METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR VALIDATING ELECTRONIC DISTRIBUTION TRANSACTIONS AND REDUCING NON-COMPLIANT ELECTRONIC DISTRIBUTION TRANSACTIONS
A method, apparatus and computer program product are provided for validating electronic distribution transactions and reducing non-compliant electronic distribution transactions. A distribution application enables users to enter details relating to a retirement account distribution. A tax service integrated with the distribution application provides scenario-specific tax withholding information, and enforces relevant tax withholding rules. A user provides withholding information and the system ensures compliance by validating the transaction against the withholding rules. The system displays to the user error that need to be corrected, and a breakdown of the proceeds from the transaction. The tax service is implemented remotely from the distribution application so that changing tax regulations may be implemented into the tax service without impacting the distribution application. The tax service may utilize a customer's state of residence, age (and/or date of birth), and citizenship status such that state tax withholding information and validation, and requirement minimum distribution rules.
Systems, apparatuses, methods, and computer program products are disclosed for compiling AI system outputs into unified responses. An example method includes receiving response data that is representative of one or more AI system outputs. The example method further includes identifying a task request associated with the response data. The example method further includes generating a unified response associated with the task request. The example method further includes causing transmission of the unified response to a user device associated with the task request. The example method may further include determining an AI system server that transmitted the response data.
Systems and methods for servicing an ATM may include maintaining, by one or more processors, a machine learning model trained to determine one or more actions corresponding to automated teller machines (ATMs), receiving, by the one or more processors, an error code corresponding to an ATM, determining, by the one or more processors, a service history associated with the ATM, applying, by the one or more processors as an input, data corresponding to the service history and the error code to the machine learning model, to determine one or more actions for responding to the error code corresponding to the ATM, and providing, by the one or more processors, the one or more actions for rendering on a user interface, to facilitate servicing the ATM.
Systems and methods may generally be used to automatically curate a blocklist of internet protocol (IP) addresses. An example method may include using risk factor scores for a particular IP address that was blocked by a traffic control component to determine whether to add the particular IP address to a blocklist. The example method may include, in response to a determination to add the particular IP address to the blocklist, generating an IP address entry in the blocklist for the particular IP address, the IP address entry optionally including a corresponding time-based expiration. The example method may include outputting the blocklist or the IP address entry, such as in response to a request from a firewall.
Various systems and methods for providing a gamification of bequests are described herein. An online system for managing beneficiaries and assets of a will is configured to present a conditional bequest to a user, the conditional bequest presented in a user interface on a device operated by the user, the user interface including gaming elements, and the conditional bequest comprising a task to be completed by the user and a gift to be given to the user after completion of the task; receive a notification that the user has completed the task; and initiate transfer of the gift to the user in response to confirming that the user has completed the task.
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
6.
ADVANCED MACHINE LEARNING METHODS FOR ENHANCED CALL TRANSCRIPT ANNOTATION AND TARGETED ANALYTICS REPORT GENERATION
Systems, apparatuses, methods, and computer program products are disclosed for providing a targeted analytics report. An example method includes receiving a call transcript, wherein the call transcript is associated with transcript metadata. The example method further includes determining one or more annotations for the call transcript. The example method further includes annotating the call transcript with the one or more annotations. The example method further includes storing the annotated call transcript in a history recorder repository. The example method further includes identifying an analytics inquiry comprising one or more attributes of interest, wherein an attribute of interest corresponds to one or more annotations. The example method further includes selecting one or more annotated call transcripts based on the one or more attributes of interest. The example method further includes generating a targeted analytics report based on the selected one or more annotated call transcripts, and providing the targeted analytics report.
G06F 40/58 - Use of machine translation, e.g. for multi-lingual retrieval, for server-side translation for client devices or for real-time translation
G06F 18/2415 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on parametric or probabilistic models, e.g. based on likelihood ratio or false acceptance rate versus a false rejection rate
G06F 40/169 - Annotation, e.g. comment data or footnotes
H04M 3/42 - Systems providing special services or facilities to subscribers
7.
PRACTICAL ITEMIZED ENCRYPTION FOR CRYPTOGRAPHIC ERASURE (PIECE)
The arrangements disclosed herein relate to systems, apparatus, methods, and non-transitory computer readable media for determining to erase a plurality of ciphertext blocks stored in a memory device, in response to determining to erase the plurality of ciphertext blocks, performing a cryptographic erasure of the plurality of ciphertext blocks. The cryptographic erasure includes encrypting each of the plurality of ciphertext blocks with a random key and destroying the random key in response to encrypting each of the plurality of ciphertext blocks.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
Systems, apparatuses, methods, and computer program products are disclosed for routing task request to one or more AI systems. An example method includes receiving a subtask request that is representative of instructions to execute an actionable subtask. The example method further includes determining computational capabilities associated with one or more AI systems. The example method further includes matching the subtask request with a target AI system of the one or more AI systems. The example method further includes causing transmission of the subtask request to the target AI system. The example method may further include determining an intelligent or optimized routing for the subtask request based on the computational capabilities of the one or more AI systems and the particular content or type of a subtask request.
Systems and methods are described herein for a tiered-based information provision. Such systems and methods may include authenticating a first user of a plurality of users configured to access a data exchange platform and retrieving a profile associated with the first user including an initial tier. The system receives first data supplied by the first user and stores the first data in a data structure communicatively coupled to the data exchange platform. After receiving and storing the first data, the system determines a score for the first data according to existing data in the data structure. Based on the score, the system determines an updated tier assigned to the profile associated with the first user. The system transmits second data to the first user, the second data including data received from a subset of users from the plurality of users that correspond to the updated tier.
Systems, apparatuses, methods, and computer program products are disclosed for generating a user preference digital profile for a user. An example method includes determining one or more user preference parameter values for one or more user preference parameters for the user and generating the user preference digital profile for the user. The example method further includes assigning a sharing category to the one or more user preference parameter values in the user preference digital profile and storing the user preference digital profile in a digital identity management repository.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
11.
SYSTEMS AND METHODS FOR GENERATING A BLENDED USER BIOSIGNATURE USING MULTIMODAL AI
Systems, apparatuses, methods, and computer program products are disclosed for generation of a user biosignature. An example method includes extracting user data from a data environment, wherein the user data is associated with a user. The example method further includes analyzing the user data, wherein the user data comprises one or more data types, wherein the one or more data types comprise at least metadata and biometric data. The example method further includes determining a character classification associated with each of the one or more data types based on the analyzed user data, wherein the character classification comprises a primary character classification and a secondary character classification. The example method further includes generating a user biosignature based on the determined character classification, and outputting the generated user biosignature.
Disclosed are example methods, systems, and devices for sensor data processing for monitoring devices. These techniques include receiving scan data from a computing device that corresponds to a scan by an imaging device and analyzing the scan data to determine that the scan data corresponds to a manufactured article. An indication can be transmitted with a request for audiovisual data corresponding to an operation of the manufactured article, and the audiovisual data can be received from an imaging device or a microphone of the computing device. A sound sample corresponding to the operation of the manufactured article is extracted, and a status metric for the article is generated based on a comparison of the sound sample to a sound signature in an identity profile of the manufactured article. The status of the manufactured article can then be determined.
G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
G06V 10/94 - Hardware or software architectures specially adapted for image or video understanding
G10L 25/03 - Speech or voice analysis techniques not restricted to a single one of groups characterised by the type of extracted parameters
13.
SYSTEMS AND METHODS FOR EVALUATING INTERFACE CONTENT USING A MACHINE LEARNING FRAMEWORK
Systems, apparatuses, methods, and computer program products are disclosed for evaluating interface content for a user population. An example method includes receiving the interface content comprising one or more interface content components. The example method further include determining a user population of interest and selecting an evaluation model framework based on the user population of interest. The example method further includes determining an accessibility score for the interface content based on the one or more interface content components using the evaluation model framework and determining whether the accessibility score satisfies an accessibility score threshold. The example method further includes providing an interface content evaluation report.
A computer system includes one or more processors and machine readable storage media coupled to the one or more processors having instructions stored therein that cause the computer system to: receive a payment request packet from an Internet of Things (IoT) device; extract a signature of the payment request packet that includes metadata; identify a firmware update status from the metadata of the signature; determine that the IoT device has a first version of the firmware installed on the IoT device based on the firmware update status; cause a second version of the firmware to be installed on the IoT device in response to determining the IoT device has the first version of the firmware; and initiate a transaction based on the payment request packet responsive to the second version of the firmware being installed on the IoT device.
G06F 8/654 - Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories
G06F 8/71 - Version control Configuration management
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
15.
RESOURCE ALLOCATION DASHBOARD AND OPTIMIZATION GENERATOR
Disclosed in some examples are methods, systems, devices, and machine-readable mediums for resource allocation optimization systems that provide one or more interfaces that display an entity's resource allocation data from multiple sources in a single interface. Also disclosed in some examples are resource allocation optimization systems which provide resource allocation adjustments for an entity to optimize resources toward a resource optimization goal. The resource allocation optimization system groups similar entities using rule-based or artificial intelligence algorithms acting upon entity description data (including in some examples, resource allocation data) obtained from the entity and/or from external network-based services. The resource allocation optimization system uses resource allocation data of entities within a group to provide resource allocation adjustments to entities within the group via improved user interfaces. The resource allocation adjustments are selected to meet one or more resource optimization goals.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
The present disclosure is directed to systems, methods, and non-transitory computer-readable media including receiving, by a Time Stamp Authority (TSA) computing system from a requestor computing system, hashed data corresponding to original data, generating, by the TSA, a Time Stamp Token (TST) for the hashed data, publishing, by the TSA, the TST to a blockchain, and sending, by the TSA to the requestor computing system, the TST.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
17.
Systems and methods for issuing blockchain tokens for property rights
Systems, methods, and computer program products are disclosed for issuing one or more blockchain tokens for property rights. An example method includes receiving an indication of user input including attributes of a property and, and generating a primary blockchain token, where the primary blockchain token includes metadata that correspond to the attributes of the property. The example method further includes broadcasting, over a blockchain network, a transfer of the primary blockchain token to the primary party, and generating one or more secondary blockchain tokens, where each of the one or more secondary blockchain tokens includes respective secondary metadata that correspond to unique subdivided property rights regarding the property, where the secondary metadata include a link to the primary blockchain token. The example method further includes broadcasting, over the blockchain network, transfer of the one or more secondary blockchain tokens to one or more secondary parties.
A method includes determining activity information of a first avatar of a first user. The activity information includes a plurality of activities performed by the first avatar in a virtual environment. The method further includes matching the plurality of activities to one or more representative attributes based on a mapping between a plurality of predetermined activities in the virtual environment and a plurality of attributes. The method further includes generating a second avatar based on the first avatar. The second avatar and the one or more first attributes are mapped to first virtual assets of the first user. The method further includes generating a virtual transfer space within the virtual environment, authorizing a third avatar of a second user to enter the virtual transfer space, displaying the second avatar in the virtual transfer space, and transferring the first virtual assets of the first user to the second user.
G06F 3/04815 - Interaction with a metaphor-based environment or interaction object displayed as three-dimensional, e.g. changing the user viewpoint with respect to the environment or object
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
G06Q 40/04 - Trading Exchange, e.g. stocks, commodities, derivatives or currency exchange
A method for distributing user data and permission settings is provided. The method includes receiving user inputs that identify at least one experience provider for data sharing and at least one data sharing preference of the user, configuring a rules engine of the platform computing system with rules based on the user inputs where the rules engine is configured to apply rules to implement data sharing preferences of the user, receiving a request for data of the user, transmitting the request for data of the user, receiving the applicable data of the user, providing the applicable data of the user, determining an amount of funds due to the user, and crediting an account associated with the user in the amount of the funds due to the user.
A system includes a processing circuit configured to generate location data relating to a person associated with transaction data where the location data is associated with a location, receive the transaction data relating to the person where the transaction data corresponds to historical transactions of the person, generate merchant match data based on the location data and the transaction data where the merchant match data indicates a merchant within a distance threshold of the location and being associated with at least one of the historical transactions, and generate and provide a notification interface based on the merchant match data to a graphical user interface of a user device where the notification interface comprises an interactive element associated with the at least one of the historical transactions related to the merchant.
A system includes a processing circuit configured to receive an input from a user device associated with a user during an interaction with a virtual assistant executed by the processing circuit. The processing circuit is further configured to determine a classification associated with the input, identify a prior user interaction with a virtual assistant associated with the classification, determine a prior resolution including an action available to the user based on the prior user interaction, determine if the action satisfies a threshold, and generate and provide an output corresponding to the prior resolution via the user device.
A computer system and method for managing security vulnerabilities in software development, including initializing a review process during application workload development, including scanning of application workload components to detect security vulnerabilities, and assessing a likelihood of the identified vulnerabilities being false positives through an analysis involving their characteristics and historical data on similar issues. Based on the review process, the system can retrieve precedent decisions on similar vulnerabilities from a historical database, and determine an automated disposition action for each identified vulnerability, streamlining the vulnerability management process within the software development lifecycle.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
23.
Systems and Methods for Customer-Specific Content Delivery via ATM
Systems and methods for customer-specific content delivery via an automated teller machine (ATM) may include one or more server(s) which receive, from an ATM, data indicative of a user profile corresponding to a user of the ATM, the user performing a transaction via the ATM; identify a transaction history associated with the user profile; determine, via one or more first machine learning models hosted on the one or more servers, a context corresponding to at least one transaction of the transaction history; generate, via one or more second machine learning models, a content item according to the context determined by the one or more first machine learning models; and transmit the content item for display by the ATM to the user, the ATM displaying the content item for at least a portion of a duration in which the transaction is performed via the ATM.
G07F 19/00 - Complete banking systemsCoded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
Systems and methods are described herein for generating data analytics and implementing payoff plans. Such systems and methods may use an institution computing system to retrieve, from an application programming interface (API), first data relating to an input of a first entity. The system retrieves second data relating to the input from one or more second APIs. After receiving the first data and the second data, the system identifies third data relating to a financing of the input of the first entity. Responsive to an update to the input, the system determines a payoff plan for the updated input by applying the first data, the second data, and the third data to one or more machine learning models. After the one or more machine learning models generates the payoff plan, the system causes implementation of the payoff plan automatically through a computing system of the first entity.
A method includes authenticating, by a resource of a mobile device, a user for accessing the resource based on user credentials of the user, determining, according to a profile of the user, a set of allowable actions to be taken by the user, determining a list of accounts linked to the profile of the user, receiving an image of an identifier corresponding to a product, the image captured by a camera of the mobile device, extracting characters from the image corresponding to the identifier, initiating a request, to a server, including i) the identifier and ii) information corresponding to the list of accounts, receiving, responsive to the request, data corresponding to the product and displaying information relating to the data which corresponds to the product, including the set of allowable actions permitted to be performed.
An example computer system for managing software dependencies can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: identify a vulnerability associated with a dependency for a computer program as the computer program is being developed; determine a severity of the vulnerability; and manage the dependency based upon the severity of the vulnerability.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Systems and techniques may be used for transaction limit management based on trust relationships in financial transactions. An example technique may include receiving data obtained by a user device interacting with a merchant device, such as scanning a QR code or using near-field communication (NFC). The example technique may include processing the data to identify the user device within a financial transaction system linked to a merchant point-of-sale (POS) system. The example technique may further include analyzing the transaction history between the user device and the merchant device to establish a trust level and determine the trustworthiness of the user device, wherein an increase in a transaction limit may be approved upon establishing a sufficient trust level.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
Systems and methods of robotic process automation including: receiving a multi-threaded task request from a messaging application; automatically dividing the multi-threaded task request into a plurality of subtasks based on metadata associated with the multi-threaded task requests; generating a queue comprising one or more subtasks from the plurality of subtasks; identifying an application programming interface associated with the one or more subtasks from the queue; routing the one or more subtasks to the application programming interface; receiving a response from the application programming interface associated with executing the one or more subtasks; and providing the response to the messaging application.
An example computer system for automating policy management can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to create: a translation engine programmed to take policy code in a first format and translate the policy code to a second format; and a pipeline engine programmed to automatically distribute the policy code in the first format to a first policy engine and distribute the policy code in the second format to a second policy engine.
G06Q 10/0637 - Strategic management or analysis, e.g. setting a goal or target of an organisationPlanning actions based on goalsAnalysis or evaluation of effectiveness of goals
Provided is a toggleable mirror interface that integrates with native device accessibility features to convert an inaccessible interactive user experience into an accessible experience. Elements of the user experience are processed to be presented in an accessible format on the mirror interface, which becomes the primary interface for users requiring such accessibility. The mirror interface presents accessible elements as the interactive user experience progresses to enable an accessible experience.
Various embodiments described herein relate to systems, methods, and non-transitory computer-readable media structured to perform server-to-device secure data exchange using a device access token. In an embodiment, a smart device receives, from a requestor entity provided to the smart device, an account data provisioning request for an account. Based on the account data provisioning request, an account identifier for the account is determined. In some arrangements, the account identifier comprises or is associated with a device access token. Based on the device access token, a data element associated with the account is determined. In some embodiments, the data element is accessible to the requestor entity only if it is not access-restricted based on the device access token. Based on the data element, an executable graphic rendering instruction is generated. The executable graphic rendering instruction is executed, which includes generating and displaying, on a user interface of the smart device, a dynamic account status indicator relating to the account.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04L 67/133 - Protocols for remote procedure calls [RPC]
System, apparatus, and computer program products are disclosed for generating a verification non-fungible token. An example method includes processing an event generation request triggered by a user. The example method further includes capturing an asset position and a timestamp and performing one or more authentication operations on the event generation request. The example method further includes, in an instance in which the one or more authentication operations authenticates the event generation request, generating the verification non-fungible token for the asset identifier, generating the travel non-fungible token, and providing the verification non-fungible token and the travel non-fungible token for storage in an associated distributed ledger.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Techniques are described for assessing the health of one or more applications. For example, this disclosure describes a computing device configured to obtain information associated with one or more software assets, wherein the information associated with one or more software assets comprises information associated with a lifecycle of the one or more software assets. The computing device is also configured to compute, based on at least a portion of the information associated with the one or more software assets, a health score that indicates a security risk of the one or more software assets. The computing device is further configured to perform an action based on the health score.
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
34.
Systems and methods for automated teller drawer counting and balancing
A system includes a currency counting device communicably coupled to memory and one or more processors. The memory stores instructions that are executable by the one or more processors to cause the one or more processors to cause a first amount of currency to be counted by the currency counting device, wherein the first amount of currency is an actual amount of currency received by a teller money drawer; determine that the first amount of currency is a discrepancy amount different than an expected amount of currency; determine that a teller error is a potential source of the discrepancy based on the discrepancy amount being below a threshold; and cause a display device of a teller computing device to display an indication within a pop-up window that the teller error is the potential source of the discrepancy based on the discrepancy amount being below the threshold.
An example electronic computing device can include: a processor; and a system memory, the system memory including instructions which, when executed by the processor, cause the electronic computing device to: receive a model for natural language processing of data, the model including a plurality of self-attention heads; prune the model by removing one or more of the plurality of self-attention heads of the model to create a pruned model; and evaluate a classification accuracy of the pruned model to maintain a performance level.
Disclosed in some examples are methods, systems, devices, and machine-readable mediums which provide a wearable device, such as a smart ring, that provides feedback to guide users in performing physical tasks. Tasks may include tasks associated with an application executing on a mobile device of the user.
Systems and methods for protecting user data received by, stored on, and/or requested by third-party computing devices include a data entry computing system on a first network node. A data entry computing system can include a processing circuit that can identify user-entered data as sensitive user data, generate a content encryption key (CEK), generate encrypted user data by encrypting the sensitive user data with the CEK, tag the encrypted user data and the CEK with a tag readable by a database server on a network node different than the data entry computing system, the tag comprising information indicative of the encrypted user data, and transmit the encrypted user data to the database server, wherein the database server excludes a private key of a key manager on a network node different than the data entry computing system.
A system, method, and computer-readable media include detecting a noncompliance event based on content accessed by one or more user devices and served by an experience provider that is noncompliant with a data sharing preference of the one or more user devices, providing an alert on a graphical user interface (GUI) of a client application, remediating the detected noncompliance event according to a remediation selection of one or more options based on executing an API call with the experience provider by: transmitting a warning to the experience provider regarding a penalty for the noncompliance, receiving, from the experience provider, a data structure comprising a tabulation of funds due to resolve the penalty, verifying the tabulation of funds due, and depositing the funds due into an account of a user of the one or more user devices to resolve the penalty.
G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
G06F 11/32 - Monitoring with visual indication of the functioning of the machine
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
Systems, methods, and computer-readable storage media for restricting exchanges using a proof of integrity model. One system includes memory and at least one processing circuit configured to receive, from a node on a first DLT network, an exchange request, the exchange request includes an amount of a digital asset to exchange, a content item, and a destination identifier. The at least one processing circuit is further configured to generate an exchange record and validate the exchange record in the amount of the digital asset based on a protection model. The at least one processing circuit is further configured to authorize, based on a consensus model, the exchange corresponding with the validated exchange record including the appended protection parameter. The at least one processing circuit is further configured to generate a new blockchain block on the first DLT network and transmit, to a second DLT network, an exchange notification.
A system includes a processing circuit. The processing circuit is configured to receive an indication of a log-in into a client application. The log-in causes a launching of an image capture graphical user interface. The client application is executed by a user device associated with a user. The processing circuit is also configured to acquire image data associated with an image and user data relating to the user. The image data is associated with an object depicted in the image. The processing circuit is also configured to determine, based on the image data, a prospective action associated with the object. The processing circuit is also configured to generate, based on comparing the prospective action to the user data, action data specific to the user for completing the prospective action. The processing circuit is also configured to augment the image capture graphical user interface by including the action data.
Disclosed herein is a workflow for a chatbot system based on an ad hoc set of documents. The chatbot enables users to ask questions of these documents. The workflow then searches for relevant information and generates a response. The response may include an answer to a question and a relevant section of a document.
Systems, methods, and computer-readable storage media for restricting exchanges using a proof of integrity model. One system includes memory and at least one processing circuit configured to receive, from a node on a first DLT network, an exchange request, the exchange request includes an amount of a digital asset to exchange, a content item, and a destination identifier. The at least one processing circuit is further configured to generate an exchange record and validate the exchange record in the amount of the digital asset based on a protection model. The at least one processing circuit is further configured to authorize, based on a consensus model, the exchange corresponding with the validated exchange record including the appended protection parameter. The at least one processing circuit is further configured to generate a new blockchain block on the first DLT network and transmit, to a second DLT network, an exchange notification.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
43.
SYSTEMS AND METHODS FOR PROXIMITY-BASED TRANSACTION LIMIT THRESHOLD OVERRIDE
A method may include receiving, using a processing unit at a service endpoint, from a first computing device a request to initiate a transfer from a first account to a second account, the request identifying a transfer amount; determining, using the processing unit, that the transfer amount exceeds a stored threshold transfer limit; receiving an identifier associated with the second account; subsequent to the determining, receiving, using the processing unit, an indication that a geographic location override action has been completed between the first computing device and a second computing device, the second computing device stored as associated with the second account; and in response to receiving the indication, increasing the threshold transfer limit between the first computing device and second computing device for a period of time and authorizing the transfer.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
44.
GENERATING ENTITY CONTRIBUTION SCORES USING CONFIGURATION INSTRUMENTATION METRICS
Systems, apparatuses, methods, and computer program products are disclosed for generating an entity contribution score for an entity. An example method includes receiving, by a communications hardware, a set of entity configuration evaluation data and identifying, by a configuration identification circuitry, one or more configuration instruments and one or more corresponding configuration instrument metrics. The example method further includes determining, by an entity contribution scoring circuitry, an entity contribution score and generating, by the entity contribution scoring circuitry an entity contribution score report based on the entity contribution score.
G06Q 10/0639 - Performance analysis of employeesPerformance analysis of enterprise or organisation operations
G06Q 10/0637 - Strategic management or analysis, e.g. setting a goal or target of an organisationPlanning actions based on goalsAnalysis or evaluation of effectiveness of goals
45.
SYSTEMS AND METHODS FOR THREAT MITIGATION USING ARTIFICIAL INTELLIGENCE
Systems, apparatuses, methods, and computer program products are disclosed for mitigating threats using artificial intelligence. An example method includes: obtaining, via communications hardware of a threat manager, a piece of data; determining, by a threat identification engine of the threat manager, that the piece of data is a threat; and causing, by a remediation engine of the threat manager and in response to the determination, execution of a threat remediation action. The threat remediation action comprises at least one of: publishing an emergency remediation statement addressing the threat, transmitting a takedown request to remove the threat from a threat source, or ignoring the threat.
Various embodiments described hereby include components of a planning, advice, and execution (PAE) system configured to deliver an advice, planning, and attainment experience that focuses on understanding clients as human beings and what they want to accomplish with their life. The PAE system, or one or more components thereof, may operate to provide technology-based solutions that continuously sync financial objectives with aspirations and values through the many moments of life. These technology-based solutions may empower humans to make financial decisions and attain life objectives, big or small, simple or complex, that make a real and lasting impact on their lives and future generations.
An example computer system for executing data quality rules, the computer system comprising one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: receive a plurality of rules; group the plurality of rules into one or more categories of rules; determine a category of the one or more categories of rules to execute based on a scheduling trigger; request execution of each rule of the category by a database; and receive, from the database, output from execution of the each rule of the category.
This disclosure describes techniques that include assessing whether various service providers, such as cloud service providers or SaaS providers, are properly maintaining sensitive data (e.g., private, confidential, and/or non-public information) that is entrusted to them. In one example, this disclosure describes a method that includes collecting, by a computing system, information about interactions with a service provider computing system; identifying, based on the information about the interactions, a plurality of network paths, each associated with a data object accessed at the service provider computing system; requesting, based on the plurality of network paths, data from the service provider computing system; receiving a response; determining, based on the response, whether the response includes sensitive information; and taking action based on whether the response includes sensitive data.
Embodiments are disclosed for detecting and responding to potentially fraudulent transactions and other network access events via a system comprising a three-tiered network architecture. An example system comprises one or more user equipment devices configured with a thin client application (a first tier). The one or more user equipment devices are capable of communicating with a respective local authority controller and a local knowledge base (the second tier). The one or more local authority controllers and local knowledge bases are configured to interact with a master authority controller and master knowledge base (the third tier) to enable the efficient assessment of potentially localized fraudulent network activity and the passing of network access rule sets amongst the devices in each tier. Corresponding apparatuses and methods are also provided.
Systems, apparatuses, methods, and computer program products are disclosed for identifying how individuals traverse through virtual spaces. An example method includes identifying relevant data from blockchains associated with virtual spaces and harvesting the relevant data from the blockchains. The example method further includes storing the harvested data in organized sidechains for accessibility, and based on the stored data of the sidechains, generate outputs.
Managing carbon emissions associated with unavailable services. In the context of financial services, a customer of a financial institution can attempt to access an online provided financial service, only to be denied access to the service due to an access issue with one or more computing systems. Such denials of service can lead to high levels of carbon emissions due to ensuing activity following the initial denial of service, such as repeated attempts to refresh a webpage or messaging customer service. By contextualizing the denial of service and predicting relative magnitudes of carbon emissions associated with different service access pathways for providing the denied service to the customer, overall carbon emissions can be reduced.
Aspects of this technical solution can receive, via a user interface, a first prompt for a large language model including a first query that references first data, generate one or more second prompts for the large language model based on the first prompt and the first data, each of the second prompts including one or more second data clarifying the first query, generate, by the large language model receiving one or more of the second prompts, one or more responses to the one or more second prompts, select an optimized prompt from among the one or more second prompts, according to a determination that a response to the at least one of the second prompts meets an accuracy threshold, and cause the user interface to present the optimized prompt or a response to the optimized prompt, the large language model to generate the response using the optimized prompt as input.
Systems, methods, and computer-readable storage media to authorizing exchanges using a proof of usage model. One system includes memory and at least one processing circuit configured to generate a plurality of distributed ledger technology (DLT) networks and activate and connect a first network computing system to at least one of the DLT networks. The at least one processing circuit further configured to activate and connect a second network computing system to at least one of the DLT networks. The at least one processing circuit further configured to execute a disbursement of funds or digital asset corresponding with the first network computing system. The at least one processing circuit further configured to append a protection parameter to the funds or digital asset based on a scheme and in response to receiving an exchange request from the second network computing system, authorize an exchange based a proof of usage model.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
54.
SYSTEMS AND METHODS FOR VERIFYING CANDIDATE COMMUNICATIONS
Systems, apparatuses, methods, and computer program products are disclosed for establishing an authentic communication storage repository. An example method includes receiving an authentic communication from the agent device and determining one or more authentic communication feature values for one or more communication feature types. The example method further includes generating an authentic communication record for the received authentic communication and storing the authentic communication record in the authentic communication storage repository, wherein the authentic communication storage repository comprises a plurality of authentic communication records.
Systems, apparatuses, methods, and computer program products are disclosed for verifying candidate communications. An example method includes receiving a communication verification request comprising a candidate communication from a third-party device and determining one or more candidate communication feature values for one or more communication feature types. The example method further includes querying an authentic communication storage repository for an authentic communication record that comprises one or more authentic communication feature values that correspond to the one or more candidate communication features, wherein the authentic communication storage repository comprises a plurality of authentic communication records. The example method further includes determining a communication classification for the candidate communication based on a query result and providing a communication verification response comprising the communication classification to the third-party device.
Systems and methods for generating new transaction frameworks using a machine learning model include a transaction framework training system and a transaction framework generation system. The transaction framework training system includes hardware configured to receive historical transaction framework data associated with a plurality of transaction frameworks corresponding to historical transactions performed by a provider. The historical transaction framework data includes final transaction framework terms and outcome data for each historical transaction. The hardware is configured to generate a machine learning model. The machine learning model is configured to generate new transaction frameworks. The machine learning model is generated using the historical transaction framework data. The transaction framework generation system includes hardware configured to receive input initial transaction framework data. The hardware is configured to generate an output transaction framework by applying the input initial transaction framework data to the machine learning model.
Systems, apparatuses, methods, and computer program products are disclosed for verifying candidate communications. An example method includes establishing an authenticated session with a user using a user device and receiving a communication verification request comprising a candidate communication. The example method further includes determining one or more candidate communication feature values for one or more communication feature types and querying an authentic communication storage repository for an authentic communication record that comprises one or more authentic communication feature values that correspond to the one or more candidate communication features. The example method further includes determining a communication classification for the candidate communication based on a query result and providing a communication verification response comprising the communication classification to the user device.
A method may include generating an API call to a collaborative document creation platform, the API call requesting comments made with respect to a document hosted by the collaborative document creation platform; transmitting the API call to the collaborative document creation platform; in response to the transmitting, receiving from the collaborative document creation platform, a data payload, the data payload identifying a communication made within the document and the communication formatted in a first data structure schema; transforming the communication formatted in the first data structure schema to a second data structure schema; and storing the communication formatted in the second data structure schema in an archive data store.
A computing device within an enterprise network is described, the computing device configured to execute one or more applications and one or more status modules embedded within the one or more applications. A first status module embedded within a first application running on the computing device is configured to periodically determine an operational status of the first application based on at least one value of at least one metric of the first application for each periodic interval. The at least one metric may be selected from a predefined list of metrics as being indicative of the operational status of the first application. The first status module is configured to report an identifier of the computing device on which the first application is running and a status indicator representative of the operational status of the first application at a given time to an application performance tool within the enterprise network.
Systems, methods, and apparatuses for authenticating a user based at least in part on a location of the user or a location of a user device are described. A method includes: receiving a login request including a user identifier associated with a user; transmitting a request for location information of a user device associated with the user; causing computer-executable code deployed to the user device to generate a location-based modifiable digital fingerprint comprising a first encoded value based on a unique identifier of the user device and a second encoded value based on a first location information of the user device; receiving the location-based modifiable digital fingerprint from the user device; verifying that the location information from the location-based modifiable digital fingerprint corresponds to a second location; and providing the user access to the computing device.
Systems and techniques may generally be used to integrate automated teller machine (ATM) functions into one or more fuel pumps at a gas station. An example system may include a media transfer slot and a display screen to present a fuel pump prompt and an automated teller machine (ATM) prompt. The example system may cause a fuel to be dispensed when the fuel pump prompt is selected. The example system may cause the media transfer slot to activate when the ATM prompt is selected.
Systems, methods, and other embodiments associated with cash pooling. According to one embodiment, a system includes an account logic configured to receive at least one change selected by a user and make the at least one change to a pool. The pool includes a plurality of accounts. The system further includes a settlement logic configured to calculate a balance for one or more accounts in the pool. The settlement logic is further configured to identify at least one settlement options for the one or more accounts based at least in part on the balance.
In general, this disclosure describes techniques for generating and evaluating automatic transcripts of audio recordings containing human speech. In some examples, a computing system is configured to: generate transcripts of a plurality of audio recordings; determine an error rate for each transcript by comparing the transcript to a reference transcript of the audio recording; receive, for each transcript, a subjective ranking selected from a plurality of subjective rank categories; determine, based on the error rates and subjective rankings, objective rank categories defined by error-rate ranges; and assign an objective ranking to a new machine-generated transcript of a new audio recording, based on the objective rank categories and an error rate of the new machine-generated transcript.
Systems, methods, and apparatuses for scrubbing account data accessed via links to applications or devices are disclosed. A system receives, from a financial institution computing system, a security access token granting access to account data of a user account administered by the financial institution. The system transmits an API request including the security access token to retrieve account data, receives the requested account data, and stores the account data locally. The system provides stored account data to a client application upon request. Upon receiving a scrub command from the financial institution computing system instructing deletion of the stored account data, the system deletes the account data from local storage and transmits an indication back to the financial institution confirming deletion.
Systems and methods relating to a distributed ledger-based payment rail are provided. A computer-implemented method includes determining whether a sending financial institution of a sender of a funds transfer and a receiving financial institution of a recipient of the funds transfer each operates a node on a permissioned distributed ledger network. The method further includes routing a funds transfer request message to the permissioned distributed ledger network in response to determining that the sending financial institution and the receiving financial institution each operates a node on the permissioned distributed ledger network. The method further includes destroying, by an issuer, the cash states in response to the recipient redeeming cash states associated with the funds transfer.
A method includes obtaining application information including at least one of a location of origin for customer information within an application or a location of termination for the customer information within the application, performing at least one corrective action to reduce a determined risk associated with the application based on privacy guidelines associated with at least one of the location of origin or the location of termination, and displaying, via a graphical user interface, the at least one corrective action to a user.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Systems and techniques for secure communications and distribution of random values, provided via satellite communications, are described. These random values are generated from one or more ground-based entropy sources (e.g., quantum random number generators (QRNGs) at terrestrial locations), and optionally combined with values from satellite-based entropy sources (e.g., QRNGs at non-terrestrial locations). An example method includes: receiving a first random value generated by a first QRNG at a terrestrial location; receiving a second random value and a third random value via at least one satellite communication, each additional random value generated by other QRNGs; and generating a cryptographic key based on the first random value, the second random value, and the third random value. The cryptographic key may be produced by a key derivation function that combines the random values, and the cryptographic key may be used to establish a secure communication session.
Systems and techniques for secure communications and distribution of random values for cryptographic key generation, coordinated with the use of specific key generation parameters, are described. An example method includes: receiving a first random value and a second random value generated from at least one quantum random number generator (QRNG), with at least one of the first random value and the second random value being provided from a satellite communication; obtaining key generation parameters associated with cryptographic key generation, where the key generation parameters specify a specific combination of the first random value and the second random value; and generating a cryptographic key, using the specific combination of the first random value and the second random value, as a seed to a cryptographic function.
Systems and techniques may generally be used to authenticate users. An example technique may include linking a first user account of a first user to a second user account of a second user at a financial institution, receiving an authorization request to complete a first financial transaction on the first user account, sending to the first computing device of the second user an authentication request for the first user, and receiving a first authentication confirmation from the second user. The example technique may include determining that the first authentication confirmation meets the authentication level requirement of the first financial transaction, and, in response to the determination, authorizing the first financial transaction on the first user account.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
70.
SYSTEMS AND METHODS FOR RANKING CALL INTENT PROBABILITY
Systems, apparatuses, methods, and computer program products are disclosed for deriving call intent probability. An example method includes receiving a set of call menu tokens and creating an n-gram from the set of call menu tokens. The example method further includes receiving an intent call log for a candidate call intent, which includes a frequency of the n-gram and a total frequency, and determining, by scoring circuitry, an n-gram intent score based on the frequency of the n-gram and the total frequency of the intent call log. The example method further includes determining a total score for the candidate call intent based on the n-gram intent score, where the total score provides a measure of a probability of the candidate call intent and outputting a ranked list of call intents comprising the total score and the candidate call intent.
An example computer system for providing a communication system can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: monitor criteria associated with the computer system; calculate a risk score associated with the communication system; and automatically change one or more endpoints of the computer system when the risk score exceeds a threshold.
Systems and methods may generally provide a dynamic personalized banking user interface. An example method may include receiving data corresponding to a user pathway interaction by a user at a user interface, and personalizing, using reinforcement learning, a trained model to the user based on the data to generate a personalized reinforcement learning model. The example method may include receiving an indication that the user has accessed the user interface or requested access to the user interface, and dynamically generating the user interface using the personalized reinforcement learning model. The dynamically generated user interface may be output for display on a user device.
G06F 9/451 - Execution arrangements for user interfaces
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
Systems and techniques for secure communications and distribution of random values, produced from at least two satellite entropy sources, are described. These random values may be provided by respective quantum random number generators (QRNGs) at separate satellites, and optionally combined with values from ground-based entropy sources (e.g., QRNGs at terrestrial locations). An example method includes: receiving a first random value and a second random value via at least one satellite communication, where the first random value is generated by a first QRNG at a first satellite, and the second random value is generated by a second QRNG at a second satellite; and generating a cryptographic key based on the first random value and the second random value. The cryptographic key may be produced by a key derivation function that combines the random values, and the cryptographic key may be used to establish a secure communication session.
Systems, apparatuses, methods, and computer program products are disclosed for providing accessible interface content. An example method includes receiving base interface content comprising one or more interface content components and determining a user population of interest and a platform of interest. The example method further includes generating one or more interface feature sets using a pre-processing model. The example method further includes modifying one or more interface content components for each interface feature set using feature modification models. The example method further includes generating modified interface content using a multimodal model based on the one or more interface feature sets and providing the modified interface content.
Systems and techniques may generally be used to authenticate users. An example technique may include receiving a selection to execute a first financial transaction on a first user account of a first user at a financial institution, the first financial transaction having an authentication level requirement, and determining that the first user completed a selected authentication option that satisfies the authentication level requirement. The example technique may include, in response to the determination, authorizing the first financial transaction to execute using the first user account.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
76.
PROTECTING TOKENIZED STRUCTURES USING A PROTECTION ARCHITECTURE
Systems, methods, and computer-readable storage media to protect non-fungible tokens (NFTs) using a protection architecture. One method includes protecting the NFT including tracking, utilizing the overlay ledger, an association of NFT ownership of a plurality of NFTs and storing and protecting, utilizing a blockchain storage, the plurality of NFTs. The method further includes receiving an exchange request and exchanging the NFT on us including determining the customers have an NFT account with the overlay ledger and executing an on-us exchange based on updating the overlay ledger.
Disclosed is an approach in which news alerts are scanned in real-time or near real-time, relevant alerts identified through a topic extraction model, and associated actors identified through an entity extraction model. An entity resolution model may be applied to determine which actors are clients. The topic extraction, entity extraction, and/or entity resolution models may apply, for example, natural language processing models. The alert may be enriched by being packaged with client and transactional data to generate an enriched alert. A predictive model may be applied to the enriched alert to identify events with a high probability of law enforcement referral, and the enriched alert may be automatically transmitted to certain identified devices. The predictive model is trained using a combination of news alerts and data on clients and transactions, yielding enhanced predictions. The disclosed approach reveals relevant underlying associations and connections between entities and transactions not otherwise feasibly discoverable.
G08B 7/06 - Signalling systems according to more than one of groups Personal calling systems according to more than one of groups using electric transmission
H04L 67/53 - Network services using third party service providers
78.
Systems and methods for tracking NFT-backed instruments
Systems, apparatuses, methods, and computer program products are disclosed for tracking NFT-backed instruments. An example method includes identifying a plurality of NFTs on a distributed blockchain ledger, associating an instrument with the cryptographic NFTs, determining a value of the cryptographic NFTs based on transactions on the distributed blockchain ledger that are associated with one or more of the cryptographic NFTs, monitoring the distributed blockchain ledger to detect transaction data of a block of the distributed blockchain ledger, the transaction data indicative of a transaction associated with a first cryptographic NFT of the cryptographic NFTs, determining a modified value of the cryptographic NFTs responsive to the transaction data, and terminating the instrument associated with the cryptographic NFTs in response to a comparison of the modified value to a predetermined threshold value indicating that the modified value is less than the predetermined threshold value.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
79.
Secure digital authorization based on identity elements of users and/or linkage definitions identifying shared digital assets
Disclosed are example methods, systems, and devices that allow for secure digital authorization via generated datasets. The techniques include receiving a first dataset of a first user and a second dataset of a second user and generating a first set of identity elements and a second set of identity elements based on the first dataset and the second dataset, respectively. A linkage definition can be generated based on the first and second datasets, which can be associated with a set of activation elements. The techniques include determining that a set of inputs satisfy one or more of the set of activation elements and, in response, generating a set of security access tokens based on the linkage condition. The security access tokens can be transmitted to a computing device upon analyzing and verifying biometric data received from that computing device.
Various embodiments described herein relate to systems, methods, and non-transitory computer-readable media structured to perform server-to-device secure data exchange using a device access token. In an embodiment, a smart device receives, from a requestor entity provided to the smart device, an account data provisioning request for an account. Based on the account data provisioning request, an account identifier for the account is determined. In some arrangements, the account identifier comprises or is associated with a device access token. Based on the device access token, a data element associated with the account is determined. In some embodiments, the data element is accessible to the requestor entity only if it is not access-restricted based on the device access token. Based on the data element, an executable graphic rendering instruction is generated. The executable graphic rendering instruction is executed, which includes generating and displaying, on a user interface of the smart device, a dynamic account status indicator relating to the account.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04L 67/133 - Protocols for remote procedure calls [RPC]
The innovation disclosed and claimed herein, in one aspect thereof, comprises systems and methods of delivering cash to a subscriber of a cash delivery service by way of a courier. In another aspect, collection of cash from a subscriber by a courier is contemplated. Conversely, the subscriber prearranging to pick up cash at a kiosk is contemplated. For these and like embodiments, network servers host a cash delivery application and users/couriers utilize the application as clients.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 40/04 - Trading Exchange, e.g. stocks, commodities, derivatives or currency exchange
82.
Apparatuses and methods for improved session authentication
A method, apparatus, and computer program product for establishing an authenticated online session are provided. An example method includes receiving a request for an authenticated online session and causing, by display circuitry, presentation of an input pattern to a user. The method further includes receiving, by gaze detection circuitry, one or more images of the user's eye captured during presentation of the input pattern, and determining, by the gaze detection circuitry, an identification code represented by the one or more images. The method also includes receiving, by contextual evaluation circuitry, contextual device data of a user device associated with the user during presentation of the input pattern. The method further includes establishing, by authentication circuitry, the authenticated online session based upon the identification code and the contextual device data.
The present disclosure is directed to systems, methods, and non-transitory computer-readable media for receiving, by a relying party device from a subject device, an attribute certificate of a subject corresponding to the subject device, wherein the attribute certificate identifies a plurality of public key certificates, each of the plurality of public key certificates is part of a certificate chain, each of the plurality of public key certificates comprises a public key of the subject, selecting, by the relying party device, a public key certificate of the plurality of public key certificates using the attribute certificate, performing, by the relying party device, certificate chain validation of a certificate chain of the selected public key certificate, and in response to the certificate chain validation being successful, using, by the relying party device, a public key comprised in the selected public key certificate in a cryptographic operation.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
84.
SERVER-TO-DEVICE SECURE DATA EXCHANGE TRANSACTIONS
Described are systems, methods, and computer-readable media structured to perform server-to-device secure data exchange using a device access token. A smart device may receive, from a requestor entity provided to the smart device, an account data provisioning request for an account. Based on the provisioning request, an account identifier for the account is determined. In some arrangements, the account identifier comprises or is associated with a device access token. Based on the device access token, a data element associated with the account is determined. The data element may be accessible to the requestor entity only if it is not access-restricted based on the device access token. Based on the data element, an executable graphic rendering instruction may be generated. The executable graphic rendering instruction may be executed, which includes generating and displaying, on a user interface of the smart device, a dynamic account status indicator relating to the account.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04L 67/133 - Protocols for remote procedure calls [RPC]
A system can obtain, based on a first control structure that identifies a content type, a non-fungible token (NFT) linked to a content object corresponding to the content type, encapsulate the NFT within a container having a second control structure that restricts output by the content object linked to the encapsulated NFT, and generate a control token compatible with a third control structure that restricts output by the container to a destination corresponding to the control token, determine by the third control structure that the control token is compatible with the third control structure, and transmit, by the second control structure and based on the determination that the control token is compatible with the third control structure, the output from the content object to the destination.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
86.
SCRUBBING ACCOUNT DATA ACCESSED VIA LINKS TO APPLICATIONS OR DEVICES
Systems and methods for scrubbing account data accessed via links to applications or devices are disclosed. A service provider computing system can transmit, to a financial institution computing system, an application programming interface (API) call comprising a request for account data associated with a user account. The system can receive, in response to the API call, the account data according to security access granted to the service provider, and store the account data in non-volatile memory. Upon receiving a data request from a client application executing on a user device, the system can transmit the stored account data to the user device. In response to receiving a scrub command from the financial institution computing system instructing deletion of the account data, the system can delete the account data from memory and transmit an indication to the financial institution computing system confirming deletion of the account data.
A method, apparatus, and system of providing a management system for digital platforms are disclosed. The method includes creating a master account associated with a first user; providing a management graphical user interface (GUI) to a user device; creating a subordinate account associated with a second user in response to a first user input via the management GUI; establishing one or more spending rules for the subordinate account in response to a second user input via the management GUI; providing a subordinate GUI; generating a subordinate payment token for a payment account associated with the master account; receiving, from a computing system, a request to approve a first in-app purchase (IAP), the request indicating receipt of the subordinate payment token; retrieving the spending rules for the subordinate account; and approving the first IAP from the subordinate account based on the first IAP satisfying the spending rules.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
88.
AUTOMATIC GENERATION OF PROCESS INSTRUCTIONS FROM LOG FILES
A computing system may access log files that log data associated with prior performances of a process by users. Such data may be recorded by one or more computing systems based on tracking user interactions with the one or more computing systems to perform the process. The computing system may generate, using an instructions generation model that is trained using machine learning, the process instructions for performing the process based on the data associated with the prior performances of the process. The process instructions may be human-readable written instructions.
A provider computing system can include at least one processing circuit having at least one processor coupled to at least one memory device. The memory device can store instructions that, when executed by the at least one processor, cause the at least one processing circuit to receive a query corresponding to a first topic, determine one or more data sources associated with the first topic based on data included in the query, generate a first response to the query based on information received from the one or more data sources using a machine learning model, determine a correlation between the first response and the information received from the one or more data sources, generate a first score for the first response based on the correlation, and transmit one or more signals to cause the user device to display a user interface including the first response and the first score.
Enhancing financial literacy using the metaverse. Visual, immersive financial content is provided via an augmented reality environment or a virtual reality environment. The content changes based on one or more financial factors, allowing users to visually and virtually experience and better understand how different prospective financial transactions are impacted by different financial factors of those transactions.
Two-factor authentication code generation devices are described which include accessibility features and/or additional authentication features to ensure an identity of a user.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A chatbot system described herein uses a two-staged approach to answer a question. The first stage consists of a contextual search that takes in the question, searches a library of documents and finds a relevant piece of text. The second stage is to use the relevant piece of text, present it to a large language model, and have the model answer the question give the context of the text. The model in question formulates the answer by extracting the most relevant section of the text. When asked an ill-posed question, the chat bot will ask the user clarifying questions until a well-defined question is found.
A provider computing system includes at least one processing circuit having at least one processor coupled to at least one memory device. The at least one memory device can store instructions that, when executed by the at least one processor, cause the at least one processing circuit to: receive a query associated with an event; identify one or more parameters absent from at least one first parameter based on an event type of the event; transmit one or more first signals to cause a user device to display a prompt to provide at least one additional parameter regarding the event; receive a first response to the prompt; generate at least one second parameter absent from the first response; determine a plurality of actions to perform the event; and, output a second response identifying the plurality of actions to perform the event, and display a user interface including the second response.
A third verification factor is introduced into the two-factor authentication process, thereby establishing a robust three-factor authentication system. Specifically, a One-Time Password (OTP) that is typically generated for authentication purposes undergoes an additional layer of security by utilizing the OTP in a data authentication scheme of a user's chip-enabled credit, debit, banking, or similar card. An enhanced OTP generator sends the OTP to the card, which encrypts either the OTP or a value derived from the OTP (e.g., such as a hash of the OTP) with a cryptographic key associated with the card to create an encrypted authentication token. The encrypted authentication token is then provided to the authenticating party. Also described is an enhanced OTP generation device in the form of a passbook.
Systems, apparatuses, methods, and computer program products are disclosed for determining a security vulnerability of a computer system. An example method includes initializing a policy based on initial policy data. The example method further includes selecting an action based on the policy and executing, by agent circuitry, the action in the environment. The example method further includes, subsequent to executing the action in the environment, receiving an observation of the environment and determining an updated state from the set of states based on the observation. The example method further includes determining, by the policy, a reward based on the updated state and updating the policy based on the updated state.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
96.
CONTEXTUAL MODELING FOR ELECTRONIC LOAN APPLICATIONS
An example system for managing an electronic loan application can: detect a triggering event associated with a customer, the triggering event being unassociated with a potential loan transaction; access, in response to the triggering event, financial information associated with the customer for the potential loan transaction; perform pre-decisioning on the financial information to generate an offer for the potential loan transaction; and present the offer for the potential loan transaction to the customer.
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
A financial institution computing system includes a network circuit exchanging information over a network, a customer database storing financial information, and a transaction circuit. The transaction circuit receives a transaction request associated with a user computing device. The transaction request specifies a financial account. The transaction circuit receives payment card location information indicative of a location of a payment card with respect to the user computing device. The payment card location information indicates that the payment card is within a threshold distance of the user computing device. The transaction circuit authenticates the transaction request using the payment card location information and by determining whether the payment card is associated with an authorized user of the financial account. The transaction circuit authorizes the transaction request based on whether the transaction request is authenticated and transmits a confirmation to a transaction terminal over the network via the network circuit.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
98.
ENHANCED SEARCH RESULT RELEVANCY FOR INFORMATION RETRIEVAL SYSTEMS
Disclosed in some examples are methods, systems, and machine readable mediums which utilize volume to improve the ordering of search results for various information retrieval systems. This improves relevance as volume is a proxy for interest. As volume changes over time, the relevance of a particular result to a particular search query will increase or decrease over time.
A method comprising receiving, by a first computing system from a second computing system, a pre-approval message indicating a customer is pre-approved to open an account, and receiving account registration information for opening the account and a mobile device identifier, the identifier received from the mobile device via a first near-field communication (NFC) tap between the mobile device and the first computing system. The method comprises providing the mobile device identifier to the second computing system to validate the mobile device, and receiving, from the second computing system, a payment token for the account, where the payment token is automatically provisioned to an application of the mobile device via a second NFC tap between the mobile device and the first computing system.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
A service provider computing system includes memory having stored thereon instructions that, when executed by one or more processors, cause the one or more processors to obtain a first set of complaint logs corresponding to one or more user complaints, each complaint log including a resolution comments field providing a textual representation of a resolution for a corresponding complaint log, parse the resolution comments field of each complaint log of the first set of complaint logs to identify one or more key terms, and execute a machine-learning predictive model using the one or more key terms to generate, for each complaint log, a prediction indicating whether a corresponding complaint should have compensation, the machine-learning predictive model being a supervised machine learning model configured to accept the parsed resolution comments field for the first set of complaint logs as inputs and to output the prediction for each complaint log.