A computer system and a transaction machine, such as an automated teller machine (ATM), can provide for any payor to make a payment to a payee at the transaction machine. The transaction machine provides the payor a user interface to enter a passcode that uniquely identifies the payment transaction. The passcode can be generated by a provider computing system associated with the transaction machine and provided directly to the payee or through the payor prior to the transaction. The transaction machine provides the payor a user interface to enter an amount. The transaction machine receives a cash deposit and provides a deposit user interface that displays deposit information based on at least one bill of the cash deposit.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
Systems and methods for providing secure access to a voice key database are disclosed. The voice key database stores associations between audio inputs, contacts, and voice seeds, leading to synthetic voice outputs. The described embodiments allow for a first set of users to modify voice seed associations. A second set of users may also control the first set of users' ability to modify the voice seed associations. One disclosed system includes one or more processors and memory with stored instructions which when executed by the one or more processors cause the one or more processors to identify a contact associated with an audio input by an input entity; retrieve a voice seed associated with the contact; and generate a synthetic voice based in part on the voice seed and the input.
G10L 13/08 - Text analysis or generation of parameters for speech synthesis out of text, e.g. grapheme to phoneme translation, prosody generation or stress or intonation determination
Disclosed in some examples are methods, systems, devices, and machine-readable mediums for managing the testing of software component dependencies. In some examples, the system may track versions of dependencies; provide an interface to create a customized testing environment—e.g., such as by allowing a user to select whether to include a particular dependency and what version of that dependency to include; select test scripts; select test environments; and automate tests of the selected versions. The system may log test results that can be used for proof of regulatory compliance. In some examples, the system may automate the testing of new dependency versions. For example, a new version of a dependency may automatically be tested by the system using one or more test scripts. The results may then be presented to one or more users.
A method includes presenting, to a user, a list of bill payment accounts included in a bill payment system, wherein each bill payment account in the list of bill pay eligible bank accounts of the user is delegable by the user. The method also includes receiving, from the user, a selection of a bill payment account included in the list of bill payment accounts and a to-be delegate identifying information, and transmitting a communication comprising a request for bill payment delegation based on the selection and on the pending delegate identifying information. The method additionally includes authenticating a second user via a user credential linked to the pending delegate information, receiving, from the second user, an indication of acceptance of a delegate role for the bill payment account, and applying the delegate role in the bill payment system to enable access to the bill payment account via the user credential based on the indication of acceptance.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
5.
SYSTEMS AND METHODS FOR FRAUD CONTROLS FOR AUTOMATED TRANSACTION MACHINES
Systems and methods relate to an automated teller machine (ATM) associated with a provider institution computer system. The ATM system includes a processor and a memory having instructions thereon that cause the processor to: receive, via an input device and in a first instance, a first user input from a user of the ATM regarding a first transaction; identify at least: one or more factors associated with the user, and user account data; in a second instance subsequent to the first instance, provide a second transaction including one or more products, the products determined based on at least the factors associated with the user and the user account data; and cause a graphical user interface (GUI) of the ATM to display the products. The ATM may also include a storage repository to store non-monetary media and a card preparation apparatus to convert the non-monetary media into a transaction media.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
6.
SYSTEMS AND METHODS FOR PROVIDING CONTINUOUS SIGNATURE MANAGEMENT
Systems, apparatuses, methods, and computer program products are disclosed for providing continuous signature management. An example method includes detecting, by an event identification circuitry, a user authentication event and receiving, by communications hardware, a signature from the user during the user authentication event. The example method further includes determining, by the event identification circuitry, a signature parameter set for the signature and determining, by the event identification circuitry, whether the user authentication event corresponds to an authentic event type. The example method further includes in an instance in which the user authentication event corresponds to the authentic event type, storing, by signature management circuitry, the signature and corresponding signature parameter set in a signature profile associated with the user within a signature corpus.
A method may include transmitting, from a browser application of a client system, a request for a webpage to a server system using a general execution environment of the client system; receiving the webpage, the webpage including a secure execution request to execute a computation in a trusted isolated execution environment of the client system; in response to the secure execution request, establishing a secure enclave within the trusted isolated execution environment with respect to the browser application; receiving, within the trusted isolated execution environment, an attestation request from the server system for an attestation associated with the secure enclave; transmitting, from the trusted isolated execution environment, an attestation response based on a physical property of a processing unit in the client system; subsequent to transmitting the attestation response, receiving, from the server system, a data file; and storing the data file in the secure enclave.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
8.
SERVER-TO-DEVICE SECURE DATA EXCHANGE TRANSACTIONS
Various embodiments described herein relate to systems and methods to perform server-to-device secure data exchange using a device access token. In an embodiment, a first device may, via a software application, receive a request to enroll a paired second device in a secure ecosystem, generate a device access token based on a device identifier for the second device, and provide the token to the second device. The second device may receive a transaction request from a second application and transmit the device access token and transaction request to a computing system. The computing system may parse a device identifier from the token, generate an electronic message responsive to the transaction request, and send the electronic message to the second device. The second device can provide a response to the transaction request to the second application based on the received electronic message.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04L 67/133 - Protocols for remote procedure calls [RPC]
9.
PROTECTING TOKENIZED STRUCTURES USING A PROTECTION ARCHITECTURE
Systems, methods, and computer-readable storage media to protect tokens using a protection architecture. One method includes identifying asset tokens including links to a plurality of asset metadata objects. Further, the method includes generating a container metadata object including metadata of the asset tokens. Further, the method includes generating a container token including a link with the container metadata object. Further, the method includes encapsulating the container token and the asset tokens within a container including a container control structure restricting outputs of the container metadata object and the plurality of asset metadata objects. Further, the method includes generating an allocation token compatible with a segmented allocation control structure restricting outputs by the container of a first segmented allocation of the asset tokens based on metadata of a subset of the plurality of asset metadata objects. Further, the method includes providing, using the segmented allocation control structure, the allocation token.
G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
10.
Apparatuses, computer-implemented methods, and computer program products, for data repository ownership identification
Embodiments of the present disclosure provide for improved identification of ownership and/or ownership lineage for a data repository, such as a shared file drive. Ownership data and/or ownership lineage data is identified based on data associated with the data repository itself and/or file data objects stored thereon in conjunction with data from a user linkage database. In this regard, accurate identification of a particular owner or owner(s) of a data repository may be determined from the data repository, and the user linkage database may serve additional details of such owner(s), linkages to other user(s) and/or group(s) of users embodying owner(s), and/or the like. Identified ownership data and/or ownership lineage data may be used for a myriad of additional processes, such as to notify users, determine what data repositories to perform detailed, efficient scans of based on group membership of the owner of said data repositories, or the like.
Disclosed in some examples are methods, systems, and devices which provide for an IRS menu bypass and an authentication and session transfer to a live agent according to some examples of the present disclosure. When a handover condition is detected the ANLPA requests a security token from the IRS. The ANLPA also provides the user's authentication status, context information about why the user is calling, and/or other information to the IRS. When the user calls, they provide the security token to the IRS. The IRS uses the token to look up the authentication status and the context information and to automatically route the user to the correct live agent. In some examples, in order to enhance security, the user remains authenticated only if they are calling from a same computing device that hosted the ANLPA session and requested the security token.
Examples described provide systems and methods provided that include creation of financial avatars in a metaverse representing an insured person, beneficiaries and beneficial activities to be carried out in the event of the insured person's demise or other predefined trigger event. An intervener avatar executes all of the intended beneficial activities on behalf of the insured person to the rightful beneficiaries and/or integral products. Upon successful completion of the beneficial activity, the intervener avatar causes the financial avatars to be disintegrated or erased from the metaverse.
Systems, apparatuses, methods, and computer program products are disclosed for peer-based influence prediction for compute actions. In various examples, a first subset of a first plurality of user accounts may be determined as peers for a first user account. A proposed compute action associated with the first user account may be identified. First encoded data representing the proposed compute action may be generated. A first similarity score may be generated based at least in part on the first encoded data and one or more encoded representations of past actions associated with the first subset of the first plurality of user accounts. An influence prediction may be generated for the proposed compute action based on the first similarity score. The influence prediction may indicate a predicted degree by which the proposed compute action is influenced by the past actions.
A computer system and method for improving call center routing through analysis of customer interactions including obtaining identifying information for a caller upon initiation of a call, identifying the caller as a repeat customer using the identifying information, retrieving historical interaction data associated with the repeat customer from a database, analyzing any combination of customer audio data, customer call log information, or customer feedback, utilizing an artificial intelligence algorithm to determine a current mood indicator of the customer, calculating a customer behavior score for the repeat customer based on the historical interaction data and the current mood indicator of the customer, and matching the repeat customer to a call agent, based on the customer behavior score.
A risk-sensitive code generation computing system receives query data indicating a requested code section. A code attribute evaluation module determines attributes that indicate characteristics of the query data or the requested code section. Based on the attributes, the code attribute evaluation module calculates risk level data for the requested code section. A code generation module selects, based on the risk level data, a set of training resources. Based on the selected training resources, the risk-sensitive code generation computing system modifies training of a trained neural network model. The modified trained neural network model generates a risk-sensitive code data object based on the requested code section and the risk level data. The risk-sensitive code generation computing system provides at least a portion of the risk-sensitive code data object to an additional computing system.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 8/71 - Version control Configuration management
16.
SYSTEMS AND METHODS FOR EVALUATING AN ELECTRONIC COMMUNICATION
Systems, apparatuses, methods, and computer program products are disclosed for evaluating an electronic communication. An example method includes receiving an electronic communication and generating, a plurality of tokens based on the plurality of characters. The example method further includes determining whether the electronic communication includes disallowed content based on the plurality of tokens using a contextual analysis machine learning model and in an instance in which the electronic communication is determined to include disallowed content, determining, an infraction event using the contextual analysis machine learning model. The example method further includes determining an infraction alleviation action based on the infraction event type and causing performance of the infraction alleviation action.
Systems and methods are disclosed herein for computing a frequency response spectrum for a superconducting transmon. An example method includes receiving, by communications hardware, an applied voltage function, and computing a first approximation for a set of coefficients of a component form Lindblad master equation, wherein the component form Lindblad master equation is determined using a Hamiltonian based on a Schwinger oscillator model of angular momentum. The example method also includes computing a second approximation for a set of eigenvalue energies of the component form Lindblad master equation and determining a set of coupled differential equations. The example method also includes applying a Runge Kutta method to solve the set of coupled differential equations to obtain a set of matrix elements of a density operator and computing an expectation value of a Schwinger angular momentum component to obtain the frequency response.
Systems and methods relate to an automated teller machine (ATM). The ATM includes a storage repository configured to store a non-monetary media and at least one processor and at least one memory coupled to the at least one processor. The memory has instructions thereon that when executed, cause the at least one processor to, in a first instance, receive, via an input device, a first user input from a user of the ATM regarding a transaction involving the non-monetary media. Additionally, responsive to receiving the first user input, the ATM receives, via at least one media aperture, non-monetary media for storing in the storage repository and provides, via an output device, an access credential associated with the transaction. In a second instance after the first instance, the ATM receives the access credential, validates the access credential, and provides the non-monetary media from the storage repository to the user.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
A computing system can include at least one processing circuit that can monitor a first plurality of interactions with a plurality of Automated Teller Machines (ATMs), detect a change from a first status of a first ATM of the plurality of ATMs to a second status of the first ATM, retrieve information corresponding to a second plurality of interactions with the first ATM, identify one or more profiles associated with respective interactions of the second plurality of interactions, determine a plurality of user devices enrolled in a subscription to receive status updates regarding the first ATM, and transmit a signal to the plurality of user devices to cause the plurality of user devices to display a user interface to identify the second status of the first ATM.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
20.
SYSTEM AND METHOD FOR FINANCIAL HEALTH ROBO-ADVISOR
Aspects of the present disclosure address systems and methods for receiving, via a processor, a financial health goal from a user and for retrieving, from a data store, one or more financial health templates based on the financial health goal. The financial health goal does not include an investment goal. The systems and methods additionally include retrieving, from a data store, one or more financial health templates based on the financial health goal, wherein each of the one or more financial health templates comprise a trained model. The systems and methods also include deriving, via the processor, a financial health advice action based on using the financial health goal as input to the trained model of the one or more financial health templates, and providing the financial health advice, wherein the one or more financial health templates are created based on consumer financial data.
Various examples are directed to computer-implemented systems and methods for financial health visualization. A method includes providing an interactive interface for a user on a graphical user interface (GUI) of a local user device, where providing the interactive interface includes using an instance of a program that is prevented from accessing networks once running to ensure security of user input. Input is received from the user generated by user manipulation of a plurality of sliders on the interactive interface. In response to the input, a plurality of financial measures indicative of a financial health of the user are calculated based on the input, and the plurality of financial measures are displayed on the interactive interface. Further in response to the input, a plurality of vertical stacked line graphs are adjusted based on the input, and the adjusted plurality of vertical stacked line graphs are displayed on the interactive interface.
G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
G06F 3/04817 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
G06Q 40/06 - Asset managementFinancial planning or analysis
G06T 11/20 - Drawing from basic elements, e.g. lines or circles
22.
COLONIZATION OF TRANSACTIONAL DATA BASED UPON GEOGRAPHY
An example computer system for colonizing transactions can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: receive a transaction initiated by an originator; automatically route the transaction to a colony based upon a context packet associated with the transaction; and store data associated with the transaction in the colony; wherein the colony satisfies regulatory requirements of a geographic area associated with the transaction.
A computing system includes at least one one or more automated teller machines (ATMs) and at least one processing circuit. The at least one processing circuit is configured to train an artificial intelligence (AI) model to determine predicted transactions of a user using transaction data related to a plurality of transactions of the user with the one or more ATMs; receive data indicative of a location of a user device corresponding to the user; determine a corresponding location of an ATM of the one or more ATMs; determine a predicted transaction of the user at the ATM using the AI model; and transmit information corresponding to the predicted transaction to the user device including an interface element to cast the predicted transaction to the ATM. The ATM is configured to receive transaction data cast by the user device to the ATM and execute a transaction according to the transaction data.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
An example computer system for liquidity modeling can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: receive requests from an organization to conduct one or more transactions, where the transactions include receivable transactions and payable transactions; identify a current liquidity status and one or more business activities associated with the organization; predict a liquidity requirement of the organization based upon the receivable transactions, the payable transactions, the current liquidity status and the one or more business activities; and prioritize the one or more transactions based upon the liquidity requirement.
Systems and techniques may generally be used to exchange data across multiple routing platforms. An example technique may include receiving, at a routing platform, an ongoing voice call, generating an interaction identifier associated with a user and the ongoing call, collecting ongoing voice call information, retrieving, using the ongoing voice call information, a user data record from a records data storage, identifying a target routing platform, and sending a voice stream corresponding to the ongoing voice call to the target routing platform. The target routing platform may include a routing target.
Systems and methods for managing data using knowledge graphs are provided. A method receiving, by a processor, an input record. The method may also include loading, by the processor, a configuration file comprising commands that cause the processor to query a data source to extract application log data associated with the input record and map the application log data to transaction graph data. The method may also include traversing, by the processor, the transaction graph data to identify one or more anomalous components in the transaction graph data. The method may also include outputting, by the processor, a signal associated with an indication of the one or more identified anomalous components.
A method may include receiving, over a first wired phone line interface of a computing device, a telephone call with an originating call identification; passing the telephone call to an attached phone over a second wired phone line interface; matching, at the computing device, the originating call identification to a number list of a plurality of number lists; based on the number list, assigning, using the computing device, the telephone call a threat level; and presenting, on a display device of the computing device, an identification of the threat level.
A method may include presenting a user interface on a computing device, the user interface including: a service provider input element identifying a service provider; a service identifier input element identifying a service; and a graph presentation area; executing a knowledge graph database query using a combination of the service provider and the service as input to a knowledge graph database; receiving tuple results in response to the executing, the tuple results including an allocation value property of the service provider attributable to the service provider with respect to the service; and generating in the graph presentation area, an interactive graph based on the tuple results including: representations of entities including the service provider and the service in the tuple results as nodes in the interactive graph, wherein a representation of the service provider includes the allocation value; and links connecting the representations of entities.
An example system for generating an integrated property and lending search experience can include: at least one processor; and memory encoding instructions which, when executed by the at least one processor, cause the system to: generate a property engine programmed to search for homes meeting certain home parameters; generate a lending engine programmed to search for loans meeting certain loan parameters, the loan parameters including a down payment amount and/or a monthly payment amount; and display information about one or more homes meeting both the home parameters and the loan parameters.
Information analysis and display systems and methods include receiving first financial information regarding a user, and calculating a target home price based on the received financial information. A user interface display is generated that displays the target home price, and modifications to the target home price from the user are received via the user interface. Homes for sale are evaluated based on the target price.
Managing payment requests. When a liquidity manager goes down, last-known liquidity data can be obtained from a stand-in liquidity manager to execute requested payments even while the liquidity manager is down. Based on a context of a requested payment, execution of the payment can be either performed in real-time using the stand-in liquidity manager or queued until a later time when the liquidity manager is back up.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
The arrangements disclosed herein relate to systems, apparatus, methods, and non-transitory computer readable media for Secure Node Exchange Attribute-based Keys (SNEAK) including secure exchange of sensitive message elements between sequential message nodes using attribute-based key management. Each message node can access none, one, some, or all encrypted message elements based on assigned attributes of that message node. A key management node provides key exchange for each Content Encryption Key (CEK) used to protect the message elements based on attributes of the message nodes.
A secured credit provider computing system is disclosed. The system includes a processing circuit. The processing circuit can provide, to a user computing device, a passcode corresponding to a product. The processing circuit can receive, from an automated teller machine (ATM), a request corresponding to the product and comprising the passcode. Responsive to determining that the passcode is valid, the processing circuit can cause the ATM to accept a check or paper currency corresponding to a collateral deposit for the product. The processing circuit can receive, from the ATM, a message acknowledging the collateral deposit, the message generated by the ATM upon accepting the check or paper currency. The processing circuit can determine that the collateral deposit satisfies a collateral request for the product and transmit, to the user computing device or the ATM, a notification indicating that the collateral deposit has been approved.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
34.
SECURE DIGITAL AUTHORIZATION BASED ON IDENTITY ELEMENTS OF USERS AND/OR LINKAGE DEFINITIONS IDENTIFYING SHARED DIGITAL ASSETS
A method includes: generating a dataset based on a first digital identity profile of a first entity and a second digital identity profile of a second entity; inputting the dataset to an artificial intelligence (AI) agent to generate a linkage definition and a set of activation elements; determining that at least one activation element of the set of activation elements has been triggered; in response to determining that the at least one activation element has been triggered, generating one or more security access tokens based on the linkage definition, the one or more security access tokens indicating that access to the one or more assets is granted; and transmitting the one or more security access tokens to at least one of a first device identified in the first digital identity profile or a second device identified in the second digital identity profile.
Various examples are directed to systems and methods for serving a virtual reality user interface to a user. A computing system may receive, from a user device, an indication that a user avatar for the user is to encounter a third-party avatar associated with a third party in a virtual environment. The computing system may access trust data describing a level of trust between the user and the third party and determine a first visual indicator based at least in part on the level of trust between the user and the third party. The computing system may generate a rendering of the third-party avatar comprising the first visual indicator and serve the rendering of the third-party avatar to the user device for display by the user device to the user.
The present disclosure generally relates to techniques for implementing a virtual assistant application using machine learning. The systems and methods can receive an input from a user. The input can be associated with a problem to be solved. Using a machine learning model, the systems and methods can determine a style and an intent of the user based on the input, determine extracted data that includes information corresponding to the style and intent, predict a desired result based on the extracted data, and generate a set of actions. The set of actions can be based in part on the style of the user and the intent of the user. Each action in the set of actions can correspond to a step that the user can take to accomplish the desired result. The systems and methods can output a signal associated with a representation of the set of actions.
The present disclosure describes devices and methods of providing a technology environment for analyzing programs or initiatives of an enterprise. In particular, a computing device including a processor with computer readable instructions to access client resolution data that includes information regarding one or more resolutions. A resolution may be associated with a claim made by a client, and include multiple variables including correspondences between the client and the enterprise, an actual value corresponding to the claim, and an expected value corresponding to the claim. The computing system may generate a dataset of all of the resolutions, apply an outlier detection model, and provide an interactive summary of one or more outlier analysis tests via a graphical user interface.
G06Q 10/0637 - Strategic management or analysis, e.g. setting a goal or target of an organisationPlanning actions based on goalsAnalysis or evaluation of effectiveness of goals
G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations
38.
COMPUTER-BASED SYSTEM TO VALIDATE BUILD INTEGRITY OF SOFTWARE PRODUCTS
Techniques are described for validating build integrity of software products, such as applications or containers. More specifically, this disclosure describes a build integrity validation system that analyzes build artifacts resulting from a software build process to create source code assertions, and compares the assertions against the source code from which the build artifacts were produced. The build integrity validation system validates that a particular build artifact is producible by the source code to ensure that no additional code was introduced during the build process. The build integrity validation system may also reverse the analysis to validate that the source code is able to produce the build artifacts to ensure that no code was removed or modified during the build process. The build integrity validation system identifies and reports identified discrepancies between the source code and the build artifacts resulting from the software build process of the source code.
A method, apparatus, and system of activating and using a contactless card via unique activation codes are disclosed. A system includes a memory and a processor configured to: receive an account number for a contactless card from a third party computing system; generate a card activation code for the contactless card, the card activation code being unique to the contactless card; generate a customer-specific uniform resource locator (URL) by appending the card activation code to a general URL, the general URL being associated with an entity of the system; transmit the customer-specific URL to the third party computing system with instructions to write the customer-specific URL into a wireless chip of the contactless card; associate the card activation code with the account number and information regarding a customer associated with the contactless card; and store the card activation code within the memory to be referenced during activation.
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 40/06 - Asset managementFinancial planning or analysis
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
G06F 21/45 - Structures or tools for the administration of authentication
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
H04W 4/14 - Short messaging services, e.g. short message service [SMS] or unstructured supplementary service data [USSD]
A system and method for card control includes a card control computing system configured to enforce a card control rule based upon transactions made with a payment card. The card control computing system includes a memory unit configured to store information associated with a card control dashboard, and a processing unit configured to cause presentation of the card control dashboard via a display associated with a remote computing device, such that the card control dashboard is associated with the payment card and the card control rule. The card control dashboard includes a user interface. The processing unit is further configured to receive an input via the user interface to activate or deactivate one or more features associated with the card control rule, and trigger the card control rule based upon the one or more features that are activated or deactivated.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
An example computing system for classifying messages is described. For example, a computing system includes a memory and one or more processors in communication with the memory. The one or more processors are configured to receive data indicative of a message from a user device, wherein the data indicative of the message comprises a string of characters, identify, based on the string of characters, a set of token vectors from a plurality of token vectors generated based on a set of training data, and determine, using a machine learning model and based on the set of token vectors, a probability that a risk level associated with the message is a first risk level indicating that the message is to be elevated, wherein the first risk level is greater than a second risk level.
Systems and methods are provided, that include collecting, via a data collection system, a social network data from one or more social networks, and receiving a credit voucher from a first entity of the one or more social networks, wherein the credit voucher assigns a credit score to a second entity of the one or more social networks. The systems and methods also include generating a community-based credit score for the second entity of the one or more social networks based on an analysis of the social network data and the credit score, and receiving a request for the community-based credit score sent by a requestor. The systems and methods additionally include providing the community-based credit score to the requestor.
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
An example system can include: at least one processor; and non-transitory computer-readable storage storing instructions that, when executed by the at least one processor, cause the system to: generate a configuration manager programmed to configure a workstream including a plurality of models, wherein the workstream defines metadata associated with execution of each of the plurality of models; generate an execution manager programmed to execute each of the plurality of models in the workstream according to the metadata; and generate a results manager programmed to access results of the execution of the workstream.
An example computer system for providing one or more tools for large language model agents can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: authenticate a user; provide a description of the one or more tools available for use by the large language model agents; execute the one or more tools upon receipt of a request from the large language model agents; and provide information in response to the request.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
Systems, apparatuses, methods, and computer program products are disclosed for mitigating correspondence fraud. An example method includes receiving candidate correspondence associated with a user and extracting one or more correspondence content data features from the candidate correspondence. The example method further includes determining, based on the one or more correspondence content data features, a set of fraud patterns associated with the candidate correspondence and determining, based on the set of fraud patterns, a fraud classification for the candidate correspondence. The example method further includes generating, based on the fraud classification, a first set of fraud deterrence recommendations and providing the first set of fraud deterrence recommendations to one or more computing devices.
Systems, apparatuses, methods, and computer program products are disclosed for providing emotionally intelligent interaction guidance. An example method includes detecting a user interaction event for a user within an environment and receiving media pertaining to the user. The example method further includes determining an inferred emotional classification for the user based on the received media. The example method further includes generating the emotionally intelligent interaction guidance based on the inferred emotional classification using a guidance machine learning model and providing the emotionally intelligent interaction guidance to an entity device.
Systems, apparatuses, methods, and computer program products are disclosed for providing correspondence fraud detection. An example method includes receiving candidate correspondence associated with a user and extracting, based on one or more artificial intelligence (AI) modeling techniques, correspondence content data from the candidate correspondence. The example method further includes detecting, based on the correspondence content data, a set of correspondence faults associated with the candidate correspondence. The example method further includes generating based on the set of correspondence faults, a fraud likelihood score associated with the candidate correspondence in order to determine an authenticity category for the candidate correspondence, where the authenticity category is indicative of whether the candidate correspondence originated from an enterprise with which the user is associated. The example method further includes providing a correspondence fraud evaluation, where the correspondence fraud evaluation comprises an indication of the authenticity category for the candidate correspondence.
An example method for updating users regarding incidents includes: receiving, by a computing system, one or more reports of one or more incidents; generating, by the computing system, information about each of the one or more reported incidents based on the one or more reports received by the computing system; distributing to one or more user devices the information about the one or more reported incidents; and continually updating the information distributed to the one or more of the plurality of user devices. The information can be distributed as an events ticker, which can be associated with a software application, such as a messaging application, so that the ticker may scroll events while the user is using the messaging application.
A cassette housing for storing banknotes includes a first docking element structured to receive a first cassette, a second docking element structured to receive a second cassette, a transport apparatus structured to facilitate transferring banknotes between the first cassette and the second cassette, and a housing computing system comprising a processing circuit including one or more processors and memory, the memory storing instructions that, when executed by the one or more processors, cause the housing computing system to receive banknote storage information associated with the first cassette, receive banknote storage information associated with the second cassette, and cause the transport apparatus to initiate a transfer of one or more of the banknotes based on the banknote storage information associated with the first cassette and the banknote storage information associated with the second universal cassette.
G07F 19/00 - Complete banking systemsCoded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
52.
SYSTEMS AND METHODS FOR DIGITAL ACCOUNT ACTIVATION
A method, user device, and computer-readable storage media for registering and activating accounts are provided. A method includes: transmitting, by a user device to a computing system, an input from a user regarding opening an account; establishing, by the user device, a communication session based on exchanging encryption information between the user device and the computing system; in response to establishing the communication session, automatically installing, by the user device, a client application; and receiving, by the user device, an indication of an activation of the account from the computing system.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G07F 7/10 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card together with a coded signal
A method includes receiving a mobile device identifier associated with a mobile device, wherein the mobile device identifier is received based on a first near-field communication (NFC) tap between the mobile device and a third-party computing system; validating the mobile device as belonging to a customer based on the received mobile device identifier; binding the mobile device identifier to the customer based on the validation; generating a token for an account of the customer; and in response to generating the token, providing the token to the third-party computing system, wherein the token is automatically provisioned to the validated mobile device via a second NFC tap between the mobile device and the third-party computing system.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
This disclosure describes techniques for application health monitoring using distributed ledger technology in a computing system that includes a plurality of nodes providing application services. For example, the techniques include obtaining health indicators of a particular application service by a computing system. The computing system causes a consensus system that includes a particular node executing the particular application service to vote and verify the status of the node. Based on the verification of the status of the particular node, the consensus system writes an entry to a distributed ledger regarding the status of the particular node. The computing system reads the entry of the distributed ledger and generates a ticket based on the entry. The computing system adds the ticket to a network queue for broadcasting within the computing system.
H04L 43/0817 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference
H04L 41/0893 - Assignment of logical groups to network elements
55.
Systems and methods for funds transfers via a federated directory
A system, method, and apparatus for interdirectory funds transfers is provided. A method includes: receiving data from two or more payment directories, the data comprising information pertaining to a plurality of users, each of which are enrolled with at least one of the two or more peer-to-peer payment directories. The method includes receiving, by the federated directory management computer system, a request for a fund transfer to a payee and determining, by the federated directory management computer system based on the received data and the request, that the fund transfer is either an interdirectory transfer or an intradirectory transfer. The method includes identifying, by the federated directory management computer system based on the determination, a payment rail for the fund transfer and processing, by the federated directory management computer system based on the determination, the fund transfer via the identified fund rail.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
Systems and methods for providing recommendations relating to payment methods include establishing a connection between a first application executing on a first server and a second application executing on a second server where the first and second applications are linked to a first account holder. The first application may receive invoice data of a plurality of invoices from the second application. The first application may identify that at least one recipient is enrolled to accept a second payment type with one or more second account holders. The first application may identify a subset of invoices corresponding to the at least one recipient, compute a difference between a first value corresponding to usage of a first payment type and a second value corresponding to usage of the second payment type, and present a recommendation to enroll the first account holder with the second payment type based on the difference.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
57.
Systems and methods for secure sharing of information imported into account
A system for user registration and preference configuration. The system comprises at least one processing circuit to receive an enrollment request of a user, import user content of the user based on the availability of the user content, create a user account for the user, wherein the user account comprises the user content, import, via a listener channel, content from a user device associated with the user, wherein the importing includes extracting data from the content, receive a content share request from a third-party for a piece of content, and authorize the third-party based on cross-referencing the content share request with a plurality of sharing rules set by the user, wherein the authorization comprises a limitation on the piece of content.
In an example, a computer-implemented method includes determining a set of permissions that specifies types of account data of one or more financial accounts to share with a third-party, the one or more financial accounts being associated with a user and held by a financial institution, and generating authorization data that authenticates the third-party and authorizes the third-party to access the types of account data specified by the set of permissions. The method also includes transmitting the authorization data to the third-party, receiving a request for authorization that includes the authorization data and a request for account data of the one or more financial accounts that conforms to the types of account data specified by the set of permissions, authorizing the third-party based on the authorization data, and transmitting the account data that conforms to the types of account data specified by the set of permissions.
Systems, apparatuses, methods, and computer program products are disclosed for providing overfitting mitigation for AI models under training. An example method includes initiating a model training session for an AI model. The example method further includes determining an overfitting metric value associated with an overfitting metric, where the overfitting metric indicates an overfitting condition associated with an AI model under training. The example method further includes determining whether the overfitting metric value satisfies a first overfitting metric threshold and determining whether the overfitting condition associated with the AI model has deteriorated. The example method further includes, in response to determining that the overfitting condition associated with the AI model has deteriorated, incrementing a patience counter value associated with a patience counter, determining whether the patience counter value satisfies a patience threshold and, in response to determining that the patience counter value satisfies the patience threshold, terminating the model training session.
Systems, apparatuses, methods, and computer program products are disclosed for estimating a crypto-agility score of a network of computing assets. An example method includes receiving a network graph and a set of expert-determined importance weights and selecting a first network node from a set of network nodes. The example method further includes computing an upgrade cost for the first network node based on a set of dependency network nodes and applying an expert-determined importance weight to the upgrade cost for the first network node to determine a weighted upgrade cost for the first network node. The example method further includes adding the weighted upgrade cost for the first network node to a set of weighted upgrade costs and summing, by the graph circuitry, each weighted upgrade cost from the set of weighted full upgrade costs to determine the crypto-agility score for the network of computer assets.
Aspects of this technical solution can include receiving, by a provider computing system from an application of a client device, a query indicating a request for information; determining that a reply to the query is associated with the provider computing system or an external computing system external to the provider computing system; authenticating a user of the client device to a first authentication layer linked with the provider computing system in response to the reply and the user being associated with the provider computing system; authenticating the user of the client device to a second authentication layer linked with the external computing system in response to the reply and the user being associated with the external computing system; and causing the application to present the reply to the query according to the first authentication layer or the second authentication layer.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
62.
NETWORKED PORTAL FOR MULTIDIRECTIONAL INTEGRATION OF DIVERSE UNAFFILIATED PROCESSES AND SUBSYSTEMS WITH CLIENT APPLICATIONS
Systems and methods for multidirectional integration of diverse unaffiliated processes and subsystems with client applications are disclosed. A method includes: presenting in a client application executing on a user device, a first graphical user interface including a listing of a plurality of unaffiliated applications administered by respective unaffiliated computing systems; receiving a request to integrate an unaffiliated application with the client application; identifying a set of primary data that relates to the unaffiliated application; updating permission settings that authorize transmission of the set of primary data to the unaffiliated computing system; transmitting the set of primary data to the unaffiliated computing system; and presenting the unaffiliated application interface in a second graphical user interface of the client application by providing the executable code to the client application without requiring a user to provide the set of primary data to the unaffiliated application.
H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
63.
ADVERSARIAL INPUT GENERATION FOR NATURAL LANGUAGE PROCESSING MACHINE LEARNING MODELS
Disclosed in some examples are methods, systems, and machine readable mediums which provide summaries of topics determined within a corpus of documents. These summaries may be used by customer service associates, analysts, or other users to quickly determine both topics discussed and contexts of those topics over a large corpus of text. For example, a corpus of documents may be related to customer complaints and the topics may be summarized to produce summaries such as “credit report update due to stolen identity.” These summarizations may be used to efficiently spot trends and issues.
Systems and methods provide for integrating a wallet client with federated directory services are disclosed herein. By integrating merchant services, such as directory services with a wallet service provider, wallet clients on mobile devices can have access to all merchant listings without having to manually add each directory service. The system disclosed herein integrates Chamber of Commerce directory service listings with the wallet client, such that when a request for a merchant directory service is received from a device associated with the wallet client, the request is forwarded to a federated directory service wallet system interface operated by a Chamber of Commerce site. Supply chain data that matches the request, and location information that is included in the request, is then fetched from the federated directory service wallet system interface and forwarded to the device that sent the request.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
65.
SYSTEMS AND METHODS FOR DATA TRANSLATION OF SOURCE DATA FILES
A method may include accessing, using a processing unit, a source chain datafile formatted in a first format, the source chain datafile including data entries identifying linkages between a service provider, a service receiver, and a component provider, of an enterprise; forming, using the processing unit, initial knowledge graph tuples including subject, object, and predicate components based on the linkages; generating, using the processing unit, a staging knowledge graph storing the initial knowledge graph tuples; translating, using the processing unit, the initial knowledge graph tuples into production knowledge graph tuples according to a source chain knowledge graph schema; and storing, using the processing unit, the production knowledge graph tuples in a production knowledge graph.
Disclosed are methods, systems, computing devices, and machine-readable mediums for securing the delivery of OTPs via email. The disclosed methods utilize one or more of a combination of server-side vulnerability scans; security policy compliance enforcement; email provider integration to allow for real-time threat scanning; and/or utilizing executable files or secure links for additional authentication and OTP retrieval. This system ensures that OTPs are only sent to secure, verified email addresses and that the recipient's environment meets the necessary security standards.
Systems and methods are provided. In one example, a method includes monitoring data stores storing policy records for changes to the policy records, and retrieving, from the data stores, the changes to the policy records. The method further includes determining, via a large language model (LLM) using the changes to the policy records, a list of one or more entities in an organization affected by the changes to the policy records, and deriving, via the LLM, an impact metric for each of the one or more affected entities. The method additionally includes identifying, via the LLM using a customizable threshold, for each of the one or more affected entities, that their impact metric exceeds the customizable threshold. The method also includes generating, via the LLM, an impact assessment report of detailing a predicted effect of the changes to the policy records, and transmitting the impact assessment report.
G06Q 10/0637 - Strategic management or analysis, e.g. setting a goal or target of an organisationPlanning actions based on goalsAnalysis or evaluation of effectiveness of goals
Various examples are directed to systems and methods for emotionally adaptive financial chatbots. A method includes receiving authentication information from a user of the computer system, authenticating the user for a transaction based on the received authentication information, and detecting an abnormal aspect of the transaction based on parameters of the transaction. Upon detecting the abnormal aspect, the method includes determining, using machine learning, an emotional state of the user. The method further includes adapting an interaction style with the user based on the determined emotional state of the user, receiving an input from the user after adapting the interaction style, and implementing additional security requirements for the transaction based on the detected abnormal aspect, the input from the user, and the determined emotional state.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G10L 15/183 - Speech classification or search using natural language modelling using context dependencies, e.g. language models
G10L 25/30 - Speech or voice analysis techniques not restricted to a single one of groups characterised by the analysis technique using neural networks
G10L 25/63 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination for estimating an emotional state
69.
SYSTEMS AND METHODS FOR SENDING AND RECEIVING MATH-BASED CURRENCY VIA A FIAT CURRENCY ACCOUNT
A method performed by a processor of a financial institution computing system includes authorizing an account holder to execute transactions in an MBC from a financial account of the account holder that includes funds in a fiat currency. A transaction request is received, including a request to transfer a first amount of funds from the financial account to a recipient. The first amount is defined in MBC. The financial account is debited by a second amount, which is an amount of fiat currency equivalent to the first amount of MBC. A service call is transmitted to the MBC partner. The service call includes instructions to create a temporary account to hold the MBC, to exchange the second amount from fiat currency to MBC, to credit the temporary account with the funds exchanged to MBC, and to transfer the first amount in MBC from the temporary account to the recipient.
Systems and methods are described herein for updating an application program interface (API) schema of an API to comply with a standard schema model. Such systems and methods may use a computing system to identify a subdomain of the standard schema model, where the API relates to the subdomain via at least one of a matched path or an unmatched path. The computing system compares the API schema to the subdomain. Based on the comparison, the computing system updates the API schema. For instance, in response to determining that the API relates to the subdomain via the unmatched path, the computing system may replace the API schema with a second API schema. In response to determining that the API relates to the subdomain via the matched path, the computing system may revise one or more settings of the API schema to generate an updated API schema.
A system includes a network interface circuit and a processing circuit configured to receive a physical currency transaction request from a first user device, the physical currency transaction request including a currency exchange transaction parameter; match the physical currency transaction request to another physical currency transaction request based at least in part on the currency exchange transaction parameter; provide the physical currency transaction request to a second user device associated with the another physical currency transaction request; geo-fence an area based on at least one of the currency exchange transaction parameters or a current location of the first user device; determine an exchange location based on the geo-fenced area and the matched physical currency transaction request and another physical currency exchange request; and provide instructions to the first user device and the second user device for an exchange based on the determined exchange location.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Adaptive multi-layer electronic content management is provided. A system includes a processor coupled to a memory that that includes instructions that, when executed by the processor, cause the processor to receive an electronic document. The processor can determine an interaction event for at least one section of the electronic document. The processor can also determine an expertise level of a user of the electronic document based on the interaction event. The processor can assign a rule to the at least one section based on the interaction event and the expertise level of the user and implement an action to the at least one section of the electronic document based on a determination that the interaction event has occurred and the rule.
A system includes processors configured to: determine that a transaction history of a user is inconsistent with transaction histories of other users; create a payment control user profile including payment control rules for determining whether to allow or restrict transactions associated with the user; present a user interface including information associated with the payment control user profile and a payment control rule; receive selections from the user to update the payment control user profile and the payment control rule; modify the payment control user profile and the payment control rule based upon the selections; identify a location of a user device associated with the payment control user profile; determine that a current transaction of the user violates the modified payment control rule based on the location of the user device; and send an alert to the user device to indicate the current transaction violates the modified payment control rule.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
Systems, methods, and apparatuses for providing a customer a central location to manage permissions provided to third-parties and devices to access and use customer information maintained by a financial institution are described. The central location serves as a central portal where a customer of the financial institution can manage all access to account information and personal information stored at the financial institution. Accordingly, the customer does not need to log into each individual third-party system or customer device to manage previously provided access to the customer information or to provision new access to the customer information.
A data pipeline validation system and method configured to partially automate testing of data pipelines in a distributed computing environment. The system includes a data pipeline analytic device equipped with various modules, such as a query generation module, data frame comparison module, and metadata management module. The query generation module employs natural language processing techniques to analyze configuration entries and dynamically generate SQL queries tailored to specific test cases. The data frame comparison module compares the results of different test cases using distributed collections, enabling parallel processing and efficient result comparison. The metadata management module captures and stores relevant metadata for traceability and auditing purposes. The system facilitates comprehensive validation of data pipelines, enabling organizations to ensure the accuracy, reliability, and integrity of data.
Various examples are directed to systems and methods for rationalizing policies using artificial intelligence. A method includes receiving policy data of a plurality of policies from one or more data sources, and comparing policy data of a first policy of the plurality of policies to policy data of one or more second policies of the plurality of policies. Using artificial intelligence, the compared policy data is analyzed to determine overlaps and gaps in the first policy and the one or more second policies, and the first policy and the one or more second policies are optimized to reduce the overlaps and gaps in the first policy and the one or more second policies. The optimized first policy and the optimized one or more second policies are stored in a storage library, and an interactive interface to the storage library is provided for one or more users of the system.
A multi-perspective login data evaluation computing system receives candidate login data for a secured service or a secured computing system. The multi-perspective evaluation system includes a mnemonic generation model and a mnemonic evaluation model. The mnemonic generation model generates, based on features of the candidate login data, candidate mnemonic data that includes media data associated with the candidate login data. The mnemonic evaluation model generates, based on features of the mnemonic guess features, login guess data that includes at least one text string or other login guess data object that describes a potential interpretation of the candidate mnemonic data. The multi-perspective evaluation system provides one or more of the candidate mnemonic data or the login guess data to an additional computing system. In some cases, the multi-perspective evaluation system provides user profile data that is based on the candidate login data.
This disclosure describes techniques for capturing data points from a collection of models. In one example, this disclosure describes a method that includes capturing a sequence of model output data generated by a model, wherein the sequence of model output data includes information about a plurality of predictions made by the model; selecting, based on configuration settings, a process to perform on the sequence of model output data, wherein the process is selected from a plurality of available processes; performing the selected process, based on at least a portion of the sequence of model output data, to generate information about performance of the model over time; and sending, to a downstream system, control signals to modify operation of the downstream system based on the information about performance of the model over time.
A method includes receiving, by a mobile device of a user, a payment amount for a transaction of the user. The method further includes receiving, by the mobile device, authentication data via a short range communication from a contactless card to the mobile device. The method further includes sending, by the mobile device, the authentication data and the payment amount from the mobile device to an account management system associated with the contactless card. The method further includes receiving, by the mobile device, an authorized form of payment for the payment amount from the account management system based on the user being authenticated using the authentication data. The method further includes providing, by the mobile device, the authorized form of payment to a merchant point of sale device.
G06Q 30/0226 - Incentive systems for frequent usage, e.g. frequent flyer miles programs or point systems
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Dynamic allocation of cash. Dispensing of cash by an automatic teller machine (ATM) can be prioritized, e.g., for customers of the financial institution that operate the ATM over non-customers. A request by a customer to hold cash at an automatic teller machine (ATM) for future withdrawal is analyzed using an architecture of artificial intelligence. If the cash hold request is approved, in some examples the requested amount of cash is moved from a first cash rack of the ATM to a second cash rack of the ATM. The requested amount of cash cannot be moved from the second cash rack unless the customer withdraws it from the ATM or unless a time limit for the customer to withdraw the requested amount from the ATM is exceeded.
G07F 19/00 - Complete banking systemsCoded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
81.
SYSTEMS AND METHODS FOR INTELLIGENTLY COMPILING RESPONSES FROM AI SYSTEMS
Systems, apparatuses, methods, and computer program products are disclosed for compiling AI system outputs into unified responses. An example method includes receiving response data that is representative of one or more AI system outputs. The example method further includes identifying a task request associated with the response data. The example method further includes generating a unified response associated with the task request. The example method further includes causing transmission of the unified response to a user device associated with the task request. The example method may further include determining an AI system server that transmitted the response data.
Systems, apparatuses, methods, and computer program products are disclosed for providing a targeted analytics report. An example method includes receiving a call transcript, wherein the call transcript is associated with transcript metadata. The example method further includes determining one or more annotations for the call transcript. The example method further includes annotating the call transcript with the one or more annotations. The example method further includes storing the annotated call transcript in a history recorder repository. The example method further includes identifying an analytics inquiry comprising one or more attributes of interest, wherein an attribute of interest corresponds to one or more annotations. The example method further includes selecting one or more annotated call transcripts based on the one or more attributes of interest. The example method further includes generating a targeted analytics report based on the selected one or more annotated call transcripts, and providing the targeted analytics report.
G06F 40/58 - Use of machine translation, e.g. for multi-lingual retrieval, for server-side translation for client devices or for real-time translation
G06F 18/2415 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on parametric or probabilistic models, e.g. based on likelihood ratio or false acceptance rate versus a false rejection rate
G06F 40/169 - Annotation, e.g. comment data or footnotes
H04M 3/42 - Systems providing special services or facilities to subscribers
Various systems and methods for providing a gamification of bequests are described herein. An online system for managing beneficiaries and assets of a will is configured to present a conditional bequest to a user, the conditional bequest presented in a user interface on a device operated by the user, the user interface including gaming elements, and the conditional bequest comprising a task to be completed by the user and a gift to be given to the user after completion of the task; receive a notification that the user has completed the task; and initiate transfer of the gift to the user in response to confirming that the user has completed the task.
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
84.
SYSTEMS AND METHODS FOR ARTIFICIAL INTELLIGENCE-BASED ATM SERVICE
Systems and methods for servicing an ATM may include maintaining, by one or more processors, a machine learning model trained to determine one or more actions corresponding to automated teller machines (ATMs), receiving, by the one or more processors, an error code corresponding to an ATM, determining, by the one or more processors, a service history associated with the ATM, applying, by the one or more processors as an input, data corresponding to the service history and the error code to the machine learning model, to determine one or more actions for responding to the error code corresponding to the ATM, and providing, by the one or more processors, the one or more actions for rendering on a user interface, to facilitate servicing the ATM.
Systems and methods may generally be used to automatically curate a blocklist of internet protocol (IP) addresses. An example method may include using risk factor scores for a particular IP address that was blocked by a traffic control component to determine whether to add the particular IP address to a blocklist. The example method may include, in response to a determination to add the particular IP address to the blocklist, generating an IP address entry in the blocklist for the particular IP address, the IP address entry optionally including a corresponding time-based expiration. The example method may include outputting the blocklist or the IP address entry, such as in response to a request from a firewall.
METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR VALIDATING ELECTRONIC DISTRIBUTION TRANSACTIONS AND REDUCING NON-COMPLIANT ELECTRONIC DISTRIBUTION TRANSACTIONS
A method, apparatus and computer program product are provided for validating electronic distribution transactions and reducing non-compliant electronic distribution transactions. A distribution application enables users to enter details relating to a retirement account distribution. A tax service integrated with the distribution application provides scenario-specific tax withholding information, and enforces relevant tax withholding rules. A user provides withholding information and the system ensures compliance by validating the transaction against the withholding rules. The system displays to the user error that need to be corrected, and a breakdown of the proceeds from the transaction. The tax service is implemented remotely from the distribution application so that changing tax regulations may be implemented into the tax service without impacting the distribution application. The tax service may utilize a customer's state of residence, age (and/or date of birth), and citizenship status such that state tax withholding information and validation, and requirement minimum distribution rules.
A computer system includes one or more processors and machine readable storage media coupled to the one or more processors having instructions stored therein that cause the computer system to: receive a payment request packet from an Internet of Things (IoT) device; extract a signature of the payment request packet that includes metadata; identify a firmware update status from the metadata of the signature; determine that the IoT device has a first version of the firmware installed on the IoT device based on the firmware update status; cause a second version of the firmware to be installed on the IoT device in response to determining the IoT device has the first version of the firmware; and initiate a transaction based on the payment request packet responsive to the second version of the firmware being installed on the IoT device.
G06F 8/654 - Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories
G06F 8/71 - Version control Configuration management
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
88.
RESOURCE ALLOCATION DASHBOARD AND OPTIMIZATION GENERATOR
Disclosed in some examples are methods, systems, devices, and machine-readable mediums for resource allocation optimization systems that provide one or more interfaces that display an entity's resource allocation data from multiple sources in a single interface. Also disclosed in some examples are resource allocation optimization systems which provide resource allocation adjustments for an entity to optimize resources toward a resource optimization goal. The resource allocation optimization system groups similar entities using rule-based or artificial intelligence algorithms acting upon entity description data (including in some examples, resource allocation data) obtained from the entity and/or from external network-based services. The resource allocation optimization system uses resource allocation data of entities within a group to provide resource allocation adjustments to entities within the group via improved user interfaces. The resource allocation adjustments are selected to meet one or more resource optimization goals.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
Disclosed are example methods, systems, and devices for sensor data processing for monitoring devices. These techniques include receiving scan data from a computing device that corresponds to a scan by an imaging device and analyzing the scan data to determine that the scan data corresponds to a manufactured article. An indication can be transmitted with a request for audiovisual data corresponding to an operation of the manufactured article, and the audiovisual data can be received from an imaging device or a microphone of the computing device. A sound sample corresponding to the operation of the manufactured article is extracted, and a status metric for the article is generated based on a comparison of the sound sample to a sound signature in an identity profile of the manufactured article. The status of the manufactured article can then be determined.
G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
G06V 10/94 - Hardware or software architectures specially adapted for image or video understanding
G10L 25/03 - Speech or voice analysis techniques not restricted to a single one of groups characterised by the type of extracted parameters
90.
PRACTICAL ITEMIZED ENCRYPTION FOR CRYPTOGRAPHIC ERASURE (PIECE)
The arrangements disclosed herein relate to systems, apparatus, methods, and non-transitory computer readable media for determining to erase a plurality of ciphertext blocks stored in a memory device, in response to determining to erase the plurality of ciphertext blocks, performing a cryptographic erasure of the plurality of ciphertext blocks. The cryptographic erasure includes encrypting each of the plurality of ciphertext blocks with a random key and destroying the random key in response to encrypting each of the plurality of ciphertext blocks.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
Various systems and methods for confirming conditional bequests are described herein. An online system is configured to transmit a confirmation request to a plurality of users of the online system, the confirmation request to provide feedback on a completion of a conditional bequest, the conditional bequest comprising a task to be completed by a beneficiary and a gift to be given to the beneficiary after completion of the task; receive feedback from at least one of the plurality of users; compare the feedback to a confirmation threshold; and record that the conditional bequest was completed when the feedback satisfies the confirmation threshold.
Systems, apparatuses, methods, and computer program products are disclosed for evaluating interface content for a user population. An example method includes receiving the interface content comprising one or more interface content components. The example method further include determining a user population of interest and selecting an evaluation model framework based on the user population of interest. The example method further includes determining an accessibility score for the interface content based on the one or more interface content components using the evaluation model framework and determining whether the accessibility score satisfies an accessibility score threshold. The example method further includes providing an interface content evaluation report.
Systems, apparatuses, methods, and computer program products are disclosed for generating a user preference digital profile for a user. An example method includes determining one or more user preference parameter values for one or more user preference parameters for the user and generating the user preference digital profile for the user. The example method further includes assigning a sharing category to the one or more user preference parameter values in the user preference digital profile and storing the user preference digital profile in a digital identity management repository.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
94.
SYSTEMS AND METHODS FOR TIERED-BASED INFORMATION PROVISION
Systems and methods are described herein for a tiered-based information provision. Such systems and methods may include authenticating a first user of a plurality of users configured to access a data exchange platform and retrieving a profile associated with the first user including an initial tier. The system receives first data supplied by the first user and stores the first data in a data structure communicatively coupled to the data exchange platform. After receiving and storing the first data, the system determines a score for the first data according to existing data in the data structure. Based on the score, the system determines an updated tier assigned to the profile associated with the first user. The system transmits second data to the first user, the second data including data received from a subset of users from the plurality of users that correspond to the updated tier.
Systems, apparatuses, methods, and computer program products are disclosed for routing task request to one or more AI systems. An example method includes receiving a subtask request that is representative of instructions to execute an actionable subtask. The example method further includes determining computational capabilities associated with one or more AI systems. The example method further includes matching the subtask request with a target AI system of the one or more AI systems. The example method further includes causing transmission of the subtask request to the target AI system. The example method may further include determining an intelligent or optimized routing for the subtask request based on the computational capabilities of the one or more AI systems and the particular content or type of a subtask request.
Systems, apparatuses, methods, and computer program products are disclosed for generation of a user biosignature. An example method includes extracting user data from a data environment, wherein the user data is associated with a user. The example method further includes analyzing the user data, wherein the user data comprises one or more data types, wherein the one or more data types comprise at least metadata and biometric data. The example method further includes determining a character classification associated with each of the one or more data types based on the analyzed user data, wherein the character classification comprises a primary character classification and a secondary character classification. The example method further includes generating a user biosignature based on the determined character classification, and outputting the generated user biosignature.
Systems, methods, and computer program products are disclosed for issuing one or more blockchain tokens for property rights. An example method includes receiving an indication of user input including attributes of a property and, and generating a primary blockchain token, where the primary blockchain token includes metadata that correspond to the attributes of the property. The example method further includes broadcasting, over a blockchain network, a transfer of the primary blockchain token to the primary party, and generating one or more secondary blockchain tokens, where each of the one or more secondary blockchain tokens includes respective secondary metadata that correspond to unique subdivided property rights regarding the property, where the secondary metadata include a link to the primary blockchain token. The example method further includes broadcasting, over the blockchain network, transfer of the one or more secondary blockchain tokens to one or more secondary parties.
The present disclosure is directed to systems, methods, and non-transitory computer-readable media including receiving, by a Time Stamp Authority (TSA) computing system from a requestor computing system, hashed data corresponding to original data, generating, by the TSA, a Time Stamp Token (TST) for the hashed data, publishing, by the TSA, the TST to a blockchain, and sending, by the TSA to the requestor computing system, the TST.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A method includes determining activity information of a first avatar of a first user. The activity information includes a plurality of activities performed by the first avatar in a virtual environment. The method further includes matching the plurality of activities to one or more representative attributes based on a mapping between a plurality of predetermined activities in the virtual environment and a plurality of attributes. The method further includes generating a second avatar based on the first avatar. The second avatar and the one or more first attributes are mapped to first virtual assets of the first user. The method further includes generating a virtual transfer space within the virtual environment, authorizing a third avatar of a second user to enter the virtual transfer space, displaying the second avatar in the virtual transfer space, and transferring the first virtual assets of the first user to the second user.
G06F 3/04815 - Interaction with a metaphor-based environment or interaction object displayed as three-dimensional, e.g. changing the user viewpoint with respect to the environment or object
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
G06Q 40/04 - Trading Exchange, e.g. stocks, commodities, derivatives or currency exchange
A system includes a processing circuit configured to generate location data relating to a person associated with transaction data where the location data is associated with a location, receive the transaction data relating to the person where the transaction data corresponds to historical transactions of the person, generate merchant match data based on the location data and the transaction data where the merchant match data indicates a merchant within a distance threshold of the location and being associated with at least one of the historical transactions, and generate and provide a notification interface based on the merchant match data to a graphical user interface of a user device where the notification interface comprises an interactive element associated with the at least one of the historical transactions related to the merchant.