Systems, apparatuses, methods, and computer program products are disclosed for predicting an emotion in real-time based on facial gestures and limb gestures derived from captured images. An example method includes receiving a series of images captured in real-time. The example method further includes causing generation of a face segmentation and one or more limb segmentations using the series of images. The example method further extracting one or more face segmentations vectors and one or more limb segmentation vectors. The example method further includes causing generation of weighted vectors using the one or more face segmentation vectors and the one or more limb segmentation vectors for each of the one or more the limb segmentations. The example method includes calculating a probability distribution based on the one or more probabilities corresponding to one or more emotions. The example method finally includes determining a predicted emotion based on the probability distribution.
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
G06K 9/36 - Prétraitement de l'image, c. à d. traitement de l'information image sans se préoccuper de l'identité de l'image
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
2.
SYSTEMS AND METHODS FOR DETERMINING REAL-TIME AVAILABLE CAPACITY OF A MERCHANT
Systems and methods of determining real-time available capacity of a merchant are provided. A plurality of financial transactions involving the merchant can be received during a current time period. A current payment velocity of the financial transactions involving the merchant during the current time period can be determined. The current payment velocity can be compared with a baseline payment velocity associated with financial transactions involving the merchant during a corresponding historical time period. An available capacity of the merchant can be determined, based on a difference between the current payment velocity and the baseline payment velocity.
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
3.
SYSTEMS AND METHODS FOR REAL-TIME BILLER POSTING SERVICES
Embodiments include a provider computing system associated with a provider including a processing circuit configured to present, by a graphical user interface while a bill pay application is in an unlaunched state, a notification including a summary of a bill, and automatically launch the bill pay application in response to the customer selecting the summary. The processing circuit further configured to receive, via the bill pay application, a request to pay an amount of funds to a biller, generate a payment request, provide at least one post to a funds account circuit based on the payment request, and generate and provide a payment data object to a biller computing system.
An example computer system for providing a communication system can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: monitor criteria associated with the communication system; assign a weight to the criteria to determine a risk score associated with the communication system; and automatically change an address of the communication system when the risk score exceeds a threshold.
Techniques described herein include selecting experience data for use when training or retraining a model. In one example, this disclosure describes a method that includes generating a plurality of trajectories, each comprising a contiguous sequence of instances of experience data, where each instance of experience data in the contiguous sequence has an error value associated that instance of experience data; determining, for each of the trajectories, a sorted order of the instances of experience data, wherein the sorted order is based on the error value associated with each of the instances of experience data; selecting, based on a distribution function applied to the sorted order of the instances of experience data in at least one of the trajectories, a subset of instances of the experience data; and retraining a reinforcement learning model, using the subset of instances of experience data, to predict an optimal action to take in a state.
A housing facilitates a service operation for a transaction device. The housing includes a transfer cassette interface structured to receive a cassette. The housing also includes a transaction device interface that is structured to couple to a cassette port of the transaction device when the housing is disposed within a vault of the transaction device such that the housing is removably coupled to the transaction device via the transaction device interface, and responsive to the transfer cassette interface receiving the cassette, operably couple the cassette to a transaction device transport apparatus via the transfer cassette interface.
G07D 11/34 - Surveillance du contenu des dispositifs, p.ex. de la quantité de papiers de valeur
G07D 11/50 - Tri ou comptage des papiers de valeur
G07D 11/60 - Aménagements des interfaces utilisateur
G07F 19/00 - Systèmes bancaires complets; Dispositions à déclenchement par carte codée adaptées pour délivrer ou recevoir des espèces ou analogues et adresser de telles transactions à des comptes existants, p.ex. guichets automatiques
7.
TRANSACTION INSTRUMENT WITH FEATURES FOR DESTRUCTION AND DISPOSAL
In some examples, a transaction instrument includes a body that defines a first face and a second face, a chip assembly comprising an integrated circuit chip, an aperture in a portion of the body that provides access to a portion of the transaction instrument, and an attachment mechanism configured to secure the chip assembly at least partially within the body and hold the chip assembly substantially flush with the first face of the body. At least one of the body, the attachment mechanism, or a portion of the chip assembly is designed to fail in response to a force applied via the aperture in the body, and wherein the failure of the at least one of the body, the attachment mechanism, or the portion of the chip assembly, destroys the integrated circuit chip of the transaction instrument.
G06K 19/077 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré - Détails de structure, p.ex. montage de circuits dans le support
Systems and methods may generally include using proximate communication circuitry to automatically coordinate bill splitting among users with a mobile device. An example method may include receiving a bill, for example at a mobile wallet executing on the mobile device. The method may include receiving via the proximate communication circuitry, an indication from a second mobile device. A virtual account (e.g., of the mobile wallet) may be funded with a first amount drawn using information from the indication and a second amount drawn from an account of the mobile wallet. The method may include executing payment of the bill, such as with the mobile device.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
9.
SYSTEMS AND METHODS FOR AUGMENTING ELECTRONIC COMMUNICATIONS
Systems, apparatuses, methods, and computer program products are disclosed for improving individual interactions with generative artificial intelligence. An example method includes receiving, by communications hardware, an electronic correspondence with an individual and extracting, by language processing circuitry and using an interaction data model, interaction data from the electronic correspondence. The example method also includes generating, by generative model circuitry and using an augmentation generation model, correspondence augmentation data based on augmentation model input data, wherein the augmentation model input data comprises the interaction data and user profile data associated with the individual. The example method also includes generating, by correspondence circuitry, a modified electronic correspondence comprising the correspondence augmentation data and data from the electronic correspondence.
H04L 51/07 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p.ex. courriel caractérisée par l'inclusion de contenus spécifiques
G06Q 30/015 - Fourniture d’une assistance aux clients, p. ex pour assister un client dans un lieu commercial ou par un service d’assistance
Systems, apparatuses, methods, and computer program products are disclosed for selecting a classification category based on query data. An example method includes receiving query data and requesting a set of classification categories from a set of classification engines. The example method further includes receiving the set of classification categories and, if a leading classification category occurs, selecting a classification category that includes the first leading classification category. The example method further includes, if the leading classification category does not occur, forming a set of partial-digits categories by removing a first pre-determined number of digits from each classification category, and if a first leading partial-digits category from the first set of partial-digits categories occurs, selecting a second classification category consistent with the first leading partial-digits category. The example method further includes selecting a ranked priority classification category based on the priority rank for each classification engine.
Systems, apparatuses, methods, and computer program products are disclosed for facilitating extended range encrypted communication. An example method includes automatically navigating, via navigation circuitry of a first drone, to a first location of a first device. The example method also includes generating, by quantum random number generator circuitry of the first drone, a cryptographic key. The example method also includes establishing, by communications hardware of the first drone, a first connection between the first drone and the first device. The example method also includes causing transmission, by the communications hardware of the first drone, of the cryptographic key to the first device, such that the cryptographic key facilitates secure communication between the first drone and the first device.
Distributed firewalls reside at different points across a network. Each distributed firewall can include one or more rules that govern traffic over and/or access to the network. The rules can be discovered, converted into a standardized format, and indexed at a centralized rule database. The rules or data of the rules can be verified. The rules can be certified at the centralized database. The certification process can be based on a direction of traffic to which the rule governs. The certification process may have different levels based on the direction of traffic.
Systems, methods, and computer-readable storage media of template-based digital asset exchanges using a public key cryptography (PKC) framework. One method includes storing a plurality of exchange templates, and receiving a signed exchange request signed by a private key of a public and private key pair associated with a digital asset. The method further includes receiving an environmental dataset, and selecting, utilizing the environmental dataset, an exchange template of the plurality of exchange templates. The method further includes populating the plurality of fields of the selected exchange template based on the environmental dataset. The method further includes providing, to a plurality of user devices, a public key, updating a provider ledger, and updating a central ledger.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Various examples are directed to systems and methods for administering transactions for a plan participant. A plan sponsor system may send plan participant identity information to an identity management system. The plan sponsor system may receive, from the identity management system, an indication of a previously generated public verification key for the first plan participant. The plan sponsor system may generate a first transaction record indicating a transaction on a first retirement plan managed by the first plan sponsor system and broadcast the first transaction record to be included in a distributed ledger.
Systems, apparatuses, methods, and computer program products are disclosed for secure communication based on random key derivation. An example method includes receiving, by communications hardware of a first device, an initial key shared between the first device and a second device. The example method also includes receiving, by the communications hardware of the first device, a first set of seed bits, wherein the first set of seed bits is also received by the second device. The example method also includes deriving, by key derivation circuitry of the first device, a first symmetric key based on the initial key and the first set of seed bits. The example method also includes performing, by data protection circuitry of the first device, a first cryptographic data protection action using the first symmetric key.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A computer system for implementing a non-fungible token (NFT) as a payment object in a metaverse space. The system includes one or more processors and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to create: a mint engine programmed to generate an NFT having a unique visual appearance, the NFT being associated with a currency account and including an authorization credential for the currency account; a ledger engine programmed to maintain the NFT on a ledger; a wallet engine programmed to generate a presentation of the NFT in response to a user request, wherein the presentation includes the visual appearance of the NFT to provide a visual representation of the authorization credential; and a transaction engine programmed to access the currency account, based on the authorization credential, in response to a payment request.
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
17.
Systems and methods for predicting an emotion based on a multimodal input
Systems, apparatuses, methods, and computer program products are disclosed for predicting an emotion in real-time based on a multimodal input including at least (i) an amount of keystrokes over a period of time and (ii) text. An example method may include receiving, by a communications circuitry, a multimodal input from a user including at least (i) an amount of keystrokes over a period of time and (ii) text. The example method may further include generating, by a trained machine learning model of an emotion prediction circuitry and using the multimodal input, an EmotionPrint for the user. The example method may finally include determining, by the emotion prediction circuitry and using the EmotionPrint, a next action.
G10L 25/63 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes spécialement adaptées pour un usage particulier pour comparaison ou différentiation pour estimer un état émotionnel
G10L 15/26 - Systèmes de synthèse de texte à partir de la parole
G10L 15/32 - Reconnaisseurs multiples utilisés en séquence ou en parallèle; Systèmes de combinaison de score à cet effet, p.ex. systèmes de vote
H04L 51/02 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p.ex. courriel en utilisant des réactions automatiques ou la délégation par l’utilisateur, p.ex. des réponses automatiques ou des messages générés par un agent conversationnel
H04M 3/493 - Services d'information interactifs, p. ex. renseignements sur l'annuaire téléphonique
Systems and methods an enhanced drive-up banking experience with automatic authentication are provided herein. The system includes a communication interface structured to communicatively couple to a network, sensors, a processor, and memory. The system performs operations including receive a first pre-staged transaction request for a first pre-staged transaction, from a user device; detect, by the one or more sensors, that the user device has entered a first geolocation area; determine a first provider employee of a plurality of provider employees to process the pre-staged transaction; add the pre-staged transaction to a first dynamic service queue, the first dynamic service queue corresponding to the first provider employee; display a teller user interface on a teller device, the teller user interface comprising at least the dynamic service queue; verify, by an authentication circuit, the pre-staged transaction; responsive to verifying the pre-staged transaction, complete, by a transaction device management circuit, the pre-staged transaction.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 10/0631 - Planification, affectation, distribution ou ordonnancement de ressources d’entreprises ou d’organisations
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
H04W 4/029 - Services de gestion ou de suivi basés sur la localisation
19.
Systems and methods for identity verification of math-based currency account holders
Math-based currency (“MBC”) transactions are inherently quasi-anonymous. Systems and methods of registering customers with a financial institution for the purposes of opening a MBC account are described. During the registration process, the financial institution gathers and stores certain information relating to the customers having MBC accounts. This information may later be used to provide verification of MBC transactions to other parties involved in the MBC transactions.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
Systems and methods for activating a transaction card are provided. A method includes: receiving a uniform resource locator (URL) and an encrypted key stored on a contactless transaction card from a first contactless communication between the contactless transaction card and a customer device; decrypting the encrypted key to identify information regarding the contactless transaction card; providing a web site associated with the URL for display, wherein the web site comprises a field automatically populated based on the identified information regarding the contactless transaction card; activating the contactless transaction card in response to verifying the identified information regarding the contactless transaction card; receiving information associated with the contactless transaction card from a second contactless communication between the contactless transaction card and the customer device; and resetting a credential for accessing an account associated with the contactless transaction card.
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p.ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
21.
Systems and methods for determining a next action based on entities and intents
Systems, apparatuses, methods, and computer program products are disclosed for predicting an entity and intent based on captured speech. An example method includes capturing speech and converting the speech to text. The example method further includes causing generation of one or more entities and one or more intents based on the speech and the text. The example method further includes determining a next action based on each of the one or more entities and each of the one or more intents.
Systems, apparatuses, methods, and computer program products are disclosed for facilitating on-demand delivery of unknown qubits. An example method includes determining a first quantum basis pattern. The example method further includes encoding, by encoding circuitry, a set of bits utilizing the first quantum basis pattern to generate a set of qubits and transmitting, by quantum communications circuitry, the set of qubits over a quantum line, for example, a polarization maintaining optical fiber, to a remote device, wherein the set of qubits is configured for measurement by an independently determined, second quantum basis pattern, resulting in a second set of bits different than the first set of bits.
Methods, apparatuses, and computer program products are disclosed for generating and/or using a mobile legal identification data object. An example method includes receiving a request for a mobile legal identification data object and generating the mobile legal identification data object based at least in part on the request for the mobile legal identification data object. The method further includes associating the mobile legal identification data object with a user profile. The method further includes providing the mobile legal identification data object to a user device associated with the user profile.
Systems, apparatuses, methods, and computer program products are disclosed for managing keys of digital certificates. An example method includes receiving a digital certificate comprising a first public key and a corresponding first digital signature and a second public key and a corresponding second digital signature. The example method also includes receiving a signed data object associated with the digital certificate. The signed data object indicates a set of key management policies associated with the first public key and the second public key. The example method further includes performing, based on the set of key management policies, a first cryptographic data protection action using the first public key and the first digital signature or the second public key and the second digital signature. The first cryptographic data protection action facilitates secure communication between the first device and the second device.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/14 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
25.
Systems and methods for and operation of a digital marketplace add-in
Systems, methods, and computer-readable storage media for a digital marketplace add-in. One method includes receiving an entity dataset includes marketplace design preferences that define styling and designs of an online marketplace provided by a marketplace computing system, and generating and presenting, on a user device, a first application user interface based on the marketplace design preferences, the first application user interface including a plurality of interactive elements associated with payment information of a user. The method further includes receiving a preference in response to a selection of a first interactive element of the plurality of interactive elements, and receiving, from the marketplace computing system, transaction information regarding a transaction. The method further includes identifying the user based on correlating the transaction information to the user, retrieving the preference based on identifying the user, and automatically routing, a resource to the user based on the retrieved preference.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Systems and methods for managing third party data are provided. A third party data management system includes a processing circuit. The processing circuit is configured to receive first third party activity data from a source computing system and via a cybersecurity correlation and analytics computing system, determine a computing entity external to the third party data management system associated with the third party activity data based on at least one item extracted from the first third party activity data, periodically monitor third party activity associated with the computing entity, comprising operations to collect second third party activity data, and correlate the monitored second third party activity data to an entity profile.
A method includes transmitting, by a user device, a request to a user-interactive device via a first short-range wireless communication and automatically launching a mobile application on the user device based on the request. The method further includes transmitting, by the user device, first information to the user-interactive device via a second short-range wireless communication according to the request and receiving, by the user device, a second request from the user-interactive device via the second short-range wireless communication. The method further includes transmitting, by the user device, second information to the user-interactive device via a third short-range wireless communication.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
A system includes a database that stores user information regarding a plurality of customers; a network interface configured to communicate data over a network; and a processing circuit. The processing circuit is configured to: receive, from a customer computing device, a first indication that a customer is within a first predetermined distance of a first customer area and activate, based on the first indication, an interface of the customer computing device. The interface is configured to receive an input. The processing circuit is further configured to receive a second indication that the customer is within a second predetermined distance of a second customer area that is within the first customer area and authorize, based on the second indication and reception of the input, a transaction at the terminal.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G07F 19/00 - Systèmes bancaires complets; Dispositions à déclenchement par carte codée adaptées pour délivrer ou recevoir des espèces ou analogues et adresser de telles transactions à des comptes existants, p.ex. guichets automatiques
H04L 67/52 - Services réseau spécialement adaptés à l'emplacement du terminal utilisateur
H04W 4/02 - Services utilisant des informations de localisation
H04W 76/10 - Gestion de la connexion Établissement de la connexion
An example computer system for data pipeline orchestration configured to manage and coordinate the end-to-end process involved in moving and transforming data from various sources to designated target repositories can include one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to create: a user interface configured to receive metadata configuration requirements; a parsing module programmed to parse the metadata configuration requirements into one or more constituent components; and a template selection module programmed identify and select appropriate templates from a template repository used to fulfill the one or more constituent components.
G06F 16/21 - Conception, administration ou maintenance des bases de données
G06F 16/215 - Amélioration de la qualité des données; Nettoyage des données, p.ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
A multi-party operational plan simulation computing system implements a build-simulation module and a staging-simulation module. Based on characteristics of an operational plan, the build-simulation module generates a build plan data object and permits a particular network node to modify the build plan data object. The staging-simulation module simulates an environment for the operational plan and permits multiple network nodes to simulate the build plan data object. Based on data received from the particular network node or a simulation, the multi-party operational plan simulation computing system determines a data value that describes a revised characteristic of the operational plan and modifies the build plan data object based on the revised characteristic. The multi-party operational plan simulation computing system provides, to one or more network nodes, interface data associated with the modified build plan data object.
G06Q 10/0637 - Gestion ou analyse stratégiques, p. ex. définition d’un objectif ou d’une cible pour une organisation; Planification des actions en fonction des objectifs; Analyse ou évaluation de l’efficacité des objectifs
In one arrangement, a method for a key management server to manage cryptographic key rotation comprises rotating, by the key management server, an initial symmetric key based on a first rotation schedule. Rotating the initial symmetric key comprises rotating bits of the initial symmetric key to create a rotated key, the rotated key being different from the initial symmetric key. The method further comprises enciphering, by the key management server using the rotated key, data sent to a first client server. In another arrangement, a method for a client server to manage cryptographic key rotation comprises rotating, by the client server, an initial symmetric key based on a schedule. The method further comprises deciphering, by the client server, data sent from a key management server using the rotated key and providing the deciphered data to a user.
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
A system includes a tabletop display and a processing circuit including one or more processors coupled to a non-transitory computer-readable medium storing instructions that, when executed, cause the processing circuit to cause an image comprising first information and second information to be displayed on a tabletop display, receive a security trigger, and cause the first information to be obscured on the tabletop display based on receiving the security trigger.
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
G06F 3/04883 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p.ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p.ex. des gestes en fonction de la pression exer utilisant un écran tactile ou une tablette numérique, p.ex. entrée de commandes par des tracés gestuels pour l’entrée de données par calligraphie, p.ex. sous forme de gestes ou de texte
This disclosure describes techniques in which an artificially intelligent system includes a progressive machine learning model. In some examples, a system includes both a static and progressive model, each trained to make predictions or other assessments through machine learning techniques. The progressive model may be progressively updated, modified, and/or improved through additional training data or training examples, which may be derived from a local source and/or from one or more remote sources that may be chosen by a qualifier. The qualifier may be a human decision-maker that chooses, selects, and/or evaluates potential data or new training examples for use in updating the progressive model. The qualifier may, in other examples, be an artificially intelligent system trained to perform the functions of the qualifier.
G06F 3/048 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI]
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p.ex. des menus
G06F 18/21 - Conception ou mise en place de systèmes ou de techniques; Extraction de caractéristiques dans l'espace des caractéristiques; Séparation aveugle de sources
G06F 18/214 - Génération de motifs d'entraînement; Procédés de Bootstrapping, p.ex. ”bagging” ou ”boosting”
G06N 20/20 - Techniques d’ensemble en apprentissage automatique
G16H 50/20 - TIC spécialement adaptées au diagnostic médical, à la simulation médicale ou à l’extraction de données médicales; TIC spécialement adaptées à la détection, au suivi ou à la modélisation d’épidémies ou de pandémies pour le diagnostic assisté par ordinateur, p.ex. basé sur des systèmes experts médicaux
34.
Quantum and classical cryptography (QCC) for data encryption and data decryption
A system and method for establishing secure communications based on combined capabilities of classical and quantum computers. A system can perform encrypting, responsive to a request for client data associated with a client device, the client data using a cryptographic key to generate an encrypted data packet, transmitting the encrypted data packet to a second classical computer simulating a quantum computer operation, the encrypted data packet causing the second classical computer to begin a decryption process on the encrypted data packet to recover a decrypted data packet determining an absence of a response from the second classical computer occurring within a predefined window of time, the response comprising the decrypted data packet and transmitting, responsive to the absence of the response, the encrypted data packet to a quantum computer, the encrypted data packet causing the quantum computer to decrypt the encrypted data packet to recover a decrypted data packet.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
35.
Systems and methods for automated prototyping of a topic model
Systems, apparatuses, methods, and computer program products are disclosed for automated prototyping of a topic model. An example method includes a data manipulation engine ingesting and pre-processing source data from a set of data sources, a feature extraction engine that thereafter transforms the pre-processed data into a set of numeric representations of the pre-processed data, and an autonomous model generator that automatically generates a trained topic model using the set of numeric representations. Embodiments further enable visualization of topic model output, which permits a user to easily consume and utilize information from a topic model for any number of purposes.
Systems, methods, and apparatuses for providing a customer a central location to manage permissions provided to third-parties and devices to access and use customer information maintained by a financial institution are described. The central location serves as a central portal where a customer of the financial institution can manage all access to account information and personal information stored at the financial institution. Accordingly, the customer does not need to log into each individual third-party system or customer device to manage previously provided access to the customer information or to provision new access to the customer information. A user additionally is able to have user data and third-party accounts of the user deleted from devices, applications, and third-party systems via a central portal.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p.ex. des menus
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
G06F 3/04842 - Sélection des objets affichés ou des éléments de texte affichés
37.
Protecting tokenized structures using a protection architecture
Systems, methods, and computer-readable storage media to protect non-fungible tokens (NFTs) using a protection architecture. One method includes receiving an NFT, authenticating the NFT including authenticating or verifying the NFT using a key and authenticating the link of the NFT, and protecting the NFT including generating a public-private key pair, encapsulating the NFT within a control structure, updating an NFT account in an overlay ledger, generating and storing a cold storage object in a cold storage ledger, and broadcasting the NFT to a blockchain storage.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
38.
MULTIFACTOR IDENTITY AUTHENTICATION VIA CUMULATIVE DYNAMIC CONTEXTUAL IDENTITY
Disclosed are example methods, systems, and devices that allow for generation and maintenance of a central identity databank for a user's digital life. The identity databank may include identity elements with payload values and metadata values corresponding immutable attributes of the user. A multifactor identity authentication protocol allows service provider devices to more reliably validate transactions with user devices via an identity system. The identity databank may include passwords, which may be generated by the identity system linked to user accounts and/or service providers. The passwords may be provided to service provider devices, eliminating the need for users to conceive of a multitude of varying passwords for the user's accounts.
A computer system includes a token repository configured to store payment tokens, and a server system. The server system includes a processor and instructions stored in non-transitory machine-readable media, the instructions configured to cause the server system to receive a request to provision a payment token based on a financial product, wherein the request includes information related to the financial product, provision a payment token based on the token request, including authenticating the financial product based on the financial product information and generating the payment token upon authenticating the financial product, wherein the payment token is useable to make a payment via the financial product, and store the payment token in the token repository.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
40.
ENTITY AUTHENTICATION THROUGH AN INFORMATION STORAGE AND COMMUNICATION SYSTEM
Systems and methods for authenticating parties and transactions are described herein. The systems and methods may be part of an information wallet system. The information wallet system or a separate authentication system in communication with the information wallet system may facilitate verification and/or authentication of the parties. In one embodiment, the authentication system includes an authentication server configured to receive an authentication request from a first party to authenticate a second party. The authentication server is further configured to transmit an information request the second party. The authentication server is configured to receive second party information and to configured to compare the second party information with a verified second party information. The authentication server is configured to transmit an authentication result to the first party device.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
41.
SYSTEMS AND METHODS FOR GENERATING A GUI FOR RESCHEDULE OF PAYMENTS
Systems and methods method include establishing, a connection between the first computing system and an application of a second computing system, the connection associated with an entity having one or more first accounts with the first computing system and a second account with the application of the second computing system, receiving a dataset corresponding to the second account, the dataset comprising a plurality of data entries corresponding to respective invoices, retrieving account data corresponding to the one or more first accounts with the first computing system, applying, the dataset and the account data as inputs to a machine learning model trained to generate optimized orders, and generating, by the one or more processors, a first user interface including data of a list of the plurality of entries, the plurality of entries being ordered according to the optimized order for the dataset.
A computing system includes a processor circuit that causes a processor to receive, from a user device, a request to enroll in a service, receive, from the user device, a request to link a first account with a second account, generate a third account, couple the third account with the first and second account, generate a unique identifier for the second account, assign the unique identifier to the second account, transmit, to a third party system, the unique identifier, receive, from the third party system, a resource transfer request associated with the second account including a transaction amount and the unique identifier, determine an available amount of resources of the first account, compare the available amount of resources of the first account with the transaction amount, cause a transfer of an amount of resources from the first account to the third account, and transmit, to the user device, a notification.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Techniques described herein involve processes and systems for performing identity verification on a network. In one example, this disclosure describes a method that comprises receiving, by a computing system and from a requesting device, a request to perform an identity verification for a requesting user that is operating the requesting device; outputting, by the computing system and to the requesting device, code information; enabling, by the computing system, the requesting device to display a code derived from the code information; receiving, by the computing system and from a verification device, an image of another device; and determining, by the computing system and based on the image of the other device, whether the other device is the requesting device.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06V 30/224 - Reconnaissance de caractères caractérisés par le type d’écriture de caractères imprimés pourvus de marques de codage additionnelles ou de marques de codage
G06V 40/16 - Visages humains, p.ex. parties du visage, croquis ou expressions
In one example, this disclosure describes a method that includes determining a first transaction category identifier based on data for a first financial transaction initiated by a customer. A demographic category identifier is determined based on a set of demographic data associated with the customer. A first composite event signature is established for the customer by combining the transaction category identifier with the demographic category identifier. The customer is assigned to a first profile group of customers having the first composite event signature. A first risk associated with the first profile group is determined, based on zero or more historical fraud events associated with the first profile group. When the first risk exceeds a first threshold, a first fraud report is generated, a first fraud alert is generated, and/or a first mitigation action is performed to mitigate the first risk.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
45.
Automated provisioning of temporary communication systems
An example computer system for providing a communication system can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: receive a command to create the communication system based upon an event; automatically install and provision the communication system in a cloud computing environment; provide an event management microservice programmed to track issues associated with the computer system, including provisioning the event management microservice with one or more tickets based upon a type of the event; and provide a communication microservice programmed to facilitate communications between users of the communication system, including provisioning the event management microservice with one or more contacts based upon the type of the event.
Various examples are directed to systems, methods, and computer programs for detecting fraudulent activity and/or fraudulent actors in transaction requests associated with pay groups in a financial institution. For example, a financial server receives a transaction authorization request related to a pay group on an account of a user. The financial server monitors events associated with at least one payee of the pay group and identifies a fraud indication among a first event of the events associated with the at least one payee of the pay group. The financial server blocks the transaction authorization request related to the pay group, including triggering, by the fraud indication, stopping multiple payments to multiple payees of the pay group.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
47.
SYSTEMS AND METHODS FOR DEVICE CONNECTIVITY-BASED AUTHENTICATION
Systems, apparatuses, methods, and computer program products are disclosed for device connectivity-based authentication. An example method includes receiving, from a first device, an authorization request associated with a first action. The example method also includes receiving a current connectivity dataset from the first device which indicates one or more devices detected by the first device to be in communication with the first device. The example method also includes comparing the current connectivity dataset with a reference connectivity dataset. The example method also includes determining, based on the comparison, whether the current connectivity dataset and the reference connectivity dataset satisfy a predefined similarity threshold. The example method also includes authorizing, in an instance in which the current connectivity dataset and the reference connectivity dataset satisfy the predefined similarity threshold, the first device to perform the first action.
Various embodiments are generally directed to insight quantization and state control, such as in the context of CRM. Some embodiments are particularly directed to forecasting and avoiding or diffusing user issues, such as customer complaints, associated with enterprises and enterprise systems. For example, embodiments include utilizing insight indexes to quantize user states, determining a likelihood for issues to arise based on the quantized insight indexes, and performing a state improvement process when the likelihood for issues arises. The state improvement process may generate and/or implement mediating output actions configured to adjust the quantized insight indexes and reduce the likelihood for issues to arise.
A method includes: receiving an indication that a user has requested to perform an activity requiring authorization; generating an authentication path for presentation to the user, the authentication path comprising a first portion and a second portion, the first portion of the authentication path comprising at least one first authentication challenge, the second portion of the authentication path comprising at least one second authentication challenge and being presented to the user after a first valid response to the at least one first authentication challenge has been provided; determining that the user provided a second valid response to the second portion of the authentication path; and, responsive to determining that the user provided the second valid response to the second portion of the authentication path, authorizing, by the one or more processors, the user to perform the activity requiring authorization.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Disclosed in some examples is an enterprise software management system (ESMS) that manages procurement, deployment, security, and maintenance of software in large enterprises. The ESMS may include one or more of a software tracking component, a software component storage component, a licensing repository component, a software vulnerabilities detection component, and a software risk management component. The ESMS governs and manages software applications and components to reduce legal, security, and other risks to the enterprise environment. The ESMS solves the technical problem of tracking and managing software and components using the technical solution of a tracking framework that utilizes interconnected systems that document, track, and ensure compliance with enterprise software goals.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06F 8/75 - Analyse structurelle pour la compréhension des programmes
G06F 21/52 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données
51.
SYSTEMS AND METHODS FOR DATA EXCHANGE USING PAYMENT CARDS WITH UNIVERSAL REFERENCE NUMBERS
Methods and systems of exchanging data using payment cards with universal reference numbers are disclosed. A merchant computing system includes a merchant input/output assembly receiving a universal reference number from a customer at a point of sale. A merchant database retrievably stores a plurality of universal reference numbers and customer information associated with each of the plurality of universal reference numbers. A transaction circuit receives the universal reference number from the merchant input/output assembly, retrieves customer information associated with the universal reference number, and provides an output relating to a transaction based on the customer information.
Systems and methods for facilitating communication between computing systems may include a device which establishes a connection between a first application executing on a first server and a second application executing on a second server. The first application and the second application may be linked to a common account holder. The first application may transmit, to the second application, at least a portion of data associated with the common account holder and accessible via the first application. The first application may generate populated form fields for a form associated with the first application using data from the second application and the data received by the second application from the first application. The first application may generate a new account for the common account holder using the populated form fields received from the second application.
Various embodiments of the present disclosure provide methods, apparatuses, systems, computing devices, and/or the like that are configured to train a wire transfer validation machine learning model to process transfer requests to a potential recipient. An example computer-implemented method includes receiving the transfer request that includes data entries associated with scannable indicia indicative of a recipient of the transfer request. The method includes applying, for the transfer request, a wire transfer validation machine learning model to determine a transfer validation prediction object for the transfer request and generating a wire transfer validation interface based on the transfer validation prediction object. The wire transfer validation interface may include an actionable object configured to complete a real-time transfer from a user account associated with the transfer request to a recipient account as indicated by the scannable indicia of the transfer request.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06N 5/02 - Représentation de la connaissance; Représentation symbolique
54.
Modeling of information technology failures of enterprise computing systems
Disclosed are techniques for using machine learning models to more reliably predict likelihoods of application failure. A model is trained to identify and display events that may cause high severity application failures. Logistic regression may be used to fit the model such that application features are mapped to a high severity event flag. Significant features of applications that relate to the high severity flag may be selected using stepwise regression. The identified applications may be displayed on a graphical user interface for review and reprioritization. Information may be ranked and displayed according to multiple different ranking criteria, such as one ranking generated by a first model, and another determined by one or more users. The multiple ranking criteria may be used to inform steps taken, and/or to retrain or tune the parameters of the model for subsequent predictions or classifications.
A computer-implemented method includes receiving, from a mobile device, a deposit request including a first check image for funds to be deposited into a user account, determining a risk level associated with the deposit request, requesting a second check image having a restricted endorsement based on the risk level, receiving the second check image having the restricted endorsement, determining a confidence level based on the restricted endorsement, and transferring the funds to the user account based on the confidence level.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
56.
Systems and methods for distributed management of negative certificates for blockchain-based value exchange transactions
A system and methods include a negative certificate authority for distributed management of negative certificates. An authorization restriction is associated with an untrusted user. A negative certificate generated for the untrusted user includes a public key associated with the untrusted user and an authorization restriction. The authorization restriction includes at least one global restriction, which is applicable to each consortium member that subscribes to the negative certificate. The authorization restriction includes at least one local restriction, which allows individual consortium members to further define their own locally applicable restrictions using the negative certificate authority. The negative certificate is accessible to each member of the consortium to enforce the authorization restriction against a transaction request. A secure contributor record including a unique cryptographically generated address is generated for each contributor. In some embodiments, the transaction request is a blockchain-based value exchange transaction, such as a payment transaction using fiat or math-based currency.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
57.
Systems and methods for onboarding customers through a short-range communication channel
Systems, methods, and apparatuses for enrolling a user with a product of an institution are provided. One or more processors of a user device perform operations including: establishing a short-range communication channel with a computing device associated with an institution based on a tap exchange; providing information to the computing device over the short-range communication channel, the information associated with an enrollment of a user with a product of the institution; and automatically ceasing the short-range communication channel based on at least one of a predetermined time period or a location of the user device.
Techniques are described for personalizing customer interactions using one or more machine learning models for customer communications. For example, a computing system includes a memory and one or more processors in communication with the memory. The one or more processors are configured to: retrieve, from a database in memory, one or more sets of emotion factor values for communication data associated with a customer over time; classify, using an emotion propensity model running on the one or more processors, the customer into an emotional profile according to the customer's typical emotional response during customer communications based on the one or more sets of emotion factor values for the communication data associated with the customer over time; and determine a probability that the customer will respond positively to a particular type of customer engagement based on the emotional profile for the customer.
Computer-implemented methods, systems, apparatuses, and computer program products are disclosed for financial transactions. An example method includes generating a user interface for presentation to a first user associated with a first user account and accessing first user financial data associated with the first user and the first user account. The method further includes generating one or more interrogatory objects requesting responsive inputs from the first user based upon the first user financial data and presenting the one or interrogatory objects to the first user in the user interface. The method also includes arranging a financial transaction based upon the first user financial data and one or more responsive inputs by the first user to the interrogatory objects. In response to authorization by the first user, the method further includes executing the financial transaction within the user interface.
A computer system for a change management intelligent reconciliation platform configured to support the change management process. The computer system includes a task mining agent, an intelligence reconnaissance service, an insight service, and a notification service. The task mining agent is programmed to passively log user actions related to a change request. The intelligence reconnaissance service filters the logged actions and identifies patterns and anomalies in user behavior. The insight service analyzes the differences between the filtered actions and one or more prescribed actions related to the change request, and generates one or more reconciliation insights based on the results of the analysis. The notification service generates one or more notifications regarding the generated reconciliation insights to provides valuable insights into user behavior data and to aid in identifying potential risks or issues during the change implementation process.
G06F 9/48 - Lancement de programmes; Commutation de programmes, p.ex. par interruption
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
61.
PREVENTING TRANSMISSION OF INVALID OR NON-COMPLIANT TRANSACTION DATA TO OTHER ENTITIES
Methods and systems disclosed herein relate to preventing transmission of invalid or non-compliant transaction data to other entities. A data-furnishing application accesses first transaction data associated with a first account of a first user. The data-furnishing application applies a plurality of data-processing rules to the first transaction data to determine whether the first transaction data is to be suppressed or furnished to another entity. The data-furnishing application determines, based on outputs generated by applying the plurality of data-processing rules, that the first transaction data violates a first condition associated with a first data-processing rule of the third rule category while satisfying a second condition associated with a second data-processing rule of the second rule category. The data-furnishing application generates a first report that excludes the first transaction data in response to determining that the first transaction data violates the first condition.
Various arrangements relate to a method performed by a processor of a computing system. An example method includes tokenizing a first value using a tokenization algorithm to generate a first token. The first value and first key are inputs of the tokenization algorithm. A message is generated. The message includes a first value identifier associated with the first value and a first key generation identifier associated with the generation of the first key. The message is associated with the first token. A second key is generated. A second value is tokenized using a tokenization algorithm to generate a second token. The second value and second key are inputs of the tokenization algorithm.
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A system including at least one processor and non-transitory computer-readable storage storing instructions that, when executed by the at least one processor, cause the system to: generate a context configuration module programmed to compose a user experience based on a user context and a registry of micro front-ends; and generate a rendering module programmed to render one or more micro front-ends from the registry of micro front-ends into a framework to deliver the user experience.
Systems, apparatuses, methods, and computer program products are disclosed for generating a predicted effect for a target user or a target cluster in response to a synthetic stimulus. An example method includes receiving a synthetic behavior prediction request and determining a cluster for a target user. The method further includes identifying a digital twin for a target user and generating a predicted effect for the target user in response to the synthetic stimulus and based on an inferred effect or predicted effect associated with the digital twin. The method further includes providing a predicted effect notification which includes the predicted effect generated for the target user.
Systems, apparatuses, methods, and computer program products are disclosed for generating a predicted effect for a target cluster in response to a synthetic stimulus. An example method includes receiving a synthetic behavior prediction request and generating a plurality of clusters, wherein each cluster is associated with a corresponding centroid position. The method further includes selecting the target cluster from the plurality of clusters and generating the predicted effect for the target cluster in response to the synthetic stimulus based on the centroid position corresponding to the target cluster. The method further includes providing a predicted effect notification.
G06F 18/2413 - Techniques de classification relatives au modèle de classification, p.ex. approches paramétriques ou non paramétriques basées sur les distances des motifs d'entraînement ou de référence
An example hub and registry module can be programmed to determine if a plurality of micro front-ends is conformant with one or more experience rules, register one or more of the plurality of micro front-ends in response to determining that the one or more micro front-ends are conformant with the one or more experience rules, compose one or more micro front-ends into an experience for a user, and monitor performance of the one or more micro front-ends within the experience.
Systems, methods, and computer program products are provided for disparate quantum computing (QC) detection. An example system includes QC detection data generation circuitry configured to generate a set of QC detection data. The example system further includes cryptographic circuitry configured to distort the set of QC detection data via a first PQC cryptographic technique, generate a pair of asymmetric cryptographic keys comprising a public cryptographic key and a private cryptographic key via a second PQC cryptographic technique, generate encrypted QC detection data from the distorted set of QC detection data based on the pair of asymmetric cryptographic keys, and destroy the private cryptographic key. The example system further includes data monitoring circuitry configured to monitor a set of data environments for electronic information related to the encrypted QC detection data.
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
68.
SYSTEMS AND METHODS OF EXCHANGING DIGITAL ASSETS USING A PUBLIC KEY CRYPTOGRAPHY (PKC) FRAMEWORK
Systems, methods, and computer-readable storage media of exchanging digital assets using a public key cryptography framework. One method includes encrypting at least one digital asset on an internal ledger and storing the encrypted at least one digital asset on an internal ledger. The method further includes receiving a signed exchange request signed by a first key corresponding with an encrypted digital asset on the internal ledger and providing, to an inter-provider ledger, a second key based on interfacing with the inter-provider ledger based on establishing a first data feed. The method further includes determining the signed exchange request was verified. The method further includes updating a central ledger by interfacing with of the central ledger via an application programming interface (API) based on establishing a second data feed and wherein at least one of a plurality of fields of the encrypted digital asset is a universal field.
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
Systems and methods for a user interface for preventing data transmission including: applying data processing rules to a set of transaction data to determine a furnishing decision for a subset of the set of transaction data, receiving a selection of one or more data processing rules of the set of data processing rules; determining, based on the selected data processing rules, a list of accounts comprising at least a first account and a second account, wherein the first account is associated with the first data of the subset and the furnishing decision for the first data, and the second account is associated with the second data of the subset and the furnishing decision for the second data; changing the furnishing decision for the first data; and automatically updating the furnishing decision for data associated with each account of the list of accounts.
Disclosed are example methods, systems, and devices that allow for generation and maintenance of a central identity databank for a user's digital life. The identity databank may include identity elements with payload values and metadata values corresponding immutable attributes of the user. A multifactor identity authentication protocol allows service provider devices to more reliably validate transactions with user devices via an identity system. The identity databank may include passwords, which may be generated by the identity system linked to user accounts and/or service providers. The passwords may be provided to service provider devices, eliminating the need for users to conceive of a multitude of varying passwords for the user's accounts.
Systems, methods, and apparatuses for providing a user a central location to manage permissions provided to third-parties and devices to access and use user data maintained by a financial institution are described. The central location serves as a central portal where a customer of the financial institution can manage all access to account information and personal information stored at the financial institution. Accordingly, the customer does not need to log into each individual third-party system or customer device to manage previously provided access to the customer information or to provision new access to the customer information. A user additionally is able to have user data and third-party accounts of the user deleted from devices, applications, and third-party systems via a central portal. Restrictions on how user data is used by devices, applications, and third-party systems can be imposed via a central portal.
G06F 3/04817 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport utilisant des icônes
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p.ex. des menus
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
G06F 16/215 - Amélioration de la qualité des données; Nettoyage des données, p.ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
A mobile device includes a processing circuit and a network interface structured to communicate data over a network. The mobile device transmits an instance of user activity information to a remote computing system. The mobile device receives and implements, from the remote computing system, a time-limited budget restriction on a user payment account. The time-limited budget restriction is based on a user spending profile that is based on the instance of the user activity information as compared to a baseline level of user spending and a baseline activity characteristic. The time-limited budget restriction comprises a threshold and a definite time period and is configured to prevent the user payment account from completing transactions above the threshold during the definite time period
A method for initiating a provisioning of a payment account to a mobile wallet includes generating, by a provider computing system on an initiating device, a user interface configured to initiate the provisioning of one or more payment accounts; receiving, by the provider computing system via the user interface, authentication information, wherein the authentication information authenticates a user associated with the mobile wallet; retrieving, by the provider computing system and based on the authentication information, account information associated with the user regarding one or more eligible payment accounts for provisioning; displaying, by the provider computing system via the user interface, a list of the one or more eligible payment accounts provisioning; and receiving, by the provider computing system via the user interface, a selection of the payment account from the list for provisioning to the mobile wallet.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/24 - Schémas de crédit, c. à d. de "paiement différé"
G06Q 20/26 - Schémas de débit, c. à d. de "paiement immédiat"
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
74.
MATH BASED CURRENCY POINT OF SALE SYSTEMS AND METHODS
Systems, methods, and computer-readable storage media utilized for processing open loop math based currency (“MBC”) credit card transactions at a financial institution. One method includes receiving, via an open loop processing network, a request for an MBC transaction and generating a first code uniquely identifying the MBC transaction. The method further includes transmitting, via the open loop processing network, the first code to the customer computer device and receiving, from an acquirer/processor computer system via the open loop processing network, a second code including the first code and a public and private key pair. The method further includes determining that the public key is registered and updating a first entry of an overlay ledger and a second entry of the overlay ledger. The method further includes transmitting, via the open loop processing network, a credit guarantee and transmitting, via the open loop processing network, a receipt of the MBC transaction.
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
Systems, methods, and apparatuses for aggregating merchant offers include a network interface structured to facilitate data communication via a network, an accounts database structured to store account information associated with accounts held by the provider, including a payment account associated with a customer, and a processing circuit comprising a processor and memory. The processing circuit is structured to receive a pre-filtered offer from an offer vendor, aggregate the pre-filtered offer with other received pre-filtered offers from multiple offer vendors to create an aggregated offer list, filter the aggregated offer list based on the account information for the customer to create a filtered offer list, generate a prioritized offer list based on the account information for the customer, and transmit the prioritized offer list to a customer device of the customer.
Systems, methods, and computer-readable storage media to trace obfuscated data of an entity. One system includes a data processing system including memory and one or more processors configured to generate a data structure including a plurality of cryptographic outputs, wherein each of the plurality of cryptographic outputs obfuscates data of at least one identifier of the entity. The processors are further configured to broadcast the data structure to a distributed ledger and receive a proof request associated with a customer's cryptographic output. The processors are further configured to generate a cryptographic proof dataset for the customer's cryptographic output and provide the cryptographic proof dataset.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
The present disclosure is directed to systems, methods, and non-transitory computer-readable media for generating, by a first node, an encrypted protected message. Generating the encrypted protected message includes generating an obfuscated message by intercalating a second message into the first message, generating a protected message by applying a plurality of data protection mechanisms to the obfuscated message, and generating the encrypted protected message by applying a plurality of confidentiality techniques to the protected message. The first node transmits to a second node the encrypted protected message using a plurality of communication channels.
At least one aspect of this disclosure is directed to method of scraping, by a first computing system, one or more first data sources of the first computing system, and one or more second data sources of one or more external computing systems, to compile a first dataset, standardizing, by the first computing system, the first dataset to generate a standardized dataset, applying, by the first computing system, a first artificial intelligence (AI) algorithm to assign labels to data entries of the standardized dataset, compiling, by the first computing system, the standardized dataset having the labels assigned to the respective data entries in a database, receiving, by an AI interface of the first computing system, a query from a computing device, and generating, by the first computing system, a response to the query for delivering via the AI interface to the computing device.
This disclosure describes techniques applied in an engineering analysis of energy asset information. In one example, this disclosure describes a method that includes collecting energy asset data maintained by a borrower; receiving information about a first set of parameters for use in evaluating the energy asset data maintained by the borrower; generating, based on the energy asset data and the first set of parameters, cash flow data for the borrower; calculating, based on the cash flow data, borrowing base data for the borrower; receiving information about a second set of parameters; generating, based on the cash flow data and the second set of parameters, adjusted cash flow data; and calculating, based on the adjusted cash flow data, updated borrowing base data for the borrower.
A computer-implemented method includes monitoring, by a mobile wallet computing system, a context of a user having a mobile wallet on a user mobile device, determining whether one or more rules for each one or more sub-wallets associated with the mobile wallet on the user mobile device are fulfilled based on the monitored context of the user, in response to at least one of the rules associated with a predefined sub-wallet being fulfilled, provisioning the predefined sub-wallet to the mobile wallet on the user mobile device, configuring a removal rule for the predefined sub-wallet, and removing the predefined sub-wallet from the mobile wallet on the user mobile device in response to the removal rule being fulfilled.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
A currency exchange platform for conducting currency exchanges and transactions in a social pool is described. The currency exchange platform receives a request for an amount of a first currency from a first user in a social pool. The request includes an indication of a type of the request and a preference for delivery of the funds. The currency exchange platform then matches the request with a matching account in the social pool, and, responsive to the preference for delivery indicating an automated teller machine (ATM) for delivery of the funds, delivers at least a portion of the requested amount of the first currency to the first user via the ATM.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
82.
Authentication circle shared expenses with extended family and friends
Systems and methods for providing authentication circles to pursue financial goals and/or share expenses with others are provided. One or more provider computing systems are communicatively coupled to one or more user devices. Users may join a circle and make contributions via electronic messages that may allow for acceptance in a one-click fashion. Members may, for example, plan for and share expenses for a trip and compare the expenses with budgets.
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
G06Q 20/16 - Paiements effectués par le biais de systèmes de télécommunication
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 50/00 - Systèmes ou procédés spécialement adaptés à un secteur particulier d’activité économique, p.ex. aux services d’utilité publique ou au tourisme
83.
Methods and systems for product display visualization in augmented reality platforms
Using augmented reality (AR) to display information regarding products and services that are comparable or related to a product or service that a user of the AR device is viewing or may consider purchasing. For example, in response to scanning a particular product, an AR device may display one or more products comparable or related to the scanned product. These products may be presented to the user as a digital visualization wall of products, wherein the digital visualization wall is dynamically rendered in real-time and viewable from the AR device.
A provider institution computing system determining a goal of the customer of the provider institution, determining context information related to the goal, generating a first set of sub-goals for the goal of the customer, the first set of sub-goals defining a first group of steps required to be met by the customer to reach the goal, determining a current status of the customer relating to the first set of sub-goals and the goal, generating a second set of sub-goals for the goal of the customer corresponding to a first change in the context information, the second set of sub-goals being different than the first set of sub-goals, wherein the goal remains unchanged upon generating the second set of sub-goals, and responsive to determining that at least one transaction fails to conform with the goal, blocking, by the artificial intelligence circuit, the at least one transaction.
A machine learning model engine executes a machine learning model that has been trained with training data and processes scoring data to generate predictions. A machine learning model analyzer is configured to evaluate the machine learning model. The machine learning model analyzer determines a plurality of drift metrics for the plurality of input variables to compare the distribution of the training data to the distribution of the scoring data. Each of the plurality of drift metrics is associated with one of the plurality of input variables. The machine learning model analyzer also determines an overall drift metric for the combination of the input variables. The plurality of input variables are weighted in the overall drift metric in accordance with the plurality of feature importances. The machine learning model analyzer generates an alert based on the overall distribution of the training data relative to the overall distribution of the scoring data.
G06F 17/17 - Opérations mathématiques complexes Évaluation de fonctions par des procédés d'approximation, p.ex. par interpolation ou extrapolation, par lissage ou par le procédé des moindres carrés
86.
Biometrics-based e-signatures for pre-authorization and acceptance transfer
A method includes receiving an agreement associated with a signing party by a computing system, receiving a biometric sample captured from the signing party by the computing system, generating a hash of the agreement by the computing system, and receiving a secret knowledge factor by the computing system. The method further includes generating an encryption key using the secret knowledge factor as an input to a password authenticated key exchange protocol by the computing system and generating a biometric-based electronic signature token by encrypting the biometric sample and the hash of the agreement with the encryption key by the computing system. The method further includes generating a smart contract based on the agreement by the computing system. The smart contract includes terms of the agreement and the biometric-based electronic signature token. The biometric-based electronic signature token providing biometric-based pre-authorization to be initiated by the smart contract.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
H04L 9/14 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
87.
Systems and methods for rewards integration as a funding account
Systems, methods, and apparatuses for processing a rewards transaction including an accounts database storing information associated with accounts held by a financial institution including a payment account associated with a customer, a rewards account database storing information associated with reward accounts, including a rewards account associated with the customer, and a processing circuit. The processing circuit is structured to receive transaction details that define a rewards transaction associated with the rewards account, receive a rewards transaction request associated with the rewards account, the rewards transaction request including a rewards amount and recipient details, debit an amount of points from the rewards account maintained by the financial institution and associated with the customer, where the amount of points are less than or equal to the rewards amount, and complete the rewards transaction without converting the rewards amount to currency.
A system, computer-implemented method, and computer-readable storage media for using a client application. A method can include receiving an image from a mobile device based on receiving a first user selection of an image capture function element displayed via the client application on a mobile device and a subsequent capturing of the image by the mobile device. The image may include a code. The method can further include determining a product associated with the code. The method can further include receiving a second user selection and a product purchase option. The method can further include in response to receiving the product purchase option, transferring a payment for the product to a merchant from an account based on information associated with the merchant and the product purchase option. The method can further include causing the client application to display a purchase confirmation.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
Systems, apparatuses, methods, and computer program products are disclosed for automatically deriving data transformation criteria. An example method includes receiving, by communications circuitry, a source dataset and a target dataset and identifying, by a model generator, a target variable. The example method further includes training, by the model generator, a decision tree for the target variable using the source dataset and the target dataset such that the trained decision tree can predict a value for the target variable from new source data. The example method further includes deriving, by a derivation engine, a set of parameters and pseudocode for producing the target variable from the source dataset.
G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
G06F 18/214 - Génération de motifs d'entraînement; Procédés de Bootstrapping, p.ex. ”bagging” ou ”boosting”
G06F 18/2415 - Techniques de classification relatives au modèle de classification, p.ex. approches paramétriques ou non paramétriques basées sur des modèles paramétriques ou probabilistes, p.ex. basées sur un rapport de vraisemblance ou un taux de faux positifs par rapport à un taux de faux négatifs
G06N 5/02 - Représentation de la connaissance; Représentation symbolique
A computer system selects a default payment account based on at least one of (a) account balance information for a plurality of accounts of a user or (b) user preferences received from the user. The computer system receives a request for a transaction to transfer funds to a recipient and determines that the transaction causes the account balance of the default payment account to decrease below a user-defined threshold minimum value. The computer system generates a screen display including a link associated with a second account and provides the screen display to a mobile device of the user. The computer system receives a selection of the link associated with the second account, generates an optical code associated with the second account that incorporates a tokenized account number of the second account, and transmits the optical code to the mobile device for the transaction.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
This disclosure describes techniques that include validation or other assessments of digital systems, such as machine learning models and other statistical models. In one example, this disclosure describes a method that includes receiving, by a validation computing system and from a development system, a request to perform a test on a model configured to execute on the development system; outputting, by the validation computing system to the development system and in response to the request, an instruction; enabling the development system to process the instruction; receiving, by the validation computing system, test response data; evaluating, by the validation system, the test response data.
A user computing device comprises a network interface, an input/output (“I/O”) device, an imaging device, and a processing circuit storing instructions that cause a processor to receive a set of user photographs, determine an emotive state of the user in each of the photographs in the set of user photographs, categorize each of the photographs based on the determined emotive states of the user where each of the photographs is categorized into at least one of a user positive emotion category and a user negative emotion category, receive spending behavior data indicative of a spending behavior of the user, generate an advertisement based on the received spending behavior data where the advertisement includes a photograph from the set of user photographs categorized within at least one of the user positive emotion category and the user negative emotion category, and present the advertisement to the user via the display device.
Systems and techniques for social responsibility load balancer are described herein. First user data for a first user and second user data for a second user is obtained. The first user data is aggregated into a first dataset and the second user data is aggregated into a second dataset. The first dataset and the second dataset are evaluated using a responsibility prediction learning model to determine a set of responsibilities. A target responsibility delta is calculated. The set of responsibilities are processed using a responsibility balancing algorithm to sort the set of responsibilities into the first responsibility assignments and the second responsibility assignments. A current delta is calculated between the first responsibility assignments and the second responsibility assignments. It is determined that the current delta is equal to the target responsibility delta. A user interface is generated to output the first responsibility assignments and the second responsibility assignments.
Systems and methods for establishing a connection between a first computing system and a first application hosted on one or more remote servers may include receiving, from a computing device, a request to establish a new account with the first computing system, determining a dataset for establishing the new account with the first computing system, the dataset including a first data entry and a second data entry, polling one or more servers of the first computing system for first data to satisfy the first data entry, transmitting a query via the connection to an application program interface (API) for the first application for second data to satisfy the second entry, and establishing the new account with the first computing system based on the first data and the second data.
An example computer system for implementing a lifecycle of a model can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to create: an orchestration service programmed to create a workflow for model execution; and a registration service programmed to provide governance for the workflow; wherein the orchestration service and the registration service are microservices, and the microservices communicate programmatically to facilitate the model execution.
An process analysis computing system receives input data that identifies a subject-matter expert (SME) process, such as an SME process that requires detailed information regarding a very large quantity of information about the SME process. In the process analysis computing system, a scenario selection engine extracts process factors and user factors from the input data. Based on the process factors and user factors, the scenario selection engine determines initial schedule data describing event stages and milestone stages included in the SME process, and also generates user-specific process schedule data based on a modification of the initial schedule data. A user-specific execution engine in the process analysis computing system receives the user-specific process schedule data. Based on a milestone stage dependency in the user-specific process schedule data, the process analysis computing system controls access to a requested resource associated with the SME process.
A computer-implemented method includes generating, by a computing system, a message including a status and editable data regarding a transaction request. The status indicates a potential delay related to the editable data. The computer-implemented method further includes receiving, by the computing system, an indication regarding the editable data. The indication includes a change to the editable data that remedies the potential delay by correcting information required to complete the transaction request.
A computing system includes an account associated with a user of the system, and a server. One or more processors are configured to receive user information from a user computing device, wherein the user information is related to a user of the account, determine, based on the user information, one or more user settings preferences related to a second computing device, receive an information request, wherein the information request includes a request to send the one or more user settings preferences to the second computing device, and to send the one or more user settings preferences to the second computing device, wherein the one or more user settings preferences are useable by the second computing device to adjust one or more settings of the second computing device.
Systems and methods may generally be used to configure applications, specifically cloud-based applications or software as a service (SaaS) applications. An example method may include receiving data indicating a performance condition of the network environment. The example method may include classifying the performance condition into one of at least two categories, where the two categories include a normal category indicating a normal condition of the network environment and at least one non-normal category indicating at least one non-normal condition of the network environment. The example method can further include setting configuration parameters corresponding to a selected one of the at least two categories, responsive to detecting at least one performance condition corresponding to the selected category. The application can subsequently be operated in the network based on the configuration parameters.
H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p.ex. en réponse aux événements dans le réseau
H04L 41/0806 - Réglages de configuration pour la configuration initiale ou l’approvisionnement, p.ex. prêt à l’emploi [plug-and-play]
A relational database for migrating data in a workflow between databases in different environments. Graphical user interfaces are generated through which database management scripts are automatically generated for migrating data between environments. Generally, the database management scripts are compatible with database attributes. The database management scripts are executed to update data tables stored on the databases.