The present disclosure is directed to systems, methods, and non-transitory computer-readable media for adding a first Public Itemization of Public Key Infrastructure Nodes (PIPKIN) object to a blockchain, the first PIPKIN object comprises first hierarchy information of at least one first certificate chain of a first Public Key Infrastructure (PKI), and adding a second PIPKIN object to the blockchain, the second PIPKIN object comprises second hierarchy information of at least one second certificate chain of a second PKI.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
2.
SYSTEM AND METHODS FOR SOFTWARE SECURITY INTEGRITY
A method may include querying, using a processing unit, a project data store with a project identifier; in response to the querying, receiving a functional requirement of a project data structure stored as associated with the project identifier; inputting, using the processing unit, the functional requirement into a trained machine learning model, the machine learning model configured with output nodes corresponding to a set of requirement classifications; after the inputting, accessing, using the processing unit, output values of the output nodes; and adding, using the processing unit, a requirement classification of the set of requirement classifications based on the output values to the project data structure.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
3.
SYSTEM AND METHODS FOR SOFTWARE SECURITY INTEGRITY
A method may include querying, using a processing unit, a project data store with a project identifier; in response to the querying, receiving a functional requirement of a project data structure stored in the project data store as associated with the project identifier; inputting, using the processing unit, the functional requirement into a trained machine learning model, the trained machine learning model configured with output nodes corresponding to a set of security concerns; after the inputting, accessing output values from the output nodes; and adding, using the processing unit, a security concern of the set of security concerns to the project data structure based on the output values.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 40/284 - Lexical analysis, e.g. tokenisation or collocates
Systems, methods, and apparatuses for encouraging engagement with a rewards system are described herein. A customer associated with a customer device holds a rewards account with a provider associated with a provider computing system. The provider computing system receives rewards and payment card activity of the customer, analyzes the rewards and payment card activity, and generates a rewards engagement rating, which the provider uses to generate and transmit tailored rewards engagement messages to the customer device. The messages provide rewards earn and burn opportunities in which the customer can select to participate.
Systems and methods for requesting, generating, and processing digital tokens are disclosed. A system can receive, from a first user device associated with a first user, a first request to generate a digital token representing a transfer of a resource to a second user. Upon verifying authentication information received from the first user device, the system generates the digital token for transmission to the second user device. The digital token is associated with a usage timestamp. The system receives, from a transaction machine, a second request to redeem the digital token, the second request designating a portion of the resource. Responsive to determining that the second request to redeem the digital token is valid, the system causes the transaction machine to provide the portion of the resource, and credits a remainder of the resource to an account associated with the second user.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
6.
SYSTEMS AND METHODS FOR DETECTING EVIDENCE OF TAMPERING IN A DOCUMENT
Systems, apparatuses, methods, and computer program products are disclosed for detecting evidence of tampering in a digital document. An example method includes receiving by communications hardware, the digital document and determining, by tampering detection circuitry, a tampered region classification result for a region of the digital document. The example method further includes in an instance in which the tampered region classification result indicates tampering, providing, by the tampering detection circuitry, an indication of the region of the digital document and the tampered region classification result to a combination model and receiving, by the tampering detection circuitry, an overall tampering probability from the combination model.
A method includes receiving, via a point-of-sale system, a request for payment comprising a credit account information, a transaction payment amount, and a partial payment indicator, and querying an account database to retrieve an available credit amount and based on the credit account information. The method further includes determining that there is an insufficient credit amount to complete the request for payment based on the available credit amount and the transaction payment amount. The method additionally includes determining a partial payment authorization or a denial of the request for payment based on one or more partial payment authorization rules, the credit account information, the transaction payment amount, and the insufficient credit amount. The method also includes communicating, to the point-of-sale system, the partial payment authorization or the denial of the request for payment. The one or more partial payment authorization rules include a merchant category code (MCC) rule, a percent of transaction rule, an account status rule, a product rule, and/or a partial payment amount rule.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
An example electronic computing device can be programmed to: receive a status and a date for each of a plurality of loan components associated with a loan transaction, the loan transaction being purchase or refinance of a loan for a property; use an operating service level associated with each of the plurality of loan components to calculate a projected completion date for each of the plurality of loan components; and project a closing date based upon a longest of the projected completion date. The electronic computing device can calculate the operating service levels using artificial intelligence.
Systems, methods, and devices for smart digital interactions with augmented reality and generative artificial intelligence are disclosed. A method includes authenticating a user according to one or more authentication settings provided to the premises computing system. The authentication settings can authorize presentation and processing of a subset of the user data records. The method further includes monitoring user input from the user via an input device of the premises computing system, and transmitting, to a generative artificial intelligence system, a request to generate a response based on the user input. The request is in regard to the subset of the user data records. The method also includes presenting, via an augmented reality device, at least one visualization generated based on the response received from the generative artificial intelligence system.
A method may include accessing a financial account of a user to detect an expenditure. The method may include determining a category of the expenditure. The method may include determining whether the user has a financial goal pertaining to the category. The method may include generating a user interface, the user interface including a non-textual visualization pertaining to the financial goal. The method may include presenting the user interface on a computing device of the user.
Systems and apparatuses for safety deposit box access using a smart table and a locker are described herein. A safety deposit box access system includes a smart table and a locker. The smart table includes a processing circuit configured to receive a request from a customer user device associated with a customer to access a safety deposit box that is stored in the locker. The processing circuit is further configured to verify that the customer is authorized to access the safety deposit box stored in the locker. The processing circuit is further configured to actuate a lock of the locker to an unlocked position based on the customer being authorized to access the safety deposit box via the locker.
A computer-based network system and method for using a payment vehicle having an on and off function. The system comprises a payment vehicle comprising an on and off function to enable or to disable the payment vehicle in the computer-based network for processing an electronic payment transaction, a holder of the payment vehicle, and a computer payment network wherein the computer payment network comprises a transaction engine for enabling or for disabling the payment vehicle at a request of the holder of the payment vehicle.
G06Q 40/00 - FinanceInsuranceTax strategiesProcessing of corporate or income taxes
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
13.
Systems and methods for post-quantum cryptography on a smartcard
Systems, apparatuses, methods, and computer program products are disclosed for post-quantum cryptography (PQC). An example system includes a PQC smartcard. The smartcard may include a PQC cryptographic algorithm selection circuitry configured to select a PQC cryptographic technique from a set of PQC cryptographic techniques for encrypting the data. The smartcard may further include a PQC cryptographic circuitry configured to encrypt data based on a generated set of PQC encryption attributes and the PQC cryptographic technique.
The methods and system allow for the generation of a signcrypted biometric electronic signature token using a subsequent biometric sample after an enrollment of a biometric reference value in a biometric system. The signcrypted biometric electronic signature token involves simultaneous encryption and digital signature to protect the confidentiality. The system as described herein provides data integrity, origin authentication, and efficiency by performing encryption and digital signature simultaneously. The process allows a signcrypting party to enroll in a biometric service, sign a piece of data or content using a public key, that may be tied to a trusted anchor certificate authority, and submit a biometric sample. Subsequently, the relying party may validate the information on that piece of data or content to confirm the identity of the signcrypting party.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
15.
Creating augmented hybrid infrastructure as a service
The subject disclosure pertains to provisioning of a hybrid cloud services solution to users. A request for hybrid cloud service can be received from a user by way of a portal. Target users of a hybrid cloud service are identified in response to the received request. Out-of-band touch points can next be determined based on the target users and the request. In one instance, the touch points can be determined based on enterprise or industry rules regarding touch points. Subsequently, a hybrid cloud service solution can be provisioned that integrates the out-of-band touch points. Automatic life cycle management controls can also be provisioned to address patches.
An electronic computing device includes a processing unit and system memory. The system memory includes instructions which, when executed by the processing unit, cause the electronic computing device to receive data associated with one or more customers of an institution. The data is received from one or more other electronic computing devices. The received data is analyzed to identify grammatical elements in the data. Relationships are derived between a plurality of the grammatical elements. At least one derived relationship is used to update a profile for a customer. At least one derived relationship is used to identify a customer for which a remedial action is warranted.
Computing systems and technical methods that transform data structures and pierce opacity difficulties associated with complex machine learning algorithms are disclosed. Advances include a framework and techniques that include: i) global diagnostics; ii) locally interpretable models LIME-SUP-R and LIME-SUP-D; and iii) explainable neural networks.
G06F 18/23213 - Non-hierarchical techniques using statistics or function optimisation, e.g. modelling of probability density functions with fixed number of clusters, e.g. K-means clustering
The described financial institution computing system provides services to customers through an application programming interface (“API”). The services include user identification services to customers. The user identification services allow the customers to verify the identity of users as non-fraudulent users. Further the user identification services allow the financial institution to provide known user information to the customers for purposes of prepopulating registration forms, completing transactions, and the like. Further services, such as user account validation services, payment services, and the like are also possible through the financial institution APIs. In some situations, users are registered with the financial institution. For example, a user may also be an account holder with the financial institution. In other situations, the users are not registered with the financial institution.
Systems, apparatuses, methods, and computer program products are disclosed for determining and providing value information and/or boundary activation information for a system defined in an at least partially bounded domain (i.e., the boundary of said domain consisting of at least one point) and having boundary conditions imposed at a boundary thereof. A deep BSDE solver is trained by, for each time step and for each path, determining, based on a set of underlying features for that path, whether a boundary condition has been activated for the path. When it is determined that a boundary condition has been activated for a first time for the path, an output value for the path is updated based on the boundary condition, an output time is updated based on the boundary activation time step, and not updated further. When the boundary condition was not activated for the path by the final time, the output value for the path is a final corresponding value.
Techniques are described for analyzing and presenting alert-based information for an enterprise business. In particular, a central device in a computer system receives alerts from other devices associated with different office branches of the enterprise business, and analyzes the alerts on a periodic schedule. For example, every month, the central device may calculate a weighted alert volume by district based on the risk scores calculated for the office branches within the district, calculate an average weighted alert volume across the entire enterprise, and calculate the standard deviation of the average weighted alert volume to determine the alert risk rating for the district. The central device may also analyze the dispositions of the alerts on the period schedule. For example, the central device may determine coaching rates and/or disposition rates by district. The central device may further output the alert and/or disposition information to users in a simple format.
G06Q 10/0635 - Risk analysis of enterprise or organisation activities
G08B 3/10 - Audible signalling systemsAudible personal calling systems using electric transmissionAudible signalling systemsAudible personal calling systems using electromagnetic transmission
G08B 29/10 - Monitoring of the annunciator circuits
21.
SYSTEMS AND METHODS FOR PROVIDING CURATED DATASETS ACCORDING TO DATA FROM DISPARATE DATA SOURCES
At least one aspect of this disclosure is directed to method of scraping, by a first computing system, one or more first data sources of the first computing system, and one or more second data sources of one or more external computing systems, to compile a first dataset, standardizing, by the first computing system, the first dataset to generate a standardized dataset, applying, by the first computing system, a first artificial intelligence (AI) algorithm to assign labels to data entries of the standardized dataset, compiling, by the first computing system, the standardized dataset having the labels assigned to the respective data entries in a database, receiving, by an AI interface of the first computing system, a query from a computing device, and generating, by the first computing system, a response to the query for delivering via the AI interface to the computing device.
Disclosed in some examples are methods, systems, and machine-readable mediums which provide for an agent support application with a plurality of plug-in communication support assistants. Each of the plurality of plug-in communication support assistants monitors communications between the agents and customers for different conversational triggers. Conversational triggers may be any conversation, either by the agent or the customer, that the communication support assistant is trained to detect. Upon detecting one of these conversational triggers, the plug-in communication support assistant provides one or more suggestions to the agent.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
G06F 16/435 - Filtering based on additional data, e.g. user or group profiles
G06F 16/9535 - Search customisation based on user profiles and personalisation
G10L 13/00 - Speech synthesisText to speech systems
G10L 15/18 - Speech classification or search using natural language modelling
G10L 15/22 - Procedures used during a speech recognition process, e.g. man-machine dialog
G10L 25/63 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination for estimating an emotional state
H04L 51/04 - Real-time or near real-time messaging, e.g. instant messaging [IM]
23.
APPARATUSES, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR PROPERTY-BASED TRANSACTIONS
A method, apparatus, and computer program product for property-based transactions are provided. An example method includes receiving, by a computing device, a property-based transaction request of a first user that includes first selection parameters and determining first user characteristics of the first user associated with the property-based transaction request. The method further includes determining a first candidate real estate owned (REO) property data object based upon the first selection parameters and the first user characteristics. The first candidate REO property data object is indicative of a first physical location that is owned by an entity associated with the computing device. The method further includes providing a first actionable object to the first user for the first candidate REO property data object. The first actionable object includes selectable inputs that receive corresponding first user inputs for effectuating a transaction that results in a transfer of ownership of the first physical location.
Mapping a message sent between computing applications to a computing environment associated with one of the computing applications. The computing environment can be a test environment used for developing the computing application. Identification of the computing environment and other data from the message can be extracted from a header of the message and logged. The logged data can be stored in a storage and displayed via a user interface.
Systems and methods of metadata-based task access and tracking including: receiving a selection of a source backlog from a set of backlogs; generating a list of tasks associated with the source selection; determining a subset of backlogs from the set of source backlogs based on user account data; receiving a selection of a target backlog from the subset of backlogs; receiving a selection of a task from the list of tasks associated with the source backlog; cloning the selected task from the source backlog to the target enterprise backlog such as by applying a metadata label to the target enterprise backlog associated with the target selection.
Determining and masking sensitive information. Sensitive information, such as personal identifying information, can be present in digitally stored records. For instance, a customer of a business enterprise may submit a textual complaint containing sensitive information that is received and stored by the enterprise. Embodiments of the present disclosure are directed to systems and methods that determine the sensitive information and mask it to reduce vulnerability of the customer and/or to improve the usability of the stored records.
A method may include storing a vector space representation of a set of concepts in a semantic ontology, wherein locations of the set of concepts in the vector space are based on weights of a neural network trained using triples from the semantic ontology; presenting a semantic search user interface including: a text input portion to receive a search query from an input device; a suggested search portion; and a search results portion; receiving, from a user computing device, the search query; converting, using at least one processor, the search query into a vector; computing, using the at least one processor, a set of possible concepts related to the search query based on a distance between the vector and other concepts in the vector space representation; and presenting the set of possible concepts related to the search query in the suggested search portion of the semantic search user interface.
Math-based currency (“MBC”) transactions are inherently quasi-anonymous. Systems and methods of registering customers with a financial institution for the purposes of opening a MBC account are described. During the registration process, the financial institution gathers and stores certain information relating to the customers having MBC accounts. This information may later be used to provide verification of MBC transactions to other parties involved in the MBC transactions.
Detecting a level of current in a conductor such as a power line can be accomplished using sensing devices that are coupled to the line. Such devices can have a clamshell or briefcase-style shape and close about the line. The line passes through a channel between the sides of the device. A quantum substance made of a material having a phonon decay sideband is arranged nearby the channel, and a light source and a scanning source work in tandem to cause the substance to emit light that can be analyzed to determine a magnitude of a magnetic field on the substance. By distributing such sensing devices about a grid or other electrical distribution network, current throughout the network can be collected and analyzed to ascertain the presence and location of interferences with the grid.
G01R 15/24 - Adaptations providing voltage or current isolation, e.g. for high-voltage or high-current networks using light-modulating devices
G01R 19/00 - Arrangements for measuring currents or voltages or for indicating presence or sign thereof
H02H 7/22 - Emergency protective circuit arrangements specially adapted for specific types of electric machines or apparatus or for sectionalised protection of cable or line systems, and effecting automatic switching in the event of an undesired change from normal working conditions for distribution gear, e.g. bus-bar systemsEmergency protective circuit arrangements specially adapted for specific types of electric machines or apparatus or for sectionalised protection of cable or line systems, and effecting automatic switching in the event of an undesired change from normal working conditions for switching devices
H02J 3/00 - Circuit arrangements for ac mains or ac distribution networks
30.
COMPUTER-BASED SYSTEM FOR PROVIDING TOUCHLESS TRANSACTIONS AT AUTOMATED TELLER MACHINES
Techniques are described for providing touchless ATM transactions based on receipt of a pre-staged transaction initiated by an authenticated user via an online banking system of a bank and subsequent receipt of a cryptogram of the user's payment card at an ATM. A server device receives transaction data for the pre-staged transaction from a user computing device via a user interface of an application associated with the online banking system. The server device associates the pre-staged transaction with a bank account including one or more payment cards of the user. The server device later receives a cryptogram of a payment card from an ATM and, based on identification information included in the cryptogram, determines that the payment card at the ATM is one of the payment cards of the bank account associated with the pre-staged transaction. In response, the server device authorizes performance of the pre-staged transaction at the ATM.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
A computer-based system is described that includes a plurality of end-user devices and a computing device executing a contract assessment tool in an enterprise network. An example method includes initiating, by an agent device and with the contract assessment tool, an assessment session for a contract being negotiated; presenting, by the contract assessment tool and to the agent device, one or more prompts for information related to the contract; receiving, by the contract assessment tool and from the agent device, input data representative of the information related to the contract; determining, by the contract assessment tool, whether negotiations for the contract are to be escalated to an enterprise legal group; generating, by the contract assessment tool, one or more reports associated with the contract; and outputting, by the computing device, the one or more reports to at least one of the end-user devices.
A method comprises receiving a cash level indicator from a third-party server. The cash level indicator indicates an amount of cash in each of a plurality of cash storage devices, where the plurality of cash storage devices receive cash from a plurality of delivery agents. Each of the cash storage devices is arranged within or on a vehicle operated by one of the plurality of delivery agents. The method further comprises receiving a cash request from a user device. The method also includes selecting one of the plurality of cash storage devices based on the cash level indicator and location data of delivery agent devices of the delivery agents. The method also comprises sending a message comprising location data of the user device, the selected delivery agent device being one of the delivery agent devices, wherein the selected cash storage device is associated with the selected delivery agent device.
Various embodiments described herein relate to systems, methods, and non-transitory computer-readable media structured to perform server-to-device secure data exchange using a device access token. In an embodiment, a smart device receives, from a requestor entity provided to the smart device, an account data provisioning request for an account. Based on the account data provisioning request, an account identifier for the account is determined. In some arrangements, the account identifier comprises or is associated with a device access token. Based on the device access token, a data element associated with the account is determined. In some embodiments, the data element is accessible to the requestor entity only if it is not access-restricted based on the device access token. Based on the data element, an executable graphic rendering instruction is generated. The executable graphic rendering instruction is executed, which includes generating and displaying, on a user interface of the smart device, a dynamic account status indicator relating to the account.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04L 67/133 - Protocols for remote procedure calls [RPC]
34.
Assessing vulnerability to denial-of-service attacks
This disclosure describes techniques that include evaluating websites and web services to identify those that are at risk for a denial-of-service attack or a distributed denial-of-service attack. In one example, this disclosure describes a method that includes interacting, by an assessment computing system, with a target computing system, wherein interacting includes issuing a plurality of requests to the target computing system and receiving a plurality of responses to the plurality of requests; identifying, by the assessment computing system and based on the plurality of responses, a plurality of latency values that are attributable to processing performed by the target computing system; and determining, by the assessment computing system and based on the plurality of latency values, whether the target computing system is vulnerable to a denial-of-service attack.
Systems and methods an enhanced drive-up banking experience with automatic authentication are provided herein. The system includes a communication interface structured to communicatively couple to a network, sensors, a processor, and memory. The system performs operations including receive an indication that a user has activated a user session on a user device; detect, by the sensors, whether that the user device has entered a first geolocation area; receive a first pre-staged transaction request for a first pre-staged transaction, from a user device; generate a first notification indicating a first transaction device and a first provider employee for completing the first pre-staged transaction; receive a second notification indicating that a user associated with the user device is at the first transaction device; verify the pre-staged transaction; responsive to verifying the pre-staged transaction, complete, by the transaction device management circuit, the pre-staged transaction.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
H04W 4/02 - Services making use of location information
36.
Display screen or portion thereof with a transitional graphical user interface
An automated teller machine (“ATM”) including a processing circuit including a processor and a memory, the memory structured to store instructions that are executable by the processor. The instructions cause the processing circuit to, upon determining that a mobile device of a customer is within a threshold proximity of the ATM: retrieve a real-time rewards balance of a rewards account associated with the customer; determine that at least a portion of the real-time rewards balance is expiring within a certain amount of time; generate a push notification indicating that the customer is near the ATM where the customer can redeem the at least a portion of the real-time rewards balance that is expiring and an interactive user interface element configured to be interacted with by the customer on the mobile device to view a location of the ATM; and transmit the push notification to the mobile device of the customer.
G06Q 30/0207 - Discounts or incentives, e.g. coupons or rebates
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 30/0235 - Discounts or incentives, e.g. coupons or rebates constrained by time limit or expiration date
G07F 19/00 - Complete banking systemsCoded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
A computer-implemented method includes detecting a mobile device associated with an entity entering a geographic location, monitoring a position of the entity within the geographic location, determining movements of the entity within the geographic location based on monitoring the position of the entity, identifying an action performed by the entity within the geographic location based on the movements of the entity, determining an amount of a payment based on the action where the amount of the payment is configured to at least one of increase or decrease based on the movements of the entity within the geographic location, detecting the mobile device exiting the geographic location, and transferring the payment via a payment network in response to determining the amount of the payment and the entity exiting the geographic location.
Machine-readable storage media having instructions stored therein that, when executed by a processor of a mobile device, configure the mobile device to capture a check image for funds to be deposited into a recipient account. The mobile device configured to display a request to a user of the mobile device to provide one or more portions of a MICR line for the received check image and receive user inputs from the user specifying the one or more portions of the MICR line. The mobile device configured to transmit a message to a bank account computer system associated with the recipient account, the message including data specifying the one or more portions of the MICR line.
Computer-implemented methods, apparatuses, and computer program products are provided for multi-user transaction authentication and allocation. An example computer-implemented method includes receiving a transaction payment request data object from a first user device that includes image data and a transaction payment request value. The method further includes determining a first user and a second user from amongst the plurality of users based at least in part upon the image data, determining a first sub-transaction value for the first user, and determining a second sub-transaction value for the second user. The method further includes generating a responsive transaction payment data object that includes instructions for executing a transaction responsive to the transaction payment request data object.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06V 40/20 - Movements or behaviour, e.g. gesture recognition
41.
PRACTICAL ITEMIZED ENCRYPTION FOR CRYPTOGRAPHIC ERASURE (PIECE)
The arrangements disclosed herein relate to systems, apparatus, methods, and non-transitory computer readable media for determining to erase a plurality of ciphertext blocks stored in a memory device, in response to determining to erase the plurality of ciphertext blocks, performing a cryptographic erasure of the plurality of ciphertext blocks. The cryptographic erasure includes encrypting each of the plurality of ciphertext blocks with a random key and destroying the random key in response to encrypting each of the plurality of ciphertext blocks.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
A method comprises receiving, by a computing device, a selection of at least one product to initiate for a customer, determining, by executing a first bot, a product initiation system compatible with a second format and configured to initiate the at least one product, and retrieving, via the first bot, the customer information from a set of previously collected customer information within a product selection form stored in a first format. The method further includes enqueuing, via first bot, the customer information in a workflow queue, and providing, via at least one second bot, the customer information to the product initiation system in the second format, the at least one second bot being associated with the at least one product. The method further includes receiving, from the product initiation system, a notification indicating whether the at least one product has been initiated.
Techniques are described for providing financial institution-specific branding and transactions based on a transaction request initiated by a user at a digital ink ATM and subsequent receipt of a cryptogram from the user's payment card at the digital ink ATM. An ATM server device receives the cryptogram from the digital ink ATM and, based on identifying information included in the cryptogram, determines the financial institution associated with the payment card. The ATM server device then communicates with a bank server device associated with the financial institution to authenticate the user. Upon authentication, the bank server sends a file containing branding information specific to the financial institution to the ATM server. The ATM server then sends instructions to the digital ink ATM displays, including a digital ink display, to display the branding information to the user. The bank server device then authorizes performance of the transaction at the digital ink ATM.
G07F 19/00 - Complete banking systemsCoded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
Systems, apparatuses, methods, and computer program products are disclosed for authenticating devices. An example method includes generating pairs of entangled photons by a first device. One photon of each entangled photon pair may be transmitted to a second device. The first device and the second device may attempt to measure respective photons of the entangled photon pair to obtain a bit of a bit sequence. The bits may be encoded in the polarizations of the entangled photon pairs and may correspond to a true random number due to the generation method used by the first device. The second device may provide authentication data based on the bit sequence to the first device. The first device may use its copy of the bit sequence and the authentication data to authenticate the second device.
Techniques are described for distributed storage and retrieval of data by a defined computing system that includes a plurality of computing devices arranged in a network topology. The computing system stores two or more data blocks of a data set across two or more computing devices of the computing system. Each data block comprises at least one fragment of the data set and metadata including a data set identifier. The storage locations of the data blocks are determined based on messages exchanged among the plurality of computing devices, and may only be known by the computing devices within the computing system. After receipt of a request to access the data set, the two or more computing devices retrieve the two or more data blocks based on the data set identifier, and the computing system sends the two or more data blocks to a requesting device external to the computing system.
An apparatus, system, method, and computer program product are provided for improved automated customer assistance based on legacy data, which may be associated with an ancestor in a family that owns a family business. Some example embodiments use legacy data not associated with the client but associated with the client's predecessor. Some example embodiments employ machine-learning modeling to facilitate automated customer assistance to generate advisories to clients that to assist the client in addressing the implementation of strategies or specific events.
A computing system includes a memory and processing circuitry in communication with the memory. The processing circuitry is configured to receive, from a biller device, a request for payment that indicates a payment amount requested from a payer; and output, for display by a payer device operated by the payer, information indicative of the request for payment, wherein the information indicative of the request for payment comprises the requested payment amount. The processing circuitry is also configured to output, for display by the payer device, information about an offer to apply a funding option to the payment amount, wherein the offer to apply the funding option identifies an amount of funds available; and receive, from the payer device, an indication of selection of the funding option.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
A computer-based credit evaluation system is described that uses a machine learning-based credit risk model with an adverse action methodology to assess applicant credit profiles and identify adverse action factors for credit request denials. The credit risk model is trained to assess an applicant's credit profile based on characteristics. In the case of a denial, the system compares applicant values of the characteristics against anchor values for the characteristics determined based on values from a top scoring credit profile. The system uses the credit risk model to calculate a replacement score for each of the characteristics by replacing the applicant value for the characteristic with an anchor value for the characteristic. The system ranks the characteristics based on the replacement scores, and identifies the top ranked characteristics as the adverse action factors for the denial.
A provider computing system includes a network interface and a processing circuit structured to receive a plurality of fraud cases where each fraud case is associated with transaction data and an initial priority score, determine an updated priority score for each fraud case based on the transaction data and case prioritization data where the case prioritization data includes a set of rules developed using a machine learning model, assign each fraud case to one of a plurality of queues, assign at least one fraud case to a fraud agent computing terminal associated with a fraud agent responsive to determining its updated priority score is at or above a threshold by moving the at least one fraud case to a cache, receive an input from the fraud agent computing terminal regarding a disposition of the at least one fraud case, and restructure the case prioritization data based on the input.
Methods and systems of managing payment cards are disclosed. A financial institution computing system includes a token database storing a plurality of tokens and token information, a network interface circuit enabling the financial institution computing system to exchange information over a network; and a token management circuit. The token management circuit enables a graphical user interface on a customer device over the network that can be used to generate new token requests, re-provision token requests, and management requests. The management requests enable and disable tokens, such that transactions against a payment card account using an enabled token are completed, and transactions against the payment card account using a disabled token are denied.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
G07F 17/32 - Coin-freed apparatus for hiring articlesCoin-freed facilities or services for games, toys, sports, or amusements
51.
SYSTEMS AND METHODS FOR PROVIDING USER PROFILE SEARCH RESULTS
A system includes a network interface coupled to a network, a profile database coupled to the network interface and configured to store profile information relating to a plurality of users, and a processing circuit. The processing circuit is configured to: provide, via a display of a user device, a graphical user interface having a searchable data field that allows a user to enter search criteria; receive, via the network interface, search criteria from the user device associated with the user of the plurality of users; identify historical data comprising at least one of (a) historical search selections associated with the user or (b) data patterns associated with existing or previous successful relationships; and cause profile information relating to one or more users based on the search criteria and the historical data to be transmitted to the device via the network interface.
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
52.
SYSTEMS AND METHODS FOR ENABLING CUSTOMIZED DIGITAL OBJECTS IN MULTIPLE ENVIRONMENTS
Systems and methods of enabling and providing digital objects across multiple environments are provided. A computer-implemented method includes: extracting image content from digital object; determining that the image content satisfies a filter, wherein the filter defines prohibited content for card images; in response to the determination that the image content satisfies the filter, causing, a provisioning of the digital object to an application to display the digital object as being associated with a card; receiving a credential associated with a third-party system depicting a digital representation of the card; providing the received credential to the third-party system depicting the digital representation of the card; and receiving an indication of a verification of the received credential and linking a provider institution computing system with the third-party system.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
A method may include receiving at a receiving system an electronic request to transfer assets, included in an account of a user at a delivering system, to the receiving system; generating an electronic transaction record, the electronic transaction record identifying the user, the assets, and transfer information related to the assets; adding the electronic transaction record to a shared ledger data structure; in response to the adding: transmitting an indication to the delivering system that the electronic transaction record was added; and transmitting a notification to computing nodes associated with the shared ledger data structure that the shared ledger data structure was updated; after transmitting the indication, receiving confirmation from a third-party system that the assets were successfully transferred; and in response to the confirmation, updating an account database at the receiving system indicating a transfer of the assets
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Systems, apparatuses, methods, and computer program products are disclosed for curating a community between a plurality of clients. An example method for curating a community between a plurality of clients includes authenticating a first client of the plurality of clients; obtaining first operation data of the first client; generating a first client profile for the first client; matching the first client to other ones of the plurality of clients using the first client classification; generating a community interaction portal that facilitates interaction between the first client and the other ones of the plurality of clients matched to the first client; and displaying the community interaction portal on a display.
Aspects of the present disclosure address systems and methods for providing a list of financial filters, receiving, from a user, a selection of one or more of the financial filters and a target geographic area, and applying the selection of the one or more financial filters and the target geographic area to match a set of matched geographic areas from a data store, wherein the matched geographic areas are geographically included as part of the target geographic area. The systems and methods additionally include retrieving financial information, demographic information, or a combination thereof, for the set of matched geographic areas when a match is found, and presenting, via a display, the set of matched geographic areas, the financial information, the demographic information, or a combination thereof.
Techniques described herein pertain to prioritizing threats based on their potential effect on the specific enterprise network sought to be protected. In one example, this disclosure describes a method that includes collecting, by a computing system and from a plurality of external data sources, threat information; storing, by the computing system and in a threat registry, the threat information that includes information about a plurality of threats; collecting, by the computing system, information about an attack surface for an enterprise network; mapping, by the computing system, the threat information to the attack surface; analyzing, by the computing system and based on the mapping of the threat information to the attack surface, a threat included in the plurality of threats to identify a risk score associated with the threat, wherein the risk score represents an assessment of the vulnerability of the enterprise network to the threat.
A computer-implemented method, apparatus, and computer program product for digital identity based authentication are provided. An example method includes receiving a request for authentication associated with a first user and determining attributes associated with the first user that include at least one static attribute and at least one dynamic attribute. The method further includes generating an inquiry authentication credential based upon the static attribute and the dynamic attribute and includes querying a digital identity construct database storing one or more previously acquired attributes of the first user. The method includes obtaining a verified authentication credential based upon the previously acquired iterations of the static and dynamic attributes and includes authenticating the first user based upon a comparison between the inquiry authentication credential and the verified authentication credential.
This disclosure describes techniques for calibrating parameters for a model of interest. In one example, this disclosure describes identifying, based on a textual description, a model that generates an output based on a set of inputs; selecting a first plurality of parameter values; assembling a set of training samples by observing outputs generated by the model in response to each of the first plurality of parameter values; training a surrogate model, wherein the surrogate model is trained to predict outputs of the model; generating, using the surrogate model, predicted outputs of the model, wherein each of the predicted outputs of the model is based on a different parameter value in a second plurality of parameter values; selecting, based on the predicted outputs of the model, a desired parameter value; and applying the model, using the desired parameter value, to predict a value of interest for an input value.
An example computer system for providing a maturity model can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: use a cloud computing cybersecurity matrix that organizes a suite of cybersecurity capabilities associated with a cloud computing environment; overlay the maturity model onto the cloud computing cybersecurity matrix, the maturity model measuring a maturity level of technologies associated with the cloud computing environment; and display a dashboard showing the cloud computing cybersecurity matrix with the maturity model overlaid thereon.
Systems, apparatuses, methods, and computer program products are disclosed for obtaining data. The data may be obtained from a variety of data sources. In order to determine the preferred data source for obtaining the data, data quality scores may be computed and assigned to each data source of interest for a given implementation. Each data quality score may take into account several criteria including the computing resources required to obtain the data, the financial cost of obtaining the data, the security risk of obtaining the data, etc. Data may be obtained from the preferred data source, presented to a user associated with the data for verification, and processed in order to provide a computer-implemented services to the user.
In an example, techniques of this disclosure include establishing, by a computing device, authentication data for authenticating a user of a service provided by a service provider, where the authentication data comprises one or more first data entries and one or more second data entries that correspond to the one or more first data entries. The techniques also include retrieving, from at least one third-party service provider, one or more second data entries maintained by the at least one third-party service provider that correspond to the one or more first data entries, and authenticating the user based on the authentication data, where authenticating the user comprises comparing the one or more first data entries to the one or more second data entries retrieved from the at least one third-party service provider.
Disclosed are techniques for using machine learning models to more reliably predict likelihoods of application failure. A model is trained to identify and display events that may cause high severity application failures. Logistic regression may be used to fit the model such that application features are mapped to a high severity event flag. Significant features of applications that relate to the high severity flag may be selected using stepwise regression. The identified applications may be displayed on a graphical user interface for review and reprioritization. Information may be ranked and displayed according to multiple different ranking criteria, such as one ranking generated by a first model, and another determined by one or more users. The multiple ranking criteria may be used to inform steps taken, and/or to retrain or tune the parameters of the model for subsequent predictions or classifications.
A secure transaction system, computer program recording medium and method facilitate secure, in-person peer-to-peer transaction. A controller of the secure transaction system authenticates first and second parties of a transaction via respective first and second user devices. A financial trustworthiness of at least the second party is determined. The controller vouches for the financial trustworthiness of the second party to the first party via the first user device. The controller brokers an in-person transaction that comprises transfer of physical value from the first party to the second party. In response to receiving confirmation of the transfer to the physical value between the first and second parties, the controller adjusts first and second financial accounts respectively associated with the first and second parties to reflect the transfer.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
In a system, computer-readable media and methods for secure ledger assurance tokenization (SLAT), a block content of a first blockchain is audited, which includes accessing, by a request circuit of a SLAT computing system, a retrievably stored cross-reference content and generating an audit result. Generating an audit result includes evaluating, by a SLAT circuit of the SLAT computing system, the cross-reference content such that the audit result is informed at least by the cross-reference content. The audit result is included in a secure ledger assurance token generated by a SLAT generation circuit of the SLAT computing system and stored relationally to the block content of the first blockchain.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
65.
Systems and methods for private network issuance of digital currency
Systems, methods, and computer-readable storage media of configuring digital currency nodes utilizing a one-tier model or two-tier model. One method includes transmitting, via an application provider system, an installation request including authentication information, downloading, by the user device, a digital wallet application, and installing, by the user device, the digital wallet application based on one or more system requirements, wherein installing includes verifying the user device meets the one or more system requirements, generating a public and private key pair, hardening the user device, storing and configuring the digital wallet application, and authenticating the digital wallet application. The method further includes establishing, via a private network, a private network connection associated with digital currency issuance. Another method includes transmitting a registration request, receiving a software package including a software appliance and executable code, installing the software appliance and establishing a private network connection associated with digital currency issuance.
A system includes a processing circuit configured to receive, from a first instance of a mobile wallet application associated with a primary account holder, a request to add a secondary user to an account, receive information relating to the secondary user, receive a restriction to define the secondary user's ability to spend funds from the account based on being a threshold distance from a second computing device, enable the secondary user to download, at a user computing device, a second instance of the mobile wallet application, where the second instance of the mobile wallet application is structured to gather location data associated with the user computing device, and the location data is used to allow a transaction based the user computing device being within the threshold distance, and authorize a purchase request by the secondary user with funds from the account based on the purchase request complying with the restriction.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
Systems, methods, and computer-readable storage media of configuring digital currency nodes utilizing a one-tier model or two-tier model. One method includes transmitting, via an application provider system, an installation request including authentication information, downloading, by the user device, a digital wallet application, and installing, by the user device, the digital wallet application based on one or more system requirements, wherein installing includes verifying the user device meets the one or more system requirements, generating a public and private key pair, hardening the user device, storing and configuring the digital wallet application, and authenticating the digital wallet application. The method further includes establishing, via a private network, a private network connection associated with digital currency issuance. Another method includes transmitting a registration request, receiving a software package including a software appliance and executable code, installing the software appliance and establishing a private network connection associated with digital currency issuance.
Techniques described herein involve testing the knowledge of a learner by evaluating a response to an open-ended question that prompts a learner to provide a short answer. In one example, this disclosure describes a method that includes receiving, by a computing system, a learner question and a model answer to the learner question; outputting, by the computing system, the learner question; responsive to outputting the learner question, receiving, by the computing system, a learner answer; performing, by the computing system, an entailment assessment based on the model answer and the learner answer; determining, by the computing system and based on the entailment assessment, an evaluation of the learner answer; outputting, by the computing system, information about the evaluation; and controlling, by the computing system, a downstream computing system based on the information about the evaluation.
G09B 7/04 - Electrically-operated teaching apparatus or devices working with questions and answers of the type wherein the student is expected to construct an answer to the question which is presented or wherein the machine gives an answer to the question presented by the student characterised by modifying the teaching programme in response to a wrong answer, e.g. repeating the question, supplying a further explanation
Systems, methods, and computer-readable storage media are utilized to analyze multi-channel data based on a security model in a computer network environment. One system includes a plurality of data channels configured to access entity data and a processing circuit communicatively coupled to a data channel of the plurality of data channels, the processing circuit configured to identify at least one vulnerability, determine an impact of the at least one vulnerability, assign the first property to a first cybersecurity dimension, generate a cybersecurity risk score based at least on the impact of the at least one vulnerability, and generate a multi-dimensional score for a target computer network environment based on the cybersecurity risk score.
A method includes receiving a first user request to access or modify a first application, the first user request including a first object identifier (OID), the first OID identifying a first role of the first user. The method further includes determining whether the first OID is equivalent to a first application-specific role, and in response to determining that the first OID is equivalent to the first application-specific role, authorizing the first user request.
A data pipeline validation system and method configured to partially automate testing of data pipelines in a distributed computing environment. The system includes a data pipeline analytic device equipped with various modules, such as a query generation module, data frame comparison module, and metadata management module. The query generation module employs natural language processing techniques to analyze configuration entries and dynamically generate SQL queries tailored to specific test cases. The data frame comparison module compares the results of different test cases using distributed collections, enabling parallel processing and efficient result comparison. The metadata management module captures and stores relevant metadata for traceability and auditing purposes. The system facilitates comprehensive validation of data pipelines, enabling organizations to ensure the accuracy, reliability, and integrity of data.
This application describes techniques for authenticating and/or using a device as physical currency. In one example, this disclosure describes a device comprising: precious metal embedded within the device providing an intrinsic value for the device and making the device suitable for use as physical currency; and processing circuitry configured to: store information about a transaction hash associated with the device, wherein the transaction hash is derived from prior transactions performed using the device, and enable comparison of the transaction hash to information about the device that is stored on a distributed ledger.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
73.
SYSTEMS AND METHODS FOR TRANSACTION FACILITATION VIA A PLURALITY OF CLEARINGHOUSE DEVICES
Systems, apparatuses, methods, and computer program products are disclosed for transaction facilitation via a plurality of clearinghouse devices. An example method includes receive, from a user device, a transaction request and determining, based on the transaction request and a clearinghouse mapping protocol, whether the first clearinghouse device is to facilitate a transaction associated with the transaction request. The method also includes in response to determining that the first clearinghouse device is to facilitate the transaction, authenticating the user device, facilitating the transaction associated with the transaction request, generating an audit trail object based on the facilitated transaction, and causing transmission of the audit trail object to a central entity.
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Methods and systems of managing payment cards are disclosed. A financial institution computing system includes a token database storing a plurality of tokens and token information, a network interface circuit enabling the financial institution computing system to exchange information over a network; and a token management circuit. The token management circuit enables a graphical user interface on a customer device over the network that can be used to generate new token requests, re-provision token requests, and management requests. The management requests enable and disable tokens, such that transactions against a payment card account using an enabled token are completed, and transactions against the payment card account using a disabled token are denied.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
G07F 17/32 - Coin-freed apparatus for hiring articlesCoin-freed facilities or services for games, toys, sports, or amusements
A system for providing coaching is configured to create a custom virtual coach based on one or more feature inputs, including receiving the one or more feature inputs, receiving a financial goal of the user, and generating the custom virtual coach based on the one or more feature inputs and the financial goal of the user. The system is also configured to send a communication containing information related to the financial goal of the user to the user device, assess an effectiveness of the custom virtual coach corresponding to the financial goal of the user, and modify at least one feature of the custom user virtual coach based on the assessment.
Identification of anomalous transaction attributes in real-time with adaptive threshold tuning is provided. A set of historical transactions conducted during a defined time period are analyzed and categorizing into defined groups. Outlier transactions are identified and removed from the set of historical transactions and a set of non-anomalous transactions are determined. When a new transaction is received, the new transaction is automatically allowed based on a determination that the subsequent transaction conforms to the set of non-anomalous transactions. Alternatively, an alert for further analysis for the new transaction is output based on a determination that the subsequent transaction does not conform to the set of non-anomalous transactions.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
77.
APPLICATION OF NATURAL LANGUAGE PROCESSING TO NOTATIONAL DATASETS TO ENHANCE SUB-THRESHOLD REMEDIATION
Disclosed are methods, systems, and devices for detecting and correcting a sub-threshold remediation, wherein a remediation threshold may be established to meet a target remediation execution rate. A remediation may be categorized according to various cause codes by natural language processing, as well as optical recognition, or other methods of machine learning, which may aid in categorization. A plurality of remediation thresholds may be determined according to any characteristic of a transferee, including a history of remediation execution, a status, and the cause code of the remediation.
G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
G06F 16/583 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06K 9/46 - Extraction of features or characteristics of the image
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
G06Q 10/08 - Logistics, e.g. warehousing, loading or distributionInventory or stock management
Disclosed is an approach to model selection including receiving a splitting function, a stopping criterion, at least one attribute selection, and a target variable. A decision tree may be generated, including processing a training data set to create a node that splits the training data set on an attribute from the at least one selected attribute, splitting the node according to the splitting function, and repeating the generation until the stopping criterion is met. A plurality of models may be processed through the generated decision tree, and a determination regarding the target variable made for each model. A subset of models may be selected based on the determination of the target variable, and a category parameter and a designation of at least one model may be received. Documents associated with the designated models may be retrieved and analyzed via NLP and ranked based on the NLP and the category parameter.
A computer-implemented method includes: receiving, by a computing system, from a first device, a request to perform an activity associated with an account of a plurality of accounts of a provider institution; determining, by the computing system, based on the activity, a notification policy based on a notification setting of the account associated with a user; transmitting, by the computing system, a request for information regarding the activity to the first device; receiving, by the computing system, information regarding the activity from the first device; generating, by the computing system, a data payload comprising the received information regarding the activity and initial information associated with the request to perform the activity; retrieving, by the computing system, an address associated with the account; and providing, by the computing system, a notification comprising information from the data payload to a second device associated with the user based on the retrieved address.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
80.
SYSTEM AND METHOD FOR NETWORK ENTITY RANKINGS AND EXCHANGES
A system receives a selection, by a first entity, of product, provided by a second entity, wherein the first entity and the second entity are members of an entity network. The system receives an indication of receipt of the product via an application programming interface (API), transmitted by a first entity, and derives a first ranking metric for the second entity of the entity network based on feedback received from the first entity of the entity network. The system derives a second ranking metric for the second entity of the entity network based on one or more transactions received from a third entity of the entity network, determines whether the first ranking metric is valid based on the second ranking metric, and provides the first ranking metric to entities of the entity network based on the validity of the first ranking metric.
A system for a business entity is disclosed that is configured to execute an authorized countermeasure against a malicious actor via a smart contract in response to the system determining that the malicious actor has performed a malicious action. The system determines that a smart contract established between the business entity and an official agency defines an authorized countermeasure to be performed in the event of the malicious action. The system also determines that the malicious actor has performed the malicious action on the business entity. In response to the determination that the malicious actor has performed the malicious action, the system executes the authorized countermeasure with respect to the malicious actor, which may include one or more of a ransomware attack, a malware distribution, a beacon, a Distributed Denial of Service attack, a destruction of data, an encryption of data, a tokenization of data, or a scrambling of data.
Systems, apparatuses, methods, and computer program products are disclosed for regulating data communication. An example method includes receiving, by transaction circuitry, a communication request and identifying, by data collection engine and based on the communication request, a set of security parameters. The example method further includes determining, by security analysis engine and based on the set of security parameters, a security score associated with the communication request and in an instance in which the security sore fails to satisfy a security requirement, determining, by the security analysis engine, one or more security actions based on the security score and performing, by the transaction circuitry, the one or more security actions. The example method further includes routing, by data regulation engine and based on a configuration table, a transaction associated with the communication request to a compliant communication channel.
Disclosed herein are embodiments of methods and systems for textual-pattern searching of documents for login credentials. In an embodiment, a computer system obtains a document, and uses a textual-pattern-matching engine to search the document for a portion of the document that matches a contiguous textual search pattern. The contiguous textual search pattern includes a username segment, a proximity segment that is positioned after the username segment in the contiguous textual search pattern, and a password segment that is positioned after the proximity segment in the contiguous textual search pattern. In response to finding at least one portion of the document that matches the contiguous textual search pattern, the computer system takes one or more match-triggered actions such as displaying identified matches, augmenting one or more reports, sending one or more notifications, imposing one or more security measures, and/or the like.
Systems, methods and computer-readable storage media utilized to complete a cardless transaction on a distributed ledger network. One method includes receiving, by a point-of-sale (POS) computing device, a transaction request including a biometric sample from an individual associated with a payment account at a financial institution. The method further includes authenticating, by the POS computing device, the biometric sample by cross-referencing the biometric sample with a biometric dataset stored on the distributed ledger network. The method further includes, in response to authenticating the biometric sample, generating, by the POS computing device, a cryptogram associated with the biometric sample and processing, by the POS computing device, the transaction request utilizing the cryptogram.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Systems, apparatuses, methods, and computer program products are disclosed for mobile quantum key distribution (MQKD). An example method includes establishing a first connection between a MQKD device and a first device. The example method further includes generating a pair of entangled particles and injecting quantum data that is based on a first particle of the pair of entangled particles into the first device. The example method further includes establishing a second connection between the MQKD device and a host device and injecting quantum data that is based on a second particle of the pair of entangled particles into the host device to facilitate secure communication between the host device and the first device based at least on the pair of entangled particles.
Systems, apparatuses, and methods are disclosed for measuring one or more metrics of a cryptographic algorithm in a post-quantum cryptography (PQC) system. An example method includes obtaining a set of operating parameters comprising an algorithm of interest, wherein the algorithm of interest is a PQC algorithm, a legacy algorithm operating in a hybrid PQC system, or a variant thereof, and wherein the algorithm of interest is wrapped to present, via a wrapped algorithm of interest, a standardized interface to a sequence of benchmark operations. The example method further includes observing benchmark values of the one or more metrics, wherein the one or more metrics pertain to a designated benchmark operation from the sequence of benchmark operations. The example method further includes outputting a report comprising the benchmark values of the one or more metrics.
A computing entity accesses one or more blocks of a blockchain, encrypts the content of the one or more blocks using a first cryptographic technique to generate one or more first encrypted block values, and writes a first side chain block comprising the one or more first encrypted block values and a first signature to a first side chain. The computing entity accesses at least one of (a) at least one block of a particular second set of one or more second sets of the plurality of blocks or (b) one or more first side chain blocks corresponding to blocks of the second set, encrypts the content of the accessed block(s) using a second cryptographic technique to generate at least one second encrypted block value, and writes a second side chain block comprising the at least one second encrypted block value and a second signature to a second side chain.
G06N 10/00 - Quantum computing, i.e. information processing based on quantum-mechanical phenomena
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
88.
Secure multi-verification of biometric data in a distributed computing environment
Disclosed are example methods, systems, and devices that allow for secure multi-verification of biometric data in a distributed computing environment. The techniques include receiving a request to grant authorization to a second user. The request can include biometric data of the first user and second user. An authorization token can be generated based on the request, which can be transmitted to a second computing device of the second user. A second request can be received from a third computing device that includes the authorization token and third biometric data. The second request can be verified based on the authorization token, the third biometric data, and provenance data, and an indication that the grant of authorization to the second user is verified can be transmitted to the first, second, or third computing devices.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
89.
TRANSACTION INSTRUMENT WITH FEATURES FOR DESTRUCTION AND DISPOSAL
In some examples, a transaction instrument includes a body that defines a first face and a second face, a chip assembly comprising an integrated circuit chip, an aperture in a portion of the body that provides access to a portion of the transaction instrument, and an attachment mechanism configured to secure the chip assembly at least partially within the body and hold the chip assembly substantially flush with the first face of the body. At least one of the body, the attachment mechanism, or a portion of the chip assembly is designed to fail in response to a force applied via the aperture in the body, and wherein the failure of the at least one of the body, the attachment mechanism, or the portion of the chip assembly, destroys the integrated circuit chip of the transaction instrument.
A housing facilitates a service operation for a transaction device. The housing includes a transfer cassette interface structured to receive a cassette. The housing also includes a transaction device interface that is structured to couple to a cassette port of the transaction device when the housing is disposed within a vault of the transaction device such that the housing is removably coupled to the transaction device via the transaction device interface, and responsive to the transfer cassette interface receiving the cassette, operably couple the cassette to a transaction device transport apparatus via the transfer cassette interface.
G07F 19/00 - Complete banking systemsCoded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
Techniques described herein include selecting experience data for use when training or retraining a model. In one example, this disclosure describes a method that includes generating a plurality of trajectories, each comprising a contiguous sequence of instances of experience data, where each instance of experience data in the contiguous sequence has an error value associated that instance of experience data; determining, for each of the trajectories, a sorted order of the instances of experience data, wherein the sorted order is based on the error value associated with each of the instances of experience data; selecting, based on a distribution function applied to the sorted order of the instances of experience data in at least one of the trajectories, a subset of instances of the experience data; and retraining a reinforcement learning model, using the subset of instances of experience data, to predict an optimal action to take in a state.
Embodiments include a provider computing system associated with a provider including a processing circuit configured to present, by a graphical user interface while a bill pay application is in an unlaunched state, a notification including a summary of a bill, and automatically launch the bill pay application in response to the customer selecting the summary. The processing circuit further configured to receive, via the bill pay application, a request to pay an amount of funds to a biller, generate a payment request, provide at least one post to a funds account circuit based on the payment request, and generate and provide a payment data object to a biller computing system.
Systems and methods may generally include using proximate communication circuitry to automatically coordinate bill splitting among users with a mobile device. An example method may include receiving a bill, for example at a mobile wallet executing on the mobile device. The method may include receiving via the proximate communication circuitry, an indication from a second mobile device. A virtual account (e.g., of the mobile wallet) may be funded with a first amount drawn using information from the indication and a second amount drawn from an account of the mobile wallet. The method may include executing payment of the bill, such as with the mobile device.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
94.
AUTOMATED CHANGING OF ADDRESS FOR TEMPORARY COMMUNICATION SYSTEMS
An example computer system for providing a communication system can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: monitor criteria associated with the communication system; assign a weight to the criteria to determine a risk score associated with the communication system; and automatically change an address of the communication system when the risk score exceeds a threshold.
Systems, apparatuses, methods, and computer program products are disclosed for improving individual interactions with generative artificial intelligence. An example method includes receiving, by communications hardware, an electronic correspondence with an individual and extracting, by language processing circuitry and using an interaction data model, interaction data from the electronic correspondence. The example method also includes generating, by generative model circuitry and using an augmentation generation model, correspondence augmentation data based on augmentation model input data, wherein the augmentation model input data comprises the interaction data and user profile data associated with the individual. The example method also includes generating, by correspondence circuitry, a modified electronic correspondence comprising the correspondence augmentation data and data from the electronic correspondence.
H04L 51/07 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
G06Q 30/015 - Providing customer assistance, e.g. assisting a customer within a business location or via helpdesk
Systems, apparatuses, methods, and computer program products are disclosed for predicting an emotion in real-time based on facial gestures and limb gestures derived from captured images. An example method includes receiving a series of images captured in real-time. The example method further includes causing generation of a face segmentation and one or more limb segmentations using the series of images. The example method further extracting one or more face segmentations vectors and one or more limb segmentation vectors. The example method further includes causing generation of weighted vectors using the one or more face segmentation vectors and the one or more limb segmentation vectors for each of the one or more the limb segmentations. The example method includes calculating a probability distribution based on the one or more probabilities corresponding to one or more emotions. The example method finally includes determining a predicted emotion based on the probability distribution.
Systems and methods of determining real-time available capacity of a merchant are provided. A plurality of financial transactions involving the merchant can be received during a current time period. A current payment velocity of the financial transactions involving the merchant during the current time period can be determined. The current payment velocity can be compared with a baseline payment velocity associated with financial transactions involving the merchant during a corresponding historical time period. An available capacity of the merchant can be determined, based on a difference between the current payment velocity and the baseline payment velocity.
Systems, apparatuses, methods, and computer program products are disclosed for facilitating extended range encrypted communication. An example method includes automatically navigating, via navigation circuitry of a first drone, to a first location of a first device. The example method also includes generating, by quantum random number generator circuitry of the first drone, a cryptographic key. The example method also includes establishing, by communications hardware of the first drone, a first connection between the first drone and the first device. The example method also includes causing transmission, by the communications hardware of the first drone, of the cryptographic key to the first device, such that the cryptographic key facilitates secure communication between the first drone and the first device.
Various examples are directed to systems and methods for administering transactions for a plan participant. A plan sponsor system may send plan participant identity information to an identity management system. The plan sponsor system may receive, from the identity management system, an indication of a previously generated public verification key for the first plan participant. The plan sponsor system may generate a first transaction record indicating a transaction on a first retirement plan managed by the first plan sponsor system and broadcast the first transaction record to be included in a distributed ledger.
Distributed firewalls reside at different points across a network. Each distributed firewall can include one or more rules that govern traffic over and/or access to the network. The rules can be discovered, converted into a standardized format, and indexed at a centralized rule database. The rules or data of the rules can be verified. The rules can be certified at the centralized database. The certification process can be based on a direction of traffic to which the rule governs. The certification process may have different levels based on the direction of traffic.