A payment instrument may include a memory, a contactless chip, a sensor, a visual output component, and/or a processor. The memory may store gesture data associated with one or more predefined gestures. The contactless chip may detect an operating field of an access device and establish a communication with the access device through a near-field communication protocol. The sensor may capture further gesture data associated with a gesture made by a user with the payment instrument in the operating field of the access device. The visual output component may provide a visual output to the user. The processor may compare the further gesture data to the gesture data to determine whether a captured gesture matches a predefined gesture, and in response to the captured gesture not matching a predefined gesture, increment a counter. The processor may control, based on a current count of the counter, the visual output component.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
G06F 3/0346 - Pointing devices displaced or positioned by the userAccessories therefor with detection of the device orientation or free movement in a 3D space, e.g. 3D mice, 6-DOF [six degrees of freedom] pointers using gyroscopes, accelerometers or tilt-sensors
2.
System, Method, and Computer Program Product for Saving Memory During Training of Knowledge Graph Neural Networks
Systems, methods, and computer program products are provided for saving memory during training of knowledge graph neural networks. The method includes receiving a training dataset including a first set of knowledge graph embeddings associated with a plurality of entities for a first layer of a knowledge graph, inputting the training dataset into a knowledge graph neural network to generate at least one further set of knowledge graph embeddings associated with the plurality of entities for at least one further layer of the knowledge graph, quantizing the at least one further set of knowledge graph embeddings to provide at least one set of quantized knowledge graph embeddings, storing the at least one set of quantized knowledge graph embeddings in a memory, and dequantizing the at least one set of quantized knowledge graph embeddings to provide at least one set of dequantized knowledge graph embeddings.
Embodiments of the invention are directed to systems and methods for conducting a transaction using a cryptocurrency. A server computer may receive a transaction request for a cryptocurrency transaction from a user associated a resource provider. The server computer may provide the transaction details to a user device for confirmation. Upon receiving confirmation from the user device, the server computer can provide an authorization message to the resource provider computer indicating authorization of the cryptocurrency transaction. The server computer may receive an acceptance message from the resource provider computer. The server computer can provide, to the cryptocurrency exchange computer, the acceptance message, such that a transfer of cryptocurrency funds in the transaction amount from the funding source to an account of the resource provider associated with the resource provider computer.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Machine learning techniques can be applied to distinguish attacks (including enumeration attacks and account-testing attacks) from normal transaction activity. An ensemble machine learning model can include at least two generative units, one of which is trained using normal transaction data and another of which is trained using attack transaction data. Each generative unit produces a reconstructed output from a given input in a manner that reflects latent patterns in either normal or attack transactions. The reconstructed outputs and the original transaction data can be provided to as inputs to a machine learning classifier, such as a multi-label (or multi-class) classifier, that determines probability scores to different transaction types (or labels), including a first label indicating normal transactions, a second label indicating attack transactions, or a third label indicating uncertain transaction type. Based on the probability scores, the transaction can be classified as normal or attack type.
The present disclosure describes a non-custodial cryptocurrency wallet application, software development kit, method, and system that blend the advantages of custodial and non-custodial schemes. The system leverages existing user credentials and networks of users to generate seed phrases and encryption keeps for the end-users. The non-custodial cryptocurrency wallet application simulates the user interface of a custodial crypto wallet with the advantages and security of a non-custodial crypto wallet.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Methods, systems, and computer program products are provided for implementing a model agnostic framework to provide Shapley values associated with a machine learning model. A method may include receiving an executable file for a neural network machine learning model, converting a format of the executable file for the neural network machine learning model to an agnostic model format to provide an agnostic model format file for the neural network machine learning model, parsing the agnostic model format file, to provide a forward symbolic graph associated with the neural network machine learning model and a backward symbolic graph associated with the neural network machine learning model, receiving a real-time inference request, and determining an output of the neural network machine learning model associated with the real-time inference request and one or more Shapley values associated with the output of the neural network machine learning model.
Systems and method of managing mass access transactions are disclosed. One method includes receiving, by an access operator computer from an access device of an access provider, a first transaction request with a credential and first transaction amount. The access operator computer identifies a token, based on the credential, and transmits a pre-authorization request message with the credential and a pre-authorization amount, then receives a pre-authorization response message. The access operator computer then receives, from the access device or another access device, a second transaction request for a second transaction, with the credential and a second transaction amount. The access operator computer identifies the token and determines that the token has been used at the access provider. Then, a total amount is formed by aggregating the first transaction amount and the second transaction amount, and the access operator computer initiates the transmission of a clearing message including the total amount.
A method for personalizing a transaction via a blockchain network via payment network is disclosed herein. The method can include receiving an application programming interface (“API”) call from a computing device of a user, wherein the API call includes a private key, a public key, and a unique identifier, detecting, a non-fungible token (“NFT”) on the blockchain network based on the public key, authenticating the NFT asset on the blockchain network based on the private key, storing an NFT asset associated with the NFT, the private key, the public key, and the unique identifier upon authenticating the NFT, associating the unique identifier with the NFT upon authenticating the NFT, and transmitting the NFT asset to the computing device of the user, wherein the NFT asset is configured for use in association with a transaction associated with the unique identifier.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
One embodiment is related to a method. The method includes receiving from a storage application server computer, a token request message comprising a user identifier associated with a storage application on a user device, and determining a token. The token is a limited use token. The method includes mapping the token to the user identifier, transmitting, a token response message comprising the token to the storage application server computer. The method includes receiving from a processing network computer, a de-tokenization request message comprising the token, after the processing network computer receives an authorization request message comprising the token from a resource provider computer via a transport computer. The method also includes determining the user identifier using the token, and transmitting the user identifier to the processing network computer.
A token processing server computer to process tokens for non-fungible tokens is disclosed. The token processing server computer includes a processor and a memory coupled to the processor. The memory stores machine executable instructions that when executed by the processor cause the processor to issue a token identification (ID) based on a non-fungible token (NFT) and authenticate ownership of the NFT using payment rails.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Provided is a payment device and a method for verification using a magnetometer. The payment device includes a microchip configured to generate a verification code and a cryptogram configured to be decrypted based on the verification code by a point-of sale (POS) device. The payment device also includes at least one circuit arranged on or embedded in the payment device. The at least one circuit is configured to generate, using power from a power source, a plurality of magnetic signals to produce a pattern in a magnetic field. The pattern in the magnetic field represents the verification code.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Methods, systems, and computer program products for auto-profiling anomalies that: receive anomaly transactions, select a subset of anomaly transactions, the subset of anomaly transactions being associated with a plurality of features, generate, based on the plurality of features and a distribution of the plurality of features, a plurality of weights associated with the plurality of features; segment, using an unsupervised clustering algorithm, based on the plurality of features and the plurality of weights, the subset of anomaly transactions into a plurality of segments of anomaly transactions; and label a subset of segments of the plurality of segments with a feature profile including a feature from each segment of the subset of segments associated with a highest weight of the plurality of weights of the plurality of features of the anomaly transactions in that segment.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
14.
System, Method, and Computer Program Product for Multi-Head Posterior Based Pre-Trained Model Evaluation
Systems, methods, and computer program products for multi-head posterior based pre-trained model evaluation are provided. The system includes at least one processor configured to: generate an embedding dataset based on a pre-trained model, the embedding dataset including a plurality of embeddings representing a plurality of entities; cluster each entity of the plurality of entities based on a feature dataset, resulting in a plurality of clusters; and generate a metric for the pre-trained model based on a posterior probability of each entity of the plurality of entities and the plurality of clusters.
A method and system for efficiently executing query requests based on an estimated number of query records returned. A database server may set a predetermined record count associated with an estimated number of query records. The predetermined record count prevents a single query or multiple queries from intentionally or unintentionally consuming an excessive amount of computational resources. If the estimated number of query records exceed the predetermined record count the database server may cancel or prevent the execution of the query request in order to prevent one or more query requests from consuming an excessive amount of computing resources.
Provided are computer implemented systems, methods, and computer program products for secure key management, including receiving, by a remote data storage service, a request for data stored as encrypted data by the remote data storage service, the request initiated by a first entity, transmitting, to a first multi-party computation (MPC) server controlled by the first entity, an MPC request, receiving an MPC response from the first MPC server including a secret generated by a secure cryptoprocessor, and decrypting the encrypted data based at least partially on the MPC response. The computer implemented systems, methods, and computer program products may include blocking at least one of a subsequent MPC request from the data storage service, a subsequent MPC response to the data storage service, a link, or a connection between the data storage service and an MPC server computer of the entity to prevent decryption.
A system and method are disclosed to convert a non-carded payment to a carded payment. A payment network acceptance platform for cross-border transactions receives a request for an instant payment platform code for a non-carded transaction amount in a first currency from an acquirer. A request for an instant payment platform code for the transaction amount in a second currency is sent to the instant payment platform. The payment network acceptance platform for XB transactions receives an instant payment platform code for the transaction amount in a second currency and receives payment confirmation with an end-to-end ID, payer key, and payer service provider. The payment network acceptance platform for cross-border transactions creates a carded token using a credential directory and transaction mapping links using a transaction mapping service.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/14 - Payment architectures specially adapted for billing systems
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
41 - Education, entertainment, sporting and cultural services
Goods & Services
Downloadable podcasts; Downloadable podcasts in the fields of finance, economics, geopolitics, payments, innovation, and commerce. Transmission of podcasts Entertainment services, namely, providing podcasts; Providing online podcasts in the fields of finance, economics, geopolitics, payments, innovation, and commerce.
19.
System, Method, and Computer Program Product for Generating a Customized User Interface Based on User Interactions
Systems, methods, and computer program products are provided for generating a customized user interface based on user interactions. The system includes a processor configured to receive a user request from a user device to access a resource. In response to the user request, the system retrieves program code configured to cause display of the resource. The system generates a first version of the resource based on the program code and collects interaction data based on sensed interactions of a user of the user device with the displayed first version of the resource. The system inputs the interaction data into a first machine learning model to generate associations between user interaction types from the interaction data and display update actions. The system generates, by a second machine learning model, a second version of the resource based on the at least one display update action for the first version of the resource.
A user can request provisioning of account information for an account to a plurality of resource providing entities. The account may be a new or existing account issued by an authorization computer. The authorization computer may prompt the user to select one or more resource providing entities to which to provision a token associated with the account. Processor server computer may then tokenize the account information associated with the account by determining a token for each resource providing entity selected by the user. In some cases, a token may be provisioned to an already existing account or profile (e.g., account on file) associated with a resource providing entity. In other cases, an account or profile associated with a resource providing entity may not yet exist and thus may be created before a token may be provisioned. Subsequently, the user may utilize provisioned tokens to conduct transactions.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04L 67/53 - Network services using third party service providers
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Techniques described herein include generating a first token for a first account associated with a first authorizing entity computer, the first token associated with a first attribute. The techniques further include generating a second token for a second account associated with a second authorizing entity computer. The techniques further include assigning a first transaction rule to the second token. The techniques further include assigning a first attribute value to the first attribute associated with the first token. The techniques further include receiving a request to check the first attribute value of the first attribute against the first transaction rule. The techniques further include responsive to the first attribute value of the first attribute satisfying the first transaction rule, transmitting a first validation message to the second authorizing entity computer.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
22.
INTERACTION MESSAGING USING SENDER AND RECEIVER DEVICES
One embodiment includes a method comprising: receiving, by a processing network computer from a digital repository on a first user device, a pull message comprising a resource; identifying, by the processing network computer, a source encrypted identifier based on information associated with the digital repository; initiating, by the processing network computer via a source authorizing entity computer that issued a source account identified by the source encrypted identifier, pulling the resource from the source account; receiving, by the processing network computer from the digital repository on the first user device, a destination encrypted identifier for a destination account issued by a destination authorizing entity computer and an push message requesting to push the resource to the destination account; and executing, by the processing network computer, a process to push the resource to the destination account using a destination account identifier associated with the destination encrypted identifier.
41 - Education, entertainment, sporting and cultural services
Goods & Services
Providing online educational resources and tools, namely, articles, checklists, quizzes, modules, courses, infographics, glossaries, videos, calculators, and comics featuring information in the fields of business management, entrepreneurship, recordkeeping, financial planning, risk management, and financial literacy.
09 - Scientific and electric apparatus and instruments
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable video game software; Downloadable electronic game programs and applications Providing online video games through a global computer network; Entertainment services, namely, providing temporary use of non-downloadable video games. Providing temporary use of non-downloadable video game programs
Disclosed is a method, system, and computer program product for rotating a password. According to the method, a proxy server receives a first service ID password from an application server. The proxy server determines whether to use the first service ID password to authenticate the application server at an authentication service based on a query of a database of password changes. Based on the determination of whether to use the first service ID password, the proxy server authenticates the application server at the authentication service using the first service ID password based on the determination or authenticates the application server at the authentication service by replacing the first service ID password with a second service ID password based on the determination.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
26.
Distributed Execution of a Machine-Learning Model on a Server Cluster
Described are a system, method, and computer program product for distributed execution of a machine-learning model on a server cluster. The method includes initiating retrieval of a machine-learning model from a data repository and converting the machine-learning model to an executable format. The method includes transmitting the converted machine-learning model to each node of the server cluster and executing the converted machine-learning model on each node. The method includes generating an initial performance metric based on execution of the converted machine-learning model on each node. The method includes transmitting the plurality of initial performance metrics from each node to an external processor and combining the plurality of initial performance metrics to produce a combined performance metric. The method includes modifying a model hyperparameter of the machine-learning model based on the combined performance metric and executing the modified machine-learning model in a computer system to evaluate real-time event data.
A method is disclosed. The method includes receiving, by a server computer from a user device comprising a transfer application via a communications network, contact data for a plurality of potential users on the user device. The method also includes searching, by the server computer a database, for a set of aliases associated with the potential users in the contact data. The method also includes providing, by the server computer via the communications network, the set of aliases to the user device. The user device is programmed to store the set of aliases in the transfer application, receive a selection of an alias associated with a user, and initiate an interaction with the alias using the transfer application.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
28.
AUTHENTICATION SYSTEMS AND METHODS USING LOCATION MATCHING
A method is disclosed. The method includes receiving, by a token server from an application provider computer, a request to obtain a token for a transaction. The request to obtain the token comprising sensitive information and a transaction identifier. The method further includes retrieving, by the token server, the token, and receiving, by the token server from a resource provider computer, a request for the token, the request for the token comprising the transaction identifier. The method also includes providing, by the token server to the resource provider computer, the token.
A computer generates a cryptographic puzzle and a puzzle tag based on a private verification key, a secret, and a public traceability key. The computer provides a first interaction request message comprising the cryptographic puzzle and the puzzle tag to a first device. The first device or a second device modifies the cryptographic puzzle to obtain a modified cryptographic puzzle, a random value, and a traceability token. The computer receives a second interaction request message comprising the modified cryptographic puzzle and the traceability token from the second device. The computer verifies the modified cryptographic puzzle. The computer solves the modified cryptographic puzzle to obtain a modified secret and provides a second interaction response message comprising a modified puzzle solution or indication thereof to the second device. The second device or the first device, modifies the modified secret using the random value to obtain the secret.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
30.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR ORTHOGONALLY ENCODING FEATURES IN A LEARNED VECTOR REPRESENTATION
Methods, systems, and computer program products for orthogonally encoding features in a learned vector representation are provided. An example method may include allocating a first plurality of coordinates of a latent vector embedding of a machine learning model, orthogonally encoding a plurality of features corresponding to one or more labels of a first plurality of labels associated with a classification task in the first plurality of coordinates of the latent vector embedding, training the machine learning model based on a training dataset to provide a trained machine learning model that comprises an augmented latent vector embedding, wherein the training dataset comprises a plurality of data points having a second plurality of labels, and wherein the first plurality of labels is included in the second plurality of labels, and performing one or more classification tasks based on the augmented latent vector embedding.
Provided are methods that include receiving an initial training dataset, where each data instance of the initial training dataset has a label and a first percentage of the plurality of data instances are labeled correctly, providing the initial training dataset as an input to a reinforcement learning agent (RLA) machine learning model to generate a second training dataset, where a second percentage of data instances of the second training dataset are labeled correctly and the second percentage is greater than the first percentage, training a deep learning model using the second training dataset to provide a trained deep learning model, testing the trained deep learning model using a testing dataset to generate a resultant dataset that has a detection rate, which is an indication of a number of data instances that were predicted correctly, and generating a reward parameter. Systems and computer program products are also disclosed.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Systems and methods include establishing a communication session between a user computing device and a mobile device of a user; receiving, by the user computing device from the mobile device, a token, wherein the token is received by the mobile device after the mobile device transmits a credential obtained from a portable device of the user to a token service computer; and transmitting, by the user computing device, the token to a resource provider computer, which generates and transmits an authorization request message comprising the token to a processing network computer for authorization.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A transaction card includes card information, and a card face with a selectively modifiable transparency, wherein the card face is selectively switchable between a first state characterized by a first transparency and a second state characterized by a second transparency less than the first transparency, and wherein the card information is visible in the first state and obscured in the second state.
Systems, methods, and computer program products for dynamic passcode communication use a merchant application installed on a user device that receives transaction data associated with a transaction at a merchant system. The transaction data may include an account identifier associated with an account at an issuer system. The merchant application determines, based on the account identifier, whether an issuer application associated with the issuer system is installed on the user device. In response to determining that the issuer application is installed on the user device, the merchant application transmits, to the issuer application, a request for a dynamic passcode. The merchant application receives, from the issuer application, the dynamic passcode and transmits, to the issuer system, an authorization request including the account identifier and the dynamic passcode. The merchant application receives, from the issuer system, an authorization response authorizing or denying the transaction.
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
A computer-implemented method is disclosed. The method includes using a payment network to receive a transmission from a risk-screening module, generate an authentication message based on a prescreened status of the payment network, transmit a communication to the risk-screening module, receive from an acquirer an authorization request for the payment transaction where the authorization request is by the merchant, receive from an acquirer the authentication message, detect the prescreened status of the payment transaction, and associate the authorization request with an indicator of the prescreened status of the payment transaction based on the authentication message. The transmission includes a request for the authentication message for a payment transaction with a merchant associated with the risk-screening module. The payment transaction includes the prescreened status. The communication includes the authentication message. The detecting of the prescreened status of the payment transaction is based on the authentication message.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
36.
TECHNIQUES FOR MULTI-TIERED DATA STORAGE IN MULTI-TENANT CACHING SYSTEMS
Embodiments of the invention are directed to systems and methods for utilizing a multi-tiered caching architecture in a multi-tenant caching system. A portion of the in-memory cache may be allocated as dedicated shares (e.g., dedicated allocations) that are each dedicated to a particular tenant, while another portion of the in-memory cache (e.g., a shared allocation) can be shared by all tenants in the system. When a threshold period of time has elapsed since data stored in a dedicated allocation has last been accessed, the data may be migrated to the shared allocation. If data is accessed from the shared allocation, it may be migrated back to the dedicated allocation. Utilizing the techniques for providing a multi-tiered approach to a multi-tenant caching system can increase performance and decrease latency with respect to conventional caching systems.
G06F 12/0811 - Multiuser, multiprocessor or multiprocessing cache systems with multilevel cache hierarchies
G06F 12/084 - Multiuser, multiprocessor or multiprocessing cache systems with a shared cache
G06F 12/0891 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches using clearing, invalidating or resetting means
Disclosed herein is a service provider system and method to generate a persona token for a user, store the persona token at a restricted access database, and return a persona token identifier to the user. The persona token is used to generate persona insights, that can be provided to an artificial intelligence / machine learning algorithm along with an inquiry. The algorithm may identify goods or services based on the persona insights. Also disclosed herein are system and methods to attribute a user clicking on a product link, retaining and using the product information to link item level details to purchases, and making a purchase on the linked e-commerce / merchant website such that the originating website knows that a purchase ultimately resulted from the clicked ad.
Embodiments provide for a method of allowing for communication between a portable device comprising a portable device NFC antenna and a user device comprising a user device NFC antenna using a bridge apparatus comprising a large coil, a small coil, and an amplifier circuit electrically coupling the large coil and the small coil. The method includes the small coil in the bridge apparatus receiving a near field communication (NFC) signal from the user device NFC antenna. The amplifying circuit can amplify the NFC signal to obtain an amplified NFC signal. The large coil in the bridge apparatus can transmit, to the portable device NFC antenna, the amplified NFC signal.
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
H01Q 1/22 - SupportsMounting means by structural association with other equipment or articles
H01Q 1/36 - Structural form of radiating elements, e.g. cone, spiral, umbrella
Methods of transaction authentication are provided. In one such method, at least one first transaction has been conducted, the or each first transaction generating data including first data comprising authentication data and second data identifying the or each first transaction, wherein a given first transaction is between a merchant and a card holder. A cryptographically signed and/or encrypted token corresponding to the given first transaction and comprising a characteristic of the first transaction has been generated using at least said second data. The cryptographically signed and/or encrypted token has been transmitted to the merchant. The method comprises receiving, from the merchant, data corresponding to a second transaction and in the event that the data corresponding to the second transaction includes the cryptographically signed and/or encrypted token, responsively authenticating the cryptographically signed and/or encrypted token, whereby to determine an authenticated association between the second transaction and a given first transaction.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Described herein is a biometric identification technique that includes a gateway computer receiving a first set of encrypted match scores and a set of enrollment biometric template identifiers associated with the first set of encrypted match scores from a first database server. The first set of encrypted match scores are decrypted to obtain a first set of match scores, and a subset of enrollment biometric template identifiers of the set of enrollment biometric template identifiers is determined based on a subset of match scores in the first set of match scores. The subset of enrollment biometric template identifiers is transmitted to a second database server, wherein the second database server is programmed to compare a second encrypted reference biometric template to encrypted enrollment biometric templates corresponding to the subset of enrollment biometric template identifiers and generate a second set of encrypted match scores.
G06V 10/75 - Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video featuresCoarse-fine approaches, e.g. multi-scale approachesImage or video pattern matchingProximity measures in feature spaces using context analysisSelection of dictionaries
Disclosed herein is a system and method of biometric reference indexing for identification. The method includes obtaining a set of enrollment biometric references, partitioning the set of enrollment biometric references along a plurality of hyperplanes, each partition being assigned an index address and an indexing function associated with the partition. The indexing function being used to compute an index address of each enrollment biometric reference, the index address pointing to a location on a secure storage device. The method also includes distributing the indexing function to one or more biometric capture devices.
A processing network computer may leverage secure data for customizing (e.g., personalizing) interactions for an account holder. The processing network computer may analyze the secure data using a machine learning algorithm to generate embeddings. The embeddings can anonymize the secure data and be used to generate recommendations customized to the account holder. The generated embeddings and recommendations may be applied to in-person or e-commerce interactions to obtain a set of customizations for the account holder (e.g., customized content on terminal screen, customized content on merchant website).
Described herein is a biometric identification technique that includes a gateway computer receiving a first set of encrypted match scores and a set of enrollment biometric template identifiers associated with the first set of encrypted match scores from a first database server. The first set of encrypted match scores are decrypted to obtain a first set of match scores, and a subset of enrollment biometric template identifiers of the set of enrollment biometric template identifiers is determined based on a subset of match scores in the first set of match scores. The subset of enrollment biometric template identifiers is transmitted to a second database server, wherein the second database server is programmed to compare a second encrypted reference biometric template to encrypted enrollment biometric templates corresponding to the subset of enrollment biometric template identifiers and generate a second set of encrypted match scores.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
44.
SYSTEM AND METHOD USING RESOURCE PROVIDER APPLICATION ON MOBILE DEVICE AS AN ACCESS DEVICE
Methods and systems for using a mobile device as a point-of-sale (POS) terminal provisioned by a resource provider are provided. A server computer can transmit, to a resource provider computer, a set of platform-specific scripts to be incorporated into a resource provider application provisioned on a user device. The server computer can register each instance of the resource provider application provisioned on any user device as an access terminal associated with the resource provider computer. The server computer can receive, directly from an instance of the resource provider application on a user device, a processing request message to perform a transaction. The server computer can obtain an authorization decision on behalf of the resource provider computer and transmit the authorization decision to the user device and the resource provider computer.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
Systems, methods, and computer program products are provided for enhancing machine learning model performance without altering the model or acquiring additional data. An example method includes inputting a data set to a first machine learning model to generate predicted labels. Incorrectly labeled data from the data set is identified based on comparing the predicted labels with known labels. A second machine learning model is trained based on the incorrectly labeled data, the predicted labels associated with the incorrectly labeled data, and the known labels associated with the incorrectly labeled data to generate a score associated with accuracy. Synthetic data is generated based on the data set. The first machine learning model is refined based on the synthetic data, synthetic predicted labels associated with the synthetic data generated by the first machine learning model, and scores associated with the synthetic predicted labels generated by the second machine learning model.
Embodiments are directed to methods and systems for crypto-agile encryption and decryption. A computer system can possess a protocol file that identifies one or more cryptographic software modules. Using these cryptographic software modules, the computer system can generate a plurality of shared secrets and a session key, then use the session key to encrypt a message. The message can be sent to a server computer that can subsequently decrypt the message. At a later time, the protocol file can be updated to identify a different set of cryptographic software modules, which can be used to encrypt messages. Further, the server computer can transmit additional cryptographic software modules to the computer system, enabling the computer system to use those cryptographic software modules to generate cryptographic keys. As such, the cryptographic protocol file can be changed in response to changes in the cryptographic needs of the computer system.
A method is disclosed. The method includes receiving, from a user device storing a private key of a public-private key pair, a first attestation message comprising a first attestation data packet, the public key, a user device identifier for the user device, and a credential. The method also includes binding the credential to the user device identifier, and transmitting, to a token service computer, the first attestation data packet. The token service computer previously bound a first token from a first token requestor interacting with the user device to the user device identifier. The method includes receiving, from a second token requestor interacting with the user device, a second attestation message comprising a second attestation data packet, verifying, the second attestation data packet using the public key, and transmitting, verification data to the second token requestor. The second token requestor transmits the verification data to the token service computer.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Systems and methods are provided to enable a user to conduct a transaction using their credentials stored on a secure server computer (e.g., a computer associated with a partner such as another merchant) by merely presenting their authentication data at a physical location via an auxiliary device. An auxiliary device may be provided for interfacing with a partner's backend server (e.g., the secure server computer). In some embodiments, biometric authentication may provide a mechanism for a true seamless and potentially frictionless (in the case of modalities that do not require physical contact) interaction. Payment can occur without any need for a card, phone, wearable, or any other user device as long as the auxiliary device is able to recognize the user and retrieve a credential that can be linked to that user.
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A method includes a user device generating a detection secret set (Π). The user device obtains a user credential (η) from a user of the user device. The user device determines a real secret (η∗) based on the detection secret set (Π) and the user credential (η). The user device stores the real secret (η∗). The user device provides the detection secret set (Π) and a backup account identifier (aid) for an account associated with the user to a server computer.
A method is disclosed. The method includes receiving, by a processing system, an enrollment message from a user device operated by a user via an authorizing entity computer. The enrollment message specifies one or more preferences associated with value portions associated with interactions conducted by the user. The method also includes receiving authorization request messages associated with a plurality of interactions conducted by the user, aggregating value portions associated with the authorization request messages to form an aggregate value; and processing a transfer of the aggregate value to one or more records associated with one or more receiving entities.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
A method includes receiving, from a user, a request for an interaction with a resource provider. The request includes a resource provider identifier. The method includes transmitting, to an alias directory, a resolve request message comprising the resource provider identifier and a sending entity identifier, and receiving, from the alias directory, a resolve response message having a token associated with an account of the resource provider managed by a receiving entity, and a key. The key is derived from a plurality of data elements associated with the interaction. The method also includes transmitting, to a user device operated by the user, the key, and transmitting to a receiving entity computer via a processing network, an interaction request message with the token and the key. The key is provided to a resource provider. The user obtains a resource by presenting the key to the resource provider.
In some embodiments, a malware detection system includes an attack channel removal unit, a feature extraction unit coupled to the attack channel removal unit, and a graphical encoding unit coupled to the feature extraction unit and a malware detection unit. In some embodiments, based upon graphically-encoded component-based features and monotonic features extracted from attack-channel-free software output by the attack channel removal unit, the malware detection unit detects malware in software input into the malware detection system. In some embodiments, the monotonic features extracted from the attack-channel free software and the graphically-encoded component-based features are combined to generate a combination monotonic-component based feature vector. In some embodiments, the combination monotonic-component based feature vector is used to detect malware using the malware detection system.
Systems and methods are for performing a secure exchange of encryption keys (e.g., public keys) between two devices. One or more initialization keys are stored at both devices. In some embodiments, at least one device (e.g., a reader device) stores the initialization key(s) (e.g., a symmetric key, an asymmetric key pair) in local memory as part of performance of a manufacturing process for the device. The second device (e.g., a thin client device) may receive the initialization key(s) from an acceptance cloud (e.g., a server computer configured to perform terminal processing). The initialization key(s) are utilized to perform a secure exchange of the devices' respective public keys. Once these public keys are exchanged, the devices may proceed to establishing a secure connection with which subsequent operations may be performed.
Systems and methods disclosed herein include a mobile solution to enable users to perform financial transaction over a network using a mobile device. These techniques allow users to maintain a single personal account identifier or number (“PAN”) on the user's mobile device and to utilize it to access a plurality of linked financial accounts and sub-accounts. Any one of the accounts can be selected by a user on the mobile device to remotely deposit funds to that account based on an image of a financial payment instrument. The image can be obtained using image capture technology on the user's mobile device. Users can perform a financial transaction using the verified images over a network in order to conduct a remote financial transaction such as applying a deposit, a payment, or cash load to a designated account which is linked to the user's mobile account in real-time or near real-time.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
Methods, systems, and computer program products for time series analysis using a time interval embedding based attention mechanism are provided. An example method may include receiving training data associated with a time series of a plurality of events, determining a plurality of time intervals between each pair of events of the plurality of events of the time series, generating a time interval embedding for each time interval of the plurality of time intervals to provide a plurality of time interval embeddings, calculating a plurality of attention weights for an attention mechanism of a machine learning model based on the plurality of time interval embeddings, and generating a trained machine learning model based on the attention weights for the attention mechanism of the machine learning model.
System, Method, and Computer Program Product for Predicting Consumer Behavior Based on Demographics and New Product Features Using Machine Learning Models
Systems, methods, and computer program products are provided for predicting consumer behavior based on demographics and new product features using machine learning models. An example method includes receiving spending behavior data, payment device feature data, and transaction data associated with existing payment devices and proposed spending behavior data and proposed payment device feature data associated with a proposed payment device. A machine learning model (MLM) is trained to predict a transaction metric associated with the transaction data based on the spending behavior data and the payment device feature data for the existing payment devices. The trained MLM predicts a predicted transaction metric based on the proposed spending behavior data and the proposed payment device feature data associated with the proposed payment device. A communication is transmitted based on the predicted transaction metric.
Methods and systems for quantifying interactions between data objects in databases based on bipartite graph analysis are disclosed, particularly related to the identification, counting, and enumeration of 2×2-bicliques, also referred to as “butterflies.” A computer system (which can comprise, e.g., a distributed computing system comprising multiple distributed computing nodes) can enumerate through pairs of vertices that are common neighbors to other vertices in a bipartite graph. Based on these pairs of neighbor vertices, the computer system can count 2×2-bicliques, including counting the total number of 2×2-bicliques, the number of 2×2-bicliques per vertex in the bipartite graph, and the number of 2×2-bicliques per edge in the bipartite graph. Additionally, methods according to embodiments can be used to enumerate and list all 2×2-bicliques in a bipartite graph.
Methods, systems, and computer program products for providing global personalized recommendations are provided. An example method may include generating embeddings for a first plurality of entities based on a first dataset, determining first identifiers of the first plurality of entities included in the first dataset that corresponds to second identifiers of a second plurality of entities included in a second dataset to provide a matched set of entities, wherein the second dataset includes attribute data associated with each entity of the second plurality of entities, generating a graph representation of the second plurality of entities, and wherein the graph includes nodes and each node represents an entity of the second plurality of entities, determining one or more first nodes that lacks data associated with a node embedding, and generating data associated with the node embedding for the one or more first nodes using a graph neural network (GNN) machine learning model.
Systems, methods, and computer program products are provided for on-vehicle electronic fee collection. An example system includes at least one processor configured to receive event data from a vehicle operated by a user, the event data including a digital signature based on sensor data generated by at least one sensor of the vehicle. The at least one processor may be configured to determine a merchant system from a plurality of merchant systems based on the payment event and determine a payment event based on the event data. The at least one processor may be configured to generate transaction data based on the payment event and the merchant system and transmit a payment request message including the transaction data to the vehicle. The at least one processor may be configured to process a payment transaction based on the transaction data in response to receiving a payment confirmation message from the vehicle.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
62.
Method, System, and Computer Program Product for Ensemble Learning With Rejection
Methods, systems, and computer program products are provided for ensemble learning. An example system includes at least one processor configured to: (i) generate a rejection region for each baseline model of a set of baseline models (ii) generate a global rejection region based on the rejection regions of each baseline model; (iii) train an ensemble machine learning model; (iv) update, based on a baseline model predictive performance metric for each baseline machine learning model, the set of baseline machine learning models; and (iv) repeat (i)-(iv) until there is a single baseline model in the set of baseline models or a predictive performance or global acceptance ratio of the ensemble model satisfies a threshold.
Methods and systems for inducing model shift in a malicious computer's machine learning model is disclosed. A data processor can determine that a malicious computer uses a machine learning model with a boundary function to determine outcomes. The data processor can then generate transition data intended to shift the boundary function and then provide the transition data to the malicious computer. The data processor can repeat generating and providing the transition data, thereby causing the boundary function to shift over time.
Techniques are disclosed for performing authenticated communication. The techniques include using a public matrix A, a public matrix B, and a vector x that is a private signing key. An MPC in the head protocol may be performed by a prover device. A prover device may communicate with a verifier device to prove that the prover device is in possession of the private key that was used to sign a message that was received by the verifier device.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
65.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR INTEGRATING A FINITE STATE MACHINE (FSM) IN A CHATBOT SYSTEM
Methods, systems, and computer program products are provided for integrating a finite state machine (FSM) in a chatbot system. An example method includes: storing an FSM graph including states connected in a directed graph; receiving a message including text from a user device; automatically determining that the text is associated with the dialog flow type; in response to determining that the text is associated with the dialog flow type, retrieving the FSM graph and the function configured to be applied during each of the states of the FSM graph; inputting the text, the FSM graph, and the function into an LLM, causing the LLM to generate a response to the text; receiving the response from the LLM; and outputting the response to the user device.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
G06F 9/448 - Execution paradigms, e.g. implementations of programming paradigms
A method is disclosed. The method includes receiving claim requests from a plurality of service provider computers associated with a plurality of service providers for fulfillment by a plurality of payors. Each claim request includes service provider information, payor information, and beneficiary information. The method also includes validating the claim requests, and determining for each service provider of the plurality of service providers, a net amount to be transferred to the service provider. The net amount is associated with a plurality of claim requests made by the service provider for different beneficiaries serviced by the service provider. The different beneficiaries may be associated with different payors. The method further includes facilitating for each of the service providers, a single funds transfer in the net amount to be transferred to the service provider.
Transactions between account-based endpoints are performed in a two-step process that first qualifies the recipient's validity and then performs the actionable transfer. The qualification step, unlike a payment pre-qualification, validates the recipient account validity while collecting information required for filling out a transaction data set. The information may include anti-money laundering and know-your-customer information as well as specific account details needed for on-boarding. A recipient payouts service provider may be assigned a tokenized bank identification number for use in routing the transfer through existing financial processing networks. Data constructs, minimum required information, and format checks may be facilitated by initiator-side and recipient-side application program interfaces.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
43 - Food and drink services, temporary accommodation
Goods & Services
Providing access to curated dining experiences; organizing and hosting exclusive culinary events; offering payment cardholder-based access to premium dining events and restaurant openings; providing information related to restaurants and dining events
A method is disclosed. The method includes determining, by a delegated certificate authority computer, a tier from a plurality of tiers for a digital wallet provider based on a list of qualifying criteria. The method also includes generating a digital certificate based on the tier, where the digital certificate is used by a digital wallet application computer associated with the digital wallet provider to complete interactions using a digital currency maintained by a blockchain network. The method further includes transmitting, by the delegated certificate authority computer to a digital wallet application computer, the digital certificate.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
70.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DYNAMICALLY CONFIGURING INSTALLMENT-BASED TRANSACTIONS DURING AUTHENTICATION PROCESSING
Systems, methods, and computer program products are provided for dynamically configuring installment-based transactions during processing. The system includes a processor configured to receive a first authentication request from a merchant system, the first authentication request associated with a transaction between a user and the merchant. The processor is also configured to determine eligibility for installment payment based on the first authentication request and generate a unique uniform resource locator (URL) associated with an installment selection interface. The unique URL is configured to permit access to the installment selection interface. The processor is further configured to transmit the unique URL to the merchant system and receive a user selection of an installment plan via the installment selection interface. The processor is further configured to generate a second authentication request and cause an issuer system to initiate an installment-based transaction, by transmitting the second authentication request to the issuer system.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G07F 19/00 - Complete banking systemsCoded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
71.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR INITIATING PULL PAYMENTS
Systems, methods, and computer program products are provided for initiating pull payments. The system includes a processor configured to receive a transaction request from a mobile device, the transaction request initiated by the mobile device scanning encoded indicia. The processor is also configured to communicate an authentication request to an authentication system, the authentication request configured to cause the authentication system to prompt the user for a proof of identity. The processor is further configured to receive the proof of identity from the mobile device. The processor is further configured to, in response to receiving the proof of identity, identify a payment enabler system based on the transaction request. The processor is further configured to initiate a pull payment transaction, via payment enabler system, to transfer the transaction value from an account associated with the account identifier to a merchant account associated with the merchant identifier.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
A server computer can receive, from a resource provider computer operated by a resource provider, an authorization request message comprising a flexible credential and an amount for a transaction conducted between a user and the resource provider. The flexible credential can be associated with multiple sources. The server computer can then determine a subset of user rules of a set of user rules associated with the flexible credential to apply to the transaction. The server computer can determine a subset of resource provider rules of the resource provider based on the subset of user rules to apply to the transaction. The server computer can then apply the subset of user rules and the subset of resource provider rules to the transaction.
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
73.
EFFICIENT AND PRIVACY PRESERVING RESOURCE INTERACTION
A method is disclosed. The method includes receiving, from a storage application server, a data packet comprising access data. The method also includes receiving, from a transport computer, a request for the data packet, after the transport computer receives a message comprising a value and a resource provider identifier from a resource provider computer. The method further includes transmitting, to the transport computer, a response comprising the data packet. The transport computer is programmed to receive the data packet, generate an authorization request message comprising the access data, the resource provider identifier, and the value, and transmit the authorization request message to an external computer for authorization processing.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
Methods, systems, and computer program products are provided for dynamic data allocation to nodes in distributed systems. The method may include storing data blocks at nodes; receiving, from the nodes, node health data associated with the nodes; and for a data block, performing a dynamic data allocation including: receiving, from a node on which that data block was stored, age data associated with an age of that data block; receiving, from each client that accessed that data block at the node, network latency data associated with a network latency of that client for accessing that data block; generating, based on (i) the node health data, (ii) the age data, and (iii) the network latency data, a node assignment for that data block; and in response to determining that the node assignment is different than a current node, moving that data block from the current node to the node assignment.
A method of testing a software application on a first user device is disclosed. The method includes determining that a transceiver application on the first user device is unable to communicate with a first near field communication (NFC) application programming interface (API) associated with a first NFC hardware in the first user device. The method also includes forming a data connection between the first user device and a second user device with a second NFC API associated with a second NFC hardware in the second user device, and conducting one or more interactions between the software application and an access device via the second user device and the second NFC API associated with the second NFC hardware. The second user device communicates with the access device via NFC.
H04B 5/40 - Near-field transmission systems, e.g. inductive or capacitive transmission systems characterised by components specially adapted for near-field transmission
H04B 5/72 - Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for local intradevice communication
76.
METHOD AND SYSTEM FOR KEY RECOVERY USING GROUP STRUCTURE
A method includes a user device generating a key recovery message comprising a public key or an identifier thereof associated with an account. The public key corresponding to a first private key associated with the user device. The user device can provide the key recovery message to a smart contract on a blockchain. The user device can receive a recovery detected message from a server computer that monitors the smart contract. After providing the key recovery message to the smart contract, the user device can generate a new private key to replace the first private key.
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
77.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR ANALYZING LARGE LANGUAGE MODELS
Systems, methods, and computer program products are provided for analyzing large language models. An example system includes at least one processor configured to generate a plurality of model queries based on a semantic input, each model query of the plurality of model queries includes the semantic input and a different non-semantic input, input the semantic input into a language model, resulting in a first model output, perturb the language model with the plurality of model queries, resulting in a plurality of perturbed model outputs, determine a model harmonic value for the language model based on an angle between the first model output and the plurality of perturbed model outputs, and retrain or select the language model based on the model harmonic value satisfying at least one threshold.
Provided is a computer-implemented method for implementing a blockchain-based rewards network. The method includes establishing a blockchain network including administrative nodes, client nodes, and entity nodes, maintaining a distributed ledger on at least a portion of the administrative nodes of the blockchain network, receiving, from a plurality of entities, rewards data including a plurality of offers, each offer of the plurality of offers corresponding to at least one entity identifier, publishing the rewards data to the distributed ledger, querying the distributed ledger based on at least one entity identifier received from a client node, and determining, based on the distributed ledger, at least one offer corresponding to the at least one entity identifier received from the client node.
A method includes a computer receiving a request to conduct an interaction from a mobile device. The computer obtains a computer address and provides the computer address to the mobile device. The mobile device provides an access request to the computer address, and the access request is thereafter routed to an identity provider computer. The identity provider computer identifies identity data associated with the mobile device or a user of the mobile device. The computer obtains the identity data or a derivative of the identity data from the identity provider computer. The computer determines if the identity data or the derivative of the identity data matches previously stored identity data or a previously stored derivative of identity data. If a match is determined, the computer provides a list of user device identifiers to the mobile device.
Provided is a method for aggregating data from real-time events (e.g., payment transactions). The method may include receiving event (e.g., transaction) data associated with a plurality of events (e.g., payment transactions). First aggregation of interest data associated with a type of aggregation of interest may be received. A first key associated with each event (e.g., transaction) may be determined based on a first portion of the event (e.g., transaction) data associated with each event (e.g., transaction) and the first aggregation of interest data. A first value based at least partially on a first plurality of the first keys associated with a first subset of the plurality of payment transactions may be communicated based on a first user request. A system and computer program product are also disclosed.
G06F 7/08 - Sorting, i.e. grouping record carriers in numerical or other ordered sequence according to the classification of at least some of the information they carry
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
81.
System, Method, and Computer Program Product for Consent Management
A system, method, and computer program product are provided for consent management. A method may include receiving a first data request for user data associated with a user, the user data stored in a user data database; communicating a consent request to the requester system; receiving a consent response from the requester system; storing consent data associated with the consent response for the user data requested in the first data request in an immutable ledger; receiving a consent verification request from the user data database, the consent verification request based on a second data request for the user data from the requester system to the user data database; verifying the consent verification request based on the consent data; and communicating a consent verification response to the user data database, the consent verification response indicating consent from the user to share the user data with the requester system.
A method is disclosed. The method includes storing data relating portioning plans and credentials that can be used with the portioning plans. The method also includes receiving from a resource provider computer, an eligibility check message comprising an initial credential, determining that the initial credential is one of the stored credentials, and providing to the resource provider computer, one or more portioning plans associated with the initial credential; receiving a selection of a portioning plan of the one or more portioning plans. The method also includes receiving an authorization request message including the initial credential and a value, substituting a substitute credential for the initial credential in a credential data field in the authorization request message and placing the initial credential in a supplemental data field to form a modified authorization request message, and transmitting the modified authorization request message to an authorizing entity computer.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
A computer obtains interaction data and aggregated data for a current interaction. The current interaction relates to a device requesting access to a resource. The computer generates a feature vector using the interaction data and the aggregated data and generates a prompt comprising a set of feature-label pairs. Each feature-label pair comprises a task-specific label and an additional feature vector including additional interaction data and additional aggregated data. The additional interaction data and the additional aggregated data are related to an additional interaction of a same type of classification as the current interaction. The computer loads a pre-trained machine learning model trained to determine predictions for specific tasks. The computer inputs the prompt and a query including the feature vector into the pre-trained machine learning model. The computer determines a task-specific prediction for the query and the prompt, the task-specific prediction specifying a response state to the current interaction.
Employment recruiting services; personnel recruitment services; providing career and employment information via social media websites and mobile applications; providing online employment information in the field of employment, recruitment, careers, job resources, and job listings; recruitment advertising services, namely, posting job notices for the purpose of recruiting potential employees
Ethical data tracker systems and methods are disclosed. A payment network computer receives a token request from an application running on a client device. The token request includes user contact information and a merchant identifier. A token server computer generates a token associated with the merchant identifier. The payment network computer maps the token to the user contact information and the merchant identifier, stores the token, the user contact information, and the merchant identifier in a database, and determines a validation of a mapping in the database of a token and a merchant identifier received from a network service provider. The payment network computer authorizes or prohibits the network service provider to communicate with the account holder via the user contact information based on the determining of the validation of the mapping in the database of the token and the merchant identifier received from the network service provider.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
87.
MANAGING ATTACK SURFACE VULNERABILITIES OF A NETWORK
Embodiments include creating a simplified network tree from information contained in network devices, including load balancers and firewalls, for security analysis. The tree may model relevant security devices or network configuration points in the network to simplify the study of a network for compliance and network anomalies. A list of network devices, including externally exposed devices with externally exposed IP addresses and a plurality of internal network devices may be stored. A graph may be generated which may include a plurality of network tree paths, each network tree path containing nodes representing IP addresses of network devices in the network tree path and links between nodes representing a configuration policy. The graph may be used to detect network vulnerabilities.
36 - Financial, insurance and real estate services
Goods & Services
Financial services; monetary services; banking services; credit card services; debit card services; charge card services; pre-paid card services; provision of prepaid cards and tokens; smart payment card services; electronic credit and debit transactions; electronic funds transfer; payment processing services; transaction authentication and verification services; check verification services; cash replacement rendered by credit cards and debit cards; currency exchange services; online banking services; bill payment services; deposit access and automated teller machine services; check cashing and cash disbursement services; dissemination of financial information and electronic payment data including via a global computer network; processing of financial transactions online via computer or telecommunication networks or via telecommunication, mobile or wireless devices; financial services, namely providing a digital currency wallet.
36 - Financial, insurance and real estate services
41 - Education, entertainment, sporting and cultural services
Goods & Services
(1) Business information services, namely, providing information regarding business funding, business growth, business grants, fraud protection, disaster support for business, business credit and debit cards, offers and rewards for businesses, business optimization, cash flow management, integrated bookkeeping, streamlining business operations, and business marketing; business advisory services, namely, providing advise regarding business funding, business growth, business grants, fraud protection, disaster support for business, business credit and debit cards, offers and rewards for businesses, business optimization, cash flow management, integrated bookkeeping, streamlining business operations, and business marketing; business analysis services, namely, providing insights to businesses in the fields of business funding, business growth, business grants, fraud protection, disaster support for business, business credit and debit cards, offers and rewards for businesses, business optimization, cash flow management, integrated bookkeeping, streamlining business operations, and business marketing; marketing services for businesses; advertising services for businesses
(2) Financial services, namely, banking services; pre-paid card services, namely, authorization services, verification services, payment processing services, transaction processing services in the field of consumer payments, payment transaction settlement services; electronic credit and debit card transaction processing, electronic funds transfer, smart cards and electronic cash services, namely, authorization services, verification services, payment processing services in the field of credit card and debit card payments, credit card and debit card transaction processing services, payment transaction settlement services; electronic funds disbursement services, cash disbursement, cash replacement rendered by credit cards and debit cards, electronic cash transactions processing, check cashing, deposit access and automated teller machine (ATM) banking services, payment processing services namely, authorization services, verification services, transaction processing services, transaction settlement services, remittances, money transfer services in the nature of web-based money transfers provided by means of a global computer network; processing of financial transactions online via a global computer network or via telecommunication, mobile or wireless devices, payment transaction authentication and verification services; electronic funds transfer and currency exchange services; dissemination of financial information and electronic payment data via a global computer network or via telecommunication, mobile or wireless devices; Financial information services, namely, providing business with information regarding payment services and business credit and debit cards; financial advisory services; financial analysis services; financial consulting services; financial management services; financial planning services; financial research services
(3) Providing a website featuring educational resources and information in the fields of business funding, business growth, business grants, fraud protection, disaster support for business, business credit and debit cards, offers and rewards for businesses, business optimization, cash flow management, integrated bookkeeping, streamlining business operations, and business marketing educational services, namely, providing online classes, seminars, workshops, presentations, webinars, and conferences in the fields of business funding, business growth, business grants, fraud protection, disaster support for business, business credit and debit cards, offers and rewards for businesses, business optimization, cash flow management, integrated bookkeeping, streamlining business operations, and business marketing
41 - Education, entertainment, sporting and cultural services
Goods & Services
Providing a website featuring educational resources and information in the fields of business funding, business growth, business grants, fraud protection, disaster support for business, business credit and debit cards, offers and rewards for businesses, business optimization, cash flow management, integrated bookkeeping, streamlining business operations, and business marketing educational services, namely, providing online classes, seminars, workshops, presentations, webinars, and conferences in the fields of business funding, business growth, business grants, fraud protection, disaster support for business, business credit and debit cards, offers and rewards for businesses, business optimization, cash flow management, integrated bookkeeping, streamlining business operations, and business marketing
36 - Financial, insurance and real estate services
Goods & Services
Financial services, namely, banking services; pre-paid card services, namely, authorization services, verification services, payment processing services, transaction processing services in the field of consumer payments, payment transaction settlement services; electronic credit and debit card transaction processing, electronic funds transfer, smart cards and electronic cash services, namely, authorization services, verification services, payment processing services in the field of credit card and debit card payments, credit card and debit card transaction processing services, payment transaction settlement services; electronic funds disbursement services, cash disbursement, cash replacement rendered by credit cards and debit cards, electronic cash transactions processing, check cashing, deposit access and automated teller machine (ATM) banking services, payment processing services namely, authorization services, verification services, transaction processing services, transaction settlement services, remittances, money transfer services in the nature of web-based money transfers provided by means of a global computer network; processing of financial transactions online via a global computer network or via telecommunication, mobile or wireless devices, payment transaction authentication and verification services; electronic funds transfer and currency exchange services; dissemination of financial information and electronic payment data via a global computer network or via telecommunication, mobile or wireless devices; Financial information services, namely, providing business with information regarding payment services and business credit and debit cards; financial advisory services; financial analysis services; financial consulting services; financial management services; financial planning services; financial research services.
Business information services, namely, providing information regarding business funding, business growth, business grants, fraud protection, disaster support for business, business credit and debit cards, offers and rewards for businesses, business optimization, cash flow management, integrated bookkeeping, streamlining business operations, and business marketing; business advisory services, namely, providing advise regarding business funding, business growth, business grants, fraud protection, disaster support for business, business credit and debit cards, offers and rewards for businesses, business optimization, cash flow management, integrated bookkeeping, streamlining business operations, and business marketing; business analysis services, namely, providing insights to businesses in the fields of business funding, business growth, business grants, fraud protection, disaster support for business, business credit and debit cards, offers and rewards for businesses, business optimization, cash flow management, integrated bookkeeping, streamlining business operations, and business marketing; marketing services for businesses; advertising services for businesses
96.
GLOBAL RELYING PARTY SYSTEM FOR VALIDATING DIGITAL IDENTITY CREDENTIALS
Techniques described herein enable a digital certificate (e.g., a mobile Driver's License (mDL)) to be used as a proxy for a credential. Using the digital certificate as a proxy for the credential can improve transaction security and benefit from trust established by processes implemented by a certification authority. The techniques can add functionality to a digital certificate since the digital certificate can be used as an account credential in addition to its previous function.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
97.
SECURE DATA EXCHANGE MATCHING ACROSS IDENTITY PROVIDERS
A method includes receiving a first encrypted first identity attribute. A first doubly encrypted first identity attribute is formed by encrypting the first encrypted first identity attribute. A second doubly encrypted first identity attribute is formed by encrypting the first encrypted first identity attribute. They are transmitted to a user device, which removes a user layer of encryption on each to form a second encrypted first identity attribute and a third encrypted first identity attribute. Layers of encryption are added to the second encrypted first identity attribute to form a third doubly encrypted first identity attribute and the third encrypted first identity attribute to form a fourth doubly encrypted first identity attribute. The server computer receives them and transmits, to the second identity provider computer, the fourth doubly encrypted first identity attribute. The second identity provider computer obtains a first identity attribute and compares it to a second identity attribute.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
There is disclosed a method of authorising an electronic transaction, the method involving a server receiving transaction details for the electronic transaction and an identifier for a participant in the electronic transaction. The server sends the transaction details to the participant in the electronic transaction, and in return receives authorisation data from the participant, the authorisation data including authentication data authenticating the identity of the participant. The server then determines an account code identifying an account associated with the participant based on the identifier, and proceeds with the electronic payment transaction using the account code.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
Systems, methods, and computer program products are provided for state correction of stateful machine learning (ML) models. A system may include a processor configured to receive an input for stateful ML model, generate an output of the stateful ML model based on the input, determine whether the output of the stateful ML model corresponds to a ground truth value associated with the input, assign an initial state of the stateful ML model as an active state of the stateful ML model based on determining that the output of the stateful ML model corresponds to the ground truth value associated with the input, and assign a correction state of the stateful ML model as the active state of the stateful ML model based on determining that the output of the stateful ML model does not correspond to the ground truth value associated with the input.
A method is disclosed. The method includes receiving a first session key different from a Master Key from a remote entity, the first session key based on the Master Key. The first session key is usable for a limited number of transactions. In response to receiving the first session key, the method includes provisioning a payment application in the user device with the first session key. The method includes receiving, at the payment application, a request for an application cryptogram from a point-of-sale terminal. In response to the receiving the request for the application cryptogram, the method includes generating the application cryptogram using the first session key, transmitting the application cryptogram to the point-of-sale terminal, and receiving a second session key from the remote entity. The second session key is based on the Master Key.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system