A computing system may be configured to maintain virtual accounts or stashes for designated purchases or goals on top of underlying accounts. The computing system may enable funds to be auto-transferred from other accounts to virtual accounts. The computing systems may also recommend amounts to transfer into a virtual account. For example, a virtual account/stash for taxes may be auto-funded to cover predicted taxes for a small business. Recommendations for new virtual accounts/stashes may be made for future purchases and the like. Vendor offers, such as coupons relevant to the user, may also be provided to users of the virtual accounts based on the user's interactions with the system.
Systems, apparatuses, methods, and computer program products are disclosed for rental optimization of real estate. An example method includes detecting, by an event monitoring engine, an occurrence of a trigger event. The example method further includes defining, by the event monitoring engine and based on a trigger event attribute set, an area of interest, and identifying, by a prospect engine, a rentable unit within the area of interest that corresponds to a trigger event type attribute. The example method further includes generating, by the prospect engine and based on the trigger event attribute set, a rental price prediction for the rentable unit, if the rental price prediction satisfies a predefined rental price threshold, generating, by the prospect engine, a personalized rental recommendation for the rentable unit, and outputting, by communications hardware, a rental prompt based on the personalized rental recommendation.
Systems, apparatuses, methods, and computer program products are disclosed for using aggregated housing data to provide personalized home improvement recommendations. An example method includes receiving, by communications hardware, information regarding a target property associated with a user and aggregating, by the communications hardware, supplementary housing data. The example method further includes determining, by an improvement recommendation engine, an insight regarding the target property based on the information regarding the target property and the supplementary housing data and generating, by the improvement recommendation engine and based on the insight, a home improvement recommendation. The example method further includes storing, by the improvement recommendation engine, the home improvement recommendation in a home repair profile and transmitting, by the communications hardware and based on the home improvement recommendation, a home repair notification to a user device.
This disclosure is directed to integrating unaffiliated applications, or the processes and/or subsystems (e.g., application interfaces) of unaffiliated applications, with client applications to enable the client applications to provide new capabilities not otherwise available through the client application. The disclosed approach allows users to access new functionality within the operating environment of the client application, without accessing unaffiliated applications and undergoing separate authentication and data exchange with each unaffiliated application. Functionality of an unaffiliated application can be integrated by, for example, incorporating such processes and subsystems as interactive user interfaces, widgets, applets, plugins, etc., of unaffiliated applications.
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 16/25 - Integrating or interfacing systems involving database management systems
5.
CONTROL TOWER RESTRICTIONS ON THIRD PARTY PLATFORMS
Systems, methods, and apparatuses for providing a customer a central location to manage permissions provided to third-parties and devices to access and use customer information maintained by a financial institution are described. The central location serves as a central portal where a customer of the financial institution can manage all access to account information and personal information stored at the financial institution. Accordingly, the customer does not need to log into each individual third-party system or customer device to manage previously provided access to the customer information or to provision new access to the customer information. A user additionally is able to have user data and third-party accounts of the user deleted from devices, applications, and third-party systems via a central portal. Restrictions on how user data is used by devices, applications, and third-party systems can be imposed via a central portal.
G06F 3/04817 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06F 3/04842 - Selection of displayed objects or displayed text elements
G06F 16/215 - Improving data qualityData cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
A visualization generation computing system generates a visualization data object based on a relationship among multiple portions of resource data, which describes a resource that can be allocated. The visualization data object at least one visualization component that indicates the relationship among the portions of resource data. A user device provides the visualization component via a user interface. The visualization generation computing system receives, from the user device, modification input data that describes an adjusted presentation of the visualization component. Based on the adjusted presentation, the visualization generation computing system determines a modified relationship among the portions of resource data. The visualization generation computing system modifies the visualization data object to include a modified visualization component that describes the modified relationship. In some cases, the visualization generation computing system modifies the portions of resource data based on the modified relationship described by the adjusted presentation.
Systems and techniques for automated generation of Java unit tests, in the context of testing a code base for a financial transaction software application, are described. An example method for automated generation of Java unit tests includes: identifying default values used in Java source code of a financial transaction software application that is programmed and capable to perform batch processing of a plurality of financial transactions; identifying classes in the Java source code that are invoked by the financial transaction software application, as invoked during the batch processing; generating mock classes for the identified classes that are invoked; creating unit tests to perform unit testing of the identified classes that are invoked, the unit tests configured to invoke the mock classes and use the default values for unit testing of the identified classes; and outputting the unit tests (and optionally, executing the unit tests).
Systems, methods, and computer-readable storage media for performance indicator operations are disclosed. One method includes identifying user activity data and one or more performance indicators of a user, and modeling the user activity data to generate one or more performance products including a plurality of performance parameters corresponding to a future performance indicator of the user. The method further includes generating and presenting a graphical user interface (GUI) including one or more actionable events associated with the plurality of performance parameters, and monitoring the user activity data and the one or more performance indicators of the user based on receiving new activity data corresponding to the future performance indicator from a user data source. The method further includes presenting one or more content items on the GUI including an indication of whether the user satisfies the plurality of performance parameters of the one or more performance products.
A system comprises a memory and one or more processors in communication with the memory. The one or more processors may be configured to obtain information associated with one or more authorized file changes and store the information associated with one or more authorized file changes in a first index. The processors may be further configured to obtain one or more file change events and enrich the one or more file change events with the information associated with one or more authorized file changes from the first index. The processors may also be configured to store the one or more file change events enriched with the information associated with one or more authorized file changes in a second index, and based on the enriched data stored in the second index, output an indication that the one or more file change events are false positives.
Systems, apparatuses, methods, and computer program products are disclosed for developing an optimized debt service strategy solution utilizing products across multiple product categories. An example method includes receiving, by communications hardware, a user dataset. The example method also includes processing, by surrogate modeling circuitry, the user dataset using a plurality of surrogate models. The example method also includes generating, by the surrogate modeling circuitry and based on the processing of the user dataset, a parameter estimation set. The example method also includes determining, by optimizer modeling circuitry and based on the user dataset and the parameter estimation set, at least one debt service strategy solution comprising at least one product of a first product category from a plurality of products associated with multiple product categories. The example method also includes causing presentation, by communications hardware, of the at least one debt service strategy solution.
A method of authenticating a smart card for a mobile pay function of a mobile device using a smart card is disclosed. The method includes: offering, by a mobile pay circuit of the mobile device, a mobile pay function; receiving, by the mobile pay circuit, an affirmative user input to enable the mobile pay function; wirelessly receiving, by a contactless logic of the mobile device, an authentication code from a smart card, wherein the authentication code includes identifying customer information; automatically populating, by the mobile pay circuit, one or more fields of a graphical user interface provided by the mobile pay circuit with the received identifying customer information; authenticating, by the mobile pay circuit, the smart card using the authentication code; and, enabling, by the mobile pay circuit, the mobile pay function with the smart card upon authenticating the smart card.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
System, apparatus, and computer program products are disclosed for protected display of a requested user interface. In one aspect, a method includes receiving a protected mode display request to display the requested user interface in a protected mode, wherein the requested user interface comprises a plurality of data values; in response to the protected mode display request: (i) retrieving a data protection template for the protected mode display request, (ii) determining, based on the data protection template, one or more protected data values of the plurality of data values and one or more unprotected data values of the plurality of data values, (iii) for each protected data value, generating a masked representation, and (iv) generating a masked user interface that comprises: (a) each unprotected data value, and (b) each masked data value; and causing the masked user interface to be presented using a display device.
Systems, apparatuses, methods, and computer program products are disclosed for automatically detecting a deployment event for a user. An example method includes identifying a user behavior data set associated with a user and determining a predicted deployment event for the user based on the user behavior data set. The example method further includes providing a deployment confirmation prompt to the user in an instance in which a deployment likelihood score is determined to satisfy a deployment likelihood score threshold. The example method further includes receiving a deployment confirmation response indicative of user confirmation or denial of the predicted deployment event, and, in an instance in which the user confirms the predicted deployment event, performing one or more proactive operations for the user.
A triangulated behavioral data system for assessing customer friction during interactions with a product or service. The system accesses three distinct behavioral data sources: (i) one capturing event-level data indicative of customer interactions; (ii) another documenting user session replays, providing intricate visualizations of user conduct; and (iii) a third supplying application performance metrics focused on system-level insights. By evaluating and merging data from these sources, which represent events, user behaviors, or performance indicators, a friction metric is computed. Weighted values are attributed to these factors based on their correlation to customer friction. The friction metric is updated to incorporate real-time customer behavior modifications. When the friction metric surpasses a predefined threshold or marker, a root cause analysis is launched, which aims to identify specific components causing the observed friction, paving the way for targeted improvements.
Systems, apparatuses, methods, and computer program products are disclosed for digital product reimbursement management. An example method includes assigning a pending return status indicator to a transactional data record of a mobile banking application, the transactional data record being associated with a user. The example method also includes obtaining a first dataset associated with the user. The example method also includes determining that the first dataset corresponds to the transactional data record. The example method also includes reconciling the transactional data record based at least on the first dataset.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
16.
USER INTERFACES FOR DATA TRAVERSAL OF KNOWLEDGE GRAPHS
A method may include presenting a user interface on a computing device, the user interface including: a service provider input element identifying a service provider; a service identifier input element identifying a service; and a graph presentation area; executing a knowledge graph database query using a combination of the service provider and the service as input to a knowledge graph database; receiving tuple results in response to the executing, the tuple results including an allocation value property of the service provider attributable to the service provider with respect to the service; and generating in the graph presentation area, an interactive graph based on the tuple results including: representations of entities including the service provider and the service in the tuple results as nodes in the interactive graph, wherein a representation of the service provider includes the allocation value; and links connecting the representations of entities.
Disclosed in some examples are methods, systems, devices, and machine-readable medium for providing a consumer collections and servicing analytics platform and application to simplify data analyst search and analysis of data from disparate data sources. The platform and application ingest data into a centralized data repository, from a plurality of disparate data sources. The application transforms the ingested data into standardized data using one or more standardized formats and applies custom processing algorithms and data enrichment techniques to the standardized data to generate enriched data. The application automates manual data collection and reporting processes using the enriched data and causes a user interface to be displayed to the user device, the user interface including self-service access to the enriched data in the centralized data repository.
Systems, methods, and apparatuses for providing a customer a central location to manage permissions provided to third-parties and devices to access and use customer information maintained by a financial institution are described. The central location serves as a central portal where a customer of the financial institution can manage all access to account information and personal information stored at the financial institution. Accordingly, the customer does not need to log into each individual third-party system or customer device to manage previously provided access to the customer information or to provision new access to the customer information. A user additionally is able to have user data and third-party accounts of the user deleted from devices, applications, and third-party systems via a central portal.
G06F 3/04817 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06F 3/04842 - Selection of displayed objects or displayed text elements
G06F 16/215 - Improving data qualityData cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
A computer-implemented method includes receiving a transaction request including a transaction amount, determining that the transaction amount would cause a violation of a daily spending limit, determining to apply an adaptive daily spending limit (ADSL) override, generating an approval message indicating that the transaction request is approved based on the application of the ADSL override, transmitting the approval message to an automated teller machine (ATM), and dispensing the transaction amount in a currency by the ATM.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
20.
SYSTEMS AND METHODS FOR DATA PROTECTION UTILIZING MODELERS
Systems, methods, and computer-readable storage media for data protection. One system includes a data processing system including memory and one or more processors configured to determine one or more protection algorithms corresponding to one or more workstream elements of a workstream of one or more data systems. The processors are further configured to model one or more cybersecurity threats of the one or more data systems. The processors are further configured to map the one or more workstream elements of the workstream into the one or more cybersecurity threats based on one or more correlations between the one or more protection algorithms and the one or more cybersecurity threats. The processors are further configured to update a workstream element validation status of the one or more workstream elements based on the mapping of the one or more workstream elements.
A method may include executing a knowledge graph database query to a knowledge graph database storing properties of entities; receiving a set of tuple results in response to the executing identifying a set of entities and a set of relationships that connect the set of entities in the knowledge graph database; presenting a UI including a graph presentation area that includes: graphical representations of the set of entities in the set of tuple results; and links connecting the representations of the entities according to the set of relationships; performing a classification validation test against the set of tuple results identifying classification properties for entities in a chain of related entities in the knowledge graph database; determining that the chain meets the classification properties for the entities in the chain in the classification validation test; and in response, updating a presentation style of the graphical representations of the set of entities.
Systems and methods for establishing a secure and private local network with a block chain record are disclosed. One disclosed method includes establishing a network connection between a first device, second device, and third device. The method includes configuring a local network in communication with the first device, second device, and third device and establishing a block chain between the first, second, and third devices. The first, second, and third devices are nodes of the block chain and execute consensus protocols to maintain consistency of the block chain. Messages sent between the devices on the local network are stored in the block chain and when the local network is disbanded, the devices upload the block chain to a cloud repository.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Systems, methods, and apparatuses for providing a central location to manage permissions provided to third-parties and devices to access and use user data and to manage accounts at multiple entities. A central portal may allow a user to manage all access to account data and personal information as well as usability and functionality of accounts. The user need not log into multiple third-party systems or customer devices to manage previously provided access to the information, provision new access to the information, and to manage financial or other accounts. A user is able to have user data and third-party accounts of the user deleted from devices, applications, and third-party systems via a central portal. The user is able to impose restrictions on how user data is used by devices, applications, and third-party systems, and control such features as recurring payments and use of rewards, via a central portal.
A system includes a processing circuit configured to receive asset data relating to assets and asset distribution parameters. The processing circuit is further configured to model the asset data with the asset distribution parameters to generate initial distribution data for the assets. The processing circuit is further configured to generate initial display data based on the initial distribution data and provide the initial display data to a user device. The processing circuit is further configured to receive a user adjustment to the elements from the user device. The processing circuit is further configured to model the initial distribution data with the user adjustment to generate adjusted distribution data. The processing circuit is further configured to generate adjusted display data based on the adjusted distribution data and provide the adjusted display data to the user device.
G06Q 40/06 - Asset managementFinancial planning or analysis
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 3/04845 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
25.
SYSTEMS AND METHODS FOR ASSET COMBINATION DISPLAY AND EXECUTION
A system includes a processing circuit configured to receive asset data relating to assets of an entity and asset integration parameters. The processing circuit is further configured to model the asset data with the asset integration parameters to generate asset integration data for the assets. The asset integration data corresponds to two or more of the assets that may be combined based on the asset integration parameters. The processing circuit is further configured to generate and provide, to a graphical user interface (GUI) of a user device, an interface corresponding to the asset integration data. The interface includes a plurality of elements illustrating the two or more of the assets that may be combined.
Techniques are described for a model-based process to validate build integrity of software products. A build integrity validation system generates a build artifact model including one or more software components extracted from a build artifact resulting from a software build process of source code and generates a source code including one or more software components extracted from the source code. The system compares the software components of the build artifact model and the software components of the source code model, and identifies at least one discrepancy between the build artifact model and the source code model. The system determines a level of risk associated with the at least one discrepancy and, in response to determining the level of risk associated with the at the least one discrepancy, generates a decision indicating whether the at least one build artifact is approved for use in a software product.
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
27.
Analysis of debit card compared to credit card use
An example computing device includes: a processor; and a system memory, the system memory including instructions which, when executed by the processor, cause the computing device to: identify a financial account associated with debit card use; parse financial transactions associated with the financial account to identify debit card transactions; categorize the debit card transactions into categories based upon types of merchants; map the categories to incentives associated with a credit card; and present potential savings associated with the incentives.
Various examples are directed to systems and methods for administering transactions between plan participants in a retirement plan. A group management system may use public verification keys for the set of plan participants to monitor transactions involving the set of plan participants at a retirement plan distributed ledger and detect a trigger condition for a first plan participant of the set of plan participants. The group management system may generate an intra-group transaction, generate a transaction record describing the intra-group transaction, and broadcast the transaction record to be included in the retirement plan distributed ledger.
G06Q 40/06 - Asset managementFinancial planning or analysis
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
Disclosed are example methods, systems, and devices that allow for secure generation of authentication datasets from network activity. The techniques include accessing secured data sources to generate a first dataset of secured data, and extracting information from one or more unsecured data sources to generate a second dataset comprising a second dataset. A third set of data elements can be generated from the first and second datasets, and may be utilized to authenticate credentials that can be utilized to access secured data via a network. The techniques can transmit indications that credentials are invalid if the credentials fail to satisfy aspects of the third dataset.
An example computer system for authenticating a user can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to create: an analytical engine programmed to track activities of the user outside of a metaverse and within the metaverse; a query engine programmed to generate a series of questions for the user based upon the activities of the user outside of the metaverse and within the metaverse; and an authentication engine programmed to authenticate the user based upon responses to the series of questions provided by the user.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
Aspects of this technical solution can include identifying an NFT linked with a first public and private key pair associated with the source account, having a transfer property indicating that the NFT is transferable from the source account, having a value property denominated in fiat currency, and having a volatility metric based on one or more requests to transfer the NFT prior to or concurrently with the request, transferring the NFT from the first public and private key pair to a second public and private key pair linked with the NFT transaction processor and associated with an institution account of the financial institution, generating a third public and private key pair linked with the second customer computing device and associated with the recipient account, and transferring the amount of currency from the second public and private key pair to the third public and private key pair.
H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Association of personal, financial, and/or business-related identification information with a mobile communication device (MCD) is provided for herein. For example, an MCD can be associated with a financial account and can further include an identification component that verifies an identity of a user of the MCD. Identity can be verified by biometric analysis (e.g., finger/thumb print scan), username and password, optical feature scan, or a combination thereof or of like mechanisms, for instance. Accordingly, the claimed subject matter provides a mechanism to verify identification of a user of an MCD and incorporate user ID into remote data exchange, including remote financial transactions, with one or more networked devices.
G06Q 20/00 - Payment architectures, schemes or protocols
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
33.
SYSTEMS AND METHODS FOR DYNAMICALLY GENERATING NEW DATA RULES
Systems, apparatuses, methods, and computer program products are disclosed for dynamically generating a new data rule. An example method includes receiving a data rule including an operation to be applied to a data entry and determining regarding whether the data rule belongs to a set of previously-reviewed data rules. The example method further includes, when the data rule does not belong to the set of previously-reviewed data rules, providing the data rule to a user for human validation and receiving human validation. The example method further includes, causing an update, by rule generation circuitry, of an element of a machine learning model, where the element corresponds to the data rule where the update changes a weight value based on the validation and generating the new data rule based on the updated machine learning model. The example method further includes replacing the data rule with the new data rule.
Methods, apparatuses, and computer program products are disclosed for generating and/or using a mobile legal identification data object. An example method includes receiving a request for a mobile legal identification data object and generating the mobile legal identification data object based at least in part on the request for the mobile legal identification data object. The method further includes associating the mobile legal identification data object with a user profile. The method further includes providing the mobile legal identification data object to a user device associated with the user profile.
A method for enhanced securities lending, the method comprising: receiving a request from a user for a first number of stocks in a particular security; transmitting a quote for a second number of stocks in the security available for lending to the user, wherein the second number of stocks is less than or equal to the first number of stocks; predicting, at least in part using a quantum annealer or a quantum computer and based on a history of engagement of the user, a third number of stocks in the particular security to be reserved, the third number of stocks being less than or equal to the second number of stocks; reserving the third number of stocks for execution by the user; and decrementing a total number of stocks in the particular security by the third number of stocks.
Techniques are described for performing team member behavior identification and classification using a machine learning model and one or more rule-based models for customer communications. A computing system receives a message from a user device. The computing system uses output of a machine learning model to determine whether the message includes an indication of team member behavior including at least one behavior term and at least one team member reference. The computing system also uses output of one or more rule-based models to determine whether the message includes an indication of a type of team member behavior including a type of behavior term and a type of team member reference substantially proximate to each other within the message. Based on the message including the indication of team member behavior, the computing system sends the message to another system corresponding to the type of team member behavior included in the message.
Systems, methods and computer-readable storage media are utilized to model a multi-dimensional performance score. A processing circuit including memory and one or more processors is configured to authenticate a first exchanger and a second exchanger, receive a selection of at least one actionable element corresponding to an activity of the first exchanger and the second exchanger, identify a performance model based on the activity, collect at least one performance indicator associated with the first exchanger or the second exchanger, collect first activity data of the first exchanger and second activity data of the second exchanger, model the at least one performance indicator, the first activity data, and the second activity data to generate a MDP score, and provide the MDP score.
Systems, apparatuses, and computer program products are disclosed for authenticating a user using a knowledge factor identification transaction with a challenge authentication token. An example method includes providing a logon request, wherein the logon request comprises a user identifier received from a user. The example method further includes receiving a challenge sequence and generating a password structure, wherein the password structure is based on a static password received from the user and the challenge sequence. The example method further includes generating a challenge authentication token comprising the user identifier, the password structure, and a client timestamp and providing the challenge authentication token. The example method further includes receiving an authorization decision message, wherein the authorization decision message is indicative of whether the challenge authentication token was verified.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
An example computer system for authenticating a user in a metaverse can include one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: receive an authentication credential from the user; determine whether the authentication credential is valid; upon determining that the authentication credential is valid, update authentication status of the user; and maintain the authentication status of the user across multiple login attempts by the user.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
The arrangements disclosed herein relate to generating, by a first device, an authentication code for each of portions of a first message by running each of the portions of the first message through a cryptographic function with a cryptographic key. The first device generates a plurality of valid chunks, each including one of the plurality of portions of the first message and the corresponding authentication code. The first device generates using a Quantum Random Number Generator (QRNG) a random number for each portion of a second message. The first device generates invalid chunks, each invalid chunk includes one of the portions of the second message and the corresponding random number. The first device sends to the second device chaff including the invalid chunks interleaved with the valid chunks.
H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
41.
SYSTEMS AND METHODS FOR ESTABLISHING SHARED TRUST BETWEEN A PRIMARY CLIENT USER AND RECIPIENT AGENT USER
Systems, apparatuses, methods, and computer program products are disclosed for establishing shared trust between a client user and an agent user for a current communication. An example method includes providing a logon request for a client user account associated with a client user to a system device. The example method further includes determining an authentication sequence code using the mobile application in an instance in which the logon request was successfully authenticated and causing the authentication sequence code to be provided to the agent device associated with the agent user. The example method further includes receiving a shared trust decision message from the system device, wherein the shared trust decision message is indicative of a verification status for the current communication.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
Systems, apparatuses, methods, and computer program products are disclosed for establishing shared trust between a client user and an agent user for a current communication. An example method includes providing a logon request for a client user account associated with a client user to a system device. The example method further includes generating a candidate authentication sequence code message using the mobile application in an instance in which the logon request was successfully authenticated and providing the candidate authentication sequence code message to a system device. The example method further includes receiving a shared trust decision message from the system device, wherein the shared trust decision message is indicative of the current communication verification status.
Systems and methods for an empathy cultivator are disclosed. One disclosed method includes receiving a video signal associated with an experience; applying an enhancement to the video signal to create an enhanced video; and transmitting a signal associated with the enhanced video, wherein the enhancement comprises an addition provided by a sharer of the experience to convey an emotion of the sharer about the experience.
An example computer system for managing test coverage for a workflow can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to create: a workflow execution engine programmed to execute the workflow, including a plurality activities, using a test case; an activity identification engine programmed to identify each time one of the plurality of activities is invoked by the workflow using the test case; and a test coverage engine programmed to determine the test coverage for the workflow based upon identification by the activity identification engine of the plurality of activities invoked by the workflow.
A system to track to model asset states and access by utilizing non-fungible tokens (NFTs). The system includes a data processing system including memory and one or more processors to receive a stating request for an asset, obtain, based on a plurality of control structures, a plurality of NFTs, each of the plurality of NFTs including a link with a metadata object including metadata of a state of the asset, encapsulate the plurality of NFTs within a container, receive, from the remote device, a state request for an asset state corresponding to a first NFT, the state request including a security token, obtain, from the metadata of the first NFT, one or more recorded security tokens, compare the security token to the one or more security tokens, and, in response to the security token matching the one or more security tokens, transmit the first NFT to the remote device.
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Systems and methods may generally provide resource management based on a predictive alert. An example method may include receiving a set of social media messages referencing an entity, and comparing an indicator from the set of social media messages to a baseline model. Based on the comparison, a need for an increase in a resource may be identified. The method may include outputting an alert indicating the need for the increase in the resource.
H04L 51/52 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
47.
Systems and methods for assessing risk of fraud in an electronic transaction
A system including a processing circuit configured to collect at least first contact information of a beneficiary, identify a risk associated with the beneficiary, automatically calculate a risk score for an electronic transaction based on the risk, determine that the risk score exceeds a first threshold value and displaying a notification on the user device associated with the electronic transaction, receive data from the user device, wherein the data includes at least second contact information corresponding to the beneficiary, compare the first contact information and the second contact information with additional data, wherein comparing includes analyzing the call records or the emails and determining that a user conducted at least one mitigation activity of the displayed mitigation activities, recalculate the risk score based on the at least one mitigation activity, and display the recalculated risk score on the user device.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Systems and methods for an adaptable user interface based on a user's neurological condition, user experience level, and emotional state including: selecting a neurological condition associated with a user; determining, based on historical user data, a user experience level; generating a user interface based on the selected neurological condition and the user experience level; receiving, from a tracer configured to log a user's activity, a tracking log comprising information regarding the user's activity; determining a behavioral metric by analyzing the tracking log using a machine learning model trained by processing prior user activity, wherein the behavioral metric represents an emotional state of the user; and modifying one or more elements of the user interface based on the behavioral metric.
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 9/451 - Execution arrangements for user interfaces
Systems, apparatuses, methods, and computer program products are disclosed for generating an insight report for an entity. An example method includes identifying an entity asset set for the entity, wherein (i) the entity asset set comprises one or more entity assets associated with the entity, (ii) each entity asset is associated with an entity asset type, and (iii) each entity asset is further associated with a geographic area. The example method further includes determining one or more risk scores for each entity asset included in the entity asset set and generating one or more insights for each entity asset included in the entity asset set. The example method further includes generating and providing the insight report for the entity.
Systems and methods for virtual and physical tracking of assets is provided. A system may receive, from a first node of multiple nodes, a request to perform a transaction of an asset between the first node and a second node of the nodes. Each node may be tokenized representations of a respective physical entity for managing assets. The system may generate a block. The system may transmit the block to each of the nodes. The system may receive, from each of the nodes, a respective message indicating validation of the transaction. The system may append the block onto a blockchain based on receiving the validation. The blockchain may include multiple blocks associated with respective transactions between nodes.
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
51.
SYSTEMS AND METHODS FOR MANAGING AND SECURING SENSITIVE ELECTRONIC FILES
Systems, apparatuses, methods, and computer program products are disclosed for managing and securing sensitive electronic files. An example method includes obtaining, by interface circuitry, an electronic file associated with a third-party application. The method also includes determining, by a classification engine, a first classification of the electronic file. The method also includes, in an instance in which the first classification of the first electronic file corresponds to a first predefined classification, determining, by the classification engine, a second classification of the first electronic file, selecting, by an inbox allocation engine and based on the second classification of the electronic file, a first storage location associated with an electronic file inbox of a mobile banking application, and storing, by the inbox allocation engine, the electronic file in association with the first storage location.
Systems, apparatuses, methods, and computer program products are disclosed for generating a fleet transition climate impact report for an entity. An example method includes receiving a fleet transition climate impact report request and determining a current entity fleet metric set and a current vehicle estimate metric set. The example method further includes generating a recommended fleet electrification schedule. The example method further includes generating the fleet transition climate impact report and providing the fleet transition climate impact report.
G06Q 10/0637 - Strategic management or analysis, e.g. setting a goal or target of an organisationPlanning actions based on goalsAnalysis or evaluation of effectiveness of goals
G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations
Techniques are described for a behavioral analysis of metadata associated with source code to identify malicious source code. For example, this disclosure describes a computing system configured to obtain metadata associated with source code of a software package. The computing system is also configured to determine, based on the metadata associated with source code, whether there are any anomalies associated with the source code. The computing system is further configured to, in response to determining that there is at least one anomaly associated with the source code, compute a score for the software package. The computing system is also configured to perform an action based on the score for the software package.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
A method may include transmitting, from a browser application of a client system, a request for a webpage to a server system using a general execution environment of the client system; receiving the webpage, the webpage including a secure execution request to execute a computation in a trusted isolated execution environment of the client system; in response to the secure execution request, establishing a secure enclave within the trusted isolated execution environment with respect to the browser application; receiving, within the trusted isolated execution environment, an attestation request from the server system for an attestation associated with the secure enclave; transmitting, from the trusted isolated execution environment, an attestation response based on a physical property of a processing unit in the client system; subsequent to transmitting the attestation response, receiving, from the server system, a data file; and storing the data file in the secure enclave.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
An example system for modeling of risk associated with post-quantum cryptography can include: at least one processor; and memory encoding instructions that, when executed by the at least one processor, cause the system to: identify a plurality of applications associated with an entity; define one or more cryptographies associated with each of the plurality of applications; select an estimated time at which the one or more cryptographies will be compromised by the post-quantum cryptography; and estimate a cost of remediation for one or more of the plurality of applications.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06Q 10/0635 - Risk analysis of enterprise or organisation activities
An example computer system for providing a communication system can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: receive a single first command to create the communication system; automatically install and provision the communication system in a cloud computing environment; provide an information and event management microservice programmed to track issues associated with the computer system; provide a communication microservice programmed to facilitate communications between users of the communication system; receive a single second command to remove the communication system; and automatically remove the communication system from the cloud computing environment.
Systems, methods, and apparatuses for processing a rewards transaction including an accounts database storing information associated with accounts held by a financial institution including a payment account associated with a customer, a rewards account database storing information associated with reward accounts, including a rewards account associated with the customer, and a processing circuit. The processing circuit is structured to receive transaction details that define a rewards transaction associated with the rewards account, receive a rewards transaction request associated with the rewards account, the rewards transaction request including a rewards amount and recipient details, debit an amount of points from the rewards account maintained by the financial institution and associated with the customer, where the amount of points are less than or equal to the rewards amount, and complete the rewards transaction without converting the rewards amount to currency.
Systems, methods, and computer-readable storage media for performance indicator operations. One method includes identifying, by one or more processing circuits, user activity data and one or more performance indicators of a user. The method further includes modeling, by the one or more processing circuits, the user activity data and the one or performance indicators to generate a user data structure. The method further includes determining, by the one or more processing circuits, the user data structure causing an update in the one or more performance indicators. The method further includes configuring an actionable activity corresponding to the at least one future activity of the user, wherein the actionable activity is below a user threshold. The method further includes generating and presenting, by the one or more processing circuits, a graphical user interface (GUI) including actionable elements and at least one message associated with the actionable activity.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Systems, apparatuses, methods, and computer program products are disclosed for optimizing cloud deployment of an application. An example method includes receiving, by communications hardware, a cloud deployment request and identifying, by an application analysis engine, a set of application configuration parameters for an application. The example method further includes selecting, by a cloud platform selection engine and based on the set of application configuration parameters for the application, an optimal cloud platform from a plurality of candidate cloud platforms and deploying, by a cloud deployment, the application on the optimal cloud platform.
A computing entity generates a data instance comprising a plurality of data fields; and protects a data field value using a post quantum cryptography (PQC) cryptographic technique to generate protected text for the data field value. Protecting the data field value comprises at least one of (a) encrypting the data field value, (b) tokenizing the data field value, or (c) electronically signing the data field value. The computing entity updates the data instance to remove a plaintext version of the data field value from the data field of the plurality of data fields and to include the protected text in the data field; updates an annotation corresponding to the data instance to indicate (a) that the data field is protected and (b) the PQC cryptographic technique used to protect the data field; and provides the data instance to be stored by a data repository.
Differentiation of access within the metaverse. According to one aspect, a metaverse visualization of an environment is modified as viewed by an avatar upon access of the environment by another avatar. According to another aspect, access of an avatar to a restricted access environment within the metaverse enables trusted avatars selective access to the restricted access environment together with the avatar.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06T 13/40 - 3D [Three Dimensional] animation of characters, e.g. humans, animals or virtual beings
62.
Systems and methods for a connected mobile application with an AR-VR headset
Systems and methods of enabling a client account transaction via a client account application on a mobile device via an augmented reality or virtual reality device are provided. A computer-implemented method includes establishing a wireless connection between the devices and authenticating a user. Authenticating the user includes receiving a prompt for authentication information from the mobile device, detecting a selection of authentication information, transmitting the authentication information to the mobile device, and receiving a notification from the mobile device that the authentication information was verified. The method further includes receiving display data comprising one or more input fields associated with the client account application; displaying a visual environment based on the display data; detecting a selection of an input field; and causing execution of the selection by transmitting the selection to the mobile device.
Systems, apparatuses, methods, and computer program products are disclosed for simultaneous machine multifactor authentication. An example method includes simultaneously receiving, by communications hardware and in response to a machine authentication request, a plurality of authentication factors for a machine via a plurality of channels, wherein the plurality of authentication factors comprises at least one hardware-based challenge authentication factor. The example method further includes verifying, by an authentication engine, the plurality of authentication factors in parallel and authorizing, by the authentication engine, one or more actions based on a successful verification of the plurality of authentication factors.
Systems, apparatuses, methods, and computer program products are disclosed for distributing digital rewards between third parties. An example method includes receiving rewards data representative of at least a digital rewards profile comprising a digital rewards amount for a digital rewards program of a user and receiving a rewards mapping request comprising instructions to identify one or more available digital rewards sources compatible with the digital rewards amount. The example method further includes identifying one or more digital rewards sources comprising one or more of a second digital rewards profile comprising a second digital rewards amount, a promotion of the digital rewards program, or an incentive multiplier and causing transmission of at least one of a predefined digital rewards amount or the promotion of the digital rewards program. The example method further includes executing a purchase transaction for a product associated with a product cost of the digital rewards program.
Systems, apparatuses, methods, and computer program products are disclosed for identifying gaps in insurance coverage. An example method includes receiving, by communications hardware, an indication of a parcel and a set of property configuration parameters regarding the parcel and retrieving, by a data fabric engine and via a blockchain network, a set of compliance requirements for the set of property configuration parameters. The example method further includes generating, by the data fabric engine and based on the set of compliance requirements, a parcel profile and causing, by an advisory circuitry and based on the parcel profile, presentation of a compliance graphic illustrating the parcel and one or more data layers.
Systems and methods for activating a transaction card are provided. A method includes: receiving a uniform resource locator (URL) and an encrypted key stored on a contactless transaction card from a first contactless communication between the contactless transaction card and a customer device; decrypting the encrypted key to identify information regarding the contactless transaction card; providing a web site associated with the URL for display, wherein the web site comprises a field automatically populated based on the identified information regarding the contactless transaction card; activating the contactless transaction card in response to verifying the identified information regarding the contactless transaction card; receiving information associated with the contactless transaction card from a second contactless communication between the contactless transaction card and the customer device; and resetting a credential for accessing an account associated with the contactless transaction card.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
Systems, methods and computer-readable storage media utilized to complete a cardless transaction on a distributed ledger network. One method includes receiving, by a point-of-sale (POS) computing device, a transaction request including a biometric sample from an individual associated with a payment account at a financial institution. The method further includes authenticating, by the POS computing device, the biometric sample by cross-referencing the biometric sample with a biometric dataset stored on the distributed ledger network. The method further includes, in response to authenticating the biometric sample, generating, by the POS computing device, a cryptogram associated with the biometric sample and processing, by the POS computing device, the transaction request utilizing the cryptogram.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Systems, apparatuses, methods, and computer program products are disclosed for generating and providing a beneficiary feedback response. An example method includes receiving an inquiry request and identifying a beneficiary account for a beneficiary of interest. The example method further includes determining at least one process to be performed on the inquiry data and (i) generating a verification response, (ii) a scoring response, and/or (iii) an analytics response. The example method further includes generating a beneficiary feedback response which includes the verification response, the scoring response, and/or the analytics response and providing the beneficiary feedback response.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
69.
SYSTEMS AND METHODS FOR DYNAMIC AND FLEXIBLE BENEFICIARY ANALYSIS
Systems, apparatuses, methods, and computer program products are disclosed for generating and providing a beneficiary optimization response. An example method includes identifying a transaction request and determining one or more candidate enhanced alternative payment types for a transaction. The example method further includes identifying a beneficiary account for the beneficiary of interest and determining a payment metric set for each of the one or more of the candidate enhanced alternative payment types. The example method further includes selecting one or more candidate enhanced alternative payment types and generating and providing the beneficiary optimization response.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
70.
CRYPTANALYSIS ANALYTICAL MONITORING AND OBSERVATION (CAMO)
The arrangements disclosed herein relate to systems, apparatus, methods, and non-transitory computer readable media for determining, based on at least one cryptographic attribute, that information on a site is a first cryptographic key, and sending an alert that at least one of the first cryptographic key or a second cryptographic key corresponding to the first cryptographic key is compromised.
Techniques are described for analyzing and presenting alert-based information for an enterprise business. In particular, a central device in a computer system receives alerts from other devices associated with different office branches of the enterprise business, and analyzes the alerts on a periodic schedule. For example, every month, the central device may calculate a weighted alert volume by district based on the risk scores calculated for the office branches within the district, calculate an average weighted alert volume across the entire enterprise, and calculate the standard deviation of the average weighted alert volume to determine the alert risk rating for the district. The central device may also analyze the dispositions of the alerts on the period schedule. For example, the central device may determine coaching rates and/or disposition rates by district. The central device may further output the alert and/or disposition information to users in a simple format.
G06Q 10/0635 - Risk analysis of enterprise or organisation activities
G08B 3/10 - Audible signalling systemsAudible personal calling systems using electric transmissionAudible signalling systemsAudible personal calling systems using electromagnetic transmission
G08B 29/10 - Monitoring of the annunciator circuits
Disclosed in some examples are methods, systems, machine readable mediums that provide a network-based joint investment platform that enforces agreed-upon decision rules on jointly managed investments and provides collaboration and decision-making support tools for joint managers to make decisions about taking actions related to one or more jointly-managed assets. The platform may provide for configuring a plurality of decision rules that identify which managers can take which actions and under what conditions. The joint investment platform may enforce the decision rules by requesting any specified approvals according to the decision rules. Once those rules are satisfied, the joint investment platform may execute the requested actions. If the required approvals are not obtained, or the rules provide no path to approval, the action may not be executed.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
A payer computing system includes a processing resource, a memory resource, and computer-executable instructions stored thereon and embodied in a customer-side application programming interface (API). The instructions, when executed by the processing resource, cause the payer computing system to receive an electronic payment request and, in response, generate a request (e.g., a first API message) to access a biller computing system using a previously generated payer electronic token. The request is transmitted to the biller computing system. The payer computing system receives (e.g., via a second API message) payment information provided by the biller computing system in response to the request to access. Based on payment information, the payer computing system generates a payment transaction and causes (e.g., via a third API message) the payment transaction to be initiated.
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
74.
Efficient condition-based linking of communication sessions
This disclosure provides systems and methods for matching a customer with a service representative. A request for service can be received from a customer. A first service interaction can be initiated between the customer and a first service representative. A customer sentiment metric can be determined during the first service interaction. The customer sentiment metric can indicate a level of customer satisfaction during the first service interaction. A second service representative suitable for fulfilling the customer's request for service can be identified, based at least in part on the customer sentiment metric. A second service interaction can be initiated between the customer and the second service representative, responsive to the identification of the second service representative.
Techniques are described for autonomously managing conversion from a user performing manual payment of recurring bills with one or more billers to automatic payment of the recurring bills with the billers. A computing system identifies, based on transaction data associated with accounts of the user, recurring transactions with a biller that are manually performed by the user, wherein the recurring transactions did not occur through a bank-based payment service and did not occur through automatic payment with a biller-based payment service. The computing system determines, based on the recurring transactions, a recommendation to automatically perform subsequent recurring transactions with the biller; sends, to a user device, a notification of the recurring transactions and the recommendation to automatically perform the subsequent recurring transactions with the biller; and upon receipt of an approval of the recommendation from the user device, autonomously establishes automatic payment of the subsequent recurring transactions with the biller.
A system includes one or more hardware processors to perform operations for receiving, from a first entity of a financial entity network, a first data request to obtain a private data of a second entity of the financial entity network, and for authenticating the first data request. The operations also include retrieving, from a data repository, an encrypted private data when the first data request is authenticated, and creating, via a dynamic key exchange system, a first single use key. The operations further include providing the first single use key to the first entity, and receiving, from the first entity, a second data request to obtain the private data. The operations also include authenticating the second data request, and providing a second encrypted private data to the first entity when the second data request is authenticated, wherein the second encrypted data is decrypted using the first single use key.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
77.
SYSTEMS AND METHODS FOR ESTABLISHING CRYPTOGRAPHIC KEYS SHARED AMONG THREE OR MORE DEVICES
Systems, apparatuses, methods, and computer program products are disclosed for authentication between multiple devices using N-way entangled particles. Any number (N) of entangled particles may be distributed to any number of devices within a distributed system to facilitate authentication between multiple devices. An example authentication method includes: generating, by a secure key generator of a first participating device, a first key based on one or more quantum entangled particles; determining, by communications hardware of the first participating device, that a connection to a second participating device could not be established or maintained; in response to the determining, by the communications hardware, transmitting a first connection request to establish a connection with a third participating device; receiving, by the communications hardware, an acknowledgement to instantiate the connection with the third participating device; and establishing, by the communications hardware, the connection with the third participating device.
A computing system includes one or more processing circuits including one or more processors coupled to one or more memory devices, the one or more memory devices having instructions stored thereon that, when executed by the one or more processors, cause the one or more processors to receive an indication of a customer transaction associated with a customer, the indication of the customer transaction including a transaction amount. The instructions further cause the one or more processors to determine a credit score effect based on the transaction amount. The instructions further cause the one or more processors to generate display data including a credit score indicator indicative of the credit score effect. The instructions further cause the one or more processors to cause a graphical user interface, based on the display data, to be displayed to the customer prior to completion of the customer transaction.
A computer system and method for enabling or disabling a payment vehicle at the request of a payment card holder from a remote device. The computer system comprises a computer having memory and a processor for processing input data received from a remote device. The input data comprises an instruction executable by the processor in a form of a text message or electronic mail received from the remote device, with the instruction to enable or disable a payment card of a payment card holder by changing the status of the payment card. An interactive remote interface computer software application is provided to the payment card holder for use on the remote or other device.
A computer-implemented method includes receiving, from a mobile device, a deposit request including a first check image for funds to be deposited into a user account, determining a risk level associated with the deposit request, requesting a second check image having a restricted endorsement based on the risk level, receiving the second check image having the restricted endorsement, determining a confidence level based on the restricted endorsement, and transferring the funds to the user account based on the confidence level.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Techniques are described for routing a customer communication to an agent having appropriate expertise to handle the current communication associated with a customer using one or more machine learning models. For example, a computing system includes a memory and one or more processors in communication with the memory. The one or more processors are configured to: receive a set of emotion factor values for communication data of the current communication; generate, using a composite emotion model running on the one or more processors, a composite emotional score for the current communication based on the set of emotion factor values for the current communication; determine a routing recommendation for the current communication that identifies an agent having appropriate expertise to handle the current communication based on at least the composite emotional score; and route the current communication in accordance with the routing recommendation to a computing device of the agent.
A method including receiving a signcrypted cross-border payment message, the signcrypted cross-border payment message generated by signcrypting a cross-border payment message using a first financial institution public key, a first financial institution private key, and a second financial institution public key, retrieving the first financial institution public key, the second financial institution public key, and a second financial institution private key, wherein the second financial institution public key and the second financial institution private key are part of a public/private key pair, unsigncrypting the signcrypted cross-border payment message using the first financial institution public key, the second financial institution public key, and the second financial institution private key to retrieve the cross-border payment message, and verifying that the first financial institution public key is associated with a first financial institution.
Methods and systems for retrieving information from secondary computing systems using network access tokens are disclosed. The system can provide a user interface that lists a plurality of secondary computing systems to a client application executing at a client device associated with a user profile of the primary computing system. The system can receive, from the client device, a network token identifying a permission for accessing a second profile maintained at the secondary computing system, and retrieve the subset of data records from the secondary computing system according to a retrieval policy. The system can then update the user interface at the client application to present the subset of data records of the second profile.
Systems and methods may generally be used for security debt management. An example method may include identifying a security risk assessment including at least one security defect of an application, a set of applications, an enterprise, etc. The method may include determining, for example using a model, a security debt score for the application based on the security risk assessment. The method may include comparing the security debt score to a security debt threshold for the application, and determining, for a particular time period, a minimum remediation for the at least one security defect of the application to reduce the security debt score. In some examples, the minimum remediation is based on a minimum remediation due during the particular time period and the security debt score.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 21/55 - Detecting local intrusion or implementing counter-measures
85.
SYSTEMS AND METHODS FOR A METADATA DRIVEN MICROSERVICE FOR COMPLAINTS
Systems and methods for a metadata driven microservice including: receiving data associated with a complaint; classifying the data based on a complaint type; retrieving, from a database of text elements, a set of text elements including metadata comprising display rules associated with a user interface, a set of text elements associated with the complaint type; providing a first user interface arranged based on the display rules comprising a first text element of the set of text elements and one or more input fields; receiving in the one or more input fields an input; and providing an updated user interface comprising a second text element of the set of text elements, the second text element arranged based on the display rules of the metadata.
Systems, apparatuses, methods, and computer program products are disclosed for automated model development. An example method includes parsing, by configuration circuitry, a configuration file, and generating, by an execution engine and based on the parsed configuration file, model code for training and testing a machine learning model. The example method further includes generating, by the execution engine, a machine learning pipeline, wherein the machine learning pipeline comprises the model code and a data processing engine, and instantiating, by a monitoring driver, a monitoring engine to monitor the machine learning pipeline. The example method further includes causing execution, by the execution engine, of the machine learning pipeline, and during execution of the machine learning pipeline, generating model performance data by the monitoring engine. The example method further includes receiving, by from the execution engine, model output data, wherein the model output data comprises a trained model and model performance data.
Disclosed are example methods, systems, and devices that allow for secure digital authorization via generated datasets. The techniques include receiving a first dataset of a first user and a second dataset of a second user and generating a first set of identity elements and a second set of identity elements based on the first dataset and the second dataset, respectively. A linkage definition can be generated based on the first and second datasets, which can be associated with a set of activation elements. The techniques include determining that a set of inputs satisfy one or more of the set of activation elements and, in response, generating a set of security access tokens based on the linkage condition. The security access tokens can be transmitted to a computing device upon analyzing and verifying biometric data received from that computing device.
Systems, apparatuses, methods, and computer program products are disclosed for classical-quantum encryption and decryption. An example method for classical-quantum encryption includes receiving, by communications hardware, a symmetric key and a plaintext message, generating, by a function generator, an analytic function using the symmetric key and the plaintext message, computing, by a cryptography unit, a ciphertext based on a Taylor series expansion of the analytic function, and outputting the ciphertext. An example method for classical-quantum decryption, the method includes receiving, by communications hardware, a symmetric key and a ciphertext, deriving, by a cryptography unit and using a quantum computer, an analytic function using the ciphertext, generating, by a function generator, a plaintext message using the analytic function and the symmetric key, and outputting the plaintext message.
A method may include receiving data from a computing device requesting approval of a loan application; accessing time-series data associated with the user from a knowledge graph; building a feature vector based on the accessed time-series data; inputting the feature vector into a machine learning model; receiving a response from the output from the machine learning mode, the output indicating a level of approval for the user with respect to the loan application; and transmitting a response to the request based on the level of approval.
Building machine learning models using a standardized library of machine learning model tools. An Application Programming Interface (API) serves as an interface between one or more computer applications that receive user commands for building machine learning models and the standardized library of tools. The API provides an interface between data scientists tasked with designing machine learning models conceptually and a standardized set of software engineering tools. The API enables incorporation of the relevant standardized software engineering tools to build the machine learning models that have been designed conceptually by the data scientists.
Systems, apparatuses, methods, and computer program products are disclosed for providing an asset savings notification to a user. An example method includes determining a user event prediction for the user and in response to determining the user event prediction, determining a predicted liquid asset influx. The method further includes generating and providing the asset savings notification.
An example computer system for live threat modeling for an enterprise can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: prepare abstracts for applications associated with the enterprise to form a threat model; monitor development phases of the applications; and apply the threat model to the applications during each of the development phases to identify risk.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
A computing system may be configured to enable a reassignment of a credit card purchase between a business account and a personal account. The reassignment may include reassignments from virtual accounts for designated purchases. A page in a user interface for a combined account management platform for a purchase may enable commenting between business partners and receipt capture sharing. The combined account management platform may restrict access to business partners such that they see pages for business purchases but not personal purchases.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
Systems and methods for generating shared accounts and performing shared account transactions include a computing system which receives a request from a first user device of a first user to form a shared account accessible by a second user based on one or more rules, generates the shared account, links a first account with the shared account, identifies the second user, transmits a notification to a second user device of the second user indicating the second user has access to the shared account, receives an input to the second user device indicating acceptance of access to the shared account, links a second account with the shared account, receives a second input to the second user device indicating a selection to initiate an outbound transfer of resources and a category, determines that the category meets at least one rule, and initiates the outbound transfer of resources from the shared account.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
An example electronic computing device can include: a processor; and a system memory, the system memory including instructions which, when executed by the processor, cause the electronic computing device to: receive data associated with risk from various sub-systems of an organization; correlate the data to develop a risk profile for the organization; and present the risk profile in a single user interface.
Holistic tracking and monitoring of goals are provided. An indication of a first goal and a first set of attributes associated with the first goal and another indication of at least a second goal and a second set of attributes associated with the second goal are received. The first goal and at least the second goal are aggregated into a combined goal. A set of defined actions to achieve the combined goal is determined. Respective statuses of each defined action of the set of defined actions and a combined status for the combined goal are tracked. A representation of the combined status and the respective statuses are provided in a perceivable format. Further, the combined status and the respective statuses are updated in real-time.
Systems, apparatuses, methods, and computer program products are disclosed for providing a resource allocation recommendation message to a user. An example method includes identifying a predicted liquid asset influx for the user and determining a current resource metric. The method further includes generating a resource allocation recommendation message that comprises one or more resource allocation recommendations that are each associated with (i) a user account of the one or more user accounts associated with the user or a new user account type and (ii) a resource allocation value. The method may further include providing the resource allocation recommendation message.
A computer-implemented method includes determining, by a provider computing system associated with a provider, a goal of a first customer. The computer-implemented method further includes identifying, by the provider computing system, one or more second customers similar to the first customer based on a characteristic of the first customer. The computer-implemented method further includes determining, by the provider computing system, one or more actions taken by the one or more second customers to achieve the goal. The computer-implemented method further includes generating, by the provider computing system, a graphical user interface including an indication of the one or more actions taken by the one or more second customers to achieve the goal. The computer-implemented method further includes transmitting, by the provider computing system, the graphical user interface to a customer device associated with the first customer.
An environmental impact computing system receives event data that describes an activity-source combination, such as an activity performed by a person associated with a user account, or a source that is associated with the activity that is performed. The environmental impact computing system includes a supplier impact model which calculates an environmental impact factor of the activity-source combination, and a user impact model which calculates a user-specific modifier. Based on the user-specific modifier, the environmental impact computing system adjusts the environmental impact factor. The environmental impact computing system modifies a user interface display, such as a user device that is associated with the user account, to display the adjusted environmental impact factor. In some embodiments, the user interface display is modified to display additional data, such as data describing a projected cumulative environmental impact.
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
100.
Configuration-based development of analytics pipelines
This disclosure describes techniques relating to development of data flow pipelines. In one example, this disclosure describes a method that includes accessing, by a computing system, metadata identifying characteristics of a data flow pipeline; generating, by the computing system and based on the metadata, the data flow pipeline, wherein the data flow pipeline includes a plurality of stages, and wherein the plurality of stages includes a multi-sourced stage in which data output by each of a subset of stages in the plurality of stages are used as input to the multi-sourced stage; executing, by the computing system, the data flow pipeline; detecting, by the computing system, modifications to the metadata; generating, based on the modifications, an updated data flow pipeline; and executing, by the computing system, the updated data flow pipeline.