A method includes receiving a protection request for an exchange and generating a metadata object including a plurality of outputting attributes for outputting. The method further includes generating a protected NFT including a link with the metadata object. The protected NFT is encapsulated within a control structure that restricts an output of the metadata object. The method further includes signing the protected NFT using at least one of a first private key or a second public key. The method further includes transmitting the signed protected NFT to the remote device and continuously monitoring the exchange. The method further includes detecting, by the control structure, at least one outputting attribute of the plurality of outputting attributes is satisfied and, in response to detecting the at least one outputting attribute is satisfied, outputting at least a portion of the output.
Disclosed is an approach that enables generation of parameterized digital tokens for unique tags in, for example, digital payment platforms. The unique tags may be agnostic to accounts, such that they do not require changes to administration or ownership of existing accounts, which may be held at different institutions.
A method may include receiving, over a network interface, a login request from a requesting computing device, the login request associated with a user account; detecting a location of the requesting computing device; generating using a processing unit, an authorization code; transmitting the authorization code to a code receiving device, the code receiving device associated with the user account; detecting a location of the code receiving device; comparing, using the processing unit, the location of the requesting computing device to the location of the code receiving device; determining, based on the comparing, the location of the requesting computing device and the location of the code receiving device are different; and generating an authorization response to the login request based on the determining.
Systems and methods for a resources balancing tool are provided. A method includes: coupling, by a governing institution computing system, to a plurality of resource tracking devices associated with a plurality resource repositories; monitoring, by the governing institution computing system, resource availability across the plurality of resource repositories based on information received from the plurality of resource tracking devices; predicting, by the governing institution computing system, a resource amount in a resource repository of the plurality of resource repositories based on the monitored resource availability across the plurality of resource repositories; determining, by the governing institution computing system, that the predicted resource amount in the resource repository satisfies a threshold; and transmitting, by the governing institution computing system, a message based on the predicted resource amount in the resource repository satisfying the threshold.
The arrangements disclosed herein relate to systems, apparatus, methods, and non-transitory computer readable media for recovering a first key by decrypting encrypted key using a master key, determining a first seed using the first key and a first Identifier (ID) identifying a first device, determining a second seed using the first key and a second ID identifying a second device; and distributing the first seed and the second seed to each of the first device or the second device. Each of the first device or the second device generates a data key using a key derivation function based on the first seed and the second seed. Each of the first device or the second device encrypts or decrypts data using the data key.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
6.
SYSTEMS AND METHODS FOR CLASSICAL-QUANTUM ENCRYPTION AND DECRYPTION
Systems, apparatuses, methods, and computer program products are disclosed for classical-quantum encryption and decryption. An example method for classical-quantum encryption includes receiving, by communications hardware, a symmetric key and a plaintext message, generating, by a function generator, an analytic function using the symmetric key and the plaintext message, computing, by a cryptography unit, a ciphertext based on a Taylor series expansion of the analytic function, and outputting the ciphertext. An example method for classical-quantum decryption, the method includes receiving, by communications hardware, a symmetric key and a ciphertext, deriving, by a cryptography unit and using a quantum computer, an analytic function using the ciphertext, generating, by a function generator, a plaintext message using the analytic function and the symmetric key, and outputting the plaintext message.
The present disclosure is directed to systems, methods, and non-transitory computer-readable media for generating a first signature on a first certificate of the plurality of certificates using a first digital signature generation algorithm based on a first private key. The first signature is validated by a relying party device using a first public key in certificate chain validation. The first public key and the first private key form a first public/private key pair. A second signature is generated on a second certificate of the plurality of certificates using a second digital signature generation algorithm based on a second private key. The second signature is validated by the relying party device using a second public key in the certificate chain validation. The second public key and the second private key form a second public/private key pair. The relying party device uses a third public key in the second certificate to verify a third signature on signed data. The relying party device includes a classical computer having at least one processor that processes bits.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
An electronic online system is configured to access a set of scheduled payments; determine a set of payees from the set of scheduled payments, the set of scheduled payments to be made using a non-electronic payment mode; access a set of billers; calculate a set of redirection billers based on a match of payees from the set of payees with billers from the set of billers, wherein billers in the set of redirection billers support electronic payment modes; and schedule electronic payments for the set of redirection billers using the set of electronic payment processors.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
Various examples are directed to computer-implemented systems and methods for providing a home lending data control product. A method includes receiving data from one or more data sources, and constructing a configuration framework for ingesting, conforming and curation of data processing of the received data. Confirmation of receipt and correct format of the data is provided based on the configuration framework. The method also includes determining that the data has not been modified in transit, and confirming that the data is from a proper timeframe based on a file header or content of the data. The method further includes determining that the data has not been previously processed based on a comparison with previously processed data, transforming a format of the data based on the configuration framework and based on the one or more data sources, and storing the data in a data lake configured for centralized processing.
Systems and methods for providing a data lineage are described. According to some examples, a method may include receiving a source dataset corresponding to a use case scenario. The method may further include classifying the source dataset based on the use case scenario to create a classified dataset and then applying a set of data processing rules to the classified dataset to create a curated dataset. The method may further include receiving a reporting data object indicating a relationship between the source dataset and the curated dataset. The relationship can describe a data lineage of the source dataset. The method may further include outputting display data associated with the reporting data object.
Systems, apparatuses, methods, and computer program products are disclosed for obtaining data. The data may be obtained from a variety of data sources. In order to determine the preferred data source for obtaining the data, data quality scores may be computed and assigned to each data source of interest for a given implementation. Each data quality score may take into account several criteria including the computing resources required to obtain the data, the financial cost of obtaining the data, the security risk of obtaining the data, etc. Data may be obtained from the preferred data source, presented to a user associated with the data for verification, and processed in order to provide a computer-implemented services to the user.
Systems and techniques for cloud security posture management are described herein. Cloud configuration data is obtained for a security asset of a cloud computing environment. The cloud configuration data is evaluated by a machine learning processor using a requirements control model to output a probability of a misconfiguration of the security asset. A mitigation action is generated for the security asset based on the probability of the misconfiguration being within a threshold. A cloud security configuration policy is updated for the security asset using the mitigation action and the mitigation action is transmitted to the security asset to modify a cloud configuration of the security asset.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
13.
SYSTEMS AND METHODS FOR COMPUTING SHAPLEY ADDITIVE VALUES USING MODEL STRUCTURE INFORMATION
Systems, apparatuses, methods, and computer program products are disclosed for computing a Shapley additive explanation (SHAP) value ϕi using model structure information. An example method includes receiving a model ƒ(x) that uses a vector of features x as input, where the model has a known functional decomposition and generating, using the known functional decomposition, a set of lower order terms ƒv(xv), where a lower order term from the set of lower order terms takes a subset of the features as input, where a sum of the set of lower order terms equals the model ƒ(x). The example method further includes computing a set of lower-order SHAP values ϕi(ƒv) for the set of lower order terms and computing the SHAP value ϕi for the model based on a sum of the set of lower-order SHAP values.
Systems, apparatuses, methods, and computer program products are disclosed for monitoring and tracking technical engagements between digital resources. An example method includes deploying a machine learning monitoring application to a computing environment comprising one or more of a computing device or a network channel and detecting an engagement metric associated with a target technology of the computing environment and a user account of the computing environment. The example method further includes generating name-value pair data representative of the engagement metric, the user account, and a timestamp token and generating a technical engagement score representative of a probability of a successful utilization of the target technology by the user account. The example method further includes initializing an actionable instruction set based on a comparison of the technical engagement score to a technical engagement threshold.
A method for an interactive communication session includes receiving a request regarding a commitment associated with a user; initiating an interactive communication session with a user device; generating a prompt for inclusion in the interactive communication session, the prompt including a first question regarding an expected duration of a hardship; providing the prompt in the interactive communication session such that the prompt is provided via the user device; receiving a reply to the prompt from the interactive communication session; analyzing the reply to determine a confidence of the user in satisfying a modified commitment included with the prompt; comparing the confidence to a predefined confidence threshold; iteratively repeating the receiving, analyzing, and comparing processes until a determined confidence of the user meets or exceeds the predefined confidence threshold; and transmitting an updated term for the user based on the iterative process to the user device.
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G10L 15/183 - Speech classification or search using natural language modelling using context dependencies, e.g. language models
G10L 25/63 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination for estimating an emotional state
Systems, apparatuses, methods, and computer program products are disclosed for securing communications between an initiating device and a participating device. An example method includes obtaining audio to be provided to the participating device; embedding a token using steganography in the audio to obtain embedded audio; modifying the embedded audio based on a content concealment scheme to obtain an audio package that conceals content of the audio; and providing the audio package to the participating device.
G10L 19/018 - Audio watermarking, i.e. embedding inaudible data in the audio signal
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
An example computer system for managing incident tickets can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to create: a ticket generation engine programmed to automate generation of automated incident tickets associated with issues associated with computing devices, the ticket generation engine populating a cause of an issue for each of the automated incident tickets; and a ticket management engine programmed to receive the automated incident tickets and manual incident tickets generated manually, the ticket management engine standardizing the automated incident tickets and the manual incident tickets to create clusters of the issues associated with the computing devices.
H04L 41/5074 - Handling of user complaints or trouble tickets
G06F 18/23213 - Non-hierarchical techniques using statistics or function optimisation, e.g. modelling of probability density functions with fixed number of clusters, e.g. K-means clustering
G06F 18/2413 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on distances to training or reference patterns
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
A computer system and method for securely migrating on-premise data sources to a cloud platform. The method comprises identifying a source of record from which data is extracted, transformed, and loaded into a load-ready format. Load-ready data is then stored in a network-attached storage with encryption for secure access. Upon detecting the load-ready data via a file polling sensor, a registration directed acyclic graph (DAG) is initiated to register and validate the data within an operational database. A scanning DAG inspects the data for sensitive information, such as personally identifiable information (PII). If sensitive information is detected, a classification DAG identifies specific data elements, and a de-identification DAG encrypts or masks these elements. The de-identified data is then stored in secure cloud storage, where access is enabled within the cloud platform. A monitoring portal provides real-time status updates for the directed acyclic graphs, enhancing oversight of data security processes during migration.
Systems, apparatuses, methods, and computer program products are disclosed for post-quantum cryptography (PQC). An example system includes a PQC smartcard. The smartcard may include a a set of virtual machines (VMs) and each VM of the set of VMs is configured to perform a PQC cryptographic technique. The example system further includes communications circuitry configured to detect an interaction with the PQC smartcard and receive an updated set of PQC cryptographic techniques. The example system further includes processing circuitry configured to update the set of VMs based on the updated set of PQC cryptographic techniques.
A computer-based network system and method for using a payment vehicle having an on and off function. The system comprises a payment vehicle comprising an on and off function to enable or to disable the payment vehicle in the computer-based network for processing an electronic payment transaction, a holder of the payment vehicle, and a computer payment network wherein the computer payment network comprises a transaction engine for enabling or for disabling the payment vehicle at a request of the holder of the payment vehicle.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
G06Q 40/00 - FinanceInsuranceTax strategiesProcessing of corporate or income taxes
21.
DIGITAL ACCOUNT CONTROLS PORTAL AND PROTOCOLS FOR FEDERATED AND NON-FEDERATED SYSTEMS AND DEVICES
Systems, methods, and apparatuses for a secure digital controls portal enabling enhanced control over account functionalities and usage of secure information provided to third party systems and devices maintained by various federated and non-federated provider computing systems of various product and service providers. The secure digital controls portal can interface with various provider computing systems via custom APIs protocols. The API protocols may utilize APIs that are particular to the software and hardware operated by the various provider computing systems. The secure digital controls portal can also standardize information from the various provider computing systems. The secure digital controls portal can be a central portal accessible via a client application running on a user device that enhances one-stop switch control and security of a user's digital footprint.
Systems, methods, and apparatuses for providing a central location to manage permissions provided to third-parties and devices to access and use user data and to manage accounts at multiple entities. A central portal may allow a user to manage all access to account data and personal information as well as usability and functionality of accounts. The user need not log into multiple third-party systems or customer devices to manage previously provided access to the information, provision new access to the information, and to manage financial or other accounts. A user is able to have user data and third-party accounts of the user deleted from devices, applications, and third-party systems via a central portal. The user is able to impose restrictions on how user data is used by devices, applications, and third-party systems, and control such features as recurring payments and use of rewards, via a central portal.
Systems, methods, and apparatuses for providing a customer a central location to manage permissions provided to third-parties and devices to access and use customer information maintained by a financial institution are described. The central location serves as a central portal where a customer of the financial institution can manage all access to account information and personal information stored at the financial institution. Accordingly, the customer does not need to log into each individual third-party system or customer device to manage previously provided access to the customer information or to provision new access to the customer information. A user additionally is able to have user data and third-party accounts of the user deleted from devices, applications, and third-party systems via a central portal.
G06F 3/04817 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06F 3/04842 - Selection of displayed objects or displayed text elements
G06F 16/215 - Improving data qualityData cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
A system includes at least one processing circuit having at least one processor coupled to at least one memory device. The at least one processing circuit performs operations including: storing data regarding a plurality of transaction parties; receiving, from a user device, data regarding a transaction request for a transaction between a first party and a second party, the data including a first set of party characteristics associated with the first party; verifying the first set of party characteristics based on determining that the first party is one of the plurality of transaction parties; determining that at least one characteristic of the first set of party characteristics is incorrect based on comparing the first set of party characteristics with the data regarding the plurality of transaction parties; and causing the user device to display a notification indicating that the at least one characteristic is incorrect.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
25.
DRONE ELECTRONIC MESH FOR ONLINE NETWORK SERVICES (DEMONS)
The arrangements disclosed herein relate to systems, apparatus, methods, and non-transitory computer readable media for a network of plurality of roving cryptography devices. Each of the plurality of roving cryptography devices includes a locomotion system configured to move each of the plurality of roving cryptography devices to a respective one of a plurality of locations of the plurality of roving cryptography devices, a network interface circuit configured to provide wireless communication services to a user device of a plurality of user devices through a network of the plurality of roving cryptography devices, and a cryptography service system configured to provide cryptographic material to the user device. The plurality of roving cryptography devices at the plurality of locations form the network for providing the wireless communication services and the cryptographic materials to the plurality of user devices.
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
26.
SYSTEMS AND METHODS FOR ASSET ESCHEATMENT PREVENTION
Systems, apparatuses, methods, and computer program products are disclosed for asset escheatment prevention. An example method includes determining, based on a jurisdiction dataset, a dormancy status for at least one asset associated with a first digital user account. The example method also includes causing, during the dormancy period, transmission of an authentication credential request through a first digital channel to a first user device associated with the first digital user account. The example method also includes authenticating a first user associated with the first digital user account based on an authentication credential set received from the first user device in response to the authentication credential request. The example method also includes automatically performing, in response to an affirmative indication received from the first user device, a first action for the at least one asset on behalf of the user, wherein performance of the action facilitates owner-generated activity for the asset.
One or more systems, devices, computer program products and/or computer-implemented methods of use provided herein relate to TQFMs for kernel-based sequential data prediction. A system can comprise a memory that can store computer-executable components. The system can further comprise a processor that can execute the computer-executable components stored in the memory, wherein the computer-executable components can comprise a computation component that can use a TQFM to compute a kernel element between two sequences of symbols, on a quantum computer, by respectively processing two input sequences as vectors.
Systems, methods, and computer-readable storage media to exchange using dynamic non-fungible token (DNFT) exchange instruments. One method includes receiving an issuance request, generating a DNFT exchange instrument, dynamically updating the DNFT exchange instrument, and executing an exchange.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
A method performed by retailer computing system includes retrieving identification information for a customer and transmitting the identification information to an issuer computing system. The method includes receiving, from the issuer computing system, a pre-approval message indicating that the customer is pre-approved to open a payment account. The method includes receiving account registration information for opening the payment account from the customer and transmitting the account registration information to the issuer computing system. In response to establishing the payment account for the customer, a payment token for the payment account is automatically provisioned to a mobile wallet associated with the customer.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
Systems, apparatuses, methods, and computer program products are disclosed for utilizing activities of individuals in virtual spaces to supplement information regarding the activities of individuals in the real world in order to determine when and how to engage with an individual. An example method includes training an inference model using historical behavioral data of the individual. The example method further includes establishing a pattern of behavior of the individual, and based on the pattern of behavior, generate actionable steps to be executed for engaging with the individual.
An example system comprises a processor and storage containing instructions for generating: a micro front-end (MFE) registry with domain-specific language conformant micro frontends; a first channel control plane UI extension to display certain micro frontends; and a second similar extension; a control messaging module to communicate micro frontends between the registry and the first extension while obtaining user contexts; and one or more federated experience engines to select micro frontends for the second extension based on the obtained user contexts.
This disclosure describes techniques for application health monitoring using distributed ledger technology in a computing system that includes a plurality of nodes providing application services. For example, the techniques include obtaining health indicators of a particular application service by a computing system. The computing system causes a consensus system that includes a particular node executing the particular application service to vote and verify the status of the node. Based on the verification of the status of the particular node, the consensus system writes an entry to a distributed ledger regarding the status of the particular node. The computing system reads the entry of the distributed ledger and generates a ticket based on the entry. The computing system adds the ticket to a network queue for broadcasting within the computing system.
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference
H04L 41/0893 - Assignment of logical groups to network elements
34.
SYSTEMS AND METHODS FOR IMPROVED OPERATIONS WITH GENERATIVE ARTIFICIAL INTELLIGENCE
Systems and methods for improved operations with generative artificial intelligence may include a computing system which identifies a communication metric corresponding to a type of a communication from a device interacting with the computing system. The computing system may extract, from the communication, one or more instructions having a structure according to natural language. The computing system may generate, based on the one or more instructions and the structure, a sentiment metric that indicates a characteristic of the interaction between the device and the computing system. The computing system may select, based on the communication metric and the sentiment metric, a mode of operation of an artificial intelligence circuit of the computing system. The computing system may generate, via the artificial intelligence circuit operating according to the selected mode of operation, one or more responses having the structure based on the one or more instructions.
Methods and systems of exchanging data using payment cards with universal reference numbers are disclosed. A merchant computing system includes a merchant input/output assembly receiving a universal reference number from a customer at a point of sale. A merchant database retrievably stores a plurality of universal reference numbers and customer information associated with each of the plurality of universal reference numbers. A transaction circuit receives the universal reference number from the merchant input/output assembly, retrieves customer information associated with the universal reference number, and provides an output relating to a transaction based on the customer information.
An adaptive skill development and enhancement system is presented for enhancing employee skills and competencies. Data encompassing an employee's skills, education, work history, performance, and aspirations are amassed. A machine learning algorithm analyzes the data, to establish an interpersonal affinity-behavioral matrix for use in identifying a skill gaps against a role-specific competency model. A customized learning experience, adapted to the employee's learning style as determined by the affinity-behavioral matrix, is generated and delivered through a user interface. The user interface collects feedback and performance metrics, which inform ongoing refinements to the learning content, ensuring continual alignment with the employee's development needs.
Systems, apparatuses, methods, and computer program products are disclosed for automatic identification of veteran status. An example method includes extracting user data from a data environment. The example method further includes determining a user attribute set comprising one or more user attributes, each associated with a user data type. The example method further includes generating an aggregated veteran likelihood score based on an analysis of the one or more user attributes. The example method further includes assigning a veteran status classification based on the aggregated veteran likelihood score, and providing a verification prompt requesting the user to verify the assigned veteran status classification.
An example computer system for providing a communication system can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: monitor criteria associated with the computer system; calculate a risk score associated with the communication system; and automatically change networking of the computer system when the risk score exceeds a threshold.
Systems, apparatuses, methods, and computer program products are disclosed for modifying a savings plan based on user data. An example method includes receiving personalized data related to a user, anonymized data related to a group of users, and a savings plan and providing the received data to a generative artificial intelligence (GAI) model. The example method further includes generating, using the GAI model, a plan update recommendation and generating, by scenario circuitry, a counterfactual scenario based on the savings plan and the plan update recommendation, which includes outcome changes based on behavior of the user from the personalized data. The example method further includes presenting the plan update recommendation and the counterfactual scenario to the user and receiving a response. The example method further includes, in an instance in which the user accepts the plan update recommendation, updating the savings plan according to the plan update recommendation.
A method for managing customer information pertaining to an application associated with a provider. The method includes obtaining application information pertaining to the application, the application information including a location of origin for the customer information within the application and a location of termination for the customer information within the application. The method further includes generating a navigable application dashboard including an application mapping field providing a visual graphic depiction of the location of origin of the application and the location of termination of the application. The method further includes displaying, via a graphical user interface, the navigable application dashboard to a user.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Systems, apparatuses, and methods are disclosed for quantum entanglement authentication. An example method performed by a first device includes receiving a first electronic identification of a first subset of a first set of entangled quantum particles and a first number generated based on a second subset of the first set of entangled quantum particles associated with a second device, generating a second number based on the first subset of the first set of entangled quantum particles, generating a first session key based on the first number and the second number, receiving, from the second device, an electronic communication comprising a second session key, the second session key based on a third number and a fourth number, and authenticating a session between the first device and the second device based on the first session key being identical to the second session key.
G06F 21/72 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
G06N 10/00 - Quantum computing, i.e. information processing based on quantum-mechanical phenomena
A method, apparatus, and system of providing a management system for digital platforms are disclosed. The method includes: creating, in response to receiving an indication to enroll in a management platform, a master account, the master account having master login credentials associated therewith; providing a management graphical user interface (GUI) to a user device in response to a login using the master login credentials; creating a subordinate account in response to a first user selection via the management GUI, the subordinate account having subordinate login credentials associated therewith; establishing one or more funding rules for the subordinate account; establishing one or more spending rules for the subordinate account; approving a first in-app purchase (IAP) from the subordinate account; and, providing a dashboard via the management GUI, the dashboard comprising a ledger of transactions, the ledger of transactions comprising the first IAP.
G06Q 20/00 - Payment architectures, schemes or protocols
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
43.
Systems and methods for third party data protection
Systems and methods for protecting user data received by, stored on, and/or requested by third-party computing devices include a data entry computing system on a first network node. A data entry computing system can include a processing circuit that can identify user-entered data as sensitive user data, generate a content encryption key (CEK), generate encrypted user data by encrypting the sensitive user data with the CEK, tag the encrypted user data and the CEK with a tag readable by a database server on a network node different than the data entry computing system, the tag comprising information indicative of the encrypted user data, and transmit the encrypted user data to the database server, wherein the database server excludes a private key of a key manager on a network node different than the data entry computing system.
Systems and methods for anonymizing user data are described herein. A system for anonymizing user data includes a user device. The user device includes a network interface coupled to a processing circuit structured to display a mobile application graphical user interface depicting a field for a log-in credential. The processing circuit is further structured to receive a log-in credential of a user and cross-reference the received log-in credential to authenticate the user. The processing circuit is further configured to generate a unique value void of personally identifiable information regarding the user, determine a current location of the user, and associate the unique value with the current location to create a data packet. The processing circuit further configured to transmit the data packet to the provider computing system to quantify a number of users in a predefined area.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 30/0201 - Market modellingMarket analysisCollecting market data
A system includes a first application programming interface (API) configured to receive an input via a user device to configure a rewards wallet account setting, and a second API configured to request data of the user from a plurality of rewards providers associated with the system, and receive an API response containing the data of the user from the plurality of rewards providers. The system includes a third API configured to convert the data of the user gathered from each of the plurality of rewards providers into a standardized rewards format where the standardized rewards format comprises standardized rewards points, aggregate the standardized rewards points, and allocate the aggregated standardized rewards points to one or more categories based on the rewards wallet account setting.
G06Q 30/0226 - Incentive systems for frequent usage, e.g. frequent flyer miles programs or point systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 30/0207 - Discounts or incentives, e.g. coupons or rebates
Some arrangements relate to a system comprising a memory and one or more processors configured to receive from a first computing system of a depositor over a network, a deposit request corresponding to a first funds. In response to receiving a deposit request, first tokens are generated by tokenizing the first funds. To generate first tokens, a private key is used to create the first tokens, a public key of depositor is used to associate the depositor to the first tokens. The depositor is identified by the public and the first tokens are minted using the private key by executing one or more smart contracts.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
An electronic online system is configured to receive, at the electronic online system, an expression of a use case; determine, using a first machine-learning technique with the expression of the use case as input, a data source to satisfy the use case; determine, using a second machine-learning technique with the expression of the use case and the inference of the first machine-learning technique as inputs, a data destination to satisfy the use case; and construct a data pipeline from the data source to the data destination for the use case.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
Systems, apparatuses, methods, and computer program products are disclosed for automatically updating a veteran profile for a user. An example method includes identifying a veteran attribute data field with a data value associated with an unassigned status within a veteran profile of the user. The example method further includes generating a user input data set comprising data instances extracted from user data using a preprocessing model and determining (a) a candidate data value for the veteran attribute data field, and (b) a confidence score for the candidate data value, using an attribute identification model. The example method further includes updating the veteran profile with the candidate data value as the data value for the veteran attribute data field in an instance in which the confidence score satisfies a confidence score threshold. The example method further includes generating and providing a tailored user recommendation based on the veteran profile.
A mobile device includes a processing circuit having a processor and a memory. The memory stores instructions that, when executed by the processor, cause the processing circuit to receive an inactive payment token associated with a payment card; transmit a proximity notification to an automated teller machine (ATM) when the mobile device is proximate the ATM; receive a notification from the ATM prompting the customer to activate the inactive payment token via the ATM in response to the proximity notification and a determination by the ATM that the inactive payment token is inactive; establish a short-range communication session with the ATM; provide authentication information to the ATM; receive an indication of a change in status of the inactive payment token to active from the ATM based on the customer being authenticated using the authentication information; and update the status of the inactive payment token from inactive to active.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
51.
SYSTEMS AND METHODS FOR SMART CARD MOBILE DEVICE AUTHENTICATION
A method includes: offering, by a circuit of the mobile device, a mobile pay function, receiving, by the circuit, establishing, by the circuit via a near-field communication (NFC) data connection, a wireless communication between the mobile device and a payment card, receiving, by the circuit via the wireless communication, information of a first financial account associated with the payment card, and receiving, via the wireless communication, an authentication code from the payment card. The method includes transmitting, a transaction request for a payment transaction, receiving, by the circuit at, an authentication decision from the computing system based on the authentication request, and enabling, by the circuit, (1) the payment card for use with the mobile pay function of the mobile device to conduct a transaction and (2) an additional financial operation on the mobile device.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A computer-based network system and method for using a payment vehicle having an on and off function. The system comprises a payment vehicle comprising an on and off function to enable or to disable the payment vehicle in the computer-based network for processing an electronic payment transaction, a holder of the payment vehicle, and a computer payment network wherein the computer payment network comprises a transaction engine for enabling or for disabling the payment vehicle at a request of the holder of the payment vehicle.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
G06Q 40/00 - FinanceInsuranceTax strategiesProcessing of corporate or income taxes
53.
MACHINE LEARNING TECHNIQUES TO GENERATE NEGOTIATION DATA DURING COMPUTING SYSTEM ATTACKS
A negotiation evaluation system determines that a target computing system is experiencing a computing system attack. The negotiation evaluation system determines a set of attack characteristics associated with the computing system attack. Based on the set of attack characteristics, a negotiation estimation model generates response value data describing potential responses to the attack. Based on the response value data, a negotiation communication model generates reply text data describing a reply to the computing system attack. The negotiation evaluation system provides the reply text data to a malicious computing system that is associated with the computing system attack.
An electronic online system is configured to receive, at the electronic online system, an expression of a use case; determine, using a machine-learning technique with the expression of the use case as input, a data source and a time-to-live (TTL) value to satisfy the use case; and configure a data cache to store data received from the data source with the TTL value.
This disclosure describes techniques for performing data remediation. In one example, this disclosure describes a method that includes identifying a plurality of stale files; applying a classification model to each of the plurality of stale files; identifying a plurality of unclassified files, wherein each of the unclassified files is one of the plurality of stale files that the classification model was not able to classify with a confidence level that exceeds a threshold confidence level; updating the classification model, over a period of time, to generate an evolved classification model; applying the evolved classification model to each of the unclassified files; identifying a subset of the unclassified files that the evolved classification model was not able to classify with a confidence level that exceeds the threshold confidence level; and deleting each of the files in the subset of the unclassified files.
A system can obtain, based on a first control structure that identifies a content type, a non-fungible token (NFT) linked to a content object corresponding to the content type, encapsulate the NFT within a container having a second control structure that restricts output by the content object linked to the encapsulated NFT, and generate a control token compatible with a third control structure that restricts output by the container to a destination corresponding to the control token, determine by the third control structure that the control token is compatible with the third control structure, and transmit, by the second control structure and based on the determination that the control token is compatible with the third control structure, the output from the content object to the destination.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
57.
Protecting tokenized structures using a protection architecture
Systems, methods, and computer-readable storage media to protect non-fungible tokens (NFTs) using a protection architecture. One method includes protecting the NFT including tracking, utilizing the overlay ledger, an association of NFT ownership of a plurality of NFTs and storing and protecting, utilizing a blockchain storage, the plurality of NFTs. The method further includes receiving an exchange request and exchanging the NFT on us including determining the customers have an NFT account with the overlay ledger and executing an on-us exchange based on updating the overlay ledger.
An example computer system for provisioning data can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to create: a marketplace programmed to provide a plurality of application programming interfaces (APIs) for available data sources, the APIs being subscribable for client devices; and an authentication engine programmed to control access by the client devices to the APIs in the marketplace.
A method may include presenting a goal creation user interface on a client device to a user including: a label input element configured to receive an identifier for a goal; a total amount input element configured to receive a total amount of the goal; and a milestone input element configured to receive a milestone amount that is less than the total amount; generating a goal data structure based on values of the label input element, input element, and the milestone input; matching a sponsor identifier to the goal data structure; updating the goal data structure to include the sponsor identifier; presenting a goal status user interface, the goal status user interface including a graphic associated with the sponsor identifier; receiving an indication that the milestone amount has been reached; and updating the goal status user interface to include a link to an award associated with the sponsor identifier.
Aspects of the present disclosure include methods for retrieving a loan data stored in a first data store containing commercial and industrial (C&I) loan data, commercial real estate (CRE) loan data, off-balance sheet (OBS) loan data, commitment to issue a commitment (CTC) loan data, or a combination thereof. The methods additionally include retrieving, from a second data store, a set of configurable business rules, and selecting, via a loan validation tool (LVT) system executable via one or more processors, one or more configurable business rules from the set of configurable business rules based on characteristics of the retrieved loan data. The methods further include applying, via the LVT system, the selected configurable business rules to the loan data to validate the loan data, and generating a loan validation result, wherein the configurable business rules are updatable in the second data store without interruption to operations of the LVT system.
A device linked session connects the entity, whether device, application, or other, to a request for a session token. In subsequent uses of the token, the device identity is checked to avoid a token being used by an entity that did not request the token.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
Systems, methods, and apparatuses for providing a customer a central location to manage permissions provided to third-parties and devices to access and use customer information maintained by a financial institution are described. The central location serves as a central portal where a customer of the financial institution can manage all access to account information and personal information stored at the financial institution. Accordingly, the customer does not need to log into each individual third-party system or customer device to manage previously provided access to the customer information or to provision new access to the customer information. A user additionally is able to have user data and/or third-party accounts of the user deleted from devices, applications, and third-party systems via a central portal.
G06F 3/04817 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06F 3/04842 - Selection of displayed objects or displayed text elements
G06F 16/215 - Improving data qualityData cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
Systems, methods and computer-readable storage media utilized to create and perform an automated escrow contract on a distributed ledger network. One method comprises creating, by a first user of the distributed ledger network, the automated escrow contract on the distributed ledger network by providing contract information specifying an offer. The method further comprises accepting, by a second user of the distributed ledger network, the offer by providing a payment amount of a digital currency unit to the automated escrow contract on the distributed ledger network. The method further comprises confirming, by the second user, that the automated escrow contract has been completed. The method further comprises releasing, by the automated escrow contract, the payment amount of the digital currency unit from the second user to the first user.
A system and method for card control includes a card control computing system configured to enforce a card control rule based upon transactions made with a payment card. The card control computing system includes a memory unit configured to store information associated with a card control dashboard, and a processing unit configured to cause presentation of the card control dashboard via a display associated with a remote computing device, such that the card control dashboard is associated with the payment card and the card control rule. The card control dashboard includes a user interface. The processing unit is further configured to receive an input via the user interface to activate or deactivate one or more features associated with the card control rule, and trigger the card control rule based upon the one or more features that are activated or deactivated.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
Systems, apparatuses, methods, and computer program products are disclosed for a personalized merchant identifier. An example method includes receiving, by communications hardware, a set of transaction data elements, wherein the set of transaction data elements include an indication of a payment type or a merchant and deriving, by a personalization engine, a set of merchant data elements from the set of transaction data elements. The example method further includes receiving, by the communications hardware and from a user, one or more payment accessibility parameters and comparing, by the personalization engine, the one or more payment accessibility parameters to the set of merchant data elements to identify one or more compliant merchants, wherein the one or more compliant merchants comply with the one or more payment accessibility parameters. The example method further includes performing, by a notification circuitry and based on the one or more compliant merchants, an action.
A computing system includes a processing circuit configured to obtain user activity data pertaining to a plurality of users enrolled in a service provided by a first provider, identify a first plurality of accounts for which one or more first users have with the first provider and a second plurality of accounts for which one or more second users have with one or more second providers, generate a plurality of datasets, identify a first set of accounts that exceed a predetermined threshold and a second set of accounts within the predetermined threshold, generate a plurality of changes to the predetermined criteria to adjust at least one of a number of accounts included in the first set of accounts or a number of accounts included in the second set of accounts, and generate and present a graphical user interface (GUI) including a plurality of elements to indicate the plurality of changes.
Disclosed are example methods, systems, and devices that allow for executing machine-learning models for real-time and secure analysis of digital metrics. The techniques include generating metrics for identity elements stored in digital profiles of users. A subset of profiles can be identified that have metrics that fall below a predetermined thresholds, with which a training dataset can be generated. Machine-learning models can be executed over the training dataset to train an artificial intelligence agent that receives digital profiles as input and outputs translational elements corresponding to identity elements in the digital profiles. After training, additional profiles can be input to the machine-learning models of the artificial intelligence agent to identify a second subset of digital profiles with corresponding metrics. Electronic messages corresponding to the second subset can be generated and transmitted to one or more computing devices identified in the second subset of digital profiles.
Various embodiments described herein relate to systems, methods, and non-transitory computer-readable media structured to perform server-to-device secure data exchange using a device access token. In an embodiment, a smart device receives, from a requestor entity provided to the smart device, an account data provisioning request for an account. Based on the account data provisioning request, an account identifier for the account is determined. In some arrangements, the account identifier comprises or is associated with a device access token. Based on the device access token, a data element associated with the account is determined. In some embodiments, the data element is accessible to the requestor entity only if it is not access-restricted based on the device access token. Based on the data element, an executable graphic rendering instruction is generated. The executable graphic rendering instruction is executed, which includes generating and displaying, on a user interface of the smart device, a dynamic account status indicator relating to the account.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04L 67/133 - Protocols for remote procedure calls [RPC]
Quality associated with an interpretation of data captured as unstructured data can be determined. Attributes can be identified within the unstructured data automatically. Subsequently, sentiment associated with each of the attributes can be determined based on the unstructured data. Correctness of the unstructured data, and thus the interpretation, can be assessed based on a comparison of the attribute and associated sentiment with structured data. A quality score can be generated that captures the quality of the data interpretation in terms of correctness and as well as results of another analysis including completeness, among others. Comparison of the quality score to a threshold can dictate whether or not the interpretation is subject to further review.
G06Q 40/00 - FinanceInsuranceTax strategiesProcessing of corporate or income taxes
G06V 10/70 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06V 10/778 - Active pattern-learning, e.g. online learning of image or video features
A device includes a processor coupled to a memory that stores instructions that when executed by the processor cause the processor to provide access to at least one of a product or a service via a digital channel; provide initial information to an authorizer via the digital channel; receive an enrollment token, the enrollment token including identifying information that identifies the device and defining a level of authorization with respect to the digital channel utilized by the device; provide the enrollment token to an institution computing system associated with an institution; and access a product or service provided by the institution based on the level of authorization defined by the enrollment token.
Disclosed are example methods, systems, and devices that allow for secure generation of authentication datasets from network activity. The techniques include accessing secured data sources to generate a first dataset of secured data, and extracting information from one or more unsecured data sources to generate a second dataset comprising a second dataset. A third set of data elements can be generated from the first and second datasets, and may be utilized to authenticate credentials that can be utilized to access secured data via a network. The techniques can transmit indications that credentials are invalid if the credentials fail to satisfy aspects of the third dataset.
Systems and methods may generally be used to authenticate user credentials. An example method may include using a personal identifier and a stored base derivation key to generate an initial key value, generating a current key value using an initial key value and a counter, determining a decryption key from the current key value and decrypting an encrypted secret value using the decryption key to identify a password. The method may include generating a password check value using the current key value and the device identifier, and determining whether to authenticate the user device based on whether the password check value indicates that the password is valid.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
73.
Display screen or portion thereof with graphical user interface
This disclosure describes techniques for maintaining and using a warehouse of data about potential or actual cyberattack threats for an industry. In one example, this disclosure describes a method that includes outputting, by a computing system operated by a first entity and to a data warehouse, information about activity within a first network operated by the first entity; receiving, by the computing system and from the data warehouse, information about attributes of a peer attack directed to a second network operated by a second entity, wherein the first entity and the second entity may be marketplace competitors; applying, by the computing system, a model to identify a network asset included within the first network that is vulnerable to an attack having the attributes of the peer attack; and outputting, by the computing system and to the network asset, a control signal to modify the operation of the network asset.
A method may include receiving, from a computing device associated with a first user, an electronic request to delegate an electronic access right of an account of a user profile of the first user to a second user, the electronic request including an identifier of the second user; querying, using a processing unit, a database using the identifier of the second user; determining, using the processing unit, that the identifier of the second user is not present in the database based on a result of the querying; and as a result of the determining: generating, using the processing unit, a limited purpose user profile in the database for the second user; and establishing a digital link, using the processing unit, between the limited purpose user profile and the account of the first user in the database, the digital link identifying the electronic access right from the electronic request.
An example computing system includes: a memory storing a plurality of data assets; and a processing system of an enterprise, the processing system comprising one or more processors implemented in circuitry, the processing system being configured to: maintain a plurality of data domains, each of the data domains being managed by an executive of the enterprise, and each of the domains having one or more subdomains; maintain the one or more subdomains of each of the plurality of data domains, each of the plurality of data domains being associated with one or more data use cases, one or more data sources, and one or more risk accessible units; and track defects of the data assets in each of the plurality of data domains.
This disclosure describes techniques that include evaluating websites and web services to identify those that are at risk for a denial-of-service attack or a distributed denial-of-service attack. In one example, this disclosure describes a method that includes interacting, by an assessment computing system, with a target computing system, wherein interacting includes issuing a plurality of requests to the target computing system and receiving a plurality of responses to the plurality of requests; identifying, by the assessment computing system and based on the plurality of responses, a plurality of latency values that are attributable to processing performed by the target computing system; and determining, by the assessment computing system and based on the plurality of latency values, whether the target computing system is vulnerable to a denial-of-service attack.
Determining job postings posted by one entity of an enterprise that are re-classifiable with respect to another entity of the enterprise. Computer systems and/or computer implemented methods use one or more reclassification analyses to compare an enterprise's active job postings with operations descriptions of entities of the job postings other than the entity that posted the job posting. A report and/or an alert can be generated when there is sufficient overlap between a job posting and an entity that did not post the job posting, indicating that the job posting is likely re-classifiable.
An example computing system includes a memory storing a plurality of data assets; and a processing system of an enterprise, the processing system comprising one or more processors implemented in circuitry, the processing system being configured to: process one or more layers of a business intelligence stack to determine access events by system accounts to the data assets; generate data summarizing uses of the data assets according to the access events; and output report data representing the data summarizing the uses of the data assets.
Systems, methods, and apparatuses for providing a customer a central location to manage permissions provided to third-parties and devices to access and use customer information maintained by a financial institution are described. The central location serves as a central portal where a customer of the financial institution can manage all access to account information and personal information stored at the financial institution. Accordingly, the customer does not need to log into each individual third-party system or customer device to manage previously provided access to the customer information or to provision new access to the customer information.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
A system includes at least one processing circuit including at least one memory storing instructions therein that are executable by one or more processors to: obtain, via a first user interface, a query associated with a profile of a user, the first user interface configured to present an output corresponding to a first format; generate, based on the query and first data corresponding to the profile of the user, second data as a response to the query; select, according to a determination that a structure of the second data satisfies a heuristic corresponding to a second format, a second user interface configured to present an output corresponding to the selected second format; and cause the second user interface to present an output in the selected second format corresponding to at least a portion of the second data.
Systems and methods for a server probe to monitor compliance of servers with predetermined baseline metrics including: injecting a server probe script into one or more servers, wherein the server probe script is configured to: scan the one or more servers for operational health data; collect operational health data of the one or more servers; and comparing the operational health data to baseline data associated with a predetermined compliance baseline state for the one or more servers; and identifying based on the comparison, one or more non-compliant servers.
Systems, apparatuses, methods, and computer program products are disclosed for dynamic query optimization. An example method includes receiving, by communications hardware, a first query and determining, by a query analysis engine, whether the first query corresponds to a stored query of a historical query repository. The method also includes determining, in response to determining that the first query does not correspond to the stored query, determining, by the query analysis engine, a parameter set indicating a current state associated with a system involved in an execution of the first query, processing, by a reinforcement learning engine, the first query and the parameter set in accordance with a plurality of policies, selecting, by the reinforcement learning engine and based on the processing, a first policy from the plurality of policies, and generating, by the reinforcement learning engine and based on the first policy, a query execution plan for the first query.
Systems, apparatuses, methods, and computer program products are disclosed for disclosure validation. A method includes determining an applicability status for digital content indicating whether a required disclosure applies to the digital content, and determining a disclosure inclusion status for the digital content indicating whether the digital content includes a candidate disclosure. The method also includes, in response to determining a disclosure inclusion status that indicates that the digital content includes the candidate disclosure, determining a conformity status for the digital content that indicates whether the candidate disclosure conforms to a set of styling requirements, determining a digital content status for the digital content based on at least one of the applicability status, the disclosure inclusion status, and the conformity status, and causing presentation of the digital content status.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
Systems, methods, and computer-readable storage medium for managing tokens are provided. A method includes: receiving, by a token management system from a user device, a token command from a user associated with a target token; determining, by the token management system, an entity of a plurality of entities associated with the target token, where each of the plurality of entities is associated with a separate entity computing system that stores at least one token of a plurality of tokens, and where each of the plurality of tokens is registered with the token management system and associated with the user, in response to determining the target token is managed by the entity, transmitting, by the token management system, the token command to an entity computing system of the entity; and receiving and storing, by the token management system, an updated token from the entity computing system based on the token command.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
A method for processing requests to consolidate loans includes receiving, from one or more third party electronic computing devices, information regarding outstanding loans for a user that are issued by one or more third party lenders. The information is sent to a user electronic computing device. A selection is received of loans the user wishes to refinance or consolidate. A benefits analysis is performed for the loans. Based on the benefits analysis, a determination is made of whether any of the outstanding loans can be consolidated, and whether any of the loans are excluded from being consolidated. Consolidated loan information is sent to the user electronic computing device regarding a consolidated loan for any of the loans that can be consolidated. Exclusion information is sent to the user electronic computing device regarding any of the loans that are excluded from being consolidated.
Systems, apparatuses, methods, and computer program products are disclosed for processing third-party communications. In particular, a method includes: receiving, by communications hardware, a message to be transmitted to a message target device; determining, by a verification engine, that the message is legitimate; appending, by a badge generation engine, a verification badge to the message to obtain a verified message; and transmitting, by an in-application (in-app) messaging engine and via a secured in-app messaging channel, the verified message to the message target device to be displayed on the message target device via an application executing on the message target device.
Systems, apparatuses, methods, and computer program products are disclosed for using aggregated housing data to provide personalized home improvement recommendations. An example method includes receiving, by communications hardware, information regarding a target property associated with a user and aggregating, by the communications hardware, supplementary housing data. The example method further includes determining, by an improvement recommendation engine, an insight regarding the target property based on the information regarding the target property and the supplementary housing data and generating, by the improvement recommendation engine and based on the insight, a home improvement recommendation. The example method further includes storing, by the improvement recommendation engine, the home improvement recommendation in a home repair profile and transmitting, by the communications hardware and based on the home improvement recommendation, a home repair notification to a user device.
Systems, apparatuses, methods, and computer program products are disclosed for rental optimization of real estate. An example method includes detecting, by an event monitoring engine, an occurrence of a trigger event. The example method further includes defining, by the event monitoring engine and based on a trigger event attribute set, an area of interest, and identifying, by a prospect engine, a rentable unit within the area of interest that corresponds to a trigger event type attribute. The example method further includes generating, by the prospect engine and based on the trigger event attribute set, a rental price prediction for the rentable unit, if the rental price prediction satisfies a predefined rental price threshold, generating, by the prospect engine, a personalized rental recommendation for the rentable unit, and outputting, by communications hardware, a rental prompt based on the personalized rental recommendation.
Systems, methods, and apparatuses for providing a customer a central location to manage permissions provided to third-parties and devices to access and use customer information maintained by a financial institution are described. The central location serves as a central portal where a customer of the financial institution can manage all access to account information and personal information stored at the financial institution. Accordingly, the customer does not need to log into each individual third-party system or customer device to manage previously provided access to the customer information or to provision new access to the customer information. A user additionally is able to have user data and third-party accounts of the user deleted from devices, applications, and third-party systems via a central portal. Restrictions on how user data is used by devices, applications, and third-party systems can be imposed via a central portal.
G06F 3/04817 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06F 3/04842 - Selection of displayed objects or displayed text elements
G06F 16/215 - Improving data qualityData cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
This disclosure is directed to integrating unaffiliated applications, or the processes and/or subsystems (e.g., application interfaces) of unaffiliated applications, with client applications to enable the client applications to provide new capabilities not otherwise available through the client application. The disclosed approach allows users to access new functionality within the operating environment of the client application, without accessing unaffiliated applications and undergoing separate authentication and data exchange with each unaffiliated application. Functionality of an unaffiliated application can be integrated by, for example, incorporating such processes and subsystems as interactive user interfaces, widgets, applets, plugins, etc., of unaffiliated applications.
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 16/25 - Integrating or interfacing systems involving database management systems
A computing system may be configured to maintain virtual accounts or stashes for designated purchases or goals on top of underlying accounts. The computing system may enable funds to be auto-transferred from other accounts to virtual accounts. The computing systems may also recommend amounts to transfer into a virtual account. For example, a virtual account/stash for taxes may be auto-funded to cover predicted taxes for a small business. Recommendations for new virtual accounts/stashes may be made for future purchases and the like. Vendor offers, such as coupons relevant to the user, may also be provided to users of the virtual accounts based on the user's interactions with the system.
Systems, methods, and computer-readable storage media for performance indicator operations are disclosed. One method includes identifying user activity data and one or more performance indicators of a user, and modeling the user activity data to generate one or more performance products including a plurality of performance parameters corresponding to a future performance indicator of the user. The method further includes generating and presenting a graphical user interface (GUI) including one or more actionable events associated with the plurality of performance parameters, and monitoring the user activity data and the one or more performance indicators of the user based on receiving new activity data corresponding to the future performance indicator from a user data source. The method further includes presenting one or more content items on the GUI including an indication of whether the user satisfies the plurality of performance parameters of the one or more performance products.
A visualization generation computing system generates a visualization data object based on a relationship among multiple portions of resource data, which describes a resource that can be allocated. The visualization data object at least one visualization component that indicates the relationship among the portions of resource data. A user device provides the visualization component via a user interface. The visualization generation computing system receives, from the user device, modification input data that describes an adjusted presentation of the visualization component. Based on the adjusted presentation, the visualization generation computing system determines a modified relationship among the portions of resource data. The visualization generation computing system modifies the visualization data object to include a modified visualization component that describes the modified relationship. In some cases, the visualization generation computing system modifies the portions of resource data based on the modified relationship described by the adjusted presentation.
Systems and techniques for automated generation of Java unit tests, in the context of testing a code base for a financial transaction software application, are described. An example method for automated generation of Java unit tests includes: identifying default values used in Java source code of a financial transaction software application that is programmed and capable to perform batch processing of a plurality of financial transactions; identifying classes in the Java source code that are invoked by the financial transaction software application, as invoked during the batch processing; generating mock classes for the identified classes that are invoked; creating unit tests to perform unit testing of the identified classes that are invoked, the unit tests configured to invoke the mock classes and use the default values for unit testing of the identified classes; and outputting the unit tests (and optionally, executing the unit tests).
A system comprises a memory and one or more processors in communication with the memory. The one or more processors may be configured to obtain information associated with one or more authorized file changes and store the information associated with one or more authorized file changes in a first index. The processors may be further configured to obtain one or more file change events and enrich the one or more file change events with the information associated with one or more authorized file changes from the first index. The processors may also be configured to store the one or more file change events enriched with the information associated with one or more authorized file changes in a second index, and based on the enriched data stored in the second index, output an indication that the one or more file change events are false positives.
System, apparatus, and computer program products are disclosed for protected display of a requested user interface. In one aspect, a method includes receiving a protected mode display request to display the requested user interface in a protected mode, wherein the requested user interface comprises a plurality of data values; in response to the protected mode display request: (i) retrieving a data protection template for the protected mode display request, (ii) determining, based on the data protection template, one or more protected data values of the plurality of data values and one or more unprotected data values of the plurality of data values, (iii) for each protected data value, generating a masked representation, and (iv) generating a masked user interface that comprises: (a) each unprotected data value, and (b) each masked data value; and causing the masked user interface to be presented using a display device.
A method of authenticating a smart card for a mobile pay function of a mobile device using a smart card is disclosed. The method includes: offering, by a mobile pay circuit of the mobile device, a mobile pay function; receiving, by the mobile pay circuit, an affirmative user input to enable the mobile pay function; wirelessly receiving, by a contactless logic of the mobile device, an authentication code from a smart card, wherein the authentication code includes identifying customer information; automatically populating, by the mobile pay circuit, one or more fields of a graphical user interface provided by the mobile pay circuit with the received identifying customer information; authenticating, by the mobile pay circuit, the smart card using the authentication code; and, enabling, by the mobile pay circuit, the mobile pay function with the smart card upon authenticating the smart card.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
99.
Systems and methods for developing an optimized debt service strategy utilizing products across multiple categories
Systems, apparatuses, methods, and computer program products are disclosed for developing an optimized debt service strategy solution utilizing products across multiple product categories. An example method includes receiving, by communications hardware, a user dataset. The example method also includes processing, by surrogate modeling circuitry, the user dataset using a plurality of surrogate models. The example method also includes generating, by the surrogate modeling circuitry and based on the processing of the user dataset, a parameter estimation set. The example method also includes determining, by optimizer modeling circuitry and based on the user dataset and the parameter estimation set, at least one debt service strategy solution comprising at least one product of a first product category from a plurality of products associated with multiple product categories. The example method also includes causing presentation, by communications hardware, of the at least one debt service strategy solution.
Systems and methods for establishing a secure and private local network with a block chain record are disclosed. One disclosed method includes establishing a network connection between a first device, second device, and third device. The method includes configuring a local network in communication with the first device, second device, and third device and establishing a block chain between the first, second, and third devices. The first, second, and third devices are nodes of the block chain and execute consensus protocols to maintain consistency of the block chain. Messages sent between the devices on the local network are stored in the block chain and when the local network is disbanded, the devices upload the block chain to a cloud repository.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists