A system for authenticating a login request includes a computing device including a processing circuit configured to receive the login request including a user identifier associated with a user, transmit a request for location information of a user device associated with the user to indicate a location of the user device, receive, from the user device, a location-based modifiable digital fingerprint comprising an encoded value for a location of the user device where the updated location-based modifiable digital fingerprint is received by the computing device based on a change in the location of the user device, verify the user device based on a change to the encoded value for the location of the user device, and provide the user access to the computing device.
A method for preventing the double-spending of digital currency that transfers between multiple distributed ledger technology (DLT) networks. The method includes detecting a request to transfer a first digital currency from the a DLT network of a first type to a second DLT network of a second type. The method further includes, in response to an indication from an exchange node that the first digital currency is to be destroyed, destroying the first digital currency from the first DLT network. The method further include creating a second digital currency on the second DLT network. Creating the second digital currency on the second DLT network further includes attaching a serial number to the second digital currency.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/06 - Circuits privés de paiement, p. ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
3.
ASSESSING SECURITY OF SERVICE PROVIDER COMPUTING SYSTEMS
This disclosure describes techniques that include assessing whether various service providers, such as cloud service providers or SaaS providers, are properly maintaining sensitive data (e.g., private, confidential, and/or non-public information) that is entrusted to them. In one example, this disclosure describes a method that includes collecting, by a computing system, information about interactions with a service provider computing system; identifying, based on the information about the interactions, a plurality of network paths, each associated with a data object accessed at the service provider computing system; requesting, based on the plurality of network paths, data from the service provider computing system; receiving a response; determining, based on the response, whether the response includes sensitive information; and taking action based on whether the response includes sensitive data.
Systems and methods for an adaptable user interface based on a user's neurological condition, user experience level, and emotional state including: selecting a neurological condition associated with a user; determining, based on historical user data, a user experience level; generating a user interface based on the selected neurological condition and the user experience level; receiving, from a tracer configured to log a user's activity, a tracking log comprising information regarding the user's activity; determining a behavioral metric by analyzing the tracking log using a machine learning model trained by processing prior user activity, wherein the behavioral metric represents an emotional state of the user; and modifying one or more elements of the user interface based on the behavioral metric.
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect
G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
G06V 10/774 - Génération d'ensembles de motifs de formationTraitement des caractéristiques d’images ou de vidéos dans les espaces de caractéristiquesDispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant l’intégration et la réduction de données, p. ex. analyse en composantes principales [PCA] ou analyse en composantes indépendantes [ ICA] ou cartes auto-organisatrices [SOM]Séparation aveugle de source méthodes de Bootstrap, p. ex. "bagging” ou “boosting”
G06V 40/16 - Visages humains, p. ex. parties du visage, croquis ou expressions
G06V 40/20 - Mouvements ou comportement, p. ex. reconnaissance des gestes
G10L 15/06 - Création de gabarits de référenceEntraînement des systèmes de reconnaissance de la parole, p. ex. adaptation aux caractéristiques de la voix du locuteur
5.
SYSTEMS AND METHODS FOR CURRENCY EXCHANGES USING A LEDGER ARCHITECTURE
Various examples, systems and methods are disclosed relating to managing currency exchanges. One system is a data processing system including memory and one or more processing circuits configured to identify one or more assets of an asset class corresponding to an asset grouping framework and generate one or more smart contracts including executable code to monitor an off-chain condition of the one or more assets and exchanges rates. The one or more processing circuits are further configured to broadcast the one or more smart contracts to one or more distributed ledgers and receive, from the one or more smart contracts, an indication the off-chain condition is satisfied. The one or more processing circuits are further configured to process an exchange conversion from the first currency to the second currency based on the current exchange rate and transferring the second currency to a wallet of the receiving party.
G06Q 40/04 - TransactionsOpérations boursières, p. ex. actions, marchandises, produits dérivés ou change de devises
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
6.
SYSTEMS AND METHODS FOR DETECTING AND RESPONDING TO TRANSACTION THREATS CAUSED BY GEOPOLITICAL EVENTS
Systems and methods are described herein for detecting and responding to transaction threats caused by geopolitical events. Such systems and methods may use a provider computing system to receive a transaction request and to receive third-party data from one or more third-party data sources. The provider computing system may identify, using a trained artificial intelligence (AI) model configured to ingest the third-party data, one or more geopolitical events based on the third-party data. The provider computing system may determine, based on the one or more identified geopolitical events, a threat associated with the transaction request and a severity of the threat. In response to the transaction request and based on the severity of the threat, the provider computing system may initiate a remedial action. The remedial action may include denying the transaction request, delaying the transaction request, or requiring a user-verification of the transaction request.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
7.
ENHANCING BUSINESS INTERACTIONS USING A SMART WALLET
An example computer system for enhancing device interaction can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: receive a virtual identification (ID) by a smart wallet; determine an interaction process to initiate with a client device; query the smart wallet to access user information of the virtual ID based on a determined interaction process; and initiate the interaction process with the client device using the user information of the virtual ID.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
An example computer system for ingestion of data can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: authenticate a user to allow for definition of a configuration file for the ingestion of the data; receive the configuration file, with the configuration file defining parameters for the ingestion of the data; extract the data through an application programming interface according to the parameters of the configuration file; and perform remediation on an error record in the data according to an error code associated with the error record.
An example computer system for updating user account information can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: receive a virtual identification (ID), the virtual ID including user information; store the virtual ID within a smart wallet; connect one or more user accounts to the smart wallet; compare the user information of the virtual ID with second user information of the one or more user accounts; determine if the user information and the second user information are different; and update the one or more user accounts by replacing the second user information with the user information.
Systems and methods are directed to automatic tracking and categorization of transactions in real-time for transaction record regeneration. A smart wallet system receives, via a smart wallet mobile system activated on a mobile device, transaction data for a transaction. Responsive to receiving the transaction data, a tracker component performs, in real-time as the transaction is completed, operations comprising determining whether an item of the transaction is to be categorized into a tracker category and categorizing the item of the transaction into the tracker category in response to determining that the item of the transaction is to be categorized into the tracker category. Responsive to a record trigger event, a record component of the smart wallet system generates or updates a transaction record for the tracker category. A submission component submits the transaction record to a third-party system, which triggers the third-party system to process the transaction record.
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
Systems and methods for operating an artificial intelligence and machine learning model to generate annotations of data and to generate training datasets is disclosed. One disclosed system includes one or more processors configured to: assign a task to a machine learning model; receive an output from the machine learning model associated with the task; compare the output to task data associated with a user performing the assigned task; and when there is a difference between the output of the machine learning model and the task data, generate an annotation.
Systems, apparatuses, methods, and computer program products are disclosed for obtaining relevant data from an unstructured data source. An example method includes extracting relevant data that is intermixed with extraneous data using natural language processing. In order to do so, text from the unstructured data source may be tokenized and each token may be compared to an identifier associated with the relevant data. A similarity metric may be determined between each token and the identifier in order to classify tokens as similar or dissimilar to the identifier. All tokens classified as similar to the identifier may be aggregated in order to obtain relevant data.
A system includes a processing circuit configured to receive a first input from a user device. The processing circuit is further configured to determine a first task that the processing circuit is authorized to autonomously perform based on the first input. The processing circuit is further configured to autonomously perform the first task based on determining the processing circuit is authorized to autonomously perform the first task. The processing circuit is further configured to receive a second input from the user device. The processing circuit is further configured to determine a second task that the processing circuit is unauthorized to autonomously perform based on the second input. The processing circuit is further configured to provide the second input to a human agent device associated with a human agent based on determining the processing circuit is unauthorized to autonomously perform the second task.
H04L 51/02 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p. ex. courriel en utilisant des réactions automatiques ou la délégation par l’utilisateur, p. ex. des réponses automatiques ou des messages générés par un agent conversationnel
G06F 40/35 - Représentation du discours ou du dialogue
Systems and techniques are provided to facilitate autonomous financing decision-making by deploying an autonomous decision bot within a client system. These systems and techniques enable the autonomous decision bot to access financial data relevant to a financing decision directly from the client system. The autonomous decision bot analyzes the accessed financial data according to financing rules established by a financial institution associated with the client system to determine a financing decision without transmitting the accessed financial data to the financial institution. The system facilitates the communication of the financing decision to the financial institution and, upon receipt of a confirmation from the financial institution, outputs an indication of the financing decision to the client system.
Various systems and methods for analyzing business compliance are described herein. An electronic online system is configured to receive, from a user of the electronic online system, an indication of a law for analysis; parse the law to produce law chunks; receive, from the user, an indication of a business policy for analysis; parse the business policy to produce policy chunks; compare the law chunks with the policy chunks to determine similarity scores for respective pairs of law chunks and policy chunks; and present law chunks that have similarity scores less than a threshold similarity score to the user.
Systems, apparatuses, methods, and computer program products are disclosed for automatic change evidence processing and change implementation using a three-level data taxonomy. An example method includes receiving a change request comprising a project identifier and a change request type. The example method further includes generating a support container, wherein the support container references the project identifier, and the support container is associated with a support container identifier. The example method further includes generating one or more evidentiary requirements that reference the support container identifier and are each associated with an evidentiary domain. The example method further includes receiving an evidentiary data record associated with the change request and identifying an evidentiary requirement associated with the evidentiary data record. The example method further includes updating the identified evidentiary requirement to reference the evidentiary data record.
System and techniques to use a document repository to enhance natural language processing are described herein. Text can be obtained from a conversation between two entities (e.g., a person, chatbot, etc.) in which one entity is making a request that may not be clear. The nature of the request is determined by semantically matching a part of the text to a document in a document repository. The nature of the document reveals the nature of the request in the text. The fields of the document can be used to provide prompts to continue the conversation to gather information used to fulfill the now identified request.
G06F 16/383 - Recherche caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
Systems, apparatuses, methods, and computer program products are disclosed for simulating future asset performance based on consumable media content. An example method includes monitoring a user device for receipt of a data stream comprising media content. The example method further includes receiving a simulation request requesting a prediction model for an asset of a user portfolio based on the media content. The example method further includes generating a prediction model output indicating future performance of the asset of the user portfolio based on the media content and historical data. The example method further includes generating a natural language report representative of the future performance of the asset of the user portfolio. The example method may further include transmitting the natural language report to the user device.
Systems, apparatuses, methods, and computer program products are disclosed for establishing an ad hoc group and performing autonomous ad hoc group operations. An example method includes creating an ad hoc digital representation and selecting an invitation region to transmit an ad hoc group invitation to devices associated with individuals within the invitation region. The example method further includes receiving response decisions from the devices associated with the individuals within the invitation region and performing a digital authentication operation to authenticate devices for which the response decisions indicate acceptance of the invitation. The example method further includes adding authenticated devices to the ad hoc group and performing autonomous group operations. The autonomous group operations may comprise at least one or more of a group message broadcast, a group fund transaction, a group member geolocation tracking, a group member request handling, or a group feedback collection.
Systems and methods are described herein for prevalidating transactions using application programming interfaces (APIs). Such systems and methods may use a provider computing system to receive a transaction request from a user device associated with a user account held by a provider associated with the provider computing system. The user account may include account information, and the transaction request may include first transaction data and second transaction data. The provider computing system may determine an objective of the transaction request based on the account information. The provider computing system may perform a first verification including verifying, using a first API, the first transaction data based on the account information. The provider computing system may perform a second verification including verifying, using a second API, the second transaction data based on the objective. The provider computing system may validate the transaction request based on the first verification and the second verification.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
21.
SYSTEM AND METHOD FOR CONTEXT-AWARE VIRTUAL ASSISTANT
Systems and methods are provided. In one example, a method includes presenting, via a graphical user interface (GUI), a GUI screen on a display of a computing device, wherein the GUI screen is configured to present textual information, and capturing an annotation made by a user on a portion of the GUI screen, wherein the annotation comprises a textual annotation, a drawing annotation, or a combination thereof. The method also includes deriving a context for the annotation based at least on the portion of the GUI screen having the annotation, wherein the context comprises a subset of the presented textual information, and creating a data store query based on the context and on the annotation. The method further includes querying, via the data store query, a data store, and presenting, via the GUI, a result based on the querying of the data store.
G06F 3/04845 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p. ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs pour la transformation d’images, p. ex. glissement, rotation, agrandissement ou changement de couleur
G06F 3/04883 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p. ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p. ex. des gestes en fonction de la pression exercée enregistrée par une tablette numérique utilisant un écran tactile ou une tablette numérique, p. ex. entrée de commandes par des tracés gestuels pour l’entrée de données par calligraphie, p. ex. sous forme de gestes ou de texte
G06Q 40/02 - Opérations bancaires, p. ex. calcul d'intérêts ou tenue de compte
22.
SYSTEMS AND METHODS FOR TRACKING NFT-BACKED INSTRUMENTS
Systems, apparatuses, methods, and computer program products are disclosed for tracking NFT-backed instruments. An example method includes identifying a plurality of NFTs on a distributed blockchain ledger, associating an instrument with the cryptographic NFTs, determining a value of the cryptographic NFTs based on transactions on the distributed blockchain ledger that are associated with one or more of the cryptographic NFTs, monitoring the distributed blockchain ledger to detect transaction data of a block of the distributed blockchain ledger, the transaction data indicative of a transaction associated with a first cryptographic NFT of the cryptographic NFTs, determining a modified value of the cryptographic NFTs responsive to the transaction data, and terminating the instrument associated with the cryptographic NFTs in response to a comparison of the modified value to a predetermined threshold value indicating that the modified value is less than the predetermined threshold value.
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
An electronic online system is configured to receive, at the electronic online system, an expression of a use case; determine, using a machine-learning technique with the expression of the use case as input, a data source and a time-to-live (TTL) value to satisfy the use case; and configure a data cache to store data received from the data source with the TTL value.
Systems and techniques may be used to perform multi-capture for remote deposit via scanner. For example, a technique may include scanning a first side and a second side of a plurality of checks, and comparing geometrical features of the first side of each check of the plurality of checks to geometrical features of the second side of each check of the plurality of checks. Based on the comparison, the technique may include selecting an image from a first set of respective individual images that corresponds to an image from a second set of respective individual images to form a pair of images, the pair of images representing a single check of the plurality of checks, and outputting the pair of images.
G06T 7/62 - Analyse des attributs géométriques de la superficie, du périmètre, du diamètre ou du volume
G06T 7/70 - Détermination de la position ou de l'orientation des objets ou des caméras
G06V 10/44 - Extraction de caractéristiques locales par analyse des parties du motif, p. ex. par détection d’arêtes, de contours, de boucles, d’angles, de barres ou d’intersectionsAnalyse de connectivité, p. ex. de composantes connectées
Systems and techniques may be used to perform multi-capture for remote deposit via video. For example, a technique may include capturing a first video of a first side and a second video of the second side of each of a plurality of checks, and extracting a first set of respective individual images of the first side and the second side of each check of the plurality of checks. The technique may include comparing geometrical features of the first side of each of the plurality of checks to geometrical features of the second side of each of the plurality of checks, and based on the comparison, selecting an image from the first set of respective individual images that corresponds to an image from the second set of respective individual images to form a pair of images.
G06T 7/62 - Analyse des attributs géométriques de la superficie, du périmètre, du diamètre ou du volume
G06T 7/70 - Détermination de la position ou de l'orientation des objets ou des caméras
G06V 10/44 - Extraction de caractéristiques locales par analyse des parties du motif, p. ex. par détection d’arêtes, de contours, de boucles, d’angles, de barres ou d’intersectionsAnalyse de connectivité, p. ex. de composantes connectées
Various examples are directed to systems and methods for detecting potentially fraudulent voice calls to a financial services institution. A computing system may receive an indication of a voice call placed by a voice caller to an operator. The computing system may generate a network address indicator describing a network location. The network address indicator may be provided to the voice caller. The computing system may receive an indication of a financial services account indicated by the voice caller. The computing system may also receive an indication of an access to the network location by a remote device. The computing system may determine, using the indication of the access to the network location, a first location associated with the remote device and determine that the first location does not match a second location associated with the financial services account. The computing system may generate an alert indicating that the voice call is potentially fraudulent.
H04M 3/51 - Dispositions centralisées de réponse aux appels demandant l'intervention d'un opérateur
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
H04W 4/14 - Services d'envoi de messages courts, p. ex. SMS ou données peu structurées de services supplémentaires [USSD]
27.
MULTI-TIERED SYSTEM FOR DETECTING AND REDUCING UNAUTHORIZED NETWORK ACCESS
Embodiments are disclosed for detecting and responding to potentially fraudulent transactions and other network access events via a system comprising a three-tiered network architecture. An example system comprises one or more user equipment devices configured with a thin client application (a first tier). The one or more user equipment devices are capable of communicating with a respective local authority controller and a local knowledge base (the second tier). The one or more local authority controllers and local knowledge bases are configured to interact with a master authority controller and master knowledge base (the third tier) to enable the efficient assessment of potentially localized fraudulent network activity and the passing of network access rule sets amongst the devices in each tier. Corresponding apparatuses and methods are also provided.
Various examples are directed to computer-implemented systems and methods for providing a home lending data control product. A method includes receiving data from one or more data sources, and constructing a configuration framework for ingesting, conforming and curation of data processing of the received data. Confirmation of receipt and correct format of the data is provided based on the configuration framework. The method also includes determining that the data has not been modified in transit, and confirming that the data is from a proper timeframe based on a file header or content of the data. The method further includes determining that the data has not been previously processed based on a comparison with previously processed data, transforming a format of the data based on the configuration framework and based on the one or more data sources, and storing the data in a data lake configured for centralized processing.
A data protection system includes non-transitory memory storing instructions that, when executed by a processing circuit comprising one or more processors, cause the processing circuit to designate, for a user profile, at least one experience provider with which to share user data, generate an access token including a configuration enabling access to the data protection system for the at least one experience provider to access the user data, and provide the access token to the at least one experience provider.
Examples are directed to systems and methods that provide a token having a corresponding token identifier. The token is associated with a user and stores electronic data having a plurality of data sets associated with the user. The token is configured to interface with each of a plurality of disparate electronic platforms and map relationships of the user with ones of the plurality of disparate electronic platforms. The token can be used to identify a first data set of the plurality of data sets having data that corresponds to the data request and provide the first data set to a recipient while simultaneously masking a second data set of the plurality of data sets from the recipient.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
31.
EXCHANGE MODELER USING AN EXCHANGE PROTECTION ARCHITECTURE
Systems, methods, and computer-readable storage media for exchange modeling. One system includes a processing circuit. The processing circuits includes one or more processors and memory storing instructions that, when executed, cause the processing circuit to train a plurality of protection models of an entity using a training input to output a plurality of protection responses. The instructions further cause the processing circuit to receive exchange data of an exchange of a first entity. The instructions further cause the processing circuit to model, using an entity protection model, the exchange data and third-party data to generate an entity protection response. The instructions further cause the processing circuit to model, using at least one of an entity relationship model or an entity sector model, to generate at least one strategy response. The instructions further cause the processing circuit to receiving a feedback response to the entity protection response or the strategy response.
Systems and techniques for are described herein. Profile data is obtained for a user and an organization and preprocessed to generate a normalized data set. A generative adversarial network is trained using features extracted from the normalized data set. A set of synthetic profiles are generated using the generative adversarial network. A set of healthcare plan recommendations are derived using the set of synthetic profiles. Justification context is determined for each healthcare plan recommendation. An interactive healthcare plan recommendation user interface is generated comprising the set of healthcare plan recommendations and the justification context for output on a display device.
G16H 50/20 - TIC spécialement adaptées au diagnostic médical, à la simulation médicale ou à l’extraction de données médicalesTIC spécialement adaptées à la détection, au suivi ou à la modélisation d’épidémies ou de pandémies pour le diagnostic assisté par ordinateur, p. ex. basé sur des systèmes experts médicaux
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G16H 50/30 - TIC spécialement adaptées au diagnostic médical, à la simulation médicale ou à l’extraction de données médicalesTIC spécialement adaptées à la détection, au suivi ou à la modélisation d’épidémies ou de pandémies pour le calcul des indices de santéTIC spécialement adaptées au diagnostic médical, à la simulation médicale ou à l’extraction de données médicalesTIC spécialement adaptées à la détection, au suivi ou à la modélisation d’épidémies ou de pandémies pour l’évaluation des risques pour la santé d’une personne
System and techniques to track the ingestion of resources described herein. A device can receive a connection from a reporting entity at an intake interface of the device. A set of data that includes a representation of a resource involved in a transaction can be received over the connection. This received data can be mapped via an intake interface into fields of a template. Based on a first field of the template, a connection to an external service can be made to retrieve a value to complete a second field of the template. A ruled engine can be applied to modify the first field of the template or the second field of the template to create a compliant template that can be aggregated with other compliant templates to produce a report of a class of transactions that includes the transaction.
Systems, apparatuses, methods, and computer program products are disclosed for secure utilization of quick response (QR) codes. An example method includes obtaining a key known to the initiating device and a participating device, and identifying, by QR code processing circuitry of the initiating device, a payload to be encoded in a QR code. The example method further includes generating, by security circuitry of the initiating device and based on the payload and the key, a secure character string, creating, by the QR code processing circuitry of the initiating device, the QR code using the secure character string, and outputting the QR code by the communications hardware of the initiating device.
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p. ex. forme, nature, code
Systems, apparatuses, methods, and computer program products are disclosed for providing interoperability between private and public blockchains. An example method for providing interoperability between private and public blockchains includes, by a key exchange controller (KEC): receiving access key generation instructions; generating, based on the key generation instructions, an access key comprising access credentials; transmitting the access key to an access key target on a public blockchain network; receiving, from the access key target, a access request including the access credentials and information indicating a private blockchain on a private blockchain network; and providing, in response to receiving the access request, access for the access key target to access the private blockchain of the private blockchain network.
An application management system using Remote Procedure Call (RPC) frameworks can include enhancements. These enhancements can be used on files that are distributed to engines throughout the RPC framework. Enhancements can be stored in an enhancement server. The enhancements can include password detection, logo detection, cleartext detection, or other checks or modifications that may be useful to a variety of engines in the RPC framework. The enhancements can be used to ensure that unencrypted sensitive data, passwords, or files with confidential information (as indicated by logos or other pictorial markings) are not distributed throughout the RPC framework.
Systems and methods are disclosed herein for providing entropy to clients. An example method includes receiving a first datagram comprising a first request for entropy and a set of requirements comprising an indication of an endpoint device, an indication of a number of bits of entropy, and an indication of a quality of the entropy. The example method further includes determining, by routing circuitry, whether a first entropy source from a set of entropy sources meets the set of requirements and determining, by priority circuitry, a first priority value based on the first request. The example method further includes determining, by the priority circuitry, whether the first priority value is a greatest available priority value and causing generation, by entropy quality circuitry, of an admixture of a plurality of entropy sources from the set of entropy sources. The example method further includes providing the admixture to the endpoint device.
Systems, methods, and computer-readable storage media for global modeling. One system includes a first data structure, a second data structure, a machine learning (ML) system and a processing circuit. The processing circuits includes one or more processors and memory storing instructions that, when executed, cause the processing circuit to determine trends corresponding to the one or more accounts for a third-party entity of the plurality of entities and transaction types. The instructions further cause the processing circuit to receive a request for a report. The instructions further cause the processing circuit to retrieve an exchange history. The instructions further cause the processing circuit to determine the corresponding data item. The instructions further cause the processing circuit to generate the report according to the request, the report including a content item including information corresponding to the trend map for the subset of third-party entities.
G06F 30/27 - Optimisation, vérification ou simulation de l’objet conçu utilisant l’apprentissage automatique, p. ex. l’intelligence artificielle, les réseaux neuronaux, les machines à support de vecteur [MSV] ou l’apprentissage d’un modèle
39.
SYSTEMS AND METHODS FOR DYNAMIC INCOMING RESOURCE ALLOCATION DELAY
A provider computing system includes at least one processing circuit. The processing circuit performs operations including receiving an indication of an incoming resource allocation associated with a user; retrieving user information relating to the incoming resource allocation; generating, based on the user information, a scale including a movable element for display via a user device associated with the user, the scale including one or more durations and one or more rewards associated with each of the one or more durations; updating and providing the generated scale based on at least one of the user information or contextual information; receiving, from the user via the user interface, a selected duration of the one or more durations; withholding the incoming resource allocation for the selected duration; and transmitting the incoming resource allocation and a reward subsequent to the selected duration.
G06Q 40/02 - Opérations bancaires, p. ex. calcul d'intérêts ou tenue de compte
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p. ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
G06Q 30/0207 - Remises ou incitations, p. ex. coupons ou rabais
Systems and methods for capturing and tracking requests are provided. A method includes receiving a communication from a third-party computing device including request to interact with an application hosted by an enterprise and transforming the communication into a structured format thereby generating a request data object. The request data object includes a unique user identifier and user metadata associated with the request. The method also includes generating an enhanced request data object and storing the enhanced request data object into a transaction tracking database. The method includes processing the request data object, updating the enhanced request data object responsive to the processing, and outputting a control signal associated with one or more status indicators of the enhanced request data object.
Systems and methods are described herein for generating improved graphical user interfaces for displaying account information. Such systems and methods may use a provider computing system to identify one or more accounts associated with a user. The provider computing system may retrieve account information for each of the one or more accounts including an account balance, a scheduled transaction, or a predicted transaction. The provider computing system may monitor the account information for real-time updates. The provider computing system may cause a user interface to be displayed as an overlay on a user device including one or more selectable elements indicative of at least one of the account balance, the scheduled transaction, or the predicted transaction, and including one or more of the real-time updates. Each selectable element is configured to cause, when selected, the user interface to display additional information relating to an account associated with the selectable element.
Aspects of this technical solution can include registering a first non-fungible token (NFT) account of a customer to a first public and private key pair, registering a second NFT account of a financial institution to a second public and private key pair, receiving a request to transfer to the first NFT account an NFT having a quantitative value, generating a second quantitative value of the NFT based on the quantitative value of the NFT and a quantitative value of fiat currency, transferring the NFT to a smart contract, linking the first public and private key pair to the smart contract and a fractional value of the NFT, and linking the second public and private key pair to the smart contract and the second quantitative value of the NFT.
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
43.
Method, apparatus, and computer program product for secure facilitation of package transfer
Systems, apparatuses, methods, and computer program products are disclosed for securely facilitating a package transfer between parties. An example method includes receiving a package offer indication and providing a control signal to a storage locker compartment of a storage locker in response to determining a package drop-off indication. The example method may further include generating a package purchase data object and determining a package sale indication associated with the package offer indication. The example method may further include providing a control signal to the storage locker compartment housing a package associated with the package offer indication in response to determining a package pick-up indication and updating the package purchase data object based on the package sale indication. The example method may further include transmitting a payment to a seller account based on the package purchase data object in response to a payment trigger event.
Methods, apparatuses, and computer program products are provided for dynamically determining a trust score for an authentication action request. An example method includes receiving an authentication action request from a user device. The method further includes determining a device trust score associated with the user device and generating an action trust score for the authentication action request based at least in part on the device trust score. The method further includes providing an authentication action response to the user device based at least in part on the trust score for the authentication request. The authentication action request metadata may include one or more of event data, user device information, location data, user biometric information, user device interaction information.
G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
A computing system is configured to manage and synchronize indicators-of-attack (IOA) rules across multiple tenants of an Endpoint Detection and Response (EDR) tool. The computing system is configured to compare rules between an indicated source tenant and a destination tenant. The computing system may then generate output indicating common rules, updated rules, and missing rules between the source and destination tenants. A user, or the system itself, may update the rules at the destination tenant based on the rules at the source tenant. Such an endpoint security synchronization system avoids problems that may occur with manually transferring IOA rules across multiple tenants of an EDR tool which may result in errors that result in false or misleading security alerts.
Systems, apparatuses, methods, and computer program products are disclosed for constructing a foundational identity to establish the identity of an individual and linking the foundational identity to various other identities of the individual in virtual spaces. An example method includes linking identities across virtual spaces. The example method further includes verifying identity activity associated with the various other identities using the link between the various other identities and the foundational identity, and based on the verification of the identity activity, generate outputs.
Systems, apparatuses, methods, and computer program products are disclosed for exfiltrating an indication of a query related to a computing resource. An example method includes transmitting, by quantum generator circuitry of a transmitter device at a first time, a stream of quantum particles to a second location and monitoring, by embedded access detection circuitry of a first computing device at a second time after the first time, the computing resource for the query. The example method further includes, in an instance in which the query relating to the computing resource is detected, causing, by quantum noise generator circuitry, a microscopic change in a condition of the transmission of the stream of quantum particles, wherein the microscopic change results in a change in an error rate derived from a detection of the stream of quantum particles at the second location.
A method of accessing an account includes receiving, from a device, randomly generated seed information and an encrypted key or token generated by a card using the randomly generated seed information via a contactless communication between the card and the device; decrypting the encrypted key or token using a decryption process that includes the randomly generated seed information and the encrypted key or token as inputs in response to determining that the randomly generated seed information does not match previously received seed information; and providing, to the device and based on the decrypted key or token, access to the account.
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
49.
SYSTEMS AND METHODS FOR GEOFENCE-BASED INDUCTION CHARGING
Systems, apparatuses, methods, and computer program products are disclosed for geofence-based induction charging system. An example method includes identifying an EV by validating vehicle parameters using vehicle identification circuitry and identifying a geofence charging area by comparing vehicle geolocation data with geofence area data using geofence circuitry. The example method further includes generating an entry token and an exit token for the EV using token generation circuitry, and generating a charging transaction for the EV based on the entry token and the exit token using payment transaction circuitry. The entry token comprises at least one or more of a vehicle identifier, an entry timestamp, an entry location, or an entry power level, and the exit token comprises at least one or more of the vehicle identifier, an exit timestamp, an exit location, an updated self-charging rate, an updated power consumption rate, or an exit power level.
B60L 53/38 - Moyens pour l’ajustement automatique ou assisté de la position relative des dispositifs de charge et des véhicules spécialement adaptés au chargement en utilisant le transfert d'énergie par induction
B60L 53/65 - Surveillance et commande des stations de charge impliquant l'identification des véhicules ou de leurs types de batteries
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/42 - Confirmation, p. ex. contrôle ou autorisation de paiement par le débiteur légal
50.
SYSTEM AND METHOD FOR DUAL-DEVICE COMMUNICATION SYNCHRONIZATION
A method may include: receiving voice user interaction data via a virtual assistant from a first device of a user; processing, the voice user interaction data to determine an intent of the user associated with a task type; determining that a dual-device-communication session should be established based on the intent; transmitting a notification to a second device of the user including an electronic link to establish the session; receiving an indication of activation of the electronic link; in response to receiving the indication, establishing the session with the first device and the second device, the session associated with an instance of the task type; receiving task data from the first device via the virtual assistant associated with the task type; and in response to receiving the task data, presenting an outcome of processing the task data, the outcome presented on a user interface on the second device.
A method may include: receiving, using a processing unit, a plurality of interactions with an electronic service from a computing device; detecting, with the processing unit, a lack of subsequent interaction with the electronic service that continues longer than a threshold period; after the detecting, inputting contextual data of the plurality of interactions into an intervention machine learning model, the intervention machine learning model including weights based on contextual data of past user interaction data and user requests for assistance; after the inputting, retrieving an output value from the trained machine learning model; determining that the output value is above a threshold value; based on the determining, transmitting a message to the computing device to initiate a communication session with a user associated with the plurality of interactions; receiving an indication that the message was accepted by the user; and establishing the communication session in response to receiving the indication.
This disclosure describes techniques for managing both batch and streaming data and managing the efficient and timely calculation of features that are based on such data. In one example, this disclosure describes a method that includes receiving, by a computing system, batch and streaming data; generating, by the computing system and based on the batch and streaming data, a preliminary set of calculated features; receiving, by the computing system, a request to score input data; identifying, by the computing system and based on information included in the request, a model and input features for the model; generating, by the computing system and using the preliminary set of calculated features, the input features; applying the model, by the computing system, to the input features to generate model output data; and outputting, by the computing system, the model output data.
Systems, apparatuses, methods, and computer program products are disclosed for estimating vulnerability related to network blast radius of a network asset. An example method includes receiving a network graph and selecting a first network node from the set of network nodes. The example method further includes computing a difficulty score based on the difficulty for an attacker to compromise a second network node in an instance in which the attacker compromises the first network node and computing a cumulative difficulty score for the attacker to compromise the second network node based on a set of difficulty scores for the first network node and each other network node from the set of network nodes. The example method further includes adding the second network node to a set of blast radius nodes and determining a total vulnerability score for the first network node based on the set of blast radius nodes.
A method may include accessing a task data structure from a data store; segmenting task components of the task data structure, into a first category of task components and a second category of task components; associating the first category of tasks with a first category of computing devices and the second category of tasks with a second category of computing devices; determining a current computing device of a user; obtaining a classification of the current computing device of the user indicating the current computing device is a part of the first category of computing devices; and: selecting a first task component of the task data structure from the first category of tasks; and presenting a suggested action for the first task component on the current computing device of the user.
A method to maintain localization of a non-fungible token (NFT) in a transaction includes receiving a request to transfer an NFT from a first NFT account to a second NFT account, and identifying a first localization property corresponding to the first NFT account. The first localization property restricts transfer of the NFT to a first locality associated with a first geographical area. The method further includes identifying a second localization property corresponding to the second NFT account. The second localization property restricts transfer of the NFT to a second locality associated with a second geographical area. The method further includes, in response to determining that the first localization property and the second localization property differ, transferring the NFT to a container, and linking a public and private key pair linked with the second NFT account with the container to transfer the NFT to the second NFT account.
G06Q 40/04 - TransactionsOpérations boursières, p. ex. actions, marchandises, produits dérivés ou change de devises
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A computer system and method for managing a contract by receiving and analyzing attributes to classify the agreement based on its type. Proposed clause inputs are received, analyzed, and classified, considering their relationship to a document family and whether they pertain to an amendment or new agreement. Revised clause language is generated by identifying and reformatting previously utilized legal clauses to align with the document family and propose revisions or new clauses. Potential risk exposure is evaluated based on risk management parameters or regulatory requirements, and the revised clauses are reformatted to address identified risks. This system enables efficient contract management, ensuring appropriate classification, tailored clause generation, and risk mitigation.
Systems and methods of stress detection of and action response via a set of operations including receiving a request from a user behavior data associated with the user. The operations further include converting the behavior data into one or more groups of feature vectors and applying the one or more groups of features vectors to one or more machine-learning models to generate a stress signal associated with the user. The operations include determining a stress response based on the stress signal and performing an action based in part on the request and the stress response.
G16H 10/60 - TIC spécialement adaptées au maniement ou au traitement des données médicales ou de soins de santé relatives aux patients pour des données spécifiques de patients, p. ex. pour des dossiers électroniques de patients
A61B 5/00 - Mesure servant à établir un diagnostic Identification des individus
A61B 5/16 - Dispositifs pour la psychotechnieTest des temps de réaction
G06N 20/20 - Techniques d’ensemble en apprentissage automatique
58.
System for providing selective access to user information
A trusted data management system (TDMS) receives, from a third party system, a request for user data and a user identifier. The TDMS identifies a data sharing schema from a set of data sharing schemas associated with the user identifier. The data sharing schema defines a subset of data values of the user data. The data sharing schema also defines, for each data value of the subset of data values of the subset of the user data, a format for transmitting the data value. The TDMS retrieves, from a data storage unit, the subset of data values of the user data. The TDMS formats each data value of the subset of data values in accordance with the respective defined format of the data value. The TDMS transmits, to the third party system, the subset of user data in accordance with the data sharing schema.
Systems and methods may generally include creating a notification scheme for alerting delegates for a user. An example method includes creating a data store including one or more delegates associated with one or more intervention alert trigger events. Transaction data may be received and based on the transaction data and the trigger events, one or more triggered events may be determined. Based on the triggered events(s), notification messages may be transmitted to one or more particular delegates and response message(s) may be received. In some examples, priority data may be received setting how individual delegates receives notifications or setting how notification messages are transmitted to multiple delegates associated with the same triggered event.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
60.
Secure data processing using data packages generated by edge devices
Disclosed are example methods, systems, and devices that allow for secure data processing using data packages generated by edge devices. The techniques include generating a biometric signature using information captured by a computing device, and encrypting user data obtained via the computing device using the biometric signature and a device identifier of the computing device. A security token can be generated and utilized by the computing device to generate a data package, which is configured such that any change to the data package would cause a validation process of the data package using the security token to fail. The data package can be encrypted using various digital keys and provided to secondary computing systems.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
A method includes obtaining, by a mobile client application of a user mobile device, context data associated with a user, predicting, by the mobile client application, an intended action of the user to be performed at a provider location based on the context data associated with the user, and switching, by the mobile client application, into a context-based application mode based on the intended action of the user.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 30/018 - Certification d’entreprises ou de produits
G06Q 30/0201 - Modélisation du marchéAnalyse du marchéCollecte de données du marché
G06Q 40/02 - Opérations bancaires, p. ex. calcul d'intérêts ou tenue de compte
G06Q 50/00 - Technologies de l’information et de la communication [TIC] spécialement adaptées à la mise en œuvre des procédés d’affaires d’un secteur particulier d’activité économique, p. ex. aux services d’utilité publique ou au tourisme
H04M 1/72454 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles avec des moyens permettant d’adapter la fonctionnalité du dispositif dans des circonstances spécifiques en tenant compte des contraintes imposées par le contexte ou par l’environnement
H04M 1/72457 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles avec des moyens permettant d’adapter la fonctionnalité du dispositif dans des circonstances spécifiques en s’appuyant sur la localisation géographique
H04W 4/021 - Services concernant des domaines particuliers, p. ex. services de points d’intérêt, services sur place ou géorepères
62.
SYSTEM AND METHOD FOR ONLINE BILL PAYMENT DELEGATION
A method includes presenting, to a user, a list of bill payment accounts included in a bill payment system, wherein each bill payment account in the list of bill pay eligible bank accounts of the user is delegable by the user. The method also includes receiving, from the user, a selection of a bill payment account included in the list of bill payment accounts and a to-be delegate identifying information, and transmitting a communication comprising a request for bill payment delegation based on the selection and on the pending delegate identifying information. The method additionally includes authenticating a second user via a user credential linked to the pending delegate information, receiving, from the second user, an indication of acceptance of a delegate role for the bill payment account, and applying the delegate role in the bill payment system to enable access to the bill payment account via the user credential based on the indication of acceptance.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
Disclosed in some examples are methods, systems, devices, and machine-readable mediums for managing the testing of software component dependencies. In some examples, the system may track versions of dependencies; provide an interface to create a customized testing environment—e.g., such as by allowing a user to select whether to include a particular dependency and what version of that dependency to include; select test scripts; select test environments; and automate tests of the selected versions. The system may log test results that can be used for proof of regulatory compliance. In some examples, the system may automate the testing of new dependency versions. For example, a new version of a dependency may automatically be tested by the system using one or more test scripts. The results may then be presented to one or more users.
Systems and methods for providing secure access to a voice key database are disclosed. The voice key database stores associations between audio inputs, contacts, and voice seeds, leading to synthetic voice outputs. The described embodiments allow for a first set of users to modify voice seed associations. A second set of users may also control the first set of users' ability to modify the voice seed associations. One disclosed system includes one or more processors and memory with stored instructions which when executed by the one or more processors cause the one or more processors to identify a contact associated with an audio input by an input entity; retrieve a voice seed associated with the contact; and generate a synthetic voice based in part on the voice seed and the input.
G10L 13/08 - Analyse de texte ou génération de paramètres pour la synthèse de la parole à partir de texte, p. ex. conversion graphème-phonème, génération de prosodie ou détermination de l'intonation ou de l'accent tonique
A computer system and a transaction machine, such as an automated teller machine (ATM), can provide for any payor to make a payment to a payee at the transaction machine. The transaction machine provides the payor a user interface to enter a passcode that uniquely identifies the payment transaction. The passcode can be generated by a provider computing system associated with the transaction machine and provided directly to the payee or through the payor prior to the transaction. The transaction machine provides the payor a user interface to enter an amount. The transaction machine receives a cash deposit and provides a deposit user interface that displays deposit information based on at least one bill of the cash deposit.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/18 - Architectures de paiement impliquant des terminaux en libre-service, des distributeurs automatiques, des bornes ou des terminaux multimédia
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
A method may include transmitting, from a browser application of a client system, a request for a webpage to a server system using a general execution environment of the client system; receiving the webpage, the webpage including a secure execution request to execute a computation in a trusted isolated execution environment of the client system; in response to the secure execution request, establishing a secure enclave within the trusted isolated execution environment with respect to the browser application; receiving, within the trusted isolated execution environment, an attestation request from the server system for an attestation associated with the secure enclave; transmitting, from the trusted isolated execution environment, an attestation response based on a physical property of a processing unit in the client system; subsequent to transmitting the attestation response, receiving, from the server system, a data file; and storing the data file in the secure enclave.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
67.
SERVER-TO-DEVICE SECURE DATA EXCHANGE TRANSACTIONS
Various embodiments described herein relate to systems and methods to perform server-to-device secure data exchange using a device access token. In an embodiment, a first device may, via a software application, receive a request to enroll a paired second device in a secure ecosystem, generate a device access token based on a device identifier for the second device, and provide the token to the second device. The second device may receive a transaction request from a second application and transmit the device access token and transaction request to a computing system. The computing system may parse a device identifier from the token, generate an electronic message responsive to the transaction request, and send the electronic message to the second device. The second device can provide a response to the transaction request to the second application based on the received electronic message.
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06F 21/44 - Authentification de programme ou de dispositif
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
H04L 67/133 - Protocoles pour les appels de procédure à distance [RPC]
68.
PROTECTING TOKENIZED STRUCTURES USING A PROTECTION ARCHITECTURE
Systems, methods, and computer-readable storage media to protect tokens using a protection architecture. One method includes identifying asset tokens including links to a plurality of asset metadata objects. Further, the method includes generating a container metadata object including metadata of the asset tokens. Further, the method includes generating a container token including a link with the container metadata object. Further, the method includes encapsulating the container token and the asset tokens within a container including a container control structure restricting outputs of the container metadata object and the plurality of asset metadata objects. Further, the method includes generating an allocation token compatible with a segmented allocation control structure restricting outputs by the container of a first segmented allocation of the asset tokens based on metadata of a subset of the plurality of asset metadata objects. Further, the method includes providing, using the segmented allocation control structure, the allocation token.
G06F 21/10 - Protection de programmes ou contenus distribués, p. ex. vente ou concession de licence de matériel soumis à droit de reproduction
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
69.
SYSTEMS AND METHODS FOR FRAUD CONTROLS FOR AUTOMATED TRANSACTION MACHINES
Systems and methods relate to an automated teller machine (ATM) associated with a provider institution computer system. The ATM system includes a processor and a memory having instructions thereon that cause the processor to: receive, via an input device and in a first instance, a first user input from a user of the ATM regarding a first transaction; identify at least: one or more factors associated with the user, and user account data; in a second instance subsequent to the first instance, provide a second transaction including one or more products, the products determined based on at least the factors associated with the user and the user account data; and cause a graphical user interface (GUI) of the ATM to display the products. The ATM may also include a storage repository to store non-monetary media and a card preparation apparatus to convert the non-monetary media into a transaction media.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
70.
SYSTEMS AND METHODS FOR PROVIDING CONTINUOUS SIGNATURE MANAGEMENT
Systems, apparatuses, methods, and computer program products are disclosed for providing continuous signature management. An example method includes detecting, by an event identification circuitry, a user authentication event and receiving, by communications hardware, a signature from the user during the user authentication event. The example method further includes determining, by the event identification circuitry, a signature parameter set for the signature and determining, by the event identification circuitry, whether the user authentication event corresponds to an authentic event type. The example method further includes in an instance in which the user authentication event corresponds to the authentic event type, storing, by signature management circuitry, the signature and corresponding signature parameter set in a signature profile associated with the user within a signature corpus.
Embodiments of the present disclosure provide for improved identification of ownership and/or ownership lineage for a data repository, such as a shared file drive. Ownership data and/or ownership lineage data is identified based on data associated with the data repository itself and/or file data objects stored thereon in conjunction with data from a user linkage database. In this regard, accurate identification of a particular owner or owner(s) of a data repository may be determined from the data repository, and the user linkage database may serve additional details of such owner(s), linkages to other user(s) and/or group(s) of users embodying owner(s), and/or the like. Identified ownership data and/or ownership lineage data may be used for a myriad of additional processes, such as to notify users, determine what data repositories to perform detailed, efficient scans of based on group membership of the owner of said data repositories, or the like.
Disclosed in some examples are methods, systems, and devices which provide for an IRS menu bypass and an authentication and session transfer to a live agent according to some examples of the present disclosure. When a handover condition is detected the ANLPA requests a security token from the IRS. The ANLPA also provides the user's authentication status, context information about why the user is calling, and/or other information to the IRS. When the user calls, they provide the security token to the IRS. The IRS uses the token to look up the authentication status and the context information and to automatically route the user to the correct live agent. In some examples, in order to enhance security, the user remains authenticated only if they are calling from a same computing device that hosted the ANLPA session and requested the security token.
Examples described provide systems and methods provided that include creation of financial avatars in a metaverse representing an insured person, beneficiaries and beneficial activities to be carried out in the event of the insured person's demise or other predefined trigger event. An intervener avatar executes all of the intended beneficial activities on behalf of the insured person to the rightful beneficiaries and/or integral products. Upon successful completion of the beneficial activity, the intervener avatar causes the financial avatars to be disintegrated or erased from the metaverse.
Systems, apparatuses, methods, and computer program products are disclosed for peer-based influence prediction for compute actions. In various examples, a first subset of a first plurality of user accounts may be determined as peers for a first user account. A proposed compute action associated with the first user account may be identified. First encoded data representing the proposed compute action may be generated. A first similarity score may be generated based at least in part on the first encoded data and one or more encoded representations of past actions associated with the first subset of the first plurality of user accounts. An influence prediction may be generated for the proposed compute action based on the first similarity score. The influence prediction may indicate a predicted degree by which the proposed compute action is influenced by the past actions.
A computer system and method for improving call center routing through analysis of customer interactions including obtaining identifying information for a caller upon initiation of a call, identifying the caller as a repeat customer using the identifying information, retrieving historical interaction data associated with the repeat customer from a database, analyzing any combination of customer audio data, customer call log information, or customer feedback, utilizing an artificial intelligence algorithm to determine a current mood indicator of the customer, calculating a customer behavior score for the repeat customer based on the historical interaction data and the current mood indicator of the customer, and matching the repeat customer to a call agent, based on the customer behavior score.
A risk-sensitive code generation computing system receives query data indicating a requested code section. A code attribute evaluation module determines attributes that indicate characteristics of the query data or the requested code section. Based on the attributes, the code attribute evaluation module calculates risk level data for the requested code section. A code generation module selects, based on the risk level data, a set of training resources. Based on the selected training resources, the risk-sensitive code generation computing system modifies training of a trained neural network model. The modified trained neural network model generates a risk-sensitive code data object based on the requested code section and the risk level data. The risk-sensitive code generation computing system provides at least a portion of the risk-sensitive code data object to an additional computing system.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06F 8/71 - Gestion de versions Gestion de configuration
77.
SYSTEMS AND METHODS FOR EVALUATING AN ELECTRONIC COMMUNICATION
Systems, apparatuses, methods, and computer program products are disclosed for evaluating an electronic communication. An example method includes receiving an electronic communication and generating, a plurality of tokens based on the plurality of characters. The example method further includes determining whether the electronic communication includes disallowed content based on the plurality of tokens using a contextual analysis machine learning model and in an instance in which the electronic communication is determined to include disallowed content, determining, an infraction event using the contextual analysis machine learning model. The example method further includes determining an infraction alleviation action based on the infraction event type and causing performance of the infraction alleviation action.
Systems and methods are disclosed herein for computing a frequency response spectrum for a superconducting transmon. An example method includes receiving, by communications hardware, an applied voltage function, and computing a first approximation for a set of coefficients of a component form Lindblad master equation, wherein the component form Lindblad master equation is determined using a Hamiltonian based on a Schwinger oscillator model of angular momentum. The example method also includes computing a second approximation for a set of eigenvalue energies of the component form Lindblad master equation and determining a set of coupled differential equations. The example method also includes applying a Runge Kutta method to solve the set of coupled differential equations to obtain a set of matrix elements of a density operator and computing an expectation value of a Schwinger angular momentum component to obtain the frequency response.
Systems and methods relate to an automated teller machine (ATM). The ATM includes a storage repository configured to store a non-monetary media and at least one processor and at least one memory coupled to the at least one processor. The memory has instructions thereon that when executed, cause the at least one processor to, in a first instance, receive, via an input device, a first user input from a user of the ATM regarding a transaction involving the non-monetary media. Additionally, responsive to receiving the first user input, the ATM receives, via at least one media aperture, non-monetary media for storing in the storage repository and provides, via an output device, an access credential associated with the transaction. In a second instance after the first instance, the ATM receives the access credential, validates the access credential, and provides the non-monetary media from the storage repository to the user.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
A computing system can include at least one processing circuit that can monitor a first plurality of interactions with a plurality of Automated Teller Machines (ATMs), detect a change from a first status of a first ATM of the plurality of ATMs to a second status of the first ATM, retrieve information corresponding to a second plurality of interactions with the first ATM, identify one or more profiles associated with respective interactions of the second plurality of interactions, determine a plurality of user devices enrolled in a subscription to receive status updates regarding the first ATM, and transmit a signal to the plurality of user devices to cause the plurality of user devices to display a user interface to identify the second status of the first ATM.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
81.
SYSTEM AND METHOD FOR FINANCIAL HEALTH ROBO-ADVISOR
Aspects of the present disclosure address systems and methods for receiving, via a processor, a financial health goal from a user and for retrieving, from a data store, one or more financial health templates based on the financial health goal. The financial health goal does not include an investment goal. The systems and methods additionally include retrieving, from a data store, one or more financial health templates based on the financial health goal, wherein each of the one or more financial health templates comprise a trained model. The systems and methods also include deriving, via the processor, a financial health advice action based on using the financial health goal as input to the trained model of the one or more financial health templates, and providing the financial health advice, wherein the one or more financial health templates are created based on consumer financial data.
Various examples are directed to computer-implemented systems and methods for financial health visualization. A method includes providing an interactive interface for a user on a graphical user interface (GUI) of a local user device, where providing the interactive interface includes using an instance of a program that is prevented from accessing networks once running to ensure security of user input. Input is received from the user generated by user manipulation of a plurality of sliders on the interactive interface. In response to the input, a plurality of financial measures indicative of a financial health of the user are calculated based on the input, and the plurality of financial measures are displayed on the interactive interface. Further in response to the input, a plurality of vertical stacked line graphs are adjusted based on the input, and the adjusted plurality of vertical stacked line graphs are displayed on the interactive interface.
G06F 3/04847 - Techniques d’interaction pour la commande des valeurs des paramètres, p. ex. interaction avec des règles ou des cadrans
G06F 3/04817 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect utilisant des icônes
G06Q 40/06 - Gestion de biensPlanification ou analyse financières
G06T 11/20 - Traçage à partir d'éléments de base, p. ex. de lignes ou de cercles
83.
TELEPHONIC FRAUD COMMUNICATION INTERCEPTION SYSTEMS AND METHODS
A method may include receiving, over a first wired phone line interface of a computing device, a telephone call with an originating call identification; passing the telephone call to an attached phone over a second wired phone line interface; matching, at the computing device, the originating call identification to a number list of a plurality of number lists; based on the number list, assigning, using the computing device, the telephone call a threat level; and presenting, on a display device of the computing device, an identification of the threat level.
H04M 3/42 - Systèmes fournissant des fonctions ou des services particuliers aux abonnés
H04M 1/57 - Dispositions pour indiquer ou enregistrer le numéro de l'abonné demandeur à l'appareil de l'abonné demandé
H04M 3/22 - Dispositions de supervision, de contrôle ou de test
H04M 15/06 - Dispositions de comptage, de contrôle de durée ou d'indication de durée pour enregistrer des appels sous forme imprimée, perforée ou autre forme permanente pour enregistrer la catégorie ou le numéro d'un appelant ou d'un appelé
84.
USER INTERFACES FOR DATA TRAVERSAL OF KNOWLEDGE GRAPHS
A method may include presenting a user interface on a computing device, the user interface including: a service provider input element identifying a service provider; a service identifier input element identifying a service; and a graph presentation area; executing a knowledge graph database query using a combination of the service provider and the service as input to a knowledge graph database; receiving tuple results in response to the executing, the tuple results including an allocation value property of the service provider attributable to the service provider with respect to the service; and generating in the graph presentation area, an interactive graph based on the tuple results including: representations of entities including the service provider and the service in the tuple results as nodes in the interactive graph, wherein a representation of the service provider includes the allocation value; and links connecting the representations of entities.
An example computer system for colonizing transactions can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: receive a transaction initiated by an originator; automatically route the transaction to a colony based upon a context packet associated with the transaction; and store data associated with the transaction in the colony; wherein the colony satisfies regulatory requirements of a geographic area associated with the transaction.
A computing system includes at least one one or more automated teller machines (ATMs) and at least one processing circuit. The at least one processing circuit is configured to train an artificial intelligence (AI) model to determine predicted transactions of a user using transaction data related to a plurality of transactions of the user with the one or more ATMs; receive data indicative of a location of a user device corresponding to the user; determine a corresponding location of an ATM of the one or more ATMs; determine a predicted transaction of the user at the ATM using the AI model; and transmit information corresponding to the predicted transaction to the user device including an interface element to cast the predicted transaction to the ATM. The ATM is configured to receive transaction data cast by the user device to the ATM and execute a transaction according to the transaction data.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
An example computer system for liquidity modeling can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: receive requests from an organization to conduct one or more transactions, where the transactions include receivable transactions and payable transactions; identify a current liquidity status and one or more business activities associated with the organization; predict a liquidity requirement of the organization based upon the receivable transactions, the payable transactions, the current liquidity status and the one or more business activities; and prioritize the one or more transactions based upon the liquidity requirement.
Systems and techniques may generally be used to exchange data across multiple routing platforms. An example technique may include receiving, at a routing platform, an ongoing voice call, generating an interaction identifier associated with a user and the ongoing call, collecting ongoing voice call information, retrieving, using the ongoing voice call information, a user data record from a records data storage, identifying a target routing platform, and sending a voice stream corresponding to the ongoing voice call to the target routing platform. The target routing platform may include a routing target.
H04M 3/523 - Dispositions centralisées de réponse aux appels demandant l'intervention d'un opérateur avec répartition ou mise en file d'attente des appels
H04M 3/436 - Dispositions pour intercepter des appels entrants
Systems and methods for managing data using knowledge graphs are provided. A method receiving, by a processor, an input record. The method may also include loading, by the processor, a configuration file comprising commands that cause the processor to query a data source to extract application log data associated with the input record and map the application log data to transaction graph data. The method may also include traversing, by the processor, the transaction graph data to identify one or more anomalous components in the transaction graph data. The method may also include outputting, by the processor, a signal associated with an indication of the one or more identified anomalous components.
An example system for generating an integrated property and lending search experience can include: at least one processor; and memory encoding instructions which, when executed by the at least one processor, cause the system to: generate a property engine programmed to search for homes meeting certain home parameters; generate a lending engine programmed to search for loans meeting certain loan parameters, the loan parameters including a down payment amount and/or a monthly payment amount; and display information about one or more homes meeting both the home parameters and the loan parameters.
Information analysis and display systems and methods include receiving first financial information regarding a user, and calculating a target home price based on the received financial information. A user interface display is generated that displays the target home price, and modifications to the target home price from the user are received via the user interface. Homes for sale are evaluated based on the target price.
Managing payment requests. When a liquidity manager goes down, last-known liquidity data can be obtained from a stand-in liquidity manager to execute requested payments even while the liquidity manager is down. Based on a context of a requested payment, execution of the payment can be either performed in real-time using the stand-in liquidity manager or queued until a later time when the liquidity manager is back up.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
The arrangements disclosed herein relate to systems, apparatus, methods, and non-transitory computer readable media for Secure Node Exchange Attribute-based Keys (SNEAK) including secure exchange of sensitive message elements between sequential message nodes using attribute-based key management. Each message node can access none, one, some, or all encrypted message elements based on assigned attributes of that message node. A key management node provides key exchange for each Content Encryption Key (CEK) used to protect the message elements based on attributes of the message nodes.
A secured credit provider computing system is disclosed. The system includes a processing circuit. The processing circuit can provide, to a user computing device, a passcode corresponding to a product. The processing circuit can receive, from an automated teller machine (ATM), a request corresponding to the product and comprising the passcode. Responsive to determining that the passcode is valid, the processing circuit can cause the ATM to accept a check or paper currency corresponding to a collateral deposit for the product. The processing circuit can receive, from the ATM, a message acknowledging the collateral deposit, the message generated by the ATM upon accepting the check or paper currency. The processing circuit can determine that the collateral deposit satisfies a collateral request for the product and transmit, to the user computing device or the ATM, a notification indicating that the collateral deposit has been approved.
G06Q 20/24 - Schémas de crédit, c.-à-d. de "paiement différé"
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
95.
SECURE DIGITAL AUTHORIZATION BASED ON IDENTITY ELEMENTS OF USERS AND/OR LINKAGE DEFINITIONS IDENTIFYING SHARED DIGITAL ASSETS
A method includes: generating a dataset based on a first digital identity profile of a first entity and a second digital identity profile of a second entity; inputting the dataset to an artificial intelligence (AI) agent to generate a linkage definition and a set of activation elements; determining that at least one activation element of the set of activation elements has been triggered; in response to determining that the at least one activation element has been triggered, generating one or more security access tokens based on the linkage definition, the one or more security access tokens indicating that access to the one or more assets is granted; and transmitting the one or more security access tokens to at least one of a first device identified in the first digital identity profile or a second device identified in the second digital identity profile.
The present disclosure describes devices and methods of providing a technology environment for analyzing programs or initiatives of an enterprise. In particular, a computing device including a processor with computer readable instructions to access client resolution data that includes information regarding one or more resolutions. A resolution may be associated with a claim made by a client, and include multiple variables including correspondences between the client and the enterprise, an actual value corresponding to the claim, and an expected value corresponding to the claim. The computing system may generate a dataset of all of the resolutions, apply an outlier detection model, and provide an interactive summary of one or more outlier analysis tests via a graphical user interface.
G06Q 10/0637 - Gestion ou analyse stratégiques, p. ex. définition d’un objectif ou d’une cible pour une organisationPlanification des actions en fonction des objectifsAnalyse ou évaluation de l’efficacité des objectifs
G06Q 10/0631 - Planification, affectation, distribution ou ordonnancement de ressources d’entreprises ou d’organisations
97.
COMPUTER-BASED SYSTEM TO VALIDATE BUILD INTEGRITY OF SOFTWARE PRODUCTS
Techniques are described for validating build integrity of software products, such as applications or containers. More specifically, this disclosure describes a build integrity validation system that analyzes build artifacts resulting from a software build process to create source code assertions, and compares the assertions against the source code from which the build artifacts were produced. The build integrity validation system validates that a particular build artifact is producible by the source code to ensure that no additional code was introduced during the build process. The build integrity validation system may also reverse the analysis to validate that the source code is able to produce the build artifacts to ensure that no code was removed or modified during the build process. The build integrity validation system identifies and reports identified discrepancies between the source code and the build artifacts resulting from the software build process of the source code.
Various examples are directed to systems and methods for serving a virtual reality user interface to a user. A computing system may receive, from a user device, an indication that a user avatar for the user is to encounter a third-party avatar associated with a third party in a virtual environment. The computing system may access trust data describing a level of trust between the user and the third party and determine a first visual indicator based at least in part on the level of trust between the user and the third party. The computing system may generate a rendering of the third-party avatar comprising the first visual indicator and serve the rendering of the third-party avatar to the user device for display by the user device to the user.
The present disclosure generally relates to techniques for implementing a virtual assistant application using machine learning. The systems and methods can receive an input from a user. The input can be associated with a problem to be solved. Using a machine learning model, the systems and methods can determine a style and an intent of the user based on the input, determine extracted data that includes information corresponding to the style and intent, predict a desired result based on the extracted data, and generate a set of actions. The set of actions can be based in part on the style of the user and the intent of the user. Each action in the set of actions can correspond to a step that the user can take to accomplish the desired result. The systems and methods can output a signal associated with a representation of the set of actions.
A method, apparatus, and system of activating and using a contactless card via unique activation codes are disclosed. A system includes a memory and a processor configured to: receive an account number for a contactless card from a third party computing system; generate a card activation code for the contactless card, the card activation code being unique to the contactless card; generate a customer-specific uniform resource locator (URL) by appending the card activation code to a general URL, the general URL being associated with an entity of the system; transmit the customer-specific URL to the third party computing system with instructions to write the customer-specific URL into a wireless chip of the contactless card; associate the card activation code with the account number and information regarding a customer associated with the contactless card; and store the card activation code within the memory to be referenced during activation.
G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 40/06 - Gestion de biensPlanification ou analyse financières
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p. ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G06F 21/45 - Structures ou outils d’administration de l’authentification
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06Q 40/02 - Opérations bancaires, p. ex. calcul d'intérêts ou tenue de compte
H04W 4/14 - Services d'envoi de messages courts, p. ex. SMS ou données peu structurées de services supplémentaires [USSD]