09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable software for processing electronic payments and
for transferring funds to and from others; downloadable
software for facilitating money transfer services,
electronic funds transfer services, bill payment remittance
services, electronic processing and transmission of payments
and payment data; downloadable computer software and
downloadable mobile application software for facilitating
electronic commerce transactions; downloadable software for
use as a digital wallet; downloadable software for
connecting digital wallets; downloadable software for
connecting, integrating, and enabling transfer of funds
between digital wallets and financial accounts; downloadable
software for linking independent financial accounts and
digital wallets, enabling migration of data and transfers of
funds between independent third party financial accounts and
digital wallets, and establishing secure connections between
independent financial accounts and digital wallets;
downloadable computer software for use for financial account
management, namely, software for managing and facilitating
financial transactions and funds transfers for bank
accounts, credit card accounts, debit card accounts, and
digital wallets; downloadable authentication software for
controlling access to and communications with computers and
computer networks; downloadable software for currency
conversion. Providing business information regarding money transfer
services; business consulting services in the field of
online payments; business management and administrative
services, namely, bookkeeping, account reconciliation,
invoicing, and the compilation, tracking, and reconciliation
of data relating to credit card, debit card, ACH, prepaid
card, payment card, and other payment transactions for
business purposes, provided via electronic communications
networks; business information management, namely,
electronic reporting of business analytics relating to
payment processing, authentication, tracking, and invoicing. Electronic payment services involving electronic processing
and subsequent transmission of bill payment data; payment
transaction processing services; providing electronic
processing of electronic funds transfer, ACH, credit card,
debit card, electronic check and electronic payments;
financial information processing; money transfer services;
electronic funds transfer services; bill payment services;
financial transaction services for digital wallets;
electronic wallet payment services; providing financial
services, namely, bill payment services provided via a
digital wallet and providing secure commercial transactions;
transaction processing services for bank accounts, debit
cards, and credit cards on embedded digital wallets,
cross-border money transfers to banks and mobile wallets
with real time currency exchange rates; clearing financial
transactions via a global computer network and wireless
networks; credit card and debit card transaction processing
services; processing of electronic wallet payments; currency
exchange services; electronic commerce payment services,
namely, establishing funded accounts used to facilitate
transactions and purchases on the internet. Providing temporary use of online non-downloadable software
for processing electronic payments and for transferring
funds to and from others; application service provider (ASP)
featuring application programming interface (API) software
for facilitating payment transactions and financial
information processing; providing temporary use of online
non-downloadable software for facilitating money transfer
services, electronic funds transfer services, bill payment
remittance services, electronic processing and transmission
of payments and payment data; providing temporary use of
online non-downloadable software for facilitating electronic
commerce transactions; providing temporary use of online
non-downloadable software for use as a digital wallet;
providing temporary use of online non-downloadable software
for connecting digital wallets; providing temporary use of
online non-downloadable software for connecting,
integrating, and enabling transfer of funds between digital
wallets and financial accounts; providing temporary use of
online non-downloadable software for linking independent
financial accounts and digital wallets, enabling migration
of data and transfers of funds between independent third
party financial accounts and digital wallets, and
establishing secure connections between independent
financial accounts and digital wallets; providing temporary
use of online non-downloadable software for use for
financial account management, namely, software for managing
and facilitating financial transactions and funds transfers
for bank accounts, credit card accounts, debit card
accounts, and digital wallets; providing temporary use of
online non-downloadable authentication software for
controlling access to and communications with computers and
computer networks; providing temporary use of online
non-downloadable software for currency conversion.
Methods and systems are presented for auditing user feedback data corresponding to user communications received via at least one interface of a service provider. The user feedback data includes a first set of feedback categories associated with a first classification of the user communications. A first feature representation of the communications is generated from the user feedback data. The first feature representation includes a first set of textual data features extracted from the communications. A second feature representation is generated from the first feature representation using a first machine learning model. The second feature representation includes a second set of textual data features including semantic equivalents of the first set of features. A second machine learning model is trained with the second feature representation. A second classification of the user communications according to a second set of feedback categories is generated using the trained second machine learning model.
A method for providing social network payments includes receiving a request to make a payment. The request is associated with a social network payer and a social network payee. It is determined that the social network payer is associated with a first payment provider identifier and an authorization token, and a second payment provider identifier for the social network payee is then retrieved using the authorization token. An instruction to make a payment from the social network payer to the social network payee is then transmitted to a payment service provider. The instruction includes a payment amount, the first payment provider identifier, and the second payment provider identifier. A payment alert is also adapted for a payee social network associated with the social network payee, and the payment alert is send to a social network provider device associated with the payee social network.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A payment button on a device capable of making telephone calls, such as a mobile phone, allows a payer to electronically transfer money while in a phone call with a payee. The payment button also allows a payee to initiate an electronic payment transaction while in a phone call with a payer. The payment button may be a clickable or tappable virtual button presented on a display of the phone when being used to make or receive a call. The payer or the payee can simply enter a payment amount on the phone to complete an electronic payment transaction. A notification of payment is instantly transmitted to the phones being used for the phone call, so that the parties can safely and conveniently conclude a purchase and/or payment transaction during one phone call.
Techniques are disclosed that relate to rate limiting network traffic at a content distribution network based on decisions provided by a rate limiter located on an on-premise network. A computer system may receive, at the CDN, network traffic requesting access to a service associated with an on-premise network. The computer system sends, to a second computing system deployed in the on-premise network, a request to decide whether to rate constrain the network traffic. The second computing system is configured to perform an analysis on the network traffic. In response to the request, the computer system receives a decision from the second computing system. The computer system implements the decision for the network traffic at the CDN.
H04L 47/76 - Admission controlResource allocation using dynamic resource allocation, e.g. in-call renegotiation requested by the user or requested by the network in response to changing network conditions
H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
H04L 43/10 - Active monitoring, e.g. heartbeat, ping or trace-route
H04L 67/61 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources taking into account QoS or priority requirements
Techniques are disclosed that relate to rate limiting network traffic at a content distribution network based on decisions provided by a rate limiter located on an on-premise network. A computer system may receive, at the CDN, network traffic requesting access to a service associated with an on-premise network. The computer system sends, to a second computing system deployed in the on-premise network, a request to decide whether to rate constrain the network traffic. The second computing system is configured to perform an analysis on the network traffic. In response to the request, the computer system receives a decision from the second computing system. The computer system implements the decision for the network traffic at the CDN.
A method according to the present disclosure may include receiving, from a user device, an update associated with a document, generating an update log event based on the update, appending metadata to the update log event, the metadata indicative of a property of the update, storing the update log event with at least one other log event to generate a plurality of log events, receiving an indication of a type of compression, labelling metadata of each of the plurality of log events based on the indicated type of compression, and compressing the plurality of log events based on the labels.
09 - Scientific and electric apparatus and instruments
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable computer software and mobile application software for processing electronic payments, transferring funds to and from others, and issuing receipts regarding electronic payment transactions; downloadable software for use in issuing digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; downloadable software for accepting, buying, selling, transmitting, and exchanging digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; downloadable software for electronically trading, storing, sending, receiving, validating, verifying, accepting, tracking, and transferring digital currency, cryptocurrency, virtual currency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; downloadable software for managing, implementing, and validating digital currency, virtual currency, cryptocurrency, stablecoin, digital asset, blockchain asset, digitized asset, digital token, crypto token and utility token payment and exchange transactions; downloadable software for use in payments, purchases, and investments using digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; downloadable software for use as a digital currency, virtual currency, cryptocurrency, stablecoin, digital asset, digital token, crypto token, and utility token wallet; downloadable software for currency conversion; downloadable software for creating tokens that may be used to pay for products and services, and traded or exchanged for cash value; downloadable software for managing and facilitating money transfers, electronic funds transfers, commodity transfers, bill payment remittance, and secure transactions Electronic transfer of funds; clearing and reconciling financial transactions via a global computer network and wireless networks; providing electronic mobile payment services for others in the nature of providing secure commercial transactions and payment options using a mobile device at a point of sale; electronic foreign exchange payment processing services; issuance of stablecoins and tokens of value; stablecoin payment processing; stablecoin trading services; stablecoin exchange services; financial services, namely, providing digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens for use by others; financial services, namely, digital currency, virtual currency, cryptocurrency, stablecoin, digital and blockchain asset, digitized asset, digital token, crypto token and utility token transfer, exchange, and payment processing services; financial exchange services; providing a financial exchange for trading digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; currency exchange services, currency trading services, foreign currency dealing, and broker-dealer financial services in the field of cryptocurrency, digital currency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; currency transfer services; electronic transfer of cryptocurrency, digital currency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; electronic wallet payment services; electronic wallet services for trading, storing, sending, receiving, validating, verifying, accepting, tracking, transferring, and transmitting digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens, and utility tokens, and for managing digital currency, virtual currency, cryptocurrency, stablecoin, digital and blockchain asset, digitized asset, digital token, crypto token, and utility token payment and exchange transactions; electronic payment processing of payments made via digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens, and utility tokens; digital currency, virtual currency, cryptocurrency, stablecoin, digital and blockchain asset, digitized asset, digital token, crypto token and utility token transaction processing services for others; financial management of digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens, and utility tokens Providing temporary use of online non-downloadable software for electronic payment processing, transferring funds to and from others, and issuing receipts regarding electronic payment transactions; application service provider (ASP) services featuring software for use in digital currency, virtual currency, cryptocurrency, stablecoin, digital and blockchain asset, digitized asset, digital token, crypto token and utility token exchanges and transactions; providing temporary use of online non-downloadable software for use in issuing digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; providing temporary use of online non-downloadable software for accepting, buying, selling, transmitting, and exchanging digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; providing temporary use of online non-downloadable software for electronically trading, storing, sending, receiving, validating, verifying, accepting, tracking, and transferring digital currency, cryptocurrency, virtual currency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; providing temporary use of online non-downloadable software for managing, implementing, and validating digital currency, virtual currency, cryptocurrency, stablecoin, digital asset, blockchain asset, digitized asset, digital token, crypto token and utility token payment and exchange transactions; providing temporary use of online non-downloadable software for use in payments, purchases, and investments using digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; providing temporary use of online non-downloadable software for users to buy and sell products using digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; providing temporary use of online non-downloadable software for currency conversion; providing temporary use of online non-downloadable software for use as a digital currency, virtual currency, cryptocurrency, stablecoin, digital asset, digital token, crypto token, and utility token wallet; providing temporary use of online non-downloadable software for encryption; providing temporary use of online non-downloadable software for verifying, evaluating, and securing transactions with blockchain technology; providing temporary use of online non-downloadable software for managing and facilitating money transfers, electronic funds transfers, commodity transfers, bill payment remittance, and secure transactions
09 - Scientific and electric apparatus and instruments
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable computer software and mobile application software for processing electronic payments, transferring funds to and from others, and issuing receipts regarding electronic payment transactions; downloadable software for use in issuing digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; downloadable software for accepting, buying, selling, transmitting, and exchanging digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; downloadable software for electronically trading, storing, sending, receiving, validating, verifying, accepting, tracking, and transferring digital currency, cryptocurrency, virtual currency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; downloadable software for managing, implementing, and validating digital currency, virtual currency, cryptocurrency, stablecoin, digital asset, blockchain asset, digitized asset, digital token, crypto token and utility token payment and exchange transactions; downloadable software for use in payments, purchases, and investments using digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; downloadable software for use as a digital currency, virtual currency, cryptocurrency, stablecoin, digital asset, digital token, crypto token, and utility token wallet; downloadable software for currency conversion; downloadable software for creating tokens that may be used to pay for products and services, and traded or exchanged for cash value; downloadable software for managing and facilitating money transfers, electronic funds transfers, commodity transfers, bill payment remittance, and secure transactions Electronic transfer of funds; clearing and reconciling financial transactions via a global computer network and wireless networks; providing electronic mobile payment services for others in the nature of providing secure commercial transactions and payment options using a mobile device at a point of sale; electronic foreign exchange payment processing services; issuance of stablecoins and tokens of value; stablecoin payment processing; stablecoin trading services; stablecoin exchange services; financial services, namely, providing digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens for use by others; financial services, namely, digital currency, virtual currency, cryptocurrency, stablecoin, digital and blockchain asset, digitized asset, digital token, crypto token and utility token transfer, exchange, and payment processing services; financial exchange services; providing a financial exchange for trading digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; currency exchange services, currency trading services, foreign currency dealing, and broker-dealer financial services in the field of cryptocurrency, digital currency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; currency transfer services; electronic transfer of cryptocurrency, digital currency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; electronic wallet payment services; electronic wallet services for trading, storing, sending, receiving, validating, verifying, accepting, tracking, transferring, and transmitting digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens, and utility tokens, and for managing digital currency, virtual currency, cryptocurrency, stablecoin, digital and blockchain asset, digitized asset, digital token, crypto token, and utility token payment and exchange transactions; electronic payment processing of payments made via digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens, and utility tokens; digital currency, virtual currency, cryptocurrency, stablecoin, digital and blockchain asset, digitized asset, digital token, crypto token and utility token transaction processing services for others; financial management of digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens, and utility tokens Providing temporary use of online non-downloadable software for electronic payment processing, transferring funds to and from others, and issuing receipts regarding electronic payment transactions; application service provider (ASP) services featuring software for use in digital currency, virtual currency, cryptocurrency, stablecoin, digital and blockchain asset, digitized asset, digital token, crypto token and utility token exchanges and transactions; providing temporary use of online non-downloadable software for use in issuing digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; providing temporary use of online non-downloadable software for accepting, buying, selling, transmitting, and exchanging digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; providing temporary use of online non-downloadable software for electronically trading, storing, sending, receiving, validating, verifying, accepting, tracking, and transferring digital currency, cryptocurrency, virtual currency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; providing temporary use of online non-downloadable software for managing, implementing, and validating digital currency, virtual currency, cryptocurrency, stablecoin, digital asset, blockchain asset, digitized asset, digital token, crypto token and utility token payment and exchange transactions; providing temporary use of online non-downloadable software for use in payments, purchases, and investments using digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; providing temporary use of online non-downloadable software for users to buy and sell products using digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; providing temporary use of online non-downloadable software for currency conversion; providing temporary use of online non-downloadable software for use as a digital currency, virtual currency, cryptocurrency, stablecoin, digital asset, digital token, crypto token, and utility token wallet; providing temporary use of online non-downloadable software for encryption; providing temporary use of online non-downloadable software for verifying, evaluating, and securing transactions with blockchain technology; providing temporary use of online non-downloadable software for managing and facilitating money transfers, electronic funds transfers, commodity transfers, bill payment remittance, and secure transactions
10.
Framework for Managing Natural Language Processing Tools
A system performs operations that include receiving, via first computing environment, a request to process text data using a first natural language processing (NLP) model. The operations further include accessing configuration data associated with the NLP model, where the configuration data generated using a domain specific language that supports a plurality of preprocessing modules in a plurality of programming languages. The operations also include selecting, based on the configuration data, one or more preprocessing modules of the plurality of preprocessing modules, generating, based on the configuration data, a preprocessing pipeline using the one or more preprocessing modules, and generating preprocessed text data by inputting the text data into the preprocessing pipeline. The preprocessed text data is provided to the first NLP model.
Systems and methods for smart cloud caching using edge computing and real-time customer journey insights are disclosed. In one embodiment, a system identifies a trend in communications received by a first edge cloud server, wherein each communication corresponds to a customer journey comprising user action steps performed in a client application. The system determines which user action steps cause API invocations to non-edge cloud servers and generates a sequence of API invocations in an order associated with the sequence of user action steps of the customer journey. The sequence of API invocations may be chained and/or bundled and stored in a cache for replication at edge cloud servers. The system may determine that the trend is pervasive in a geographical location based on satisfaction of a criteria, and replicate the cached sequence of API invocations at a cache of a second edge cloud server that services the geographical location.
Systems, methods, and computer program products for correcting code issues, such as code smells, using artificial intelligence, are provided. A code issue in one of multiple source code files is determined. An artificial intelligence model, such as a large language model, receives the code issue and the multiple source code files. The AI model recursively modifies at least one source code file from the multiple source code files until the code issue and an error or errors introduced by modifying the at least one source code file are resolved, and the source code files are issue free.
Methods and systems are presented for reducing computer power consumption and speeding system response times by dynamically generating and deploying one or more small language models (SLMs) to facilitate automated interactions with users. A context is derived for a chat session based on an utterance submitted by the user and other contextual information associated with the chat session. A SLM is generated specifically for the chat session based on the context. The SLM can be generated by extracting one or more portions of an internal structure of a large language model (LLM), or by merging two or more pre-generated SLMs. The SLM is deployed to generate content for the chat session. When it is detected that the context has changed, the SLM can be updated by incorporating additional parameters from the LLM to continue facilitating automated interactions with the user during the chat session.
Methods and systems described herein improve blockchain storage operations in a variety of environments. A blockchain compression system may determine that a blockchain compression condition associated with a blockchain having a first plurality of blocks has been satisfied. In response, the system compresses the first plurality of blocks using a first hash tree into a first root hash value and stores the first plurality of blocks in a first database. The blockchain compression system generates a first new era genesis block that includes the first root hash value and a first database address of the first database at which the first plurality of blocks are stored. The blockchain compression system stores the blockchain at one or more nodes in a blockchain network. The blockchain includes the first new era genesis block and any previous new era genesis blocks. This may effectively reduce storage requirements for the blockchain, in various embodiments.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
15.
SYSTEMS AND METHODS FOR PREDICTING AND PROVIDING AUTOMATED ONLINE CHAT ASSISTANCE
Methods and systems are presented for providing automated online chat assistance in an online chat session. One or more utterances transmitted from a user device of a user via the online chat session are obtained. The one or more utterances are provided to a first prediction model to predict an intent of a user. If it is determined that the first prediction model is unable to predict the intent of the user based on the one or more utterances, the one or more utterances are provided to a second prediction model. After predicting the intent of the user by the second prediction model, the intent is used by a chat robot to provide a dialogue with the user via the online chat session. The one or more utterances and the predicted intent are used to re-train the first prediction model.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
H04L 51/04 - Real-time or near real-time messaging, e.g. instant messaging [IM]
H04L 65/1069 - Session establishment or de-establishment
Methods and systems are presented for reducing computer power consumption and speeding system response times by dynamically generating and deploying one or more small language models (SLMs) to facilitate automated interactions with users. A context is derived for a chat session based on an utterance submitted by the user and other contextual information associated with the chat session. A SLM is generated specifically for the chat session based on the context. The SLM can be generated by extracting one or more portions of an internal structure of a large language model (LLM), or by merging two or more pre-generated SLMs. The SLM is deployed to generate content for the chat session. When it is detected that the context has changed, the SLM can be updated by incorporating additional parameters from the LLM to continue facilitating automated interactions with the user during the chat session.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
Systems and methods for performing continual learning for neural network models for performing certain tasks based on data including applying a first neural network model to a second dataset, the first neural network model trained using a first dataset, determining a data distribution representative of the second dataset, determining a third dataset corresponding to a subset of data in the second dataset based on applying a threshold to the data distribution, the subset of data corresponding to new data patterns in the second dataset indicative of including different characteristics than data patterns in the first dataset, obtaining a second neural network model trained using the first dataset, and training the second neural network model using the third dataset to finetune a performance of the second neural network model in performing the certain tasks or other new tasks.
Methods and systems are presented for providing a multi-party computation (MPC) framework for dynamically configuring, deploying, and utilizing an MPC system for performing distributed computations. Based on device attributes and network attributes associated with computer nodes that are available to be part of the MPC system, a configuration for the MPC system is determined. The configuration may specify a total number of computer nodes within the MPC system, a minimum number of computer nodes required to participate in performing a computation process, a key distribution mechanism, and a computation processing mechanism. Encryption keys are generated and distributed among the computer nodes based on the key distribution mechanism. Upon receiving a request for performing the computation, updated network attributes are obtained. The configuration of the MPC system is dynamically modified based on the updated network attributes, and the MPC system performs the computations according to the modified configuration.
Latency, response times, and efficiency improvements for data querying are provided herein, particularly in the context of querying large database systems and data tables from disparate data sources. There are provided systems and methods for automatic query and data retrieval optimization through procedural generation of data tables from query patterns. A service provider may utilize different computing services for query processing and data retrieval for different applications and services used by internal and/or external users. Instead of querying large database systems and numerous data tables, pre-aggregated data tables may instead be used and searched by procedurally generating such tables based on precomputation rules and query patterns. Once patterns have been identified in queries, corresponding data may be aggregated from data sources in a pre-aggregated data table. Query optimization rules may then be used to have these data tables queried in place of their original sources.
In disclosed techniques a system generates, using a generative model, current synthetic communications, including inputting conditions for the synthetic communications into the trained generative model. The system generates the trained generative model by iteratively performing multiple operations until a discriminator of the generative model determines that synthetic communications output by the generative model satisfy a difference threshold. The operations include: generating, by a generator of the generative model, based on existing communications, a training synthetic communications, determining, by the discriminator of the generative model, differences between the existing communications and the training synthetic communications, and updating the generator based on the differences. Using the current synthetic communications and the existing communications, the system trains another model to evaluate newly initiated communications. The disclosed data synthesis techniques may advantageously enable discovery of concealed patterns, which in turn improves detection of processing systems that execute models trained on the synthetic data.
There are provided systems and methods for a computing framework for enforcement of data privacy consent through device fingerprints. A service provider, including an electronic transaction processor, may provide consent management and enforcement through device fingerprints server-side in place of using device-side cookies or other data. When a device interacts with a service provider and provides or generates user data, the user of the device may opt-in to consenting to share or use that user data for targeted content and/or personalized services. The device may be fingerprinted using unique device parameters and a fingerprinting algorithm to generate a unique device identifier. User segments may then be built for the user based on the user data and to hide or obfuscate the user data. The device fingerprint may then be shared with the user segments so that when the device is further detected, targeted content and personalization may be provided.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
22.
Dynamic Sharding Method for Distributed Data Stores
Disclosed methods and systems include maintaining, by a computer system, a database stored across a first number of nodes. This maintaining may include dividing records into a particular number of shards that are distributed among the first number of nodes. In response to a change to a second number of nodes, the computer system may determine a number of shards per node based on the second number of nodes. The computer system may select a subset of the particular number of shards to distribute across the second number of nodes, and move the subset of shards to one or more of the second number of nodes.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
23.
EXTRACTING WEAKLY CORRELATED RULES FROM SINGLE-TREE MACHINE LEARNING MODELS
Data associated with a plurality of transactions is accessed. Based on the data, a first tree-based machine learning model (e.g., a gradient boosted tree-based model) is generated that contains a plurality of first nodes and a plurality of first branches interconnecting the plurality of first nodes. A first rule is extracted from the first tree-based machine learning model. The data is adjusted after the first rule has been extracted. Based on the adjusted data, a second tree-based machine learning model (e.g., a gradient boosted tree-based model) is generated that contains a plurality of second nodes and a plurality of second branches interconnecting the plurality of second nodes. A second rule is extracted from the second tree-based machine learning model. The second rule and the first rule have a correlation below a specified threshold, for example, at or close to zero.
Disclosed methods and systems include maintaining, by a computer system, a database stored across a first number of nodes. This maintaining may include dividing records into a particular number of shards that are distributed among the first number of nodes. In response to a change to a second number of nodes, the computer system may determine a number of shards per node based on the second number of nodes. The computer system may select a subset of the particular number of shards to distribute across the second number of nodes, and move the subset of shards to one or more of the second number of nodes.
G06F 3/06 - Digital input from, or digital output to, record carriers
G06F 16/17 - Details of further file system functions
G06F 3/00 - Input arrangements for transferring data to be processed into a form capable of being handled by the computerOutput arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
36 - Financial, insurance and real estate services
Goods & Services
Cryptocurrency and stablecoin payment processing;
cryptocurrency and stablecoin exchange services; electronic
wallet services for trading, storing, sending, receiving,
validating, verifying, accepting, tracking, transferring,
and transmitting virtual currency, and managing virtual
currency payment and exchange transactions; fraud and
mistaken transaction reimbursement services, namely,
reimbursement of payment purchase processing for
transactions concerning lost, damaged, misrepresented, or
incorrect products or services; providing purchase
protection services, namely, providing payment dispute
resolution services and reimbursement services for disputed
transactions in the field of electronic payment purchases;
financial and banking services, namely, debit card and
credit card transaction processing services featuring cash
back rewards to customers that make incentivized purchases;
electronic funds transfer; processing electronic payment
transactions and electronic funds transfers via automated
clearing house (ACH), credit card, debit card, electronic
check and electronic, mobile and online payment platforms;
electronic currency transfer services, namely, electronic
splitting and sharing of funds between users.
26.
Bifurcated System for Querying Multiple Data Types
Techniques are disclosed relating to executing a bifurcated computer system for different types of data processing. The system receives a plurality of requests to execute queries and executes a first service of the system for a first query specified by the requests based on the first query specifying a first type of data. The system accesses, via the first service for the first query, a first database storing the first type of data. The system executes a second service for a second query specified by the requests based on the second query specifying a second type of data. The system accesses, via the second service for the second query, a second database storing the second type of data. The system transmits results of the first database to a user device of the first query and results of the second database to a user device of the second query.
36 - Financial, insurance and real estate services
Goods & Services
Cryptocurrency and stablecoin payment processing;
cryptocurrency and stablecoin exchange services; electronic
wallet services for trading, storing, sending, receiving,
validating, verifying, accepting, tracking, transferring,
and transmitting virtual currency, and managing virtual
currency payment and exchange transactions; fraud and
mistaken transaction reimbursement services, namely,
reimbursement of payment purchase processing for
transactions concerning lost, damaged, misrepresented, or
incorrect products or services; providing purchase
protection services, namely, providing payment dispute
resolution services and reimbursement services for disputed
transactions in the field of electronic payment purchases;
financial and banking services, namely, debit card and
credit card transaction processing services featuring cash
back rewards to customers that make incentivized purchases;
electronic funds transfer; processing electronic payment
transactions and electronic funds transfers via automated
clearing house (ACH), credit card, debit card, electronic
check and electronic, mobile and online payment platforms;
electronic currency transfer services, namely, electronic
splitting and sharing of funds between users.
28.
IMAGE REPAIR OF CAPTURED DOCUMENT IMAGES FOR DOCUMENT IMAGE SUBMISSIONS USING A GENERATIVE ARTIFICIAL INTELLIGENCE
There are provided systems and methods for image repair of captured document images for document image submissions using generative artificial intelligence (AI). A service provider, such as an electronic transaction processor for digital transactions, may provide computing services to users, which may be used to engage in interactions with other users and entities including for electronic transaction processing. When utilizing these services, document verification may be required to verify a document. A user may capture an image of a document, such as a driver's license, and an image repair generative AI may determine if image repair may be necessary to improve an image quality of the image. The generative AI may be trained using multiple neural networks to generate and distinguish between different image qualities. The generative AI may therefore generate image data that improves the image quality and allows for verification of content in the image.
Techniques are disclosed relating to executing a bifurcated computer system for different types of data processing. The system receives a plurality of requests to execute queries and executes a first service of the system for a first query specified by the requests based on the first query specifying a first type of data. The system accesses, via the first service for the first query, a first database storing the first type of data. The system executes a second service for a second query specified by the requests based on the second query specifying a second type of data. The system accesses, via the second service for the second query, a second database storing the second type of data. The system transmits results of the first database to a user device of the first query and results of the second database to a user device of the second query.
Techniques are disclosed relating to determining a minimum search region with a threshold number of entities within the minimum search region. In some embodiments, a system selects, based on a location of a user device, a first region, where the location of the device is at a center of the first region. The system executes, based on the first region, a query on a database storing entity locations. The system increases the first region by a specified amount to generate a second search region, where the increasing is based on determining that entities returned by the first query does not satisfy an entity threshold requirement. The system executes, based on the second region, a second query on the database. In response to the second query returning a number of entities that satisfy the threshold requirement, the system causes display, at the device, of the entities returned by the second query.
Methods and systems are presented for providing a container orchestration framework for facilitating development and deployment of software applications across different operating environments within an enterprise system. Upon receiving a service request for processing a set of data is received, the container orchestration framework determines one or more machines that store the set of data. Instead of processing the set of data remotely, the container orchestration framework deploys a container that encapsulates an application on the one or more machines. Each application instance running on the one or more machines are executed to process a corresponding subset of data stored on the machine locally. The container orchestration framework obtains the output data from executing the applications on each of the one or more machines, and present the output data as a response to the service request.
09 - Scientific and electric apparatus and instruments
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable computer software and mobile application software for processing electronic payments, transferring funds to and from others, and issuing receipts regarding electronic payment transactions; downloadable software for use in issuing digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; downloadable software for accepting, buying, selling, transmitting, and exchanging digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; downloadable software for electronically trading, storing, sending, receiving, validating, verifying, accepting, tracking, and transferring digital currency, cryptocurrency, virtual currency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; downloadable software for managing, implementing, and validating digital currency, virtual currency, cryptocurrency, stablecoin, digital asset, blockchain asset, digitized asset, digital token, crypto token and utility token payment and exchange transactions; downloadable software for use in payments, purchases, and investments using digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; downloadable software for use as a digital currency, virtual currency, cryptocurrency, stablecoin, digital asset, digital token, crypto token, and utility token wallet; downloadable software for currency conversion; downloadable software for creating tokens that may be used to pay for products and services, and traded or exchanged for cash value; downloadable software for managing and facilitating money transfers, electronic funds transfers, commodity transfers, bill payment remittance, and secure transactions. Electronic transfer of funds; clearing financial transactions via a global computer network and wireless networks; providing electronic mobile payment services for others in the nature of providing secure commercial transactions and payment options using a mobile device at a point of sale; electronic foreign exchange payment processing services; issuance of stablecoins and tokens of value; stablecoin payment processing; stablecoin trading services; stablecoin exchange services; financial services, namely, providing digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens for use by others; financial services, namely, digital currency, virtual currency, cryptocurrency, stablecoin, digital and blockchain asset, digitized asset, digital token, crypto token and utility token transfer, exchange, and payment processing services; financial exchange services; providing a financial exchange for trading digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; currency exchange services, currency trading services, foreign currency dealing, and broker-dealer financial services in the field of cryptocurrency, digital currency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; currency transfer services; electronic transfer of cryptocurrency, digital currency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; electronic wallet payment services; electronic wallet services for trading, storing, sending, receiving, validating, verifying, accepting, tracking, transferring, and transmitting digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens, and utility tokens, and for managing digital currency, virtual currency, cryptocurrency, stablecoin, digital and blockchain asset, digitized asset, digital token, crypto token, and utility token payment and exchange transactions; electronic payment processing of payments made via digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens, and utility tokens; digital currency, virtual currency, cryptocurrency, stablecoin, digital and blockchain asset, digitized asset, digital token, crypto token and utility token transaction processing services for others; financial management of digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens, and utility tokens. Providing temporary use of online non-downloadable software for electronic payment processing, transferring funds to and from others, and issuing receipts regarding electronic payment transactions; application service provider (ASP) services featuring software for use in digital currency, virtual currency, cryptocurrency, stablecoin, digital and blockchain asset, digitized asset, digital token, crypto token and utility token exchanges and transactions; providing temporary use of online non-downloadable software for use in issuing digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; providing temporary use of online non-downloadable software for accepting, buying, selling, transmitting, and exchanging digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; providing temporary use of online non-downloadable software for electronically trading, storing, sending, receiving, validating, verifying, accepting, tracking, and transferring digital currency, cryptocurrency, virtual currency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; providing temporary use of online non-downloadable software for managing, implementing, and validating digital currency, virtual currency, cryptocurrency, stablecoin, digital asset, blockchain asset, digitized asset, digital token, crypto token and utility token payment and exchange transactions; providing temporary use of online non-downloadable software for use in payments, purchases, and investments using digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; providing temporary use of online non-downloadable software for users to buy and sell products using digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; providing temporary use of online non-downloadable software for currency conversion; providing temporary use of online non-downloadable software for use as a digital currency, virtual currency, cryptocurrency, stablecoin, digital asset, digital token, crypto token, and utility token wallet; providing temporary use of online non-downloadable software for encryption; providing temporary use of online non-downloadable software for verifying, evaluating, and securing transactions with blockchain technology; providing temporary use of online non-downloadable software for managing and facilitating money transfers, electronic funds transfers, commodity transfers, bill payment remittance, and secure transactions.
33.
GRAPH NEURAL NETWORK WITH POINTED DIRECTIONAL MESSAGE PASSING
A graph network of a service provider is accessed. The graph network includes a plurality of nodes interconnected by a plurality of edges. A plurality of sub-graphs is generated. Each of the sub-graphs corresponds to a different portion of the graph network. Each of the sub-graphs includes a different subset of the plurality of nodes. A directional flow for information exchanges is defined between the nodes of each of the sub-graphs. A graph neural network (GNN) model is trained based on the defined directional flow. The trained GNN model is utilized to generate one or more predictions.
There are provided systems and methods for named entity recognition in chat dialogues for customer relationship management systems. A service provider, such as an electronic transaction processor for digital transactions, may provide live chat service channels for assistance through live agents and chatbot services. When interacting with these channels, a user may engage in a chat dialogue with live agents. This may include lines of texts corresponding to the exchanged messages and may include named entities for particular types or categories of words that refer to a particular object or thing. To identify these named entities, a natural language processor may utilize machine learning and other engines for named entity recognition in customer relationship management systems to highlight the named entities in live service chats. Agents of the systems may view content that identify the named entities and interact with the named entities to view descriptions.
Methods and systems are presented for stolen cookie detection. An authentication request is received for a user to access a website using a web browser executable at the user's device. A series of storage locations available on the device for storing web cookies is identified and sorted in order of increasing fraud risk starting from a first storage location. A cookie value for each storage location is retrieved from the device. For each storage location after the first: an expected cookie value is calculated based on the cookie value of a preceding storage location; the expected cookie value is compared with the value retrieved for the storage location; and a score representing a level of fraud risk for the storage location is assigned. The authentication request is processed based on whether the assigned score for at least one of the storage locations exceeds a predetermined risk tolerance for fraud detection.
Systems and methods for automatic generation of free-form conversational interfaces are disclosed. In one embodiment, a system receives an input from a user device through a conversational graphical user interface (GUI). An intent of the user may be determined based on the received input. Based on the intent of the user, the system may identify, from a plurality of objects available to the system, one or more objects. Each of the plurality of objects has annotations corresponding to one or more elements of the object and one or more functions of the object. The one or more functions corresponding to the one or more elements are executable to perform an action upon corresponding elements. Based on the identified one or more objects and the annotations of the identified one or more objects, the system may generate a dynamic dialogue flow for the conversational GUI, where the dynamic dialogue flow is generated in real-time during a conversational GUI session.
G06F 16/9035 - Filtering based on additional data, e.g. user or group profiles
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
H04L 51/216 - Handling conversation history, e.g. grouping of messages in sessions or threads
37.
SCENARIO-BASED DECISIONING BY MACHINE LEARNING MODELS FOR DATA PROCESSING RETRY SUCCESS
There are provided systems and methods for scenario-based decisioning by machine learning models for data processing retry success. A service provider, such as an electronic transaction processor for digital transactions, may detect a failure of data processing for a transaction or other request when processed with a data processing system. In order to minimize cost and wasted resources for retrying transactions that are likely to further fail, machine learning models may be implemented that generates a predictive score for whether a failed transaction is likely to be successful if retried with the data processing system. This may be done when the transactions are received or detected, which may occur prior to failures, for different scenario-based decisioning. Scenarios for failures may be processed by the models with different retry strategies and a predictive score may be used to predict a probability of success of the retry.
G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
38.
RULE GENERATION AND MANAGEMENT USING MACHINE LEARNING
The disclosed computer-implemented method includes calculating, from transaction data, a statistical change in data entries corresponding to a type of transaction and modeling a transaction rule for normalizing the statistical change by changing an acceptance standard of the type of transaction. The method further includes activating the transaction rule to update a live database system for entering real-time data entries. Various other methods, systems, and computer-readable media are also disclosed.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
39.
Execution of Machine Learning Models at Client Devices
Techniques are disclosed relating to the execution of machine learning models on client devices, particularly in the context of transaction risk evaluation. This reduces computational burden on server systems. In various embodiments, a server system may receive, from a client device, a request to perform a first operation and select a first machine learning model, from a set of machine learning models, to send to the client device. In some embodiments the first machine learning model is executable, by the client device, to generate model output data for the first operation based on one or more encrypted input data values that are encrypted with a cryptographic key inaccessible to the client device. The server system may send the first machine learning model to the client device and then receive, from the client device, a response message that indicates whether the first operation is authorized based on the model output data.
Methods and systems are presented for providing a data control framework that enables storing, sharing, and transferring of data in a secure manner. Data files stored in data repositories are scanned. Content associated with different section of each data file is analyzed, and each section is tagged with a sensitivity level based on the content and a subject matter derived for the data file. Each data file is also assigned to a clearance classification based on an expected viewer of the data file. When sections from a first data file is being transferred to a second data file, a data control mechanism is triggered. If a particular section from the first data file is incompatible with the second data file, the data control mechanism may prevent the particular section from being transferred to the second data file, while allowing the remaining sections being transferred to the second data file.
Data features are accessed from a plurality of sources. The data features pertain to a plurality of users. The data features are inputted into a predictive model. An output is generated via the predictive model. The output of the predictive model is inputted into a plurality of adversarial models. The adversarial models include different types of protected attributes. At least some of the protected attributes are non-binary. Noise is introduced to the predictive model via each of the adversarial models of the plurality of adversarial models. The output of the predictive model is updated after the noise has been introduced to the predictive model. One or more decisions involving the plurality of users are generated at least in part via the updated output of the predictive model.
09 - Scientific and electric apparatus and instruments
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing business information regarding money transfer services; business consulting services in the field of online payments; business managing and tracking credit card, debit card, ACH, prepaid cards, payment cards, and other forms of payment transactions via electronic communications networks for business purposes; business information management, namely, electronic reporting of business analytics relating to payment processing, authentication, tracking, and invoicing Downloadable software for processing electronic payments and for transferring funds to and from others; downloadable software for facilitating money transfer services, electronic funds transfer services, bill payment remittance services, electronic processing and transmission of payments and payment data; downloadable computer software and downloadable mobile application software for facilitating electronic commerce transactions; downloadable software for use as a digital wallet; downloadable software for connecting digital wallets; downloadable software for connecting, integrating, and enabling transfer of funds between digital wallets and financial accounts; downloadable software for linking independent financial accounts and digital wallets, enabling migration of data and transfers of funds between independent third party financial accounts and digital wallets, and establishing secure connections between independent financial accounts and digital wallets; downloadable computer software for use for financial account management, namely, software for managing and facilitating financial transactions and funds transfers for bank accounts, credit card accounts, debit card accounts, and digital wallets; downloadable authentication software for controlling access to and communications with computers and computer networks; downloadable software for currency conversion Electronic payment services involving electronic processing and subsequent transmission of bill payment data; Payment transaction processing services; providing electronic processing of electronic funds transfer, ACH, credit card, debit card, electronic check and electronic payments; financial information processing; money transfer services; electronic funds transfer services; bill payment services; providing a payment network for facilitating transactions from digital wallets; providing financial services, namely, bill payment services provided via a digital wallet and providing secure commercial transactions; transaction processing services for bank accounts, debit cards, and credit cards on embedded digital wallets, cross-border money transfers to banks and mobile wallets with real time currency exchange rates; clearing financial transactions via a global computer network and wireless networks; credit card and debit card transaction processing services; processing of electronic wallet payments; currency exchange services; electronic commerce payment services, namely, establishing funded accounts used to facilitate transactions and purchases on the internet Providing temporary use of online non-downloadable software for processing electronic payments and for transferring funds to and from others; Application Service Provider (ASP) featuring Application Programming Interface (API) software for facilitating payment transactions and financial information processing; providing temporary use of online non-downloadable software for facilitating money transfer services, electronic funds transfer services, bill payment remittance services, electronic processing and transmission of payments and payment data; providing temporary use of online non-downloadable software for facilitating electronic commerce transactions; providing temporary use of online non-downloadable software for use as a digital wallet; providing temporary use of online non-downloadable software for connecting digital wallets; providing temporary use of online non-downloadable software for connecting, integrating, and enabling transfer of funds between digital wallets and financial accounts; providing temporary use of online non-downloadable software for linking independent financial accounts and digital wallets, enabling migration of data and transfers of funds between independent third party financial accounts and digital wallets, and establishing secure connections between independent financial accounts and digital wallets; providing temporary use of online non-downloadable software for use for financial account management, namely, software for managing and facilitating financial transactions and funds transfers for bank accounts, credit card accounts, debit card accounts, and digital wallets; providing temporary use of online non-downloadable authentication software for controlling access to and communications with computers and computer networks; providing temporary use of online non-downloadable software for currency conversion
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable software for processing electronic payments and for transferring funds to and from others; downloadable software for facilitating money transfer services, electronic funds transfer services, bill payment remittance services, electronic processing and transmission of payments and payment data; downloadable computer software and downloadable mobile application software for facilitating electronic commerce transactions; downloadable software for use as a digital wallet; downloadable software for connecting digital wallets; downloadable software for connecting, integrating, and enabling transfer of funds between digital wallets and financial accounts; downloadable software for linking independent financial accounts and digital wallets, enabling migration of data and transfers of funds between independent third party financial accounts and digital wallets, and establishing secure connections between independent financial accounts and digital wallets; downloadable computer software for use for financial account management, namely, software for managing and facilitating financial transactions and funds transfers for bank accounts, credit card accounts, debit card accounts, and digital wallets; downloadable authentication software for controlling access to and communications with computers and computer networks; downloadable software for currency conversion. Providing business information regarding money transfer services; business consulting services in the field of online payments; business managing and tracking credit card, debit card, ACH, prepaid cards, payment cards, and other forms of payment transactions via electronic communications networks for business purposes; business information management, namely, electronic reporting of business analytics relating to payment processing, authentication, tracking, and invoicing. Electronic payment services involving electronic processing and subsequent transmission of bill payment data; Payment transaction processing services; providing electronic processing of electronic funds transfer, ACH, credit card, debit card, electronic check and electronic payments; financial information processing; money transfer services; electronic funds transfer services; bill payment services; providing a payment network for facilitating transactions from digital wallets; providing financial services, namely, bill payment services provided via a digital wallet and providing secure commercial transactions; transaction processing services for bank accounts, debit cards, and credit cards on embedded digital wallets, cross-border money transfers to banks and mobile wallets with real time currency exchange rates; clearing financial transactions via a global computer network and wireless networks; credit card and debit card transaction processing services; processing of electronic wallet payments; currency exchange services; electronic commerce payment services, namely, establishing funded accounts used to facilitate transactions and purchases on the internet. Providing temporary use of online non-downloadable software for processing electronic payments and for transferring funds to and from others; Application Service Provider (ASP) featuring Application Programming Interface (API) software for facilitating payment transactions and financial information processing; providing temporary use of online non-downloadable software for facilitating money transfer services, electronic funds transfer services, bill payment remittance services, electronic processing and transmission of payments and payment data; providing temporary use of online non-downloadable software for facilitating electronic commerce transactions; providing temporary use of online non-downloadable software for use as a digital wallet; providing temporary use of online non-downloadable software for connecting digital wallets; providing temporary use of online non-downloadable software for connecting, integrating, and enabling transfer of funds between digital wallets and financial accounts; providing temporary use of online non-downloadable software for linking independent financial accounts and digital wallets, enabling migration of data and transfers of funds between independent third party financial accounts and digital wallets, and establishing secure connections between independent financial accounts and digital wallets; providing temporary use of online non-downloadable software for use for financial account management, namely, software for managing and facilitating financial transactions and funds transfers for bank accounts, credit card accounts, debit card accounts, and digital wallets; providing temporary use of online non-downloadable authentication software for controlling access to and communications with computers and computer networks; providing temporary use of online non-downloadable software for currency conversion.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable software for processing electronic payments and for transferring funds to and from others; downloadable software for facilitating money transfer services, electronic funds transfer services, bill payment remittance services, electronic processing and transmission of payments and payment data; downloadable computer software and downloadable mobile application software for facilitating electronic commerce transactions; downloadable software for use as a digital wallet; downloadable software for connecting digital wallets; downloadable software for connecting, integrating, and enabling transfer of funds between digital wallets and financial accounts; downloadable software for linking independent financial accounts and digital wallets, enabling migration of data and transfers of funds between independent third party financial accounts and digital wallets, and establishing secure connections between independent financial accounts and digital wallets; downloadable computer software for use for financial account management, namely, software for managing and facilitating financial transactions and funds transfers for bank accounts, credit card accounts, debit card accounts, and digital wallets; downloadable authentication software for controlling access to and communications with computers and computer networks; downloadable software for currency conversion. Providing business information regarding money transfer services; business consulting services in the field of online payments; business managing and tracking credit card, debit card, ACH, prepaid cards, payment cards, and other forms of payment transactions via electronic communications networks for business purposes; business information management, namely, electronic reporting of business analytics relating to payment processing, authentication, tracking, and invoicing. Electronic payment services involving electronic processing and subsequent transmission of bill payment data; Payment transaction processing services; providing electronic processing of electronic funds transfer, ACH, credit card, debit card, electronic check and electronic payments; financial information processing; money transfer services; electronic funds transfer services; bill payment services; providing a payment network for facilitating transactions from digital wallets; providing financial services, namely, bill payment services provided via a digital wallet and providing secure commercial transactions; transaction processing services for bank accounts, debit cards, and credit cards on embedded digital wallets, cross-border money transfers to banks and mobile wallets with real time currency exchange rates; clearing financial transactions via a global computer network and wireless networks; credit card and debit card transaction processing services; processing of electronic wallet payments; currency exchange services; electronic commerce payment services, namely, establishing funded accounts used to facilitate transactions and purchases on the internet. Providing temporary use of online non-downloadable software for processing electronic payments and for transferring funds to and from others; Application Service Provider (ASP) featuring Application Programming Interface (API) software for facilitating payment transactions and financial information processing; providing temporary use of online non-downloadable software for facilitating money transfer services, electronic funds transfer services, bill payment remittance services, electronic processing and transmission of payments and payment data; providing temporary use of online non-downloadable software for facilitating electronic commerce transactions; providing temporary use of online non-downloadable software for use as a digital wallet; providing temporary use of online non-downloadable software for connecting digital wallets; providing temporary use of online non-downloadable software for connecting, integrating, and enabling transfer of funds between digital wallets and financial accounts; providing temporary use of online non-downloadable software for linking independent financial accounts and digital wallets, enabling migration of data and transfers of funds between independent third party financial accounts and digital wallets, and establishing secure connections between independent financial accounts and digital wallets; providing temporary use of online non-downloadable software for use for financial account management, namely, software for managing and facilitating financial transactions and funds transfers for bank accounts, credit card accounts, debit card accounts, and digital wallets; providing temporary use of online non-downloadable authentication software for controlling access to and communications with computers and computer networks; providing temporary use of online non-downloadable software for currency conversion.
09 - Scientific and electric apparatus and instruments
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing business information regarding money transfer services; business consulting services in the field of online payments; business managing and tracking credit card, debit card, ACH, prepaid cards, payment cards, and other forms of payment transactions via electronic communications networks for business purposes; business information management, namely, electronic reporting of business analytics relating to payment processing, authentication, tracking, and invoicing Downloadable software for processing electronic payments and for transferring funds to and from others; downloadable software for facilitating money transfer services, electronic funds transfer services, bill payment remittance services, electronic processing and transmission of payments and payment data; downloadable computer software and downloadable mobile application software for facilitating electronic commerce transactions; downloadable software for use as a digital wallet; downloadable software for connecting digital wallets; downloadable software for connecting, integrating, and enabling transfer of funds between digital wallets and financial accounts; downloadable software for linking independent financial accounts and digital wallets, enabling migration of data and transfers of funds between independent third party financial accounts and digital wallets, and establishing secure connections between independent financial accounts and digital wallets; downloadable computer software for use for financial account management, namely, software for managing and facilitating financial transactions and funds transfers for bank accounts, credit card accounts, debit card accounts, and digital wallets; downloadable authentication software for controlling access to and communications with computers and computer networks; downloadable software for currency conversion Electronic payment services involving electronic processing and subsequent transmission of bill payment data; Payment transaction processing services; providing electronic processing of electronic funds transfer, ACH, credit card, debit card, electronic check and electronic payments; financial information processing; money transfer services; electronic funds transfer services; bill payment services; providing a payment network for facilitating transactions from digital wallets; providing financial services, namely, bill payment services provided via a digital wallet and providing secure commercial transactions; transaction processing services for bank accounts, debit cards, and credit cards on embedded digital wallets, cross-border money transfers to banks and mobile wallets with real time currency exchange rates; clearing financial transactions via a global computer network and wireless networks; credit card and debit card transaction processing services; processing of electronic wallet payments; currency exchange services; electronic commerce payment services, namely, establishing funded accounts used to facilitate transactions and purchases on the internet Providing temporary use of online non-downloadable software for processing electronic payments and for transferring funds to and from others; Application Service Provider (ASP) featuring Application Programming Interface (API) software for facilitating payment transactions and financial information processing; providing temporary use of online non-downloadable software for facilitating money transfer services, electronic funds transfer services, bill payment remittance services, electronic processing and transmission of payments and payment data; providing temporary use of online non-downloadable software for facilitating electronic commerce transactions; providing temporary use of online non-downloadable software for use as a digital wallet; providing temporary use of online non-downloadable software for connecting digital wallets; providing temporary use of online non-downloadable software for connecting, integrating, and enabling transfer of funds between digital wallets and financial accounts; providing temporary use of online non-downloadable software for linking independent financial accounts and digital wallets, enabling migration of data and transfers of funds between independent third party financial accounts and digital wallets, and establishing secure connections between independent financial accounts and digital wallets; providing temporary use of online non-downloadable software for use for financial account management, namely, software for managing and facilitating financial transactions and funds transfers for bank accounts, credit card accounts, debit card accounts, and digital wallets; providing temporary use of online non-downloadable authentication software for controlling access to and communications with computers and computer networks; providing temporary use of online non-downloadable software for currency conversion
46.
REAL-TIME SUGGESTED ACTIONS BASED ON USER PROFILE ATTRIBUTES
Techniques are disclosed relating to generating real-time suggested actions for a user based on their user profile attributes. In various embodiments, a server system may select, in real-time, a particular action to suggest to a user based on profile attributes associated with a user account of the user. The server system may then provide a message indicative of this particular action to a user device associated with the user. In some embodiments, the server system may then receive an indication that the user has initiated the particular action. In response to this indication, the server system may update the profile attributes associated with the user account to indicate that the user has initiated the particular action. Using these updated profile attributes, the server system may then select, in real-time, an updated action to suggest to the user that is different from the particular action.
Techniques for providing access to scope-delimited sensitive data are disclosed. A user provides sensitive data to a first party associated with a payment service provider. The first party stores the sensitive data with the payment service provider, and the payment service provider provides the first party merchant with an encoding of the payment data. The first party provides a purchasing opportunity to the user for goods offered by a third party also associated with the payment service provider. The first party transmits a sensitive data grant request to the payment service provider. In response, the payment service provides a scope-delimited encoding of the sensitive data. The first party provides the scope-delimited encoding of the payment data to the third party. The third party merchant creates a transaction using the scope-delimited encoding of the sensitive data. At some time later, access to the scope-delimited encoding of the sensitive data is revoked.
Methods and systems are presented for bot detection. A movement of a pointing device is tracked via a graphical user interface (GUI) of an application executable at a user device. Movement data associated with different locations of the pointing device within the GUI is obtained. The movement data is mapped to functional areas corresponding to a range of the different locations of the pointing device within the GUI over consecutive time intervals. At least one vector representing a sequence of movements for at least one trajectory of the pointing device through one or more of the functional areas and a duration the pointing device stays within each functional area is generated. At least one trained machine learning model is used to determine whether the sequence of movements of the pointing device was produced through human interaction with the pointing device by an actual user of the user device.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable and recorded software for processing electronic
payments and for transferring funds to and from others;
downloadable and recorded software for remittance, transfer
of funds, stored value accounts, debit card transactions,
credit card transactions, and financial transactions and
account notifications; downloadable and recorded software
for creating, preparing, managing, sending, processing,
tracking, and reconciling invoices; downloadable and
recorded software for issuing receipts regarding mobile
payment transactions; downloadable and recorded
authentication software for controlling access to and
communications with computers and computer networks;
downloadable and recorded software for creating and managing
a business and an online store, namely, inventory
management, order processing, order tracking, fulfillment of
orders, sales tracking, collection of sales data, and sales
analytics; downloadable and recorded computer software for
generating and soliciting business funding and investments;
downloadable and recorded software for managing customer
relations (CRM) and loyalty programs, namely, software to
create, manage, and analyze customer contact and account
information, generate and track customer loyalty programs,
and generate reports; downloadable and recorded software
used for point of sale transactions; downloadable and
recorded computer software used to train and manage
employees, record employee hours worked, and generate
payroll processing; downloadable software development kits
(SDK); computer hardware for making, authenticating,
facilitating, operating, managing, and processing payment
transactions with credit cards, debit cards, prepaid cards,
payment cards, gift cards, and other payment forms;
electronic devices, namely, point of sale terminals, chip
card readers, credit card readers, payment card readers,
magnetic encoded and coded card readers, and mobile card
readers; charging stands adapted for use with handheld
digital electronic devices namely, cell phones, MP3 players,
personal digital assistants, point of sale terminals, chip
card readers, credit card readers, payment card readers, and
mobile card readers; credit card reader stands; tablet and
mobile device stands; barcode scanners; receipt printers;
cash drawers. Promoting the sale of goods and services of others by means
of contests and incentive award programs; providing
incentive award programs through issuance and processing of
loyalty points for purchase of the goods and services of
others; providing incentive award programs through the
issuance of gift cards, prepaid gift cards, prepaid stored
value cards for the purpose of promoting and rewarding
loyalty, discounts, offers, deals, coupons, rebates,
rewards, and vouchers to participants for the purchase of
the goods and services of others; customer loyalty services
for commercial, promotional and/or advertising purposes,
namely, administration of a program that allows participants
to obtain and redeem points or awards for goods and/or
services; business consulting services in the field of
online payments; managing and tracking credit card, debit
card, ACH, prepaid cards, payment cards, and other forms of
payment transactions via electronic communications networks
for business purposes; business information management,
namely, electronic reporting of business analytics relating
to payment processing, authentication, tracking, and
invoicing; business management, namely, optimization of
payments for businesses; reconciling financial transactions. Financial services, namely, electronic funds transfer;
clearing financial transactions; financial services, namely,
payment collection, payment transactions and information
processing; providing a wide variety of payment and
financial services, namely, issuing credit cards and lines
of credit, electronic payment services involving electronic
processing and subsequent transmission of bill payment data,
bill payment services with guaranteed payment delivery, all
conducted via a global communications network; credit card
transaction processing services; debit card transaction
processing services; electronic foreign exchange payment
processing; payment processing services, namely, providing
virtual currency transaction processing services for others;
processing electronic payments made through prepaid cards;
providing electronic mobile payment services for others;
providing electronic processing of electronic funds
transfer, ACH, credit card, debit card, check transactions
and payments; credit services, namely, providing revolving
credit account services; bill payment services; fund wiring
services; providing electronic payment services via ATM
machines and point-of-sale (POS) merchants, namely,
providing secure commercial transactions and payment options
using a mobile device at a point of sale; providing payment
collection, payment transaction processing, financial
remittance, transfer of funds to make payments, payment
services using stored value accounts, and debit card
transaction processing to make payments via an online
portal; financial risk management services; financial
transaction analysis, namely, financial analysis of payment
transactions and stored value card and debit card
transactions; providing purchase protection services for
goods and services purchased by others via a global computer
network and wireless networks, namely, providing fraud
reimbursement services in the field of credit card purchases
and electronic payment purchases, and providing secure
commercial transactions for credit card purchases and
electronic payment purchases; reimbursement of funds for
disputed items in the field of electronic payment purchases;
loyalty program and incentive award program payment
processing services. Providing temporary use of online non-downloadable software
for processing electronic payments and for transferring
funds to and from others; providing temporary use of online
non-downloadable software for remittance, transfer of funds,
stored value accounts, debit card transactions, credit card
transactions, financial transactions and account
notifications; providing temporary use of online
non-downloadable software for creating, preparing, managing,
sending, processing, tracking, and reconciling invoices;
providing temporary use of online non-downloadable software
for issuing receipts regarding mobile payment transactions;
providing temporary use of online non-downloadable
authentication software for controlling access to and
communications with computers and computer networks;
providing temporary use of online non-downloadable software
for creating and managing a business and an online store,
namely, inventory management, order processing, order
tracking, fulfillment of orders, sales tracking, collection
of sales data, and sales analytics; providing temporary use
of online non-downloadable computer software for managing
customer relations (CRM) and loyalty programs, namely,
software to create, manage, and analyze customer contact and
account information, generate and track customer loyalty
programs, and generate reports; providing online temporary
use of non-downloadable computer software used for point of
sale transactions; providing temporary use of online
non-downloadable computer software used to train and manage
employees, record employee hours worked, and generate
payroll processing; application service provider featuring
application programming interface (API) software for payment
collection, payment transactions, and information
processing; providing temporary use of online
non-downloadable software for customizing application
programming interfaces (APIs), integrating pay in methods to
digital wallets, sharing payment data between users and
generating reports, managing disputed charges, and
automating chargebacks; application service provider (ASP)
featuring application programming interface (API) software
for payment collection, payment transactions, forwarding
data and information processing; electronic monitoring of
financial transactions for fraud, money laundering, and
illegality in the field of electronic fund transfer and
electronic payment processing services; providing temporary
use of online non-downloadable computer software for
tracking and analyzing payment activity; providing temporary
use of online non-downloadable software to evaluate and
detect fraud and illegality in payment transactions, and
manage compliance validation.
50.
SERVER DEVICE CONFIGURATIONS BASED ON MACHINE LEARNING
A system, a medium, and a method are provided to exchange data packets over a communications network and perform machine learning operations. A network server device receives account data from client devices that correspond to account profiles. An account engine of the network server device segments the account profiles into profile groups based on a respective balance associated with each account profile. The account engine determines target accounts from profile groups based on behavioral data. Further, data processing components of the network server device determine a method of contact for each target account. The data processing components determine a respective time to communicate with a respective device for each target account. Further, communication components of the network server device initiate communications to the respective devices at the respective times for each target account.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
A system, including: a non-transitory memory; and one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations including: receiving a transaction request from an endpoint device on a network, wherein the endpoint device is registered with a transaction service provider; locating, based on the transaction request, an authorization token corresponding to a payment mechanism, wherein the authorization token is stored to a memory device of the router; in response to receiving the transaction request, transmitting the authorization token to the transaction service provider to retrieve transaction information from the transaction service provider, wherein the transaction information includes payment data for a user of the endpoint device; and transmitting the transaction information to the upstream network location, wherein the upstream network location includes a merchant server.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
H04W 88/00 - Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
Latency, response times, and efficiency improvements for data querying are provided herein, particularly in the context of querying large database systems and data tables from disparate data sources. There are provided systems and methods for automatic query and data retrieval optimization through procedural generation of data tables from query patterns. A service provider may utilize different computing services for query processing and data retrieval for different applications and services used by internal and/or external users. Instead of querying large database systems and numerous data tables, pre-aggregated data tables may instead be used and searched by procedurally generating such tables based on precomputation rules and query patterns. Once patterns have been identified in queries, corresponding data may be aggregated from data sources in a pre-aggregated data table. Query optimization rules may then be used to have these data tables queried in place of their original sources.
Systems and techniques for facilitating detection of data duplication issues relating to generation of non-fungible tokens are provided. In various embodiments, a computer system can access a digital artwork image. In various aspects, the computer system can generate a set of plagiarism probabilities by comparing the digital artwork image to a set of cached digital artwork images. In various instances, a given plagiarism probability in the set of plagiarism probabilities can indicate a likelihood that the digital artwork image was derived from a given cached digital artwork image in the set of cached digital artwork images. In various cases, the computer system can calculate an authenticity score for the digital artwork image based on the set of plagiarism probabilities. In various aspects, the computer system can determine whether the authenticity score for the digital artwork image satisfies a threshold authenticity value.
A method and system for detecting slow page load is provided. An example system comprises a page request detector, a time-out module, a time-out monitor, and a lightweight page requestor. The page request detector may be configured to detect a request for a web page. The time-out module may be configured to commence a time-out period in response to a request for a web page. The time-out module cooperates with the time-out monitor that may be configured to determine that rendering of a rich version of the requested web page has not commenced at an expiration of the time-out period. The lightweight page requestor may be configured to cause a lightweight version of the requested page to be provided to the client system when the time-out monitor determines that the rendering of a rich version of the requested web page has not commenced at an expiration of the time-out period.
Systems and methods for real-time electronic service processing adjustments are disclosed. In an embodiment, a computer system may determine that a user account activity has triggered an assessment checkpoint from a plurality of assessment checkpoints in a life cycle of a user account. The computer system may retrieve data from the assessment checkpoint and update a lifetime score for the user account based on the retrieved data. The computer system may update the lifetime score by weighting the retrieved data as one or more features in a linear-weighted lifetime score model, for the life cycle. The computer system may adjust a response threshold for the assessment checkpoint based on the updated lifetime score.
A computer-implemented method may include receiving an image to analyze for potential objects; providing the image as input to a pretrained machine learning model, where the pretrained machine learning model is trained to detect a known object that corresponds to a predefined category within the pretrained machine learning model or a generic object; determining based on output from the pretrained machine learning model, that the image comprises an instance of a generic object; performing, based on determining that the image comprises an instance of a generic object, a similarity search between the image and a library of images; and determining, for the instance of the generic object, a specific category defined by the library of images based at least in part on the similarity search. Various other methods and systems are also disclosed.
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06V 10/74 - Image or video pattern matchingProximity measures in feature spaces
57.
MACHINE LEARNING ENGINE USING FOLLOWING LINK SELECTION
A machine learning engine may be trained using artificial intelligence techniques and used according to techniques discussed herein. While an initial electronic transaction for a resource may be permitted, a subsequent related transaction to the initial electronic transaction may be analyzed in view of additional electronic information that was not available at the time of the initial transaction. Analysis of the subsequent related transaction, using the machine learning engine, may indicate a new classification related to the resource and/or the acquisition of the resource. Based on this new classification, usage of the resource may be restricted and/or denied, and the initial transaction for the resource may even be canceled retroactively.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
There are provided systems and methods for a guided web crawler for automated identification and verification of webpage resources. A service provider, such as an online transaction processor, may provide a guided web crawler and/or resources for such crawler for execution by computing devices of users. Users may load different pluggable modules to the guided web crawler, which are associated with specific web crawling tasks. Web crawling tasks may correspond to identification and verification of webpage resources on a webpage, such as a location, placement, use of, and/or number of appearances of the resource. The web crawler may use code from the pluggable module being executed to parse and/or crawl webpage data for a webpage and identify requested resources. Thereafter, the guided web crawler may automate resources to use, display, and/or interact with the identified and verified resource.
There are provided systems and methods for configuration-driven efficient transformation of formats and object structures for data specifications in computing services. A service provider, such as an electronic transaction processor for digital transactions, may utilize different computing services that implement rules and artificial intelligence models for decision-making of data including data in production computing environment. Different services may process data in different data formats and structures. However, transformation of data between different services, such as a gateway service that may receive data processing requests and/or data objects and downstream services that may process such requests and objects, may take significant time and resources. A configuration-driven data transformation platform may intelligently create code for and select from transformers that may be used for data transformations. When selected, the transformers may transform data between services faster and more efficiently by being specifically selected based on past performances and code configurations.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
36 - Financial, insurance and real estate services
Goods & Services
(1) Cryptocurrency and stablecoin payment processing; cryptocurrency and stablecoin exchange services; electronic wallet services for trading, storing, sending, receiving, validating, verifying, accepting, tracking, transferring, and transmitting virtual currency, and managing virtual currency payment and exchange transactions; fraud and mistaken transaction reimbursement services, namely, reimbursement of payment purchase processing for transactions concerning lost, damaged, misrepresented, or incorrect products or services; providing purchase protection services, namely, providing payment dispute resolution services and reimbursement services for disputed transactions in the field of electronic payment purchases; financial and banking services, namely, debit card and credit card transaction processing services featuring cash back rewards to customers that make incentivized purchases; electronic funds transfer; processing electronic payment transactions and electronic funds transfers via automated clearing house (ACH), credit card, debit card, electronic check and electronic, mobile and online payment platforms; electronic currency transfer services, namely, electronic splitting and sharing of funds between users.
36 - Financial, insurance and real estate services
Goods & Services
(1) Cryptocurrency and stablecoin payment processing; cryptocurrency and stablecoin exchange services; electronic wallet services for trading, storing, sending, receiving, validating, verifying, accepting, tracking, transferring, and transmitting virtual currency, and managing virtual currency payment and exchange transactions; fraud and mistaken transaction reimbursement services, namely, reimbursement of payment purchase processing for transactions concerning lost, damaged, misrepresented, or incorrect products or services; providing purchase protection services, namely, providing payment dispute resolution services and reimbursement services for disputed transactions in the field of electronic payment purchases; financial and banking services, namely, debit card and credit card transaction processing services featuring cash back rewards to customers that make incentivized purchases; electronic funds transfer; processing electronic payment transactions and electronic funds transfers via automated clearing house (ACH), credit card, debit card, electronic check and electronic, mobile and online payment platforms; electronic currency transfer services, namely, electronic splitting and sharing of funds between users.
36 - Financial, insurance and real estate services
Goods & Services
Cryptocurrency and stablecoin payment processing; cryptocurrency and stablecoin exchange services; electronic wallet services for trading, storing, sending, receiving, validating, verifying, accepting, tracking, transferring, and transmitting virtual currency, and managing virtual currency payment and exchange transactions; fraud and mistaken transaction reimbursement services, namely, reimbursement of payment purchase processing for transactions concerning lost, damaged, misrepresented, or incorrect products or services; providing purchase protection services, namely, providing payment dispute resolution services and reimbursement services for disputed transactions in the field of electronic payment purchases; financial and banking services, namely, debit card and credit card transaction processing services featuring cash back rewards to customers that make incentivized purchases; electronic funds transfer; processing electronic payment transactions and electronic funds transfers via automated clearing house (ACH), credit card, debit card, electronic check and electronic, mobile and online payment platforms; electronic currency transfer services, namely, electronic splitting and sharing of funds between users
63.
AUTOMATED GENERATION OF PROMPTS FOR RESEARCH SUMMARIES USING GENERATIVE ARTIFICIAL INTELLIGENCE
A method according to the present disclose may include presenting, on a graphical user interface (GUI), an interactive element; receiving, via the interactive element on the GUI, a research target and a type of research; autonomously retrieving, from a search engine, search results related to the research target; identifying, using a predictive machine learning model, at least one relevant portion of the search results, the at least one relevant portion comprising information related to the research target and responsive to the type of research; generating a prompt based on the type of research and the at least one relevant portion of the search results; and receiving, from a generative machine learning model in response to receipt of the generated prompt, a report indicative of the research target.
Techniques are disclosed relating to determining a minimum search region with a threshold number of entities within the minimum search region. In some embodiments, a system selects, based on a location of a user device, a first region, where the location of the device is at a center of the first region. The system executes, based on the first region, a query on a database storing entity locations. The system increases the first region by a specified amount to generate a second search region, where the increasing is based on determining that entities returned by the first query does not satisfy an entity threshold requirement. The system executes, based on the second region, a second query on the database. In response to the second query returning a number of entities that satisfy the threshold requirement, the system causes display, at the device, of the entities returned by the second query.
Techniques are disclosed relating to improving the efficiency of geolocation queries via geospatial cells and query parameter caching. In various embodiments, a system receives a request from a user device to access geolocation information of entities and determine a first geographic location of the device. The system identifies that the first location is within a geospatial cell stored in a database cache and determines whether query parameters corresponding to the cell are stored in the cache. The system may retrieve the cached query parameters corresponding to the geospatial cell and execute a geolocation query on a database storing location information for different entities based on the cached query parameters. Results of the geolocation query may be different from query results of one or more other queries executed, based on the cached query parameters, for other user computing devices located within the given geospatial cell based on the cached query parameters.
09 - Scientific and electric apparatus and instruments
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Advertising, marketing, and promotion services; administering promotional and incentive rewards programs, namely, rewards, discounts, and promotional programs featuring discounts and the ability to earn rewards on third-party products and services; debit and credit card incentive reward programs, namely, providing cash back rewards to debit card and credit card account holders; promoting the goods and services of others by providing information regarding rewards, discounts, coupons, rebates, vouchers and special offers for goods and services; promoting the goods and services of others, namely, providing links to the websites of others; promotion services, namely, providing websites featuring links to the online retail and e-commerce websites of others; promoting the goods and services of others via offering rewards, discounts, and promotions through a mobile application Downloadable software for sending, receiving, accepting, buying, selling, storing, transmitting, trading and exchanging digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain financial assets, digitized assets, digital tokens, crypto tokens and utility tokens; downloadable software for use in processing payments, purchases, and investments using digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain financial assets, digitized assets, digital tokens, crypto tokens and utility tokens; downloadable software for use as an electronic wallet; magnetically encoded debit cards and credit cards; downloadable software that promotes the goods and services of others by providing information regarding rewards, discounts, cash back offers, coupons, rebates, vouchers and special offers for goods and services; downloadable software for the electronic transfer of money; downloadable software that allows users to transfer money, split money, and share money; downloadable software for processing electronic payment transactions and funds transfers made via automated clearing house (ACH), credit card, debit card, electronic check and electronic, mobile and online payment platforms Cryptocurrency and stablecoin payment processing; cryptocurrency and stablecoin exchange services; electronic wallet services for trading, storing, sending, receiving, validating, verifying, accepting, tracking, transferring, and transmitting virtual currency, and managing virtual currency payment and exchange transactions; fraud and mistaken transaction reimbursement services, namely, reimbursement of payment purchase processing for transactions concerning lost, damaged, misrepresented, or incorrect products or services; providing purchase protection services, namely, providing payment dispute resolution services and reimbursement services for disputed transactions in the field of electronic payment purchases; financial and banking services, namely, debit card and credit card transaction processing services featuring cash back rewards to customers that make incentivized purchases; electronic funds transfer; processing electronic payment transactions and electronic funds transfers via automated clearing house (ACH), credit card, debit card, electronic check and electronic, mobile and online payment platforms; electronic currency transfer services, namely, electronic splitting and sharing of funds between users Software as a service (SaaS) services featuring software for sending, receiving, accepting, buying, selling, storing, transmitting, trading and exchanging digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain financial assets, digitized assets, digital tokens, crypto tokens and utility tokens; Software as a service (SaaS) services featuring software for use in processing payments, purchases, and investments using digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain financial assets, digitized assets, digital tokens, crypto tokens and utility tokens; Software as a service (SaaS) services featuring software that promotes the goods and services of others by providing information regarding rewards, discounts, cash back offers, coupons, rebates, vouchers and special offers for goods and services; Software as a service (SaaS) services featuring software for the electronic transfer of money; Software as a service (SaaS) services featuring software that allows users to transfer money, split money, and share money; software as a service (SaaS) services featuring software for processing electronic payment transactions and funds transfers made via automated clearing house (ACH), credit card, debit card, electronic check and electronic, mobile and online payment platforms; software as a service (SaaS) services featuring software for use as an electronic wallet
36 - Financial, insurance and real estate services
Goods & Services
Cryptocurrency and stablecoin payment processing; cryptocurrency and stablecoin exchange services; electronic wallet services for trading, storing, sending, receiving, validating, verifying, accepting, tracking, transferring, and transmitting virtual currency, and managing virtual currency payment and exchange transactions; fraud and mistaken transaction reimbursement services, namely, reimbursement of payment purchase processing for transactions concerning lost, damaged, misrepresented, or incorrect products or services; providing purchase protection services, namely, providing payment dispute resolution services and reimbursement services for disputed transactions in the field of electronic payment purchases; financial and banking services, namely, debit card and credit card transaction processing services featuring cash back rewards to customers that make incentivized purchases; electronic funds transfer; processing electronic payment transactions and electronic funds transfers via automated clearing house (ACH), credit card, debit card, electronic check and electronic, mobile and online payment platforms; electronic currency transfer services, namely, electronic splitting and sharing of funds between users
Techniques are disclosed relating to improving the efficiency of geolocation queries via geospatial cells and query parameter caching. In various embodiments, a system receives a request from a user device to access geolocation information of entities and determine a first geographic location of the device. The system identifies that the first location is within a geospatial cell stored in a database cache and determines whether query parameters corresponding to the cell are stored in the cache. The system may retrieve the cached query parameters corresponding to the geospatial cell and execute a geolocation query on a database storing location information for different entities based on the cached query parameters. Results of the geolocation query may be different from query results of one or more other queries executed, based on the cached query parameters, for other user computing devices located within the given geospatial cell based on the cached query parameters.
Techniques for detecting a fraudulent attempt by an adversarial user to voice verify as a user are presented. An authenticator component can determine characteristics of voice information received in connection with a user account based on analysis of the voice information. In response to determining the characteristics sufficiently match characteristics of a voice print associated with the user account, authenticator component can determine a similarity score based on comparing the characteristics of the voice information and other characteristics of a set of previously stored voice prints associated with the user account. Authenticator component can determine whether the similarity score is higher than a threshold similarity score to indicate whether the voice information is a replay of a recording or a deep fake emulation of the voice of the user. Above the threshold can indicate the voice information is fraudulent, and below the threshold can indicate the voice information is valid.
G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination
Systems and methods for determining control objective for electronic documents using models may include obtaining electronic documents and a control objectives library, determining a first set of summaries based on the electronic documents, extracting a set of embeddings from the control objectives library, and determining a set of control objectives based on the summaries and the embeddings. The method may also include determining control objective candidates based on the summaries and embeddings, ranking the control objective candidates based on a confidence score, filtering the control objective candidates based on the ranking, categorizing the control objectives candidates into a second and third set of control objectives, updating the control objectives library to include one or more control objectives from the third set of control objectives, and validating control objectives in the third set of control objectives based on a test plan and updating the control objectives library that pass validation.
G06F 16/383 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
71.
INTELLIGENT PRE-EXECUTION OF DECISION SERVICE STRATEGIES FOR AVAILABILITY DURING DATA REQUESTS
There are provided systems and methods for intelligent pre-execution of decision service strategies for availability during data requests. A service provider, such as an electronic transaction processor for digital transactions, may utilize different decision services that implement rules and artificial intelligence models for decision-making of data including data in production computing environment. A decision service may normally be invoked to execute a strategy for processing a request when that request is received or arrives at the decision service. To provide faster processing and higher availability of such services, an intimation call may be received at the decision service from an upstream service, which initiates a process to pre-execute the strategy based on available data at the time of the intimation call. Pathways of rules capable of being completed may be executed using the available data and the result may be stored for later merging with further strategy execution.
There are provided systems and methods for streamlined and privacy protected data flows for entity onboarding with online data platforms. An online transaction processor or other service provider may provide computing services and platforms to entities including merchants for electronic transaction processing and other account services. To onboard entities with the transaction processor, the transaction processor may provide a merchant or user-specific experience and recommendations using a conversational AI service and chatbot. An AI engine may be trained to engage with users via chat dialogue, which may interact with users during onboarding and/or account lifecycle events based on the available services and products of the service provider. An intent of the entity may be classified by the AI engine and may be used to generate a recommendation including an action plan or the like of activities or steps for the entity to take.
From a plurality of sources, data pertaining to one or more users is accessed. Based on the data, one or more original underwriting model scores are determined for the users. Based on the one or more original underwriting model scores, an initial approval decision is generated for one or more credit applications associated with the one or more users. One or more macro environmental criteria is monitored. Based on the monitoring indicating that the one or more macro environmental criteria has exceeded a specified threshold, the one or more macro environmental criteria and the one or more original underwriting model scores are inputted into a hyper model. Via the hyper model, one or more scaled underwriting model scores are determined for the one or more users. Based on the one or more scaled underwriting model scores, a revised approval decision is generated for one or more credit applications.
A system may include a processor and a non-transitory computer readable medium having stored thereon instructions that are executable by the processor to cause the system to receive a conversation log between a first user and a second user, derive, via a first machine learning model, at least one text chunk from the conversation log, process, via a second machine learning model, the at least one text chunk, the second machine learning model trained using previous conversation logs to determine whether the at least one text chunk indicates a vulnerability, in response to the at least one text chunk indicating the vulnerability, classify a type of the indicated vulnerability, and automatically execute a remedial action based on the classified type.
G06F 21/55 - Detecting local intrusion or implementing counter-measures
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 40/289 - Phrasal analysis, e.g. finite state techniques or chunking
Methods, systems, and computer program products are included for load balancing processing of a data stream that is communicated over a network. An exemplary method includes establishing a communication session over a network between a source endpoint device and a destination endpoint device. A network device in the network receives a data stream that is communicated to the destination endpoint device from the source endpoint device during the communication session. The network device provides data corresponding to the data stream to a processing device. The processing device identifies a portion of the data that is assigned to the processing device and performs operations to process the portion of the data. After performing the operations, the processing device communicates a response corresponding to the processing to the source endpoint device by way of the destination endpoint device.
There are provided systems and methods for streamlined and privacy protected data flows for entity onboarding with online data platforms. An online transaction processor or other service provider may provide computing services and platforms to entities including merchants for electronic transaction processing and other account services. To onboard entities with the transaction processor, the transaction processor may provide a merchant or user-specific experience and recommendations using a conversational AI service and chatbot. An AI engine may be trained to engage with users via chat dialogue, which may interact with users during onboarding and/or account lifecycle events based on the available services and products of the service provider. An intent of the entity may be classified by the AI engine and may be used to generate a recommendation including an action plan or the like of activities or steps for the entity to take.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
G06Q 30/06 - Buying, selling or leasing transactions
The disclosed computer-implemented method includes detecting an unavailability of a primary cryptocurrency exchange system and queuing received cryptocurrency transaction requests. The method also includes connecting to a backup cryptocurrency exchange system and completing the queued cryptocurrency transaction requests with a backup asset pool using the backup cryptocurrency exchange system. The method further includes detecting an availability of the primary cryptocurrency exchange system and reconnecting to the primary cryptocurrency exchange system. Various other methods, systems, and computer-readable media are also disclosed.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
There are provided systems and methods of bot detection through explainable deep learning and rule violation codebooks from generative AI. A service provider, such as an electronic transaction processor for digital transactions, may provide computing services to users for processing various requests and interactions with those users. However, malicious users may utilize bots, such as automated scripts and software applications, that attempt to conduct fraud, compromise systems and data, and the like. To provide better bot and bot activity detection, the service provider may implement an explainable deep learning system that may generate rule violations of rules indicating bot activity or presence in computing logs and interactions using a generative AI. The violations may have a corresponding explanation in codebooks to automate bot detection. When bot activity is detected, the explanation may provide a reason for the bot activity detection.
Blockchain latency is improved by unclogging a mempool, which frees up electronic memory and reduces CPU usage and network bandwidth. Mining data of one or more initial blocks of a blockchain is accessed. The mining data reveals, for each miner, the time delay between individual transactions mined by that miner. A subset of miners is then determined to have lower time delays than miners not in the subset. Thereafter, a different random number is generated for each new block of the blockchain system to be mined. Based on a comparison of this random number and a predefined threshold, either an exploitation phase or an exploration phase is entered for the mining of each new block. In the exploitation phase, mining tasks are assigned only to the subset of the miners. In the exploration phase, mining tasks are assigned to both miners within the subset and miners not in the subset.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
80.
CONTEXT-BASED GENERATIVE ARTIFICIAL INTELLIGENCE SYSTEM
Systems, methods, and computer program products for using a generative artificial intelligence system to generate answers or summaries is provided. During the ingestion stage, the system receives documents and transcripts that include data associated with a theme. The data is converted into a common format and is divided into chunks. The chunks are associated with metadata tags that include chunk and data information. From the chunks, the system generates embedding vectors. During the inference stage, the system receives an information request. If the information request is a question, the system generates a vector from the question, and uses a similarity search to identify similar vectors. From the similar vectors, the system identifies chunks. If the information request includes a summary request, the system uses the metadata tags to identify chunks with summary information. The system generates an answer or a summary from the identified chunks.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
81.
NETWORK SPILLOVER DETECTION AND GLOBAL HOLDOUT CREATION USING GRAPH PARTITIONING
Methods and systems are presented for facilitating computer software feature experimentation by using one or more graph analyses to partition users into different experimentation groups. A graph is generated to represent users of a service provider and relationships among the users. When a request to perform a software feature experiment on the users of the service provider, the graph is analyzed to determine an estimated spillover effect. The graph is then coarsened across multiple levels using a label propagation technique based on one or more coarsening parameters. After the graph has been coarsened, the graph is partitioned into multiple partitions based on one or more partitioning parameters. The coarsening parameters and/or the partitioning parameters may be determined based on the estimated spillover effect. A subset of users is selected for performing the software feature experiment based on the partitioning of the coarsened graph.
Accuracy and speed improvements for data computing results are provided herein, particularly in the context of data event streaming services and downstream data computing processes. There are provided systems and methods for failure tracking with real-time data event streaming for data quality checks. A service provider may utilize different computing services for event processing and storing for downstream applications and services in a production computing environment. Due to issues in data loading and/or processing, certain events when streamed may fail to be processed and/or stored for availability to further system components. A failed event tracker may be implemented where, when events fail to process in an original processing queue, the tracker may detect the failure and write an identifier for the event to a table in an accessible database. The tracker may the republish the event via a retry processing queue using the identifier and may track for completion.
A method for remote device updates includes receiving a selection of a terminal device having an existing operational configuration and capable of operating in a development mode and a production mode. The method further includes receiving a new operational configuration for the terminal device, causing the terminal device to enter development mode with the new operational configuration, receiving an indication that the new operational configuration should be deployed, and, in response to the indication, formatting the new operational configuration into one or more files usable by the terminal in production mode, and causing the one or more files to be transmitted to the terminal with an instruction for the terminal device to enter production mode operating according to the one or more files.
There are provided systems and methods of bot detection through explainable deep learning and rule violation codebooks from generative AI. A service provider, such as an electronic transaction processor for digital transactions, may provide computing services to users for processing various requests and interactions with those users. However, malicious users may utilize bots, such as automated scripts and software applications, that attempt to conduct fraud, compromise systems and data, and the like. To provide better bot and bot activity detection, the service provider may implement an explainable deep learning system that may generate rule violations of rules indicating bot activity or presence in computing logs and interactions using a generative AI. The violations may have a corresponding explanation in codebooks to automate bot detection. When bot activity is detected, the explanation may provide a reason for the bot activity detection.
Systems and methods for predicting computer resources to fulfil pipeline requests includes obtaining a processing pipeline request defining a first set of computing resources for allocation during a first time period, obtaining a first dataset corresponding to historical data and scheduled pipelines, determining an availability of computing resources during a second time period based on the request, and predicting a recommendation corresponding to a second set of computing resources and a third time period to fulfill the request, the prediction being determined based on the first dataset and the available computing resources. The operations may further include generating a second dataset as output, sending the second dataset to a second computing device, obtaining a third dataset corresponding to a user selection of one or more computing resources during the third time period, and coordinating with one or more other computing devices in the system to fulfill the request.
A method for remote device updates includes receiving a selection of a terminal device having an existing operational configuration and capable of operating in a development mode and a production mode. The method further includes receiving a new operational configuration for the terminal device, causing the terminal device to enter development mode with the new operational configuration, receiving an indication that the new operational configuration should be deployed, and, in response to the indication, formatting the new operational configuration into one or more files usable by the terminal in production mode, and causing the one or more files to be transmitted to the terminal with an instruction for the terminal device to enter production mode operating according to the one or more files.
G06F 15/177 - Initialisation or configuration control
H04L 41/50 - Network service management, e.g. ensuring proper service fulfilment according to agreements
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
H04L 41/00 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
87.
SPLIT-AND-MERGE FRAMEWORK FOR AUDIO CONTENT PROCESSING
Methods and systems are presented for providing a framework for analyzing and classifying audio data using a split-and-merge approach. Audio data is split into multiple audio tracks that correspond to different characteristics. Each audio track is segmented, and features are extracted from each segment of the audio track. Features extracted from audio segments of each audio track is analyzed. One or more correlations between the different audio tracks are determined based on comparing features extracted from audio segments of a first audio track against features extracted from audio segments of a second audio track. The audio data is classified based on the one or more correlations.
G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination
88.
SPLIT-AND-MERGE FRAMEWORK FOR AUDIO CONTENT PROCESSING
Methods and systems are presented for providing a framework for analyzing and classifying audio data using a split-and-merge approach. Audio data is split into multiple audio tracks that correspond to different characteristics. Each audio track is segmented, and features are extracted from each segment of the audio track. Features extracted from audio segments of each audio track is analyzed. One or more correlations between the different audio tracks are determined based on comparing features extracted from audio segments of a first audio track against features extracted from audio segments of a second audio track. The audio data is classified based on the one or more correlations.
G11B 27/02 - Editing, e.g. varying the order of information signals recorded on, or reproduced from, record carriers
H04H 60/04 - Studio equipmentInterconnection of studios
G10L 25/00 - Speech or voice analysis techniques not restricted to a single one of groups
G10L 21/00 - Speech or voice signal processing techniques to produce another audible or non-audible signal, e.g. visual or tactile, in order to modify its quality or its intelligibility
89.
ACCOUNT-CENTRIC EVALUATION FOR AUTOMATED CLEARING HOUSE APPROVALS
A system may include a processor and a non-transitory computer readable medium having stored thereon instructions that are executable by the processor to cause the system to receive a clearing house request that may include an amount owed to a first party by a second party and an indication of an account associated with the second party, and retrieve a risk score associated with the indicated account. The risk score may have been generated by a trained machine learning model configured to receive, as input, a plurality of account activities and to generate, as output, risk scores for a plurality of accounts indicative of a probability that the associated account is solvent. The system may further determine that the associated risk score exceeds a threshold value, and in response to the associated risk score exceeding the threshold value, execute a transfer of the amount to the first party via a clearing house.
Systems, methods, and computer program products for using machine learning to determine whether to dispute a chargeback request are provided. A dispute processing system receives a chargeback request for a transaction, transaction data and service provider data associated with the transaction. The dispute processing system incorporates the transaction and service provider data into a template. Next, the dispute processing system uses a machine learning framework to generate machine learning scores that indicates a likelihood of successfully winning the chargeback request and avoiding pre-arbitration. Using the machine learning scores, the transaction data, the service provider data, and at least one dispute processing rule, the dispute processing system determines a likelihood of successfully challenging the chargeback request. Based on the likelihood of successfully contesting the chargeback request, the dispute processing system generates a contestation document from the template, and submits the contestation document to contest the chargeback request.
The disclosed computer-implemented method includes detecting an unavailability of a primary cryptocurrency exchange system and queuing received cryptocurrency transaction requests. The method also includes connecting to a backup cryptocurrency exchange system and completing the queued cryptocurrency transaction requests with a backup asset pool using the backup cryptocurrency exchange system. The method further includes detecting an availability of the primary cryptocurrency exchange system and reconnecting to the primary cryptocurrency exchange system. Various other methods, systems, and computer-readable media are also disclosed.
A method for generating a smart protocol includes providing, by a server computer system, a user interface to one or more of a plurality of users. The server computer system may receive, via the user interface, input specifying terms corresponding to a smart protocol that is to be deployed on a particular blockchain platform. The specified terms may include the plurality of users associated with the smart protocol and a web resource to be used to identify one or more external data. An execution of the smart protocol may be based on a value of the external data. Based on the specified terms, the server computer system may generate, without further input from the plurality of users, the smart protocol. The server computer system may deploy the smart protocol to the particular blockchain platform.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 40/04 - Trading Exchange, e.g. stocks, commodities, derivatives or currency exchange
H04L 69/00 - Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
93.
AUTOMATED CHATBOTS THAT DETECT PRIVACY DATA SHARING AND LEAKAGE BY OTHER AUTOMATED CHATBOT SYSTEMS
There are provided systems and methods for automated chatbots that detect privacy data sharing and leakage by other automated chatbot systems. A service provider and other chatbot services, including an electronic transaction processor, may provide self-service channels for assistance through chatbot and other automated computing processes. However, these chatbots may be regulated by compliance with privacy protection requirements, and therefore use of the chatbots and/or user data when responding to users via chatbots in chat sessions may be noncompliant and/or attacked by malicious users to compromise privacy protected data. In order to facilitate detection of leaks and shares by chatbots, an AI for a privacy protection chatbot may be trained on regulations for chatbot use and/or data security and privacy protection. The chatbot may then interact with other chatbots and question the other chatbots using the trained AI model to detect whether privacy protected data is exposed.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
94.
AUTOMATICALLY GENERATING AN ELECTRONIC CONVERSATION VIA NATURAL LANGUAGE MAP MODELING
A determination is made that a customer event has been initiated by a customer. The customer event is associated with a plurality of words. The plurality of words are parsed. Based on a result of the parsing of the plurality of words, an intent of the customer corresponding to the customer event is predicted. Based on the predicted intent, a first simulated service agent of a plurality of service agents is associated with the customer event. Based on the predicted intent, a first set of Natural Language Map (NLM) models for the customer and a second set of NLM models for the first simulated service agent are accessed. Based on the first set of NLM models and the second set of NLM models, a simulated conversation between the customer and the first simulated service agent is generated. The simulated conversation involves the predicted intent.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
H04L 51/216 - Handling conversation history, e.g. grouping of messages in sessions or threads
95.
SYSTEMS AND METHODS FOR FORMATTING INFORMAL UTTERANCES
Methods and systems are presented for translating informal utterances into formal texts. Informal utterances may include words in abbreviation forms or typographical errors. The informal utterances may be processed by mapping each word in an utterance into a well-defined token. The mapping from the words to the tokens may be based on a context associated with the utterance derived by analyzing the utterance in a character-by-character basis. The token that is mapped for each word can be one of a vocabulary token that corresponds to a formal word in a pre-defined word corpus, an unknown token that corresponds to an unknown word, or a masked token. Formal text may then be generated based on the mapped tokens. Through the processing of informal utterances using the techniques disclosed herein, the informal utterances are both normalized and sanitized.
A method of preventing account takeover fraud includes assigning a user account to a target set accounts, determining matric values for past and present computing actions of the target set of accounts, determining, for at least one of the metrics, that present metric value is an outlier with respect to the past metric values and, in response, transmitting an outlier notification to the user. The method further includes receiving a computing action request involving the account, the request including computing action characteristic values, determining that the characteristic values match a combination of characteristic values associated with a risk that exceeds a threshold, the risk determined according to past computing actions and, in response, requiring a second authentication factor of the user or declining the computing action associated with the request.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
97.
LEVERAGING GRAPH NEURAL NETWORKS, COMMUNITY DETECTION, AND TREE-BASED MODELS FOR TRANSACTION CLASSIFICATIONS
Methods and systems are presented for providing a machine learning model framework that uses multiple models that analyze different aspects of graph data to perform transaction classification. A graph is generated to represent relationships among transactions and fuzzy attributes. The framework includes a graph neural network that generates embeddings for each transaction based on the graph. The framework further includes a machine learning model that generates an initial classification score for a particular transaction based on the embeddings generated for the particular transaction and the actual attributes associated with the particular transaction. One or more communities are identified within the graph based on the connections among various fuzzy attributes. Characteristics associated with a particular community corresponding to the particular transaction are used to modify the initial risk score. A classification is determined for the particular transaction based on the modified risk score.
G06N 3/043 - Architecture, e.g. interconnection topology based on fuzzy logic, fuzzy membership or fuzzy inference, e.g. adaptive neuro-fuzzy inference systems [ANFIS]
Various techniques are disclosed for providing gateway services between a client system and downstream service systems for a service system. The disclosed gateway service system is capable of implementing a new service for a client system in response to a request from the client system. The gateway service system internally determines which downstream services are needed to implement the new service. In various instances, the gateway service system utilizes machine learning algorithms to determine the downstream services suitable for providing the output needed for the new service. The gateway service system is also capable of determining whether an existing application programming interface (API) is able to be used for the new service or whether a new API needs to be created for the new service. By internally determining the downstream services and APIs, the gateway service system has more efficient utilization of its computational resources.
H04L 67/61 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources taking into account QoS or priority requirements
A system according to the present disclosure may include a processor, a centralized data warehouse, and a non-transitory computer readable medium storing thereon instructions that are executable by the processor to cause the system to perform operations. The operations may include comprising training a machine learning model based on enterprise data from the centralized data warehouse, the machine learning model trained to determine a value corresponding to a metric, receiving, from at least one external source, updated enterprise data, determining, in real-time by the machine learning model, a predicted change to the value based on the updated enterprise data, and presenting, via a graphical user interface (GUI), a suggested action based on the predicted change.
Various techniques are disclosed for providing gateway services between a client system and downstream service systems for a service system. The disclosed gateway service system is capable of implementing a new service for a client system in response to a request from the client system. The gateway service system internally determines which downstream services are needed to implement the new service. In various instances, the gateway service system utilizes machine learning algorithms to determine the downstream services suitable for providing the output needed for the new service. The gateway service system is also capable of determining whether an existing application programming interface (API) is able to be used for the new service or whether a new API needs to be created for the new service. By internally determining the downstream services and APIs, the gateway service system has more efficient utilization of its computational resources.
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine