Systems, methods, and computer program products: determine, a network delay equal to a server system time stamp associated with a system time of a server at which a login request from a user device is received by the server minus a first server system time stamp received in the login request; initiate a session timer from a time equal to the first user system time stamp plus the network delay; transmit, to the user device, an authentication cookie or access token; receive, from the user device, a further request including the authentication cookie or access token and a user system time stamp associated with the system time of the user device; validate, the authentication cookie or access token; determine, a time difference between the user system time stamp plus the network delay and the session timer; and authorize or deny, based on the time difference, the further request.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A server computer that implements an efficient sampling technique for imbalanced transactions. Transaction data comprising unlabeled transaction data and fraudulent transaction data is encoded to form (i) a first set of encoded data associated with fraudulent transactions and unlabeled transactions that are similar to fraudulent transactions, and (ii) a second set of encoded data associated with unlabeled transactions. A first sampling process is executed with respect to the first set of encoded data to obtain a first sampled set of encoded data, and a second sampling process is executed with respect to the second set of encoded data to obtain a second sampled set of encoded data. An optimal sampling size of the transaction data is determined based on whether a performance of a machine learning model that classifies the first sampled set of encoded data and the second sampled set of encoded data satisfies a condition.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
A method includes a user device, comprising a first near-field communication antenna and a first ultra-wideband antenna, detecting an ultra-wideband signal from a second ultra-wideband antenna in an access device comprising a second near-field communication antenna. The user device, using the ultra-wideband signal, can determine a location of the user device relative to the second near-field communication antenna on the access device. The user device can output instructions to move the user device in response to determining. The user device can communicate with the access device via the first near-field communication antenna and the second near-field communication antenna in response to movement of the user device according to the instructions.
H04B 5/00 - Near-field transmission systems, e.g. inductive or capacitive transmission systems
H04W 12/069 - Authentication using certificates or pre-shared keys
H04W 12/084 - Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
H04M 1/72412 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
H01Q 1/24 - SupportsMounting means by structural association with other equipment or articles with receiving set
4.
DETECTION AND DIRECTION OF CONTACTLESS DEVICE INTERACTION LOCATION USING IMAGING
A method includes a user device, comprising a camera and a first radio frequency antenna, capturing an image of at least a portion of an access device comprising a second radio frequency antenna. The user device can display, by a display screen, the image along with an indicator of a location of the second radio frequency antenna on the access device. Responsive to the displaying, the user device can be moved such that the first radio frequency antenna is proximate to the second radio frequency antenna. The user device can communicate with the access device via the first radio frequency antenna and the second radio frequency antenna.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04W 12/47 - Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
H04M 1/72412 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
H04B 5/00 - Near-field transmission systems, e.g. inductive or capacitive transmission systems
H01Q 1/24 - SupportsMounting means by structural association with other equipment or articles with receiving set
H01Q 1/22 - SupportsMounting means by structural association with other equipment or articles
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR A SECURE ELEMENT-BASED COMMUNICATION INTERFACE BETWEEN A KERNEL APPLICATION AND A CONTACTLESS PAYMENT APPLICATION
Systems, methods, and computer program products are provided for secure element-based communication interfaces between kernel applications and contactless payment applications. An example method includes receiving an input from a user indicating selection of a payment application stored in a secure element of a user device. A kernel application stored in the secure element associated with the payment application is selected, a communication channel between the kernel application and the payment application is established in the secure element of the user device. Contactless communication protocol commands and responses is communicated between the kernel application and the payment application via the communication channel. A payment transaction is initiated based on the contactless communication protocol commands and responses communicated between the kernel application and the payment application via the communication channel in the secure element.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A smart card includes a card body that includes a length and a width, wherein the length and the width cooperatively define an outer perimeter of the card body. The smart card includes a cutout sized to receive a universal serial bus Type-C (USB-C) plug, wherein the cutout comprises: a base; and side walls spaced apart to accommodate the USB-C plug therebetween; and a USB connector receptacle comprising a thickness that permits use of the smart card with standard card readers, wherein the USB connector receptacle extends from the base toward the outer perimeter, wherein the USB connector receptacle comprises a front edge within the outer perimeter, and wherein the USB connector receptacle comprises exposed electrical contacts.
Described are a method, system, and computer program product for machine learning using decoupled knowledge graphs. The method includes generating a graph including nodes connected by edges based on data of entities in a network. Generating the graph includes generating entity nodes, determining a distribution of values for an attribute of the entities, generating a lower attribute node associated with a lower subset of values for the attribute, generating a higher attribute node associated with a higher subset of values for the attribute, and generating edges connecting the nodes. The method also includes initializing node embeddings, and generating representations of the nodes by repeating, until convergence, updating the embeddings of the entity nodes while holding other embeddings static, and updating the embeddings of the non-entity nodes while holding other embeddings static. The method further includes executing a machine learning model using the representations.
A method is disclosed. The method includes receiving, by a processing network computer from a transport computer, a first clearing file comprising data for a plurality of transactions, and then determining, by the processing network computer, an authorizing entity associated with one or more transactions from the first clearing file. The method includes transmitting, by the processing network computer to an authorizing entity computer operated by the authorizing entity, a second clearing file including data for the one or more transactions, determining, by the processing network computer, that the one or more transactions include one or more anomaly transactions, and initiating, by the processing network computer, one or more transaction reversals with respect to the one or more anomaly transactions.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A method is disclosed and includes executing an integrated application comprising an SDK (software development kit) on a user device with a processor. The method includes determining, by the SDK and the processor on the user device, an checksum for the integrated application, validating, by the SDK in the user device, the integrated application using the determined checksum, and responsive to validating the determined checksum, performing, by the integrated application on the user device, an action.
G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
Methods, systems, and computer program products may obtain a machine learning model, a training dataset including a time range and a feature set including a number of features, and a number times to split the training dataset; for each feature in the feature set, determine, based on a difference between a first trained model including the machine learning model trained on the training dataset with that feature and a second trained model including the machine learning model trained on the training dataset without that feature, whether to update the training dataset to include an updated feature set by removing the feature from the feature set of the training dataset; train the machine learning model on the training dataset including the updated feature set to generate a trained machine learning model; and provide the trained machine learning model.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A method includes receiving, by aggregator platform computer from a user device of first user, remittance message including at least a service amount for service rendered by second user to the first user; identifying, by the aggregator platform computer, that the remittance message includes an additional amount that accompanies the service amount; upon identifying that the remittance message includes the additional amount, forwarding, by the aggregator platform computer to a plug-in computer, the remittance message including the service amount and the additional amount; identifying, by the plug-in computer in the remittance message, the service amount and the additional amount; and separating, by the plug-in computer, the service amount from the additional amount. The plug-in computer facilitates transfer of the additional amount from an account of the first user to an account of the second user and sends, to the aggregator platform computer, a service remittance message including the service amount.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
One or more surface features (e.g., capacitive buttons, fingerprint sensor) may be exposed on a surface of a card (e.g., chi payment card). The card may store multiple applications/accounts of a user. The card receives a selection of one of the accounts by the user placing a finger on or pressing on a surface feature associated with the selected account. The card provides credentials associated with the selected account to a terminal. The multi-application card may disable credentials associated with the remaining accounts thereby appearing as a single-application card to the terminal during a transaction.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06F 3/044 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means by capacitive means
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
G06K 19/073 - Special arrangements for circuits, e.g. for protecting identification code in memory
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
13.
System, Method, and Computer Program Product for Tuning Prediction Results of Machine Learning Models
Provided are systems for tuning prediction results of a machine learning model that include at least one processor to determine a plurality of values associated with a prediction matrix based on an output of a trained machine learning model, tune a set of reference measures to provide an adjustment to a predicted classification value of a prospective output of the trained machine learning model, apply the set of reference measures to determine a predicted classification value of a real-time output of the trained machine learning model, wherein the output of the trained machine learning model comprises a predicted classification value for a real-time event. Methods and computer program products are also provided.
Embodiments of the present invention are directed to methods and systems for managing a cryptocurrency payment network comprising one or more issuer nodes and one or more distributor nodes. Issuer nodes may be granted different rights from distributor nodes with respect to the issuance and distribution of digital currency within the cryptocurrency payment network. A management system server computer may generate unique node verification key pairs for each node in the cryptocurrency payment network, where the node verification key pairs may be used to identify and authenticate issuer nodes and distributor nodes.
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
15.
System, Method, and Computer Program Product for Interpreting Black Box Models for Payment Authorization Decisions
A computer-implemented method includes: receiving an inquiry request message identifying a first payment transaction having a first plurality of transaction parameters and a first authorization decision; querying a database including transaction data associated with a plurality of historical payment transactions to identify a subset of historical payment transactions, the transaction data including, for each of the plurality of historical payment transactions, a plurality of transaction parameters and an authorization decision, the subset of historical payment transactions including payment transactions having an authorization decision different from the first authorization decision and having a similarity score that satisfies a threshold; determining an impact parameter of the first plurality of transaction parameters by comparing the first plurality of transaction parameters with the plurality of transaction parameters associated with the plurality of historical payment transactions in the subset; and generating an inquiry response message based on the impact parameter.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
16.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR MULTI-PARTY COMPUTATION BASED REMOTE SECURE KEY EXCHANGE
Provided are methods for multi-party computation based remote secure key exchange, that include authenticating a first key custodian based on an identifier associated with the first key custodian and a second key custodian based on an identifier associated with the second key custodian, verifying a quorum is available, establishing key management operations to be performed based on verifying that the quorum is available, receiving a collaborative key generation request, generating a secure cryptographic key, encrypting a first portion of the secure cryptographic key to provide a first component encrypted secure cryptographic key and a second portion of the secure cryptographic key to provide a second component encrypted secure cryptographic key, and transmitting the first component encrypted secure cryptographic key to the first key custodian the second component encrypted secure cryptographic key to the second key custodian. Systems and computer program products are also disclosed.
H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
This disclosure relates to a computer-implemented method for enabling a transaction bypass for a user-requested block on a merchant. The method involves receiving an authorization request message from a merchant, determining if the merchant is subject to an active block instruction, and verifying customer authentication information. If the authentication information is present and the merchant matches a block instruction, a transaction bypass message is generated and sent to the issuer. Based on the issuer's response, the active block may be removed or maintained. The method also allows for sending authentication data to the issuer for verification, and periodically receiving authorization requests from the merchant. Additional features include managing an authentication security threshold and sending status notifications to the merchant. The invention ensures secure transaction processing, providing flexible handling of user-requested merchant blocks based on customer authentication and issuer approval.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
18.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR MACHINE UNLEARNING ON IDENTITY GRAPH NEURAL NETWORKS
Systems, methods, and computer program products for machine unlearning on identity graph neural networks may obtain an identity graph including a plurality of graphs, each graph including a plurality of edges and a plurality of nodes for the plurality of edges, and, in each graph, each edge and each node is associated with a same identity; apply at least one edge augmentation algorithm to the identity graph to make the identity graph a biconnected identity graph; split the biconnected identity graph into a plurality of biconnected components, such that there are no articulation points in each biconnected component; for each biconnected component, train a graph neural network that corresponds to that biconnected component to generate a graph embedding and a local minima; train an ensemble neural network on the graph embedding and the local minima of each biconnected component; and provide the trained ensemble neural network.
Systems, methods, and computer program products for tracking funds transfers are provided. A system includes at least one processor of an administrative node in a blockchain network, the at least one processor programmed to establish a unified ledger stored by a plurality of nodes of the blockchain network, receive transaction data for a plurality of transactions processed by a plurality of different systems via an interoperable protocol while each transaction of the plurality of transactions is being processed between at least two systems of the plurality of different systems, store, in the unified ledger, the transaction data, and automatically monitor the transaction data in the unified ledger to detect anomalous transactions.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
20.
ELECTRONIC IDENTIFICATION VERIFICATION FOR MOBILE DEVICE
A method is disclosed. The method includes receiving, by a mobile device, a communication comprising identity information from an electronic identification, and transmitting an electronic ID authentication request message including the identity information to an electronic ID access control computer. The electronic ID access control computer authenticates the identity information. The method includes receiving an electronic ID authentication response message from the electronic ID access control computer indicating that the electronic identification is authentic, and in response to receiving the electronic ID authentication response message, transmitting a registration request message indicating that the electronic identification is authentic to a server computer. The registration request message includes at least one of a token associated with the mobile device and a mobile device identifier associated with the mobile device. The server computer stores a record indicating that at least one of the token and the mobile device identifier is electronic ID verified.
Methods, systems, and computer program products are provided for ensemble learning. An example system includes at least one processor configured to: (i) generate a rejection region for each baseline model of a set of baseline models (ii) generate a global rejection region based on the rejection regions of each baseline model; (iii) train an ensemble machine learning model; (iv) update, based on a baseline model predictive performance metric for each baseline machine learning model, the set of baseline machine learning models; and (iv) repeat (i)-(iv) until there is a single baseline model in the set of baseline models or a predictive performance or global acceptance ratio of the ensemble model satisfies a threshold.
A method is disclosed. The method includes receiving, by a token gateway, a first request message from a token requestor computer. The token gateway determines at least one token service computer from a plurality of token service computers, each token service computer in the plurality of token service computers operating independently of each other. The token gateway transmits at least one second request message to the at least one token service computer and receives, at least one first response message comprising at least one token and/or supplemental data associated with the at least one token from the at least one token service computer. The token gateway transmits a second response message to the token requestor computer, the second response message comprising the at least one token and/or the supplemental data.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
23.
Method, System, and Computer Program Product for Processing a Group Payment Credential
A computer-implemented method may include issuing a group payment credential to a payment group including a plurality of users, each user having an individual payment credential associated with a payment device; receiving a group payment request initiated using the group payment credential, the group payment request associated with a payment transaction having a transaction amount; in response to receiving the group payment request, identifying payment device data associated with the individual payment credentials of each user in the payment group; determining a first individual payment credential from the individual payment credentials based on the payment device data associated with the individual payment credentials and transaction data associated with the payment transaction; generating a processing request including the first individual payment credential; and transmitting the processing request to an issuer system corresponding to the first individual payment credential to cause the issuer system to process the payment transaction.
Methods, systems, and computer program products are provided for improving machine-learning models by generating multiple user embeddings which include: receiving a dataset including data representing interactions between a user and items; generating a user embedding; determining clusters associated with the user, each cluster having a subset of the items; for each cluster, generating a second embedding for the user; determining a total embedding for the user based on the first embedding and the second embeddings; and generating a recommendation for the user based on the total embedding, the recommendation including a recommended item that is not one of the items.
Provided herein is a payment device including a data element containing account data and trigger data and a communication device in communication with the data element, the communication device configured to communicate the trigger data and the account data to a point-of-sale (POS) device, the trigger data configured to cause the POS device to automatically implement a modified authorization protocol. Systems and methods are also provided.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
System and methods for managing and utilizing secrets in a distributed system are disclosed. The disclosed system and methods combine a vault store and a distributed cache system to ensure the secure storage and access of sensitive information while maintaining consistency across the distributed system. The systems and methods generally disclose retrieving, by a computer server, a master key and a secret from a vault store; encrypting, by the computer server, the secret using the master key; storing, by the computer server, the secret encrypted with the master key in a distributed cache; encrypting, by the computer server, the master key using a machine key associated with the computer server; and storing, by the computer server, the master key encrypted with the machine key in the distributed cache.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
27.
METHOD AND SYSTEM FOR PROCESSING SMART QR CODE TRANSACTIONS
A method and system for processing and facilitating payment transactions with a smart QR code with a transit payment system. The smart QR code reduces the overall time that the users spend engaging with a transit payment system, expedites user entry and exit from transit stations, and utilizes existing user payment accounts. The smart QR code payment reduces the wait time at entry and exit points by removing the need to replenish depleted account balances for a specific transit system.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/14 - Payment architectures specially adapted for billing systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G07B 15/04 - Arrangements or apparatus for collecting fares, tolls or entrance fees at one or more control points taking into account a variable factor such as distance or time, e.g. for passenger transport, parking systems or car rental systems comprising devices to free a barrier, turnstile or the like
28.
System, Method, and Computer Program Product for Data Controller Platform
Provided are systems for controlling a data pipeline in a data pipeline ecosystem that include at least one processor to receive metadata parameters for a data pipeline, store the metadata parameters in a data repository, generate a logical representation of the data pipeline based on the metadata parameters, execute the data pipeline based on the metadata parameters of the data pipeline, and model the data pipeline using the directed acyclic graph (DAG) of the data pipeline. Methods and computer program products are also provided.
Methods for adversarial training and/or for analyzing the impact of fine-tuning on deep learning models may include receiving a deep learning model comprising a set of parameters and a dataset of samples. A respective noise vector for a respective sample may be generated based on a length of the sample and a radius hyperparameter. For a target number of steps, the following may be repeated: adjusting the noise vector based on a step size hyperparameter, and projecting the respective noise vector to be within a boundary. The parameters of the deep learning model may be adjusted based on a gradient of a loss based on the noise vector. This may be repeated for each sample of the plurality of samples. A system and computer program product are also disclosed.
A method for facilitating a payment from a user device at a merchant location is provided. The method comprises receiving location data associated with the user device, requesting a first set of merchant data from a first server, requesting a second set of merchant data from a second server, determining, with a matching algorithm, a third set of merchant data based on a matching of data between the first set of merchant data and the second set of merchant data, and transmitting, to the user device, match data associated with the matched merchant. A method for processing a payment from a user device at a merchant location to a first merchant is also provided.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/14 - Payment architectures specially adapted for billing systems
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
H04W 4/02 - Services making use of location information
One embodiment of the invention includes a method. The method includes receiving, from a user device, a search request comprising a set of characters. The method also includes searching a database for aliases corresponding to the set of characters, retrieving a set of aliases corresponding to the set of characters; transmitting the set of aliases to the user device, receiving a selection of one of the aliases in the set of aliases to perform a transaction, and storing the set of aliases with the set of characters in an application layer cache.
36 - Financial, insurance and real estate services
Goods & Services
Financial services; monetary services; banking services; credit card services; debit card services; charge card services; pre-paid card services; provision of prepaid cards and tokens; smart card services; electronic credit and debit transactions; electronic funds transfer; payment processing services; transaction authentication and verification services; check verification services; cash replacement rendered by credit cards and debit cards; currency exchange services; online banking services; bill payment services; deposit access and automated teller machine services; check cashing and cash disbursement services; dissemination of financial information and electronic payment data including via a global computer network; processing of financial transactions online via computer or telecommunication networks or via telecommunication, mobile or wireless devices; financial sponsorship of sports competitions, events, activities, and games; monetary and financial services in the nature of blockchain-based payment verification services; financial services, namely providing a digital currency wallet.
Techniques for identifying a fraudulent interaction of a user device using time based risk features are described herein. In embodiments, time stamp information provided by an external clock and time units may be maintained by a user device. The user device may include an authentication component that is communicatively coupled to a clock component that generates the time units. In response to conducting an interaction with an access device and user device first time information may be received from the access device. Second time information may be determined based at least in part on the time units from the clock component and the time stamp information. The second time information may be compared to the first time information. An authentication plan for the interaction may be determined based at least in part on the comparison of the second time information to the first time information.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
34.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR ANALYSIS OF MACHINE LEARNING MODELS BASED ON SEQUENTIAL COUNTERFACTUAL ACTIONS
Methods, systems, and computer program products are provided for analysis of machine learning models based on sequential counterfactual actions. A method includes receiving a data record including fields associated with features. A feature dependence matrix associated with a dependence between each feature and every other feature is received. The data record is inputted to a machine learning model to generate an initial output. At least one tuple including an action vector and a sequence vector is determined based on the data record and feature dependence matrix. Each action vector is associated with perturbations of fields for which inputting a perturbed data record based thereon to the machine learning model generates a different output than the initial output. Each sequence vector is associated with a sequence of the perturbations. A sequence loss is determined for each tuple. At least one communication based on the tuples and the sequence losses is communicated.
A computer-implemented system for streamlining encryption payload of a card transaction from a transaction code transaction via a merchant inside a restricted computer network firewall. A wallet application stores data of a payment device, and the wallet application retrieves information of a merchant and a transaction via a transaction code. In response to the retrieved information, the wallet application generates an encrypted payload. The wallet application transmits the encrypted payload to a payment facilitator within the restricted computer network firewall. After decryption of the encrypted payload, the payment facilitator transmits a decrypted payload in one payment packet to the payment processing server outside the restricted computer network firewall. The payment processing server transmits from outside the restricted computer network firewall to the merchant inside the restricted computer network firewall a notification of payment after the payment processing server validates the payment transaction.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Described are a system, method, and computer program product for dynamic node classification in temporal-based machine learning classification models. The method includes receiving graph data of a discrete time dynamic graph including graph snapshots, and node classifications associated with all nodes in the discrete time dynamic graph. The method includes converting the discrete time dynamic graph to a time-augmented spatio-temporal graph and generating an adjacency matrix based on a temporal walk of the time-augmented spatio-temporal graph. The method includes generating an adaptive information transition matrix based on the adjacency matrix and determining feature vectors based on the nodes and the node attribute matrix of each graph snapshot. The method includes generating and propagating initial node representations across information propagation layers using the adaptive information transition matrix and classifying a node of the discrete time dynamic graph subsequent to the first time period based on final node representations.
Systems, methods, and computer program products that use unsupervised learning to learn relationships between operations of a machine learning model based on a model graph representation to group the operations into clusters and, given a set of clusters and labels for the clusters, use a reinforcement learning algorithm to generate a final device placement result for the machine learning model.
A method, system, and computer program product are provided for embedding an offer. The method includes receiving transaction data for a transaction between a user and a merchant, determining an offer based on the transaction data, the offer corresponding to offer data, generating machine-readable indicia comprising encoded data, the encoded data comprising at least a portion of the transaction data and the offer data, receiving a payment request from a user device of the user based on the encoded data and account data associated with a user account of the user, and in response to receiving the payment request, automatically applying the offer data to at least one of the transaction and the user account.
Described are a method, system, and computer program product for enhanced one-time password-based transaction authorization. The method includes receiving a transaction request initiated by a user, and generating and transmitting a one-time password (OTP) to a user communication device of the user. The method also includes receiving a response code from the user communication device of the user. The method further includes verifying that the first portion of the response code matches the OTP. The method further includes identifying a user code stored in association with the user and verifying that the second portion of the response code matches the user code. The method further includes, in response to verifying that the first portion of the response code matches the OTP and that the second portion of the response code matches the user code, automatically authorizing the transaction request to be processed in an electronic payment processing network.
A method and system for migrating a payment instrument portfolio. A payment network computer receives a payment instrument portfolio conversion request message from an issuer computer to convert a payment instrument portfolio from a prior payment instrument scheme to a new payment instrument portfolio based on a new payment instrument scheme. The request message includes information about existing payment instrument references from the prior payment instrument scheme. The payment network computer creates enrollments based on the information about the existing payment instrument references and sends a portfolio migration event notification message to a payment instrument requestor partner computer associated with a payment network payment instrument requestor identifier subscribed to a new event type for the payment instrument portfolio migration. The payment network computer receives a provision payment instrument from the payment instrument requestor partner computer and sends a new payment instrument provisioning approval request message to the issuer computer.
Methods, systems, and computer program products are provided for improving matching algorithms. A method may include: receiving user privacy settings and interest preference data; storing the data in a database; inputting the interest preferences data into a machine learning algorithm to generate at least one match between the user and a merchant, wherein the merchant comprises a subset of a plurality of merchants; generating a data sharing message by: compiling first data associated with the user; filtering the first data based on interest preference data and/or privacy settings data to generate shareable data; and for each merchant associated with a subset of the data associated a merchant, generating a corresponding data sharing message containing a subset of interest preference data; and distributing the corresponding data sharing messages.
A method includes extracting, by an analysis computer, a plurality of first datasets from a plurality of graph snapshots using a structural self-attention module. The analysis computer can then extract at least a second dataset from the plurality of first datasets using a temporal self-attention module across the plurality of graph snapshots. The analysis computer can then perform graph context prediction with at least the second dataset.
Provided are computer-implemented methods that may include receiving, via a communication network, a request to perform an online action from a user device; retrieving data associated with a number of times the user device performed the online action within at least one time interval; determining whether a dataset associated with a number of times a plurality of user devices have performed the online action within the at least one time interval is normally distributed; and determining a standard deviation associated with the number of times the user device performed the online action within the at least one time interval in response to determining that the dataset is normally distributed, and performing a control operation associated with the request to conduct the online action based on a threshold of standard deviation. Systems and computer program products are also provided.
A method includes a server computer receiving, from a first data provider computer, encrypted data derived from first identity data and a cryptographic key or derivative thereof stored at the first data provider computer. The server computer transmits, to a second data provider computer, the encrypted data and/or the cryptographic key or derivative thereof. The server computer receives, from the second data provider computer, intermediate data derived from second identity data stored at the second data provider computer. The server computer determines if the first identity data and the second identity data are duplicates while the first identity data and the second identity data are encrypted. The server computer removes one of encrypted first identity data, derived from the first identity data, and encrypted second identity data, derived from the second identity data, from a memory in the server computer.
A method is disclosed. The method includes receiving, by a user device from the access device, a routing path list comprising a first set of network nodes. After receiving the routing path list, the user device determines a routing options list comprising a second set of network nodes based on the first set of network nodes in the routing path list. The method also includes obtaining an encrypted credential or token, and transmitting, by the user device to the access device, the routing options list, and the encrypted credential or token to the access device. The access device transmits an authorization request message comprising the encrypted credential or token, and the routing options list to a server computer via at least some of the network nodes in the second set of network nodes. The server computer may be an authorizing entity computer.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
46.
SECURE DATA EXCHANGE MATCHING ACROSS IDENTITY PROVIDERS
A method includes receiving a first encrypted first identity attribute. A first doubly encrypted first identity attribute is formed by encrypting the first encrypted first identity attribute. A second doubly encrypted first identity attribute is formed by encrypting the first encrypted first identity attribute. They are transmitted to a user device, which removes a user layer of encryption on each to form a second encrypted first identity attribute and a third encrypted first identity attribute. Layers of encryption are added to the second encrypted first identity attribute to form a third doubly encrypted first identity attribute and the third encrypted first identity attribute to form a fourth doubly encrypted first identity attribute. The server computer receives them and transmits, to the second identity provider computer, the fourth doubly encrypted first identity attribute. The second identity provider computer obtains a first identity attribute and compares it to a second identity attribute.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
47.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR TARGET LABEL CONCENTRATION BASED ORDINAL ENCODING
Systems, methods, and computer program products may obtain a training dataset including a plurality of labels for a plurality of samples, wherein each sample includes at least one categorical variable associated with a plurality of categories; calculate, based on the plurality of labels, a target variable rate for each category; sort, according to the target variable rate, the plurality of categories in an ascending order; assign, the plurality of categories sorted in the ascending order to a plurality of numerical values from an initial numerical value to the initial numerical value plus-or-minus a cardinality of the plurality of categories; ordinally encode, the at least one categorical variable of the plurality of samples according to the plurality of numerical values assigned to the plurality of categories to generate an encoded training dataset; and train, using a tree-based machine learning algorithm and the encoded training dataset, a tree-based machine learning model.
The present disclosure provides various systems, methods, and devices that may be used to defending against Distributed Denial of Service (DDoS) attacks. In one aspect, the disclosure provides method for defending against a DDoS attack implementable by a web server. The web server can generate indirect authentication credentials (IACs) based on authentication credentials associated with user accounts and share the IACs with an intermediary server. The intermediary server can be, for example, an internet server provider server or a proxy server. The web server can further detect an anomaly based on web traffic directed to the web server and instruct the intermediary server to validate subsequent web traffic directed to the web server based on the IACs. Thereafter, the web server can receive validated web traffic directed to the web server via the intermediary server.
Ensemble machine learning can be used to make predictions based on time series data with gaps. Multiple models are trained on different (overlapping) sets or portions of the available time series data, and the predictions from the different models are aggregated to generate predictions. The models can include one model trained on all of the time series data and a second model trained using just the data points that immediately follow the gaps. Models in an ensemble can also include models that use all features of the data points and models that use only a subset of features of the data points.
A method includes a central computer receiving, from an autonomous vehicle, a resource request message for a resource provided by an access device in a transaction. The resource request message can comprise a location of the autonomous vehicle and a resource provider identifier. After receiving the resource request message the central computer can validate the resource request message by comparing the location of the autonomous vehicle with a location of the access device. After validating the resource request message the central computer can process the transaction using a token associated with a credential. The credential can be associated with the autonomous vehicle.
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
B60L 53/30 - Constructional details of charging stations
B60W 60/00 - Drive control systems specially adapted for autonomous road vehicles
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
51.
SYSTEMS AND METHODS FOR GESTURE-BASED AUTHENTICATION
An authentication sever can receive sets of training sensor data instances from a plurality of sensors of an authentication system in response to a user initiating a plurality of training gestures. The sets of training sensor data instances associated with a set of authentication features. For each set of the sets of training sensor data instances, the authentication computer can determine distances between each pair of training sensor data instances in the set of training sensor data instances, and determine a similarity score for the set of training sensor data instances based on the distances. The authentication computer can determine a subset of the set of authentication features based on analyses of the similarity scores. The authentication computer can create an authentication model based on the subset of the set authentication features and use the model in determining whether a user can be authenticated.
Methods and systems for using a mobile device as a point-of-sale (POS) terminal provisioned by a resource provider are provided. A server computer can transmit, to a resource provider computer, a set of platform-specific scripts to be incorporated into a resource provider application provisioned on a user device. The server computer can register each instance of the resource provider application provisioned on any user device as an access terminal associated with the resource provider computer. The server computer can receive, directly from an instance of the resource provider application on a user device, a processing request message to perform a transaction. The server computer can obtain an authorization decision on behalf of the resource provider computer and transmit the authorization decision to the user device and the resource provider computer.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
There has been a rising interest in the tokenization of flat currencies among the public and private sectors. The latest trend is the interest of commercial banks in the tokenization of their fractional reserves on shared ledgers (e.g., blockchains) with the primary goal of achieving real-time interbank transfers. A payment network system can provide a comprehensive sandbox solution for commercial banks to tokenize its deposits on a blockchain of their choice while adhering to global standards to facilitate interbank transfers via their network. This technique can provide opportunities to employ advanced cryptographic techniques such as zero-knowledge proofs and atomic swaps for building an environment that would allow the payment network system to not only connect banks for real-time transfers but also provide value-added services such as fraud detection and credentials for bank deposits.
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
54.
System, Method, and Computer Program Product for Saving Memory During Training of Knowledge Graph Neural Networks
Systems, methods, and computer program products are provided for saving memory during training of knowledge graph neural networks. The method includes receiving a training dataset including a first set of knowledge graph embeddings associated with a plurality of entities for a first layer of a knowledge graph, inputting the training dataset into a knowledge graph neural network to generate at least one further set of knowledge graph embeddings associated with the plurality of entities for at least one further layer of the knowledge graph, quantizing the at least one further set of knowledge graph embeddings to provide at least one set of quantized knowledge graph embeddings, storing the at least one set of quantized knowledge graph embeddings in a memory, and dequantizing the at least one set of quantized knowledge graph embeddings to provide at least one set of dequantized knowledge graph embeddings.
Provided are systems for generating a machine learning model for classification tasks using unadversarial training that include a processor to perform an unadversarial training procedure to train a machine learning model to provide a trained machine learning model. When performing the unadversarial training procedure, the processor is programmed or configured to receive a training dataset including a plurality of training samples; generate a noise vector for the plurality of training samples based on a uniform distribution; perturb each training sample of the Generate a noise vector plurality of training samples; obtain a gradient; generate an updated noise vector based on the gradient; perturb each training sample of the plurality of training samples based on the updated noise vector; and update a model weight of the machine learning model based on the second plurality of Obtain a gradient perturbed training samples to provide the trained machine learning model. Methods and computer program products are also provided.
Method, System, and Computer Program Product for Coordinated Analysis of Output Scores and Input Features of Machine Learning Models in Different Environments
Methods, systems, and computer program products are provided for coordinated analysis of output scores and input features of machine learning models in different environments. An example method includes receiving a plurality of first data records and a plurality of second data records. A first plot is generated based on a first score generated by a machine learning model for each first data record and a second score generated by the machine learning model for each second data record. The first plot is displayed. A plurality of second plots associated with at least a subset of the plurality of features are generated. Each respective second plot is generated based on a respective first field associated with a respective feature from the first data records and a respective second field associated with the respective feature from the second data records. The second plots are displayed.
Methods and systems for using a mobile device as a point-of-sale (POS) terminal provisioned by a resource provider are provided. A server computer can transmit, to a resource provider computer, a set of platform-specific scripts to be incorporated into a resource provider application provisioned on a user device. The server computer can register each instance of the resource provider application provisioned on any user device as an access terminal associated with the resource provider computer. The server computer can receive, directly from an instance of the resource provider application on a user device, a processing request message to perform a transaction. The server computer can obtain an authorization decision on behalf of the resource provider computer and transmit the authorization decision to the user device and the resource provider computer.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
Methods and systems for secure authentication using a software application are provided. A secure application can receive a request to log in to the secure application from a user device associated with a user. The user device can generate an authentication request message including an encrypted device data in a messaging application. The user device can transmit the authentication request to an application server associated with the secure application for authentication of the user device. The user device can receive an authentication response message indicating the user device has been authenticated by the application server.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Systems and methods of validating digital assets by a payment network are disclosed. The payment network receives payment credential and mobile device information associated with a digital asset from an issuer. The payment network identifies and verifies the credential and the mobile device information. The payment network creates a payment token for making a payment for the purchase of the digital asset based on a successful identification and verification of the credential and the mobile device information. The payment network sends the payment token to the mobile device. The payment network receives a digital asset identification information from a distributed ledger. The payment network sends a request to a mobile service server computer to send a silent push notification to the mobile device and store the digital asset associated with the payment token in a secure element of the mobile device based on a successful handshake.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
Techniques comprising capturing, by a user device comprising a transfer application, a machine-readable code, the machine-readable code encoding primary account data associated with a main resource provider and secondary account data associated with a subordinate resource provider. The techniques further comprising decoding the machine-readable code to obtain the primary account data and the secondary account data to generate a transaction request message comprising a transaction amount, the primary account data, and the secondary account data. The techniques further comprising transmitting the transaction request message to an application server computer associated with the transfer application to initiate a first value transfer from a user account to a main resource provider account, the main resource provider subsequently initiating a second value transfer from the main resource provider account to a subordinate resource provider account.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
61.
TOKENIZED INTERACTIONS USING ELECTRONIC IDENTIFIER
A method is disclosed. The method includes an access device receiving a communication comprising electronic ID information from a user device in a transaction. The access device transmits an electronic ID authentication request message to an electronic ID access control computer and receives an electronic ID authentication response message from the electronic ID access control computer. In response to receiving the electronic ID authentication response message, the access device transmits a token request message to a token service computer and receives a token response message comprising a token from the token service computer. The access device the generates an authorization request message comprising the token and a value and transmits the authorization request message comprising the token to a processing computer. The processing computer processes the transaction using the using the token.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A method and a system for performing a fingerprinting technique to determine a risk level associated with a transaction executed on a user device are disclosed. The method and the system generally disclose retrieving data associated with a user device based on a transaction executed on the user device; storing the data in a plurality of current transaction fingerprints; comparing the data stored in the plurality of current transaction fingerprints to data stored in a plurality of previous transaction fingerprints associated with a plurality of previous transactions; detecting anomalies in the data stored in the plurality of current transaction fingerprints based on the comparison; and determining a level of risk based on the detected anomalies. Additionally, the method and the system disclose approving or denying the transaction, or requiring authentication, based on a combination of the determined risk level, a risk tolerance, and a transaction amount associated with the transaction.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
A method is disclosed. The method comprises: receiving from a communication device, a request message comprising a credential. The method also includes determining a response message comprising substitute device data comprising a token, and the response message to the communication device. The communication device provides the token to an access device, which transmits an authorization request message comprising the token to a first processing computer. The access device and/or the first processing network computer are capable of processing a transaction with the token, but not with the credential. The first processing computer transmits the authorization request message to a second processing computer, which obtains the credential using the token from the token service computer. The second processing computer processes the authorization request message using the credential.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
64.
AUTOMATED PRIVACY PRESERVING DISPUTE RESOLUTION FOR BIOMETRIC IDENTIFICATION
Systems and methods are disclosed herein for privacy preserving e-commerce transaction dispute resolution. One example method can comprise receiving, by a biometric comparison provider (BCP), at least one data package associated with a dispute of an e-commerce transaction, the at least one data package comprising an encrypted enrollment biometric reading (EBR') and an encrypted transaction biometric reading (TBR'); comparing, by a comparison algorithm of a BCP, the TBR' and EBR' in an encrypted domain; generating, by the BCP an encrypted comparison score based on the TBR' and EBR'; and sending the encrypted comparison score to an adjudicator provider system for dispute resolution, wherein the dispute resolution is based on the encrypted comparison score.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
65.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR RENDERING, CREATION, AND MANAGEMENT OF DYNAMIC APPLICATION FORMS
Systems, methods, and computer program products are provided for rendering, creation, and management of dynamic application forms. An example system may include at least one processor configured to receive an input from a first user via a graphical user interface (GUI). The input may be associated with a graphical element associated with a field of a form and an attribute associated with the field. A schema file may be generated based on the input associated with the graphical element associated with the field of the form and the attribute associated with the field. The schema file may be validated based on the attribute associated with the field. In response to validating the schema file, the schema file may be stored in a database. The schema file may be retrieved from the database and communicated to a user device to render and display the form based on the schema file.
In various aspects, the present disclosure provides a deposit tokenization system that can enable a commercial bank with a platform to mint, burn, and/or transfer token deposits within the commercial bank or with other commercial banks. The token deposit can be associated with an asset or liability of the commercial bank. The deposit tokenization system can provide an interface for the commercial bank to mint a token deposit to a blockchain, secure a token transfer, and/or establish a smart contract for the transfer of tokenized assets or liabilities.
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
67.
SYSTEM AND METHOD FOR PAY-PER-VIEW USING A PAYMENT NETWORK
A pay-per-view system and method are disclosed. A token management server computer receives an account credential from a content creator and sends a content creator token reference to a content delivery network. A content license server computer receives a request for a content license key from a content player. The request includes the content creator token reference and a content player token reference. The content license server computer validates the content creator token reference, validates the content player token reference, receives a token validation response from the token management server computer, creates a time bound license for content created by the content creator, and sends the content license key to the content player.
A computer-implemented method includes: storing first biometric data associated with a first user corresponding to a payment device issued by an issuer system; during a payment transaction initiated with the payment device by a second user different from the first user, receiving second biometric data associated with the second user; in response to receiving the second biometric data, automatically generating a similarity score by executing a biometric algorithm configured to compare the second biometric data to the first biometric data, the similarity score representing a similarity between the second biometric data and the first biometric data; and in response to the similarity score satisfying at least one threshold, automatically authenticating the payment transaction.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
69.
Method, System, and Computer Program Product for Authenticating Digital Transactions
Methods for authenticating digital transactions include receiving a device registration request, a device attestation response including a first token, and a selection of an authentication mode from a device. In response to receiving the device registration request and determining that the selected authentication mode is a static personal identification number (PIN) authentication mode, a device registration response is provided to the device. A first payment transaction request and an enrolment request to authenticate a second payment transaction request using the static PIN authentication mode are subsequently received from the device. The device is communicated with to receive the static PIN from the device. The device is enrolled based on the static PIN. Systems and computer program products are also provided.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
70.
AUTOMATED CREDENTIAL DISTRIBUTION SERVICE FOR MACHINES
A method and system for enhanced credential security by encrypting and storing access credentials for associated with a first service in local storages of a node. As the access credentials are rotated an updated, a credential distribution server communicates with a credential distribution agent at the node to update and store the access credentials in a local vault of the node. The credential distribution agent may be granted root access for the node with the ability to request updated credentials before they are needed to access the first service.
Methods, systems, and computer program products are provided for energy efficient generation of artificial noise to prevent side-channel attacks. An example method includes storing at least one secret value including secret value bits. At least one cryptographic operation is executed based on the at least one secret value. An artificial sequence generator stores at least one state indication based on a plurality of previous cryptographic operations executed on the device. A plurality of samples of artificial noise are generated, and a number of the plurality of samples is based on at least one power constraint parameter. Each sample of artificial noise of the plurality of samples of artificial noise is overlaid over a respective portion of a side channel signal based on the at least one state indication to mask leakage information associated with the at least one secret value on the side channel signal.
Methods, systems, and computer program products are provided for spatial-temporal prediction using trained spatial-temporal masked autoencoders. An example system includes a processor configured to determine a structural dependency graph associated with a networked system. The processor is also configured to receive multivariate time-series data from a first time period associated with the networked system. The processor is further configured to mask the plurality of edges of the structural dependency graph and mask the multivariate time-series data. The processor is further configured to train a spatial-temporal autoencoder based on the masked structural representation and the masked temporal representation. The processor is further configured to generate a prediction using a spatial-temporal machine learning model including the trained spatial-temporal autoencoder, the prediction associated with an attribute of the networked system in a second time period subsequent to the first time period.
The method includes receiving a broadcast signal from a beacon device, the broadcast signal encoding a first credential associated with a first entity. In response to receipt of the broadcast signal, the mobile communication device transmits the received first credential to an authentication system. The authentication system determines if the first entity associated with the broadcast signal is authentic and generates a confirmation message confirming the authenticity of the first entity. The mobile communication device then receives the confirmation message indicating that the first entity is authentic. The mobile communication thereafter receives and transmits a second credential for the mobile communication device to the beacon device, which transmits the second credential to the authentication system. The authentication system then confirms the authenticity of the mobile communication device. Then, the beacon device can initiate an interaction process with the user of the mobile communication device.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A method is configured to perform a continuous software testing. A processor receives, from a code developer computer, a request to commit a code portion for a microservice to a code repository including a source code for a plurality of microservices. The processor executes, using the source code into which the code portion is incorporated, a test transaction routine including tests respectively associated with the plurality of microservices. The processor determines if an error occurred in response to the executing the test transaction routine. If no error occurred, the code portion is committed to the code repository, and, if an error occurred, the code portion is not committed to the code repository.
Systems and methods for automated transaction control and verification for e-commerce platforms, the method comprising receiving, by a control server, data elements of an e-commerce transaction, wherein each data element of the data elements is of a data element-type of a plurality of data element-types; inputting, by the control server, the data elements in a multi-layer identity verification module; generating, by the multi-layer identity verification module, based on the data elements, a verification score for an identity variable of at least one layer of the multi-layer identity verification module, wherein the identity variable is comprised of at least one of the plurality of data element-types; and directing an e-commerce merchant system to apply a transaction outcome action based on implementation of transaction rules set by the e-commerce merchant system that are based on the verification score.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
76.
METHOD TO OPTIMALLY USE AVAILABLE COMPUTER RESOURCES OF DATABASE SERVERS
The present disclosure provides various devices, systems, and methods that can improve and/or optimize the computing resource utilization of database servers. For example, according to one aspect, the present disclosure provides a method that includes intercepting queries submitted for execution by a database server and applying a set of object values for each of the queries to a prediction model to predict success or failure of the execution of each of the queries. The method can further include preventing the execution of the queries that are predicted to fail and forwarding the queries that are predicted to succeed to the database server for execution.
Provided is a method for filtering false positive classifications and false negative classifications to increase machine learning model accuracy that includes generating an initial classification of one or more data instances using a data classification machine learning model, generating a second classification of one or more data instances using a recurrent neural network machine learning model, determining one or more data instances of the plurality of data instances having an incorrect classification based on the initial classification and the second classification, removing the one or more data instances of the plurality of data instances having an incorrect classification to provide a remediated dataset, generating a combined machine learning model, and training the combined machine learning model based on the remediated dataset to provide a trained combined machine learning model. Systems and computer program products are also provided.
Systems and methods securely transfer data during an interaction. An access device receives interaction data from a user device and transmits back an indication of one or more types of supplemental data requested. The access device receives, from the user device, the supplemental data in an encrypted form. The user device encrypted the supplemental data using a session key generated based on at least a subset of the interaction data. The access device transmits, to an issuer server, an authorization request message comprising the interaction data and the indication of the types of supplemental data. The access device receives, from the issuer server, an authorization response message comprising an authorization result and the session key. The issuer server derived the session key responsive to the authorization request message. The access device decrypts the supplemental data and completes the interaction based on the authorization result and the decrypted supplemental data.
G06F 21/33 - User authentication using certificates
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
79.
Systems and Methods for Generating Behavior Profiles for New Entities
Disclosed are a method and system for generating a behavior profile for a new entity. The method is performed in response to and immediately after a new entity is added to a fraud detection system. The method includes generating a doppelganger behavior profile for the new entity based on feature data of the new entity and pre-existing entities. Generating the profile includes determining a similarity score for each pre-existing entity, ranking the plurality of pre-existing entities based on the score, selecting pre-existing entities based on the ranking, and combining behavior profiles of the preexisting entities to produce the profile. The method also includes assigning the profile to the new entity and monitoring the new entity. The method further includes detecting fraud, an anomaly, and/or malicious intent based on the profile, and automatically suspending an aspect of the new entity in response to the detection.
Systems and methods disclosed herein include a mobile solution to enable users to perform financial transaction over a network using a mobile device. These techniques allow users to maintain a single personal account identifier or number (“PAN”) on the user's mobile device and to utilize it to access a plurality of linked financial accounts and sub-accounts. Any one of the accounts can be selected by a user on the mobile device to remotely deposit funds to that account based on an image of a financial payment instrument. The image can be obtained using image capture technology on the user's mobile device. Users can perform a financial transaction using the verified images over a network in order to conduct a remote financial transaction such as applying a deposit, a payment, or cash load to a designated account which is linked to the user's mobile account in real-time or near real-time.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
A method is disclosed. It includes receiving, by a clearing system comprising an artificial intelligence model, a clearing file comprising a plurality of clearing records. It also includes inputting the clearing records into the artificial intelligence model, and then determining, by the artificial intelligence model, predictions relating to the clearing records. It also includes providing the predictions to an authorizing entity computer. The authorizing entity computer performs actions based on the predictions.
Embodiments of the invention are directed to a method for reducing a computational burden of a blockchain provider. A data processing computer may facilitate an exchange of a data transfer message between respective applications of a first and second device. The data processing computer may maintain an electronic record according to the exchange. A net transfer value may be determined for the record and data comprising the net transfer value may be transmitted to a blockchain provider. Receipt of the data by the blockchain provider may cause the blockchain provider to update a ledger with the net transfer value.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
83.
ZERO-KNOWLEDGE INTERACTION PROCESSING SYSTEM AND METHOD
A user device generates an initiate interaction request message comprising a state commitment. The user device provides the initiate interaction request message to a first server computer, which creates a verify state request message comprising an interaction index, an interaction index commitment, and a first commitment signature formed from the state commitment and the interaction index commitment. The user device receives the verify state request message, then generates a modified verify state request message comprising a user device public key, the state commitment, the interaction index commitment, and the first commitment signature. The user device provides the modified verify state request message to a second server computer. The second server computer verifies the state commitment, verifies the first commitment signature, and creates a second commitment signature formed from the state commitment and the interaction index commitment. The user device receives a verify state response message comprising the second commitment signature.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
84.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR PERTURBATION-BASED INTERPRETATION OF THE EFFECTS OF RELATED FEATURES IN MACHINE LEARNING MODELS
Described are a system, method, and computer program product for perturbation-based interpretation of the effects of related features in machine learning models. The method includes generating a knowledge graph based on features and relationships, the graph including nodes connected edges. The method also includes determining feature values, determining a first feature of a first node, and perturbating a value of the first feature. The method further includes determining a second feature of a second node based on an edge connecting the first node to the second node and perturbating a value of the second feature based on the new value of the first feature. The method further includes inputting the feature values to a decision-based machine learning model and determining a significance of an effect of the first and second features on the decision-based machine learning model based on the new values of the first and second features.
41 - Education, entertainment, sporting and cultural services
Goods & Services
Arranging and conducting of concerts; Live music performances; Entertainment, namely, live performances by musical bands; Organizing and hosting of events for cultural purposes; Organization of film festivals for cultural or entertainment purposes; Entertainment services, namely, providing podcasts in the field of music and entertainment; Entertainment services in the nature of live visual and audio performances by actors, comedians, and dancers; Production and distribution of videos in the field of live performances; Providing information, news and commentary in the field of entertainment; Arranging, organizing, conducting, and hosting social entertainment events
41 - Education, entertainment, sporting and cultural services
Goods & Services
Arranging and conducting concerts; live music performances; live visual and audio performances by musical bands; organizing and hosting of events for cultural or educational purposes; organizing film festivals for cultural or entertainment purposes; providing podcasts in the field of music and entertainment; live performances by actors, comedians, and dancers; production and distribution of media featuring live performances; providing information, news, and commentary in the field of entertainment and popular culture; hosting social entertainment events, parties, mixers, and meet-and-greets; entertainment; sporting and cultural activities; organization of exhibitions for cultural or educational purposes.
41 - Education, entertainment, sporting and cultural services
Goods & Services
(1) Arranging and conducting concerts; live music performances; live visual and audio performances by musical bands; organizing and hosting of events for cultural or educational purposes; organizing film festivals for cultural or entertainment purposes; providing podcasts in the field of music and entertainment; live performances by actors, comedians, and dancers; production and distribution of media featuring live performances; providing information, news, and commentary in the field of entertainment and popular culture; hosting social entertainment events, parties, mixers, and meet-and-greets
88.
Method, System, and Computer Program Product for Identifying Library Vulnerabilities
Methods, systems, and computer program products may obtain a library; obtain, from at least one external data source, information associated with at least one vulnerability associated with the library; generate, based on the information associated with the at least one vulnerability associated with the library, at least one rule associated with the at least one vulnerability; train at least one machine learning model with the at least one rule associated with the at least one vulnerability; scan, based on the at least one rule associated with the at least one vulnerability, at least one application that uses the library to identify whether the at least one application includes the at least one vulnerability; and provide an indication of whether the at least one application that uses the library includes the at least one vulnerability.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
A method performed using a vehicle comprising a data processor and a memory element storing a vehicle interaction module and a transaction processing module. The method includes receiving, by the vehicle interaction module, a communication relating to operation of or access to the vehicle, after a user of the vehicle has performed an authentication process. The communication has data relating to an outcome of the authentication process. The method includes receiving, by the transaction processing module from a resource provider application, a transaction request, and obtaining, by the transaction processing module, from the vehicle interaction module, the data relating to the outcome of the authentication process. The method also includes providing, by the transaction processing module to the resource provider application, access data and the data relating to the outcome of the authentication process.
A method is disclosed. The method includes receiving, by a computer from a portable device via an NFC interaction, a cryptogram, the cryptogram based at least upon a primary account number. The method includes generating, by the computer, a request for dynamic account information, the request comprising the cryptogram, and transmitting, by the computer to a validation entity computer over a communications network comprising the Internet or a cellular phone network. The request comprises the cryptogram. The validation entity computer validates the cryptogram. The method also includes responsive to the validation entity computer validating the cryptogram, receiving, by the computer from the validation entity computer, the dynamic account information over the communications network.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
H04L 9/10 - Arrangements for secret or secure communicationsNetwork security protocols with particular housing, physical features or manual controls
H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A method is disclosed. The method includes receiving, by a computer from a portable device via near field communications, a primary account number. The method includes transmitting, by the computer, to a validation entity computer over a communications network comprising the Internet or a cellular phone network, a request for dynamic account information associated with the primary account number. The validation entity computer obtains and sends the dynamic account information to the computer. The method also includes receiving, by the computer from the validation entity computer over the communications network comprising the Internet or the cellular phone network, the dynamic account information and populating a form on the computer with the dynamic account information.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
H04L 9/10 - Arrangements for secret or secure communicationsNetwork security protocols with particular housing, physical features or manual controls
H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
The present disclosure generally relates to an anomaly detection solution using advanced mobile payments data and mobile transaction-level features to help banks detect potential anomalous behavior in their mobile banking platform. The solution disclosed in the present disclosure is embedded into a broader fraud and anomaly detection monitoring framework at client end to make real time decisions on transaction approval, hold, or decline. This leads to reduced fraud losses and exposures, and optimized transaction approval rates for the client. As opposed to typical models deployed by banks which are unique and targeted to a specific use, this solution concurrently caters to three distinct use cases: detection of potential fraudulent activity, facility abuse by client, and potential laundering activity.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
93.
APPARATUS, SYSTEM, AND METHOD FOR NON-VISUAL PAYMENT AUTHENTICATION
Provided herein is a payment device including a substrate having a first surface and a second surface, a plurality of input devices arranged on at least one of the first surface and second surface, each input of the plurality of input devices corresponding to a different variable, a data element including account data arranged on at least one of the first surface and second surface, a communication device arranged on or in the substrate, and at least one processor arranged on or in the substrate and in communication with each of the plurality of input devices, the at least one processor configured to communicate, using the communication device, a user input received through at least a subset of input devices of the plurality of input devices.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
94.
System and Computer Implemented Method for Generating and Transmitting Tokenized Card Information
The present disclosure relates to a method and a tokenization server for generating and transmitting tokenized card information to a token requestor. In some non-limiting embodiments or aspects, the method includes receiving, from the token requestor, a request for a token corresponding to a payment card. The token may include a plurality of characters. Further, the method includes generating a token key corresponding to the token based on location information associated with a plurality of files stored in a user device. Subsequently, the method includes transmitting the token key, including location information within the plurality of files in the user device, to the token requestor. Here, the location information may include a location embedded with a character of the plurality of characters of the token. Thus, the present disclosure provides a secure method of generating, storing, and transmitting the tokenized card information.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
A computer-implemented method for authenticating a payment terminal during a payment transaction by a cardholder is disclosed. The computer-implemented method includes receiving payment information associated with a cardholder account of the cardholder. The method further includes transmitting a payment authorization request to an issuer server, receiving a response form the issuer server to the payment authorization request. The response includes a verification request of a personal identification number (PIN) associated with the cardholder account, and a cardholder-recognizable token previously associated with the cardholder account. The method further includes presenting the cardholder-recognizable token to the cardholder with the verification request of the PIN.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Provided is a method for optimization of a decision tree machine learning model based on a sensitivity coefficient that includes receiving a dataset for a population, where the dataset includes a plurality of data instances associated with a plurality of features, generating the decision tree model based on a set of parameters associated with the decision tree model and the dataset, where generating the decision tree model includes determining a measure of a sensitivity coefficient associated with a split of the population for each feature of the plurality of features, determining a plurality of nodes of the decision tree model based on the measure of the sensitivity coefficient associated with the split for each feature of the plurality of features, and performing an action based on an output of the decision tree model that resulted from an input associated with an account. Systems and computer program products are also provided.
Provided is a system, method, and computer program product for determining a pseudo-identity score in a virtual environment based on a blockchain network. The system includes at least one processor programmed or configured to identify a pseudo-identity in a virtual environment based on a blockchain address on a blockchain network, the pseudo-identity corresponding to the blockchain address, determine an age of the pseudo-identity, determine a measure of activity of the pseudo-identity based on transactions conducted by the pseudo-identity in the virtual environment, determine a pseudo-identity score based at least partially on the age of the pseudo-identity and the measure of activity of the pseudo-identity, and process a request generated by the pseudo-identity in the virtual environment based on the pseudo-identity score.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Systems, methods, and computer program products are provided for breach detection using convolutional neural networks (CNNs). An example system includes a processor configured to generate a plurality of permuted images, each image comprising a field of points associated with suspected fraudulent transactions, an x-axis position of each point associated with a time, and a y-axis position of each point corresponding to a randomized index of a payment device. The processor is also configured to assign a breach likelihood score to each image using a CNN model. The processor is further configured to compare the breach likelihood score of each image to a threshold score. The processor is further configured to detect the breach event based on one or more breach likelihood scores satisfying the threshold score. The processor is further configured to, in response to detecting the breach event, decline transactions with the entity associated with the breach event.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Methods and systems for performing federated private anomaly detection are disclosed. An anomaly detector computer can collaborate with an aggregator computer and an account management computer in order to train machine learning models, which can be used to classify events as not fraudulent or fraudulent. The anomaly detector computer can obliviously use private information (e.g., account flags and account flag values) held by the account management computer to train and use the machine learning models, such that the anomaly detector does not become aware of the account flags or account flags values. Such a system can be used, for example, for the detection and prevention of financial crime. The anomaly detector computer can use the account flag information possessed by the account management computer to identify fraudulent events performed by customers of the organization operating the account management computer.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
An access device is disclosed. The access device includes a non-transitory computer readable medium that includes code for performing a method that includes receiving, from a user device, a digital certificate and a seed, and then encrypting the seed, and a first access device key with a public key from the digital certificate to form encrypted data. The method also includes transmitting, to the user device, the encrypted data. The user device decrypts the encrypted data using a private key corresponding to the public key to obtain the seed, and the first access device key, verifies that the seed received from the access device matches the seed sent to the access device, and encrypts a secret or derivative thereof with the first access device key to form an encrypted secret or derivative thereof. The method also includes receiving the encrypted secret or derivative thereof.
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system