data sources and the selected set of attributes data; executes the custom code; calls, in response to executing, a backend platform for processing the received data from the plurality of data sources and the selected set of attributes data; and automatically generates, in response to calling, the desired data model based on the processed received data and the selected set of attributes data.
Systems, methods, and devices for decentralized notification services are disclosed. In some aspects, the techniques described herein relate to: providing a distributed notification service configured to execute on each node of a plurality of nodes of a decentralized peer-to-peer platform; determining, by the distributed notification service of a first node, a notification definition, where the notification definition is from a catalog of notification definitions and included in a distributed application executing on the first node; sending, by the distributed notification service of a second node, a notification message, where the notification message is associated with the notification definition; receiving, by the distributed notification service of the first node, the notification message; and delivering, by the distributed notification service of the first node, the notification message in the distributed application executing on the first node.
Systems and methods for source code understanding using spatial representations are disclosed. In one embodiment, a method may include: (1) receiving, by a source code understanding computer program, a source code snippet; (2) converting, by the source code understanding computer program, the source code snippet to a two-dimensional image representation using an encoding technique; (3) mapping, by the source code understanding computer program, the two-dimensional image representation into a three-dimensional image representation; (4) determining, by the source code understanding computer program, a classification for the source code snippet using a deep learning network; and (5) providing, by the source code understanding computer program, the classification for the source code snippet to a downstream system.
Systems and methods for liquidity blending are disclosed. In one embodiment, a method for liquidity blending may include: receiving, by a liquidity blending computer program, a client trade inquiry; determining, by the liquidity blending computer program, that the client trade inquiry passes pre-negotiation checks; determining, the liquidity blending computer program, that liquidity blending is applicable to the client inquiry; receiving, by the liquidity blending computer program, price updates from a plurality of algorithms and/or a trader pricer; determining, by the liquidity blending computer program, that the prices from the plurality of algorithms and/or the trader pricer pass pre-emptive price checks; blending, by the liquidity blending computer program, the price levels into a blended price quote; determining, by the liquidity blending computer program, that the blended price quote passes a regulatory control; and sending, by the liquidity blending computer program, the blended price quote to the client.
Systems and methods for providing stateless management of a virtualization platform are disclosed. In some aspects, the techniques described herein relate to a method including: listening, at an agent executing on a host machine of a plurality of host machines that include a cluster for hosting virtual machines, for an event triggered on a virtual machine manager associated with the agent; determining, by the agent and based on the event, parameters needed for an API call at a central management service that manages a plurality of virtual machines and virtual machine managers; sending a Hypertext Transfer Protocol (HTTP) request to the central management service, wherein the parameters are included in the HTTP request; receiving, by the agent and from the central management service, a response to the HTTP request including return data based on the determined parameters and the API call.
Various methods, apparatuses/systems, and media for implementing an attended automation module are disclosed. A processor implements a primary desktop on a graphical user interface (GUI) window. The primary desktop is being created in response to calling a higher level application programming interface (API) from a higher level library in connection with a primary desktop session. The processor also determines that a primary session is being conducted on the primary desktop; accesses a lower level library that stores lower level APIs; calls the lower level APIs; dynamically creates, in response to calling the lower level APIs, a plurality of child desktops each associated with a corresponding lower level API; displays the plurality of child desktops on the GUI window; and simultaneously runs each of the plurality of child desktops on the GUI window in parallel independent of running of the primary desktop.
G06F 16/185 - Systèmes de gestion de stockage hiérarchisé, p. ex. migration de fichiers ou politiques de migration de fichiers
H04L 65/401 - Prise en charge des services ou des applications dans laquelle les services impliquent une session principale en temps réel et une ou plusieurs sessions parallèles additionnelles en temps réel ou sensibles au temps, p. ex. accès partagé à un tableau blanc ou mise en place d’une sous-conférence
H04L 67/08 - Protocoles spécialement adaptés à l'émulation du terminal, p. ex. Telnet
H04L 67/141 - Configuration des sessions d'application
89.
METHOD AND SYSTEM FOR DATA-DRIVEN FINANCIAL PLANNING
A method for providing a data-driven tool for individualized financial planning is provided. The method includes: receiving first information that relates to a user, the first information including at least one financial goal of the user; applying, to the first information, a machine learning algorithm that is uses historical data that relates to financial outcomes; calculating, based on an output of the machine learning algorithm, a probability that the at least one financial goal of the user is achievable; and determining, based on an output the machine learning algorithm, a proposed sequence of actions to be taken by the user with respect to achieving the at least one financial goal. The method may further include applying an artificial intelligence (AI) algorithm that uses a Monte Carlo tree search (MCTS) technique with respect to potential user actions.
G06F 7/08 - Tri, c.-à-d. rangement des supports d'enregistrement dans un ordre de succession numérique ou autre, selon la classification d'au moins certaines informations portées sur les supports
90.
METHOD AND SYSTEM FOR REAL-TIME ANALYTIC OF TIME SERIES DATA
A method for providing real-time analytics of time series data is disclosed. The method includes capturing a first set of time series data from a data flow based on a first predetermined time period; parsing the first set of time series data to identify a first key metric; capturing a second set of time series data from the data flow based on a second predetermined time period; parsing the second set of time series data to identify a second key metric, the second key metric corresponding to the first key metric; comparing, in real-time, the second key metric with the first key metric; and identifying, by using a model, an anomaly based on a result of the comparing and a predetermined threshold.
Systems and methods for redacted statement delivery to third-party institutions are disclosed. A method may include: receiving a request for a statement from a third-party backend; retrieving a list comprising a plurality of available statements; providing the list of the plurality of available statements to the third-party backend; retrieving a selection of one of the plurality of available statements; identifying metadata for data fields in a statement template; generate the selected statement using the statement template and embedding the metadata in data fields of the statement; identifying a redaction reason; identifying redaction metadata associated with the redaction reason; redact data fields in the statement having metadata matching the redaction reason metadata; storing the redacted statement in a temporary store; and returning a path for the temporary store to the third-party backend, wherein the third-party backend may retrieve the redacted statement from the temporary store.
A method for providing dependency registration and impacted service notification is provided. The method includes mining resource data for a plurality of resources included in heterogeneous platforms included in a single eco-system, and identifying, for each resource, one or more connections with other resources present in the heterogeneous platforms based on the mined resource data. The method also includes generating a resource dependency chain from the resource data and the identified one or more connections, and monitoring change events for the resources included in the heterogeneous planforms. When a change event is detected for a target resource among the resources, the method includes determining one or more resources that are impacted by the change event detected for the target resource based on the resource dependency chain, and transmitting a notification to users of the impacted resources.
A method for machine learning-based data matching and reconciliation may include: ingesting a plurality of records from a plurality of data sources; identifying company associated with each of the plurality of records; assigning a unique identifier to each uniquely identified company; matching each of the records to one of the uniquely identified companies using a trained company matching machine learning engine; identifying a primary company record in the matching records and associating other matching records with the primary company record; matching each of the records to a contact using a trained contact matching machine learning engine; identifying a primary contact record in the matching records and associating other matching records with the primary contact record; synchronizing the plurality of records in a graph database using the unique identifier; receiving feedback on the matching companies and/or matching contacts; and updating the trained company matching machine learning engine.
Method and systems for adaptively allocating assets in an investment portfolio are provided. The method includes: receiving first information relating to an investment portfolio of an investor; receiving second information relating to several financial goals of the investor; determining, based on the second information, respective estimated costs for achieving each corresponding financial goal; determining, based on the first information and the second information, a current status and proposed adjustments, including to asset allocation among asset classes, that relate to achieving the financial goals; and outputting third information that relates to the determined costs, the current status, and the proposed adjustments, including to asset allocation among asset classes.
A method for generating schedules for a group of persons within a common workspace is provided. The method includes: receiving a first user input that relates to employee preferences; receiving a second user input that relates to at least one manager preference; receiving a third user input that relates to business constraints; generating, based on the received first, second, and third user inputs, a respective schedule for each corresponding group member; and outputting each respective schedule to a user interface for display thereon. The method may also include generating a set of metrics that corresponds to the employee preferences.
A method for estimating a covariance with respect to a plurality of bonds is provided. The method includes: receiving historical bond market returns data; using a first algorithm based on an Auto-Regressive-Moving-Average (ARMA) model to calculate ARMA model regression errors based on the historical bond market data; using a second algorithm based on a logarithmic Generalized AutoRegressive Conditional Heteroskedasticity (GARCH) model to calculate an estimated volatility vector based on the ARMA model regression errors; using the ARMA model regression errors and the calculated volatility vector to estimate a time-varying covariance matrix of the ARMA model regression errors with respect to the historical bond market data; using the estimated time-varying covariance matrix of the ARMA model regression errors and the calculated volatility vector to estimate a time-varying covariance matrix of the bond returns; and using the estimated time-varying covariance matrix to calculate a set of predicted hedge ratios.
G06Q 10/04 - Prévision ou optimisation spécialement adaptées à des fins administratives ou de gestion, p. ex. programmation linéaire ou "problème d’optimisation des stocks"
G06Q 30/02 - MarketingEstimation ou détermination des prixCollecte de fonds
G06Q 40/04 - TransactionsOpérations boursières, p. ex. actions, marchandises, produits dérivés ou change de devises
G06Q 40/06 - Gestion de biensPlanification ou analyse financières
Method and systems for facilitating cashless payments by using a smart phone without a requirement for any of a mobile application, an exchange of personally identifying information, or a payee account are provided. The method includes: receiving an identification number that corresponds to a request for payment submitted by a potential payee; retrieving, based on the identification number, identifying information that corresponds to an account associated with a potential payor; transmitting, to the potential payor, a first message that includes a request for a payment amount; receiving, from the potential payor, a second message that includes a confirmation and the payment amount; validating the request for payment; transferring, to the potential payee, a cookie that is associated with the requested payment amount; and when a confirmation that the requested payment has been completed is received, transmitting, to the payor, a confirmation that the payment has been completed.
G06Q 20/06 - Circuits privés de paiement, p. ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
98.
SYSTEMS AND METHODS FOR GENERATING SYNTHETIC DATA USING FEDERATED, COLLABORATIVE, PRIVACY PRESERVING LEARNING MODELS
Systems and methods for generating synthetic data using federated, collaborative, privacy preserving learning models are disclosed. In one embodiment, a method for generating synthetic data from real data for use in a federated learning network may include: (1) conducting, by a backend for a first institution of a plurality of institutions in a federated learning network, a transaction comprising transaction data; (2) generating, by the backend for the first institution, local synthetic data for the transaction data using a local synthetic data generating model; (3) sharing, by the backend for the first institution, the local synthetic data with a plurality of backends for other institutions; (4) receiving, by the backend for the first institution, global synthetic data from the plurality of backends for the other institutions; and (5) training, by the backend for the first institution, a local machine learning model with the global synthetic data.
G06N 20/20 - Techniques d’ensemble en apprentissage automatique
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
99.
SYSTEMS AND METHODS FOR APPLICATION-BASED MANAGEMENT OF TRANSACTIONS
Systems and methods for application-based management of transactions are disclosed. In accordance with aspects, a method may include receiving, at a transaction management service, a received transaction including a plurality of data parameters associated with the received transaction; generating, by the transaction management service, a transaction challenge record including the plurality of data parameters, a party key and a challenge identifier; transmitting a notification to a user device including the challenge identifier; receiving, from the user device, a validation communication that validates the received transaction and includes the challenge identifier; determining customer context information based on the challenge identifier and the party key; generating, by the transaction management service, service options based on the customer context information; transmitting, by the transaction management service, the service options to the user device; and receiving, at the transaction management service, instructions with respect to the received transaction based on the service options.
Systems and methods for homomorphic encryption-based triggering are disclosed. According to an embodiment, a method for homomorphic encryption-based triggering may include: (1) receiving, by a backend computer program executed by a backend electronic device and from a computer program for a client, a trigger condition for an event, the trigger condition encrypted with a public key for an organization and an action to be executed in response to the trigger condition being met; (2) receiving, by the backend computer program, a stream of data encrypted with the public key; (3) comparing, by the backend computer program, the encrypted trigger condition to the encrypted stream of data; (4) determining, by the backend computer program, that the trigger condition is met; and (5) executing, by the backend computer program, the action associated with the trigger condition.