Systems, apparatuses, methods, and computer program products are disclosed for identifying how individuals traverse through virtual spaces. An example method includes identifying relevant data from blockchains associated with virtual spaces and harvesting the relevant data from the blockchains. The example method further includes storing the harvested data in organized sidechains for accessibility, and based on the stored data of the sidechains, generate outputs.
Aspects of this technical solution can receive, via a user interface, a first prompt for a large language model including a first query that references first data, generate one or more second prompts for the large language model based on the first prompt and the first data, each of the second prompts including one or more second data clarifying the first query, generate, by the large language model receiving one or more of the second prompts, one or more responses to the one or more second prompts, select an optimized prompt from among the one or more second prompts, according to a determination that a response to the at least one of the second prompts meets an accuracy threshold, and cause the user interface to present the optimized prompt or a response to the optimized prompt, the large language model to generate the response using the optimized prompt as input.
Systems, methods, and computer-readable storage media to authorizing exchanges using a proof of usage model. One system includes memory and at least one processing circuit configured to generate a plurality of distributed ledger technology (DLT) networks and activate and connect a first network computing system to at least one of the DLT networks. The at least one processing circuit further configured to activate and connect a second network computing system to at least one of the DLT networks. The at least one processing circuit further configured to execute a disbursement of funds or digital asset corresponding with the first network computing system. The at least one processing circuit further configured to append a protection parameter to the funds or digital asset based on a scheme and in response to receiving an exchange request from the second network computing system, authorize an exchange based a proof of usage model.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
4.
SYSTEMS AND METHODS FOR VERIFYING CANDIDATE COMMUNICATIONS
Systems, apparatuses, methods, and computer program products are disclosed for verifying candidate communications. An example method includes receiving a communication verification request comprising a candidate communication from a third-party device and determining one or more candidate communication feature values for one or more communication feature types. The example method further includes querying an authentic communication storage repository for an authentic communication record that comprises one or more authentic communication feature values that correspond to the one or more candidate communication features, wherein the authentic communication storage repository comprises a plurality of authentic communication records. The example method further includes determining a communication classification for the candidate communication based on a query result and providing a communication verification response comprising the communication classification to the third-party device.
Systems, apparatuses, methods, and computer program products are disclosed for establishing an authentic communication storage repository. An example method includes receiving an authentic communication from the agent device and determining one or more authentic communication feature values for one or more communication feature types. The example method further includes generating an authentic communication record for the received authentic communication and storing the authentic communication record in the authentic communication storage repository, wherein the authentic communication storage repository comprises a plurality of authentic communication records.
Managing carbon emissions associated with unavailable services. In the context of financial services, a customer of a financial institution can attempt to access an online provided financial service, only to be denied access to the service due to an access issue with one or more computing systems. Such denials of service can lead to high levels of carbon emissions due to ensuing activity following the initial denial of service, such as repeated attempts to refresh a webpage or messaging customer service. By contextualizing the denial of service and predicting relative magnitudes of carbon emissions associated with different service access pathways for providing the denied service to the customer, overall carbon emissions can be reduced.
Systems and methods for generating new transaction frameworks using a machine learning model include a transaction framework training system and a transaction framework generation system. The transaction framework training system includes hardware configured to receive historical transaction framework data associated with a plurality of transaction frameworks corresponding to historical transactions performed by a provider. The historical transaction framework data includes final transaction framework terms and outcome data for each historical transaction. The hardware is configured to generate a machine learning model. The machine learning model is configured to generate new transaction frameworks. The machine learning model is generated using the historical transaction framework data. The transaction framework generation system includes hardware configured to receive input initial transaction framework data. The hardware is configured to generate an output transaction framework by applying the input initial transaction framework data to the machine learning model.
G06N 3/084 - Rétropropagation, p. ex. suivant l’algorithme du gradient
G06Q 20/06 - Circuits privés de paiement, p. ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
8.
SYSTEMS AND METHODS FOR VERIFYING CANDIDATE COMMUNICATIONS
Systems, apparatuses, methods, and computer program products are disclosed for verifying candidate communications. An example method includes establishing an authenticated session with a user using a user device and receiving a communication verification request comprising a candidate communication. The example method further includes determining one or more candidate communication feature values for one or more communication feature types and querying an authentic communication storage repository for an authentic communication record that comprises one or more authentic communication feature values that correspond to the one or more candidate communication features. The example method further includes determining a communication classification for the candidate communication based on a query result and providing a communication verification response comprising the communication classification to the user device.
A method may include generating an API call to a collaborative document creation platform, the API call requesting comments made with respect to a document hosted by the collaborative document creation platform; transmitting the API call to the collaborative document creation platform; in response to the transmitting, receiving from the collaborative document creation platform, a data payload, the data payload identifying a communication made within the document and the communication formatted in a first data structure schema; transforming the communication formatted in the first data structure schema to a second data structure schema; and storing the communication formatted in the second data structure schema in an archive data store.
A computing device within an enterprise network is described, the computing device configured to execute one or more applications and one or more status modules embedded within the one or more applications. A first status module embedded within a first application running on the computing device is configured to periodically determine an operational status of the first application based on at least one value of at least one metric of the first application for each periodic interval. The at least one metric may be selected from a predefined list of metrics as being indicative of the operational status of the first application. The first status module is configured to report an identifier of the computing device on which the first application is running and a status indicator representative of the operational status of the first application at a given time to an application performance tool within the enterprise network.
Systems and techniques may generally be used to integrate automated teller machine (ATM) functions into one or more fuel pumps at a gas station. An example system may include a media transfer slot and a display screen to present a fuel pump prompt and an automated teller machine (ATM) prompt. The example system may cause a fuel to be dispensed when the fuel pump prompt is selected. The example system may cause the media transfer slot to activate when the ATM prompt is selected.
G06Q 20/18 - Architectures de paiement impliquant des terminaux en libre-service, des distributeurs automatiques, des bornes ou des terminaux multimédia
G07F 15/00 - Appareils déclenchés par pièces de monnaie avec distribution de liquide, de gaz ou d'électricité commandée par le comptage
12.
Systems and methods for location-binding authentication
Systems, methods, and apparatuses for authenticating a user based at least in part on a location of the user or a location of a user device are described. A method includes: receiving a login request including a user identifier associated with a user; transmitting a request for location information of a user device associated with the user; causing computer-executable code deployed to the user device to generate a location-based modifiable digital fingerprint comprising a first encoded value based on a unique identifier of the user device and a second encoded value based on a first location information of the user device; receiving the location-based modifiable digital fingerprint from the user device; verifying that the location information from the location-based modifiable digital fingerprint corresponds to a second location; and providing the user access to the computing device.
Systems, methods, and other embodiments associated with cash pooling. According to one embodiment, a system includes an account logic configured to receive at least one change selected by a user and make the at least one change to a pool. The pool includes a plurality of accounts. The system further includes a settlement logic configured to calculate a balance for one or more accounts in the pool. The settlement logic is further configured to identify at least one settlement options for the one or more accounts based at least in part on the balance.
Systems and methods may generally provide a dynamic personalized banking user interface. An example method may include receiving data corresponding to a user pathway interaction by a user at a user interface, and personalizing, using reinforcement learning, a trained model to the user based on the data to generate a personalized reinforcement learning model. The example method may include receiving an indication that the user has accessed the user interface or requested access to the user interface, and dynamically generating the user interface using the personalized reinforcement learning model. The dynamically generated user interface may be output for display on a user device.
G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p. ex. des menus
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p. ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
Systems and techniques for secure communications and distribution of random values, provided via satellite communications, are described. These random values are generated from one or more ground-based entropy sources (e.g., quantum random number generators (QRNGs) at terrestrial locations), and optionally combined with values from satellite-based entropy sources (e.g., QRNGs at non-terrestrial locations). An example method includes: receiving a first random value generated by a first QRNG at a terrestrial location; receiving a second random value and a third random value via at least one satellite communication, each additional random value generated by other QRNGs; and generating a cryptographic key based on the first random value, the second random value, and the third random value. The cryptographic key may be produced by a key derivation function that combines the random values, and the cryptographic key may be used to establish a secure communication session.
Systems and techniques for secure communications and distribution of random values for cryptographic key generation, coordinated with the use of specific key generation parameters, are described. An example method includes: receiving a first random value and a second random value generated from at least one quantum random number generator (QRNG), with at least one of the first random value and the second random value being provided from a satellite communication; obtaining key generation parameters associated with cryptographic key generation, where the key generation parameters specify a specific combination of the first random value and the second random value; and generating a cryptographic key, using the specific combination of the first random value and the second random value, as a seed to a cryptographic function.
Systems and techniques may generally be used to authenticate users. An example technique may include linking a first user account of a first user to a second user account of a second user at a financial institution, receiving an authorization request to complete a first financial transaction on the first user account, sending to the first computing device of the second user an authentication request for the first user, and receiving a first authentication confirmation from the second user. The example technique may include determining that the first authentication confirmation meets the authentication level requirement of the first financial transaction, and, in response to the determination, authorizing the first financial transaction on the first user account.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p. ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/42 - Confirmation, p. ex. contrôle ou autorisation de paiement par le débiteur légal
18.
SYSTEMS AND METHODS FOR RANKING CALL INTENT PROBABILITY
Systems, apparatuses, methods, and computer program products are disclosed for deriving call intent probability. An example method includes receiving a set of call menu tokens and creating an n-gram from the set of call menu tokens. The example method further includes receiving an intent call log for a candidate call intent, which includes a frequency of the n-gram and a total frequency, and determining, by scoring circuitry, an n-gram intent score based on the frequency of the n-gram and the total frequency of the intent call log. The example method further includes determining a total score for the candidate call intent based on the n-gram intent score, where the total score provides a measure of a probability of the candidate call intent and outputting a ranked list of call intents comprising the total score and the candidate call intent.
An example computer system for providing a communication system can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to: monitor criteria associated with the computer system; calculate a risk score associated with the communication system; and automatically change one or more endpoints of the computer system when the risk score exceeds a threshold.
In general, this disclosure describes techniques for generating and evaluating automatic transcripts of audio recordings containing human speech. In some examples, a computing system is configured to: generate transcripts of a plurality of audio recordings; determine an error rate for each transcript by comparing the transcript to a reference transcript of the audio recording; receive, for each transcript, a subjective ranking selected from a plurality of subjective rank categories; determine, based on the error rates and subjective rankings, objective rank categories defined by error-rate ranges; and assign an objective ranking to a new machine-generated transcript of a new audio recording, based on the objective rank categories and an error rate of the new machine-generated transcript.
Systems, methods, and apparatuses for scrubbing account data accessed via links to applications or devices are disclosed. A system receives, from a financial institution computing system, a security access token granting access to account data of a user account administered by the financial institution. The system transmits an API request including the security access token to retrieve account data, receives the requested account data, and stores the account data locally. The system provides stored account data to a client application upon request. Upon receiving a scrub command from the financial institution computing system instructing deletion of the stored account data, the system deletes the account data from local storage and transmits an indication back to the financial institution confirming deletion.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
Systems and methods relating to a distributed ledger-based payment rail are provided. A computer-implemented method includes determining whether a sending financial institution of a sender of a funds transfer and a receiving financial institution of a recipient of the funds transfer each operates a node on a permissioned distributed ledger network. The method further includes routing a funds transfer request message to the permissioned distributed ledger network in response to determining that the sending financial institution and the receiving financial institution each operates a node on the permissioned distributed ledger network. The method further includes destroying, by an issuer, the cash states in response to the recipient redeeming cash states associated with the funds transfer.
G06Q 20/06 - Circuits privés de paiement, p. ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/42 - Confirmation, p. ex. contrôle ou autorisation de paiement par le débiteur légal
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
23.
AUTOMATED RISK-BASED PRIVACY MANAGEMENT USING APPLICATION DATA FLOW MAPPING AND VISUAL USER INTERFACES
A method includes obtaining application information including at least one of a location of origin for customer information within an application or a location of termination for the customer information within the application, performing at least one corrective action to reduce a determined risk associated with the application based on privacy guidelines associated with at least one of the location of origin or the location of termination, and displaying, via a graphical user interface, the at least one corrective action to a user.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06Q 30/018 - Certification d’entreprises ou de produits
Systems and techniques for secure communications and distribution of random values, produced from at least two satellite entropy sources, are described. These random values may be provided by respective quantum random number generators (QRNGs) at separate satellites, and optionally combined with values from ground-based entropy sources (e.g., QRNGs at terrestrial locations). An example method includes: receiving a first random value and a second random value via at least one satellite communication, where the first random value is generated by a first QRNG at a first satellite, and the second random value is generated by a second QRNG at a second satellite; and generating a cryptographic key based on the first random value and the second random value. The cryptographic key may be produced by a key derivation function that combines the random values, and the cryptographic key may be used to establish a secure communication session.
Systems, apparatuses, methods, and computer program products are disclosed for providing accessible interface content. An example method includes receiving base interface content comprising one or more interface content components and determining a user population of interest and a platform of interest. The example method further includes generating one or more interface feature sets using a pre-processing model. The example method further includes modifying one or more interface content components for each interface feature set using feature modification models. The example method further includes generating modified interface content using a multimodal model based on the one or more interface feature sets and providing the modified interface content.
Systems and techniques may generally be used to authenticate users. An example technique may include receiving a selection to execute a first financial transaction on a first user account of a first user at a financial institution, the first financial transaction having an authentication level requirement, and determining that the first user completed a selected authentication option that satisfies the authentication level requirement. The example technique may include, in response to the determination, authorizing the first financial transaction to execute using the first user account.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
27.
PROTECTING TOKENIZED STRUCTURES USING A PROTECTION ARCHITECTURE
Systems, methods, and computer-readable storage media to protect non-fungible tokens (NFTs) using a protection architecture. One method includes protecting the NFT including tracking, utilizing the overlay ledger, an association of NFT ownership of a plurality of NFTs and storing and protecting, utilizing a blockchain storage, the plurality of NFTs. The method further includes receiving an exchange request and exchanging the NFT on us including determining the customers have an NFT account with the overlay ledger and executing an on-us exchange based on updating the overlay ledger.
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
28.
RAPID AND EFFICIENT CASE OPENING FROM NEGATIVE NEWS
Disclosed is an approach in which news alerts are scanned in real-time or near real-time, relevant alerts identified through a topic extraction model, and associated actors identified through an entity extraction model. An entity resolution model may be applied to determine which actors are clients. The topic extraction, entity extraction, and/or entity resolution models may apply, for example, natural language processing models. The alert may be enriched by being packaged with client and transactional data to generate an enriched alert. A predictive model may be applied to the enriched alert to identify events with a high probability of law enforcement referral, and the enriched alert may be automatically transmitted to certain identified devices. The predictive model is trained using a combination of news alerts and data on clients and transactions, yielding enhanced predictions. The disclosed approach reveals relevant underlying associations and connections between entities and transactions not otherwise feasibly discoverable.
G06Q 50/26 - Services gouvernementaux ou services publics
G08B 7/06 - Systèmes de signalisation selon plus d'un des groupes Systèmes d'appel de personnes selon plus d'un des groupes utilisant une transmission électrique
H04L 67/53 - Services réseau en utilisant des fournisseurs tiers de services
29.
Systems and methods for tracking NFT-backed instruments
Systems, apparatuses, methods, and computer program products are disclosed for tracking NFT-backed instruments. An example method includes identifying a plurality of NFTs on a distributed blockchain ledger, associating an instrument with the cryptographic NFTs, determining a value of the cryptographic NFTs based on transactions on the distributed blockchain ledger that are associated with one or more of the cryptographic NFTs, monitoring the distributed blockchain ledger to detect transaction data of a block of the distributed blockchain ledger, the transaction data indicative of a transaction associated with a first cryptographic NFT of the cryptographic NFTs, determining a modified value of the cryptographic NFTs responsive to the transaction data, and terminating the instrument associated with the cryptographic NFTs in response to a comparison of the modified value to a predetermined threshold value indicating that the modified value is less than the predetermined threshold value.
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
30.
Secure digital authorization based on identity elements of users and/or linkage definitions identifying shared digital assets
Disclosed are example methods, systems, and devices that allow for secure digital authorization via generated datasets. The techniques include receiving a first dataset of a first user and a second dataset of a second user and generating a first set of identity elements and a second set of identity elements based on the first dataset and the second dataset, respectively. A linkage definition can be generated based on the first and second datasets, which can be associated with a set of activation elements. The techniques include determining that a set of inputs satisfy one or more of the set of activation elements and, in response, generating a set of security access tokens based on the linkage condition. The security access tokens can be transmitted to a computing device upon analyzing and verifying biometric data received from that computing device.
Various embodiments described herein relate to systems, methods, and non-transitory computer-readable media structured to perform server-to-device secure data exchange using a device access token. In an embodiment, a smart device receives, from a requestor entity provided to the smart device, an account data provisioning request for an account. Based on the account data provisioning request, an account identifier for the account is determined. In some arrangements, the account identifier comprises or is associated with a device access token. Based on the device access token, a data element associated with the account is determined. In some embodiments, the data element is accessible to the requestor entity only if it is not access-restricted based on the device access token. Based on the data element, an executable graphic rendering instruction is generated. The executable graphic rendering instruction is executed, which includes generating and displaying, on a user interface of the smart device, a dynamic account status indicator relating to the account.
G06F 21/44 - Authentification de programme ou de dispositif
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
H04L 67/133 - Protocoles pour les appels de procédure à distance [RPC]
The innovation disclosed and claimed herein, in one aspect thereof, comprises systems and methods of delivering cash to a subscriber of a cash delivery service by way of a courier. In another aspect, collection of cash from a subscriber by a courier is contemplated. Conversely, the subscriber prearranging to pick up cash at a kiosk is contemplated. For these and like embodiments, network servers host a cash delivery application and users/couriers utilize the application as clients.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 40/04 - TransactionsOpérations boursières, p. ex. actions, marchandises, produits dérivés ou change de devises
33.
Apparatuses and methods for improved session authentication
A method, apparatus, and computer program product for establishing an authenticated online session are provided. An example method includes receiving a request for an authenticated online session and causing, by display circuitry, presentation of an input pattern to a user. The method further includes receiving, by gaze detection circuitry, one or more images of the user's eye captured during presentation of the input pattern, and determining, by the gaze detection circuitry, an identification code represented by the one or more images. The method also includes receiving, by contextual evaluation circuitry, contextual device data of a user device associated with the user during presentation of the input pattern. The method further includes establishing, by authentication circuitry, the authenticated online session based upon the identification code and the contextual device data.
A computing system may access log files that log data associated with prior performances of a process by users. Such data may be recorded by one or more computing systems based on tracking user interactions with the one or more computing systems to perform the process. The computing system may generate, using an instructions generation model that is trained using machine learning, the process instructions for performing the process based on the data associated with the prior performances of the process. The process instructions may be human-readable written instructions.
A provider computing system can include at least one processing circuit having at least one processor coupled to at least one memory device. The memory device can store instructions that, when executed by the at least one processor, cause the at least one processing circuit to receive a query corresponding to a first topic, determine one or more data sources associated with the first topic based on data included in the query, generate a first response to the query based on information received from the one or more data sources using a machine learning model, determine a correlation between the first response and the information received from the one or more data sources, generate a first score for the first response based on the correlation, and transmit one or more signals to cause the user device to display a user interface including the first response and the first score.
Enhancing financial literacy using the metaverse. Visual, immersive financial content is provided via an augmented reality environment or a virtual reality environment. The content changes based on one or more financial factors, allowing users to visually and virtually experience and better understand how different prospective financial transactions are impacted by different financial factors of those transactions.
Two-factor authentication code generation devices are described which include accessibility features and/or additional authentication features to ensure an identity of a user.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A chatbot system described herein uses a two-staged approach to answer a question. The first stage consists of a contextual search that takes in the question, searches a library of documents and finds a relevant piece of text. The second stage is to use the relevant piece of text, present it to a large language model, and have the model answer the question give the context of the text. The model in question formulates the answer by extracting the most relevant section of the text. When asked an ill-posed question, the chat bot will ask the user clarifying questions until a well-defined question is found.
The present disclosure is directed to systems, methods, and non-transitory computer-readable media for receiving, by a relying party device from a subject device, an attribute certificate of a subject corresponding to the subject device, wherein the attribute certificate identifies a plurality of public key certificates, each of the plurality of public key certificates is part of a certificate chain, each of the plurality of public key certificates comprises a public key of the subject, selecting, by the relying party device, a public key certificate of the plurality of public key certificates using the attribute certificate, performing, by the relying party device, certificate chain validation of a certificate chain of the selected public key certificate, and in response to the certificate chain validation being successful, using, by the relying party device, a public key comprised in the selected public key certificate in a cryptographic operation.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
40.
SERVER-TO-DEVICE SECURE DATA EXCHANGE TRANSACTIONS
Described are systems, methods, and computer-readable media structured to perform server-to-device secure data exchange using a device access token. A smart device may receive, from a requestor entity provided to the smart device, an account data provisioning request for an account. Based on the provisioning request, an account identifier for the account is determined. In some arrangements, the account identifier comprises or is associated with a device access token. Based on the device access token, a data element associated with the account is determined. The data element may be accessible to the requestor entity only if it is not access-restricted based on the device access token. Based on the data element, an executable graphic rendering instruction may be generated. The executable graphic rendering instruction may be executed, which includes generating and displaying, on a user interface of the smart device, a dynamic account status indicator relating to the account.
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
G06F 21/44 - Authentification de programme ou de dispositif
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
H04L 67/133 - Protocoles pour les appels de procédure à distance [RPC]
A system can obtain, based on a first control structure that identifies a content type, a non-fungible token (NFT) linked to a content object corresponding to the content type, encapsulate the NFT within a container having a second control structure that restricts output by the content object linked to the encapsulated NFT, and generate a control token compatible with a third control structure that restricts output by the container to a destination corresponding to the control token, determine by the third control structure that the control token is compatible with the third control structure, and transmit, by the second control structure and based on the determination that the control token is compatible with the third control structure, the output from the content object to the destination.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
42.
SCRUBBING ACCOUNT DATA ACCESSED VIA LINKS TO APPLICATIONS OR DEVICES
Systems and methods for scrubbing account data accessed via links to applications or devices are disclosed. A service provider computing system can transmit, to a financial institution computing system, an application programming interface (API) call comprising a request for account data associated with a user account. The system can receive, in response to the API call, the account data according to security access granted to the service provider, and store the account data in non-volatile memory. Upon receiving a data request from a client application executing on a user device, the system can transmit the stored account data to the user device. In response to receiving a scrub command from the financial institution computing system instructing deletion of the account data, the system can delete the account data from memory and transmit an indication to the financial institution computing system confirming deletion of the account data.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
A method, apparatus, and system of providing a management system for digital platforms are disclosed. The method includes creating a master account associated with a first user; providing a management graphical user interface (GUI) to a user device; creating a subordinate account associated with a second user in response to a first user input via the management GUI; establishing one or more spending rules for the subordinate account in response to a second user input via the management GUI; providing a subordinate GUI; generating a subordinate payment token for a payment account associated with the master account; receiving, from a computing system, a request to approve a first in-app purchase (IAP), the request indicating receipt of the subordinate payment token; retrieving the spending rules for the subordinate account; and approving the first IAP from the subordinate account based on the first IAP satisfying the spending rules.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p. ex. des menus
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p. ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
44.
SYSTEMS AND METHODS FOR A GENERATIVE ARTIFICIAL INTELLIGENCE MODEL WITH EVENT PLAN GENERATION
A provider computing system includes at least one processing circuit having at least one processor coupled to at least one memory device. The at least one memory device can store instructions that, when executed by the at least one processor, cause the at least one processing circuit to: receive a query associated with an event; identify one or more parameters absent from at least one first parameter based on an event type of the event; transmit one or more first signals to cause a user device to display a prompt to provide at least one additional parameter regarding the event; receive a first response to the prompt; generate at least one second parameter absent from the first response; determine a plurality of actions to perform the event; and, output a second response identifying the plurality of actions to perform the event, and display a user interface including the second response.
A third verification factor is introduced into the two-factor authentication process, thereby establishing a robust three-factor authentication system. Specifically, a One-Time Password (OTP) that is typically generated for authentication purposes undergoes an additional layer of security by utilizing the OTP in a data authentication scheme of a user's chip-enabled credit, debit, banking, or similar card. An enhanced OTP generator sends the OTP to the card, which encrypts either the OTP or a value derived from the OTP (e.g., such as a hash of the OTP) with a cryptographic key associated with the card to create an encrypted authentication token. The encrypted authentication token is then provided to the authenticating party. Also described is an enhanced OTP generation device in the form of a passbook.
Systems, apparatuses, methods, and computer program products are disclosed for determining a security vulnerability of a computer system. An example method includes initializing a policy based on initial policy data. The example method further includes selecting an action based on the policy and executing, by agent circuitry, the action in the environment. The example method further includes, subsequent to executing the action in the environment, receiving an observation of the environment and determining an updated state from the set of states based on the observation. The example method further includes determining, by the policy, a reward based on the updated state and updating the policy based on the updated state.
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
47.
CONTEXTUAL MODELING FOR ELECTRONIC LOAN APPLICATIONS
An example system for managing an electronic loan application can: detect a triggering event associated with a customer, the triggering event being unassociated with a potential loan transaction; access, in response to the triggering event, financial information associated with the customer for the potential loan transaction; perform pre-decisioning on the financial information to generate an offer for the potential loan transaction; and present the offer for the potential loan transaction to the customer.
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect
A financial institution computing system includes a network circuit exchanging information over a network, a customer database storing financial information, and a transaction circuit. The transaction circuit receives a transaction request associated with a user computing device. The transaction request specifies a financial account. The transaction circuit receives payment card location information indicative of a location of a payment card with respect to the user computing device. The payment card location information indicates that the payment card is within a threshold distance of the user computing device. The transaction circuit authenticates the transaction request using the payment card location information and by determining whether the payment card is associated with an authorized user of the financial account. The transaction circuit authorizes the transaction request based on whether the transaction request is authenticated and transmits a confirmation to a transaction terminal over the network via the network circuit.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/42 - Confirmation, p. ex. contrôle ou autorisation de paiement par le débiteur légal
49.
ENHANCED SEARCH RESULT RELEVANCY FOR INFORMATION RETRIEVAL SYSTEMS
Disclosed in some examples are methods, systems, and machine readable mediums which utilize volume to improve the ordering of search results for various information retrieval systems. This improves relevance as volume is a proxy for interest. As volume changes over time, the relevance of a particular result to a particular search query will increase or decrease over time.
A method comprising receiving, by a first computing system from a second computing system, a pre-approval message indicating a customer is pre-approved to open an account, and receiving account registration information for opening the account and a mobile device identifier, the identifier received from the mobile device via a first near-field communication (NFC) tap between the mobile device and the first computing system. The method comprises providing the mobile device identifier to the second computing system to validate the mobile device, and receiving, from the second computing system, a payment token for the account, where the payment token is automatically provisioned to an application of the mobile device via a second NFC tap between the mobile device and the first computing system.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/06 - Circuits privés de paiement, p. ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/24 - Schémas de crédit, c.-à-d. de "paiement différé"
A service provider computing system includes memory having stored thereon instructions that, when executed by one or more processors, cause the one or more processors to obtain a first set of complaint logs corresponding to one or more user complaints, each complaint log including a resolution comments field providing a textual representation of a resolution for a corresponding complaint log, parse the resolution comments field of each complaint log of the first set of complaint logs to identify one or more key terms, and execute a machine-learning predictive model using the one or more key terms to generate, for each complaint log, a prediction indicating whether a corresponding complaint should have compensation, the machine-learning predictive model being a supervised machine learning model configured to accept the parsed resolution comments field for the first set of complaint logs as inputs and to output the prediction for each complaint log.
G06Q 30/016 - Fourniture d’une assistance aux clients, p. ex. pour assister un client dans un lieu commercial ou par un service d’assistance après-vente
G06F 16/28 - Bases de données caractérisées par leurs modèles, p. ex. des modèles relationnels ou objet
G06F 40/166 - Édition, p. ex. insertion ou suppression
Systems, methods, and apparatuses for defining access permissions based on data type are disclosed. A system provides an account listing via an internet portal accessed on a user device. The account listing can include a financial account linked with a service provider client application. The system provides, via the internet portal, an access permissions listing comprising one or more security settings attributable to the service provider client application. Upon receiving selection of security settings, the system determines whether an incoming application programming interface (API) call comprising an account request transmitted from a service provider computing system complies with the selected security settings. Upon determining that the request does not comply with the security settings, the system declines the account request.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
A method may include receiving, over a first wired phone line interface of a computing device, a telephone call with an originating call identification; passing the telephone call to an attached phone over a second wired phone line interface; matching, at the computing device, the originating call identification to a number list of a plurality of number lists; based on the number list, assigning, using the computing device, the telephone call a threat level; and presenting, on a display device of the computing device, an identification of the threat level.
H04M 3/42 - Systèmes fournissant des fonctions ou des services particuliers aux abonnés
H04M 1/57 - Dispositions pour indiquer ou enregistrer le numéro de l'abonné demandeur à l'appareil de l'abonné demandé
H04M 3/22 - Dispositions de supervision, de contrôle ou de test
H04M 15/06 - Dispositions de comptage, de contrôle de durée ou d'indication de durée pour enregistrer des appels sous forme imprimée, perforée ou autre forme permanente pour enregistrer la catégorie ou le numéro d'un appelant ou d'un appelé
Various examples described herein are directed to systems and methods for processing a payment using a mobile wallet network and issuer. A mobile wallet application provides payment information and an indication if payment may be done directly via the mobile wallet network to a point of sale (POS) terminal. The POS terminal determines which payment network to use. A bill may be sent to the mobile wallet application. The mobile wallet application requests payment authorization from an issuer. The issuer provides the authorization and the transaction is completed between the POS terminal and the mobile wallet application.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
An example computer system for authenticating an electronic communication can include: one or more processors; and non-transitory computer-readable storage media encoding instructions which, when executed by the one or more processors, causes the computer system to create: a notification module programmed to generate a validation code for the electronic communication; and a fraud validation module programmed to accept the validation code and other contextual information associated with the electronic communication to determine an authenticity of the electronic communication.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p. ex. forme, nature, code
The arrangements disclosed herein relate to systems, apparatus, methods, and non-transitory computer readable media for sending, by a roving cryptography device to a first user device of a plurality of user devices, a first cryptographic material when the roving cryptography device is at a first location along a path of the roving cryptography device and sending, by the roving cryptography device to a second user device of the plurality of user devices, a second cryptographic material when the roving cryptography device is at a second location along the path of the roving cryptography device. The first location and the second location are different locations. The first user device and the second user device establish a cryptographic key using the first cryptographic material and the second cryptographic material.
An example hub and registry module can be programmed to authenticate a user device attempting to access a contextual interface; access data to generate the contextual interface, the data being associated with the user device; determine operational information and personal information associated with the user device; combine the operational information and the personal information to generate contextual information associated with the user device; select one or more micro front-ends from a hub of micro front-ends based on the contextual information for the contextual interface; and provide the contextual interface to the user device, wherein the contextual interface includes the one or more micro front-ends.
A first event stream maintains a plurality of privacy preference data from two or more customer relationship management (CRM) systems. A second event stream maintains a plurality of solicitation preference data, each solicitation preference data in the plurality of solicitation preference data determined by applying a set of rules to filter a respective privacy preference data from the plurality of privacy preference data. A request for a current solicitation preference of a client is received from a CRM system of the two or more CRM systems. One or more entries in the second event stream are accessed. The current solicitation preference of the client is determined from the one or more entries in the second event stream. The current solicitation preference associated with the client is provided to the CRM system.
A method may include receiving a login request from a computing device including authentication data for a user identifier; granting access to user identifier for a host application having a current level of authentication; receiving a request from the computing device to perform an action; determining the current level of authentication is less than an action level of authentication of the action; presenting a gaming application on the computing device embedded as part of the host application; monitoring telemetry data of the computing device during gameplay of the gaming application including: user interaction data associated with gaming application, and computing device movement data; calculating a current user behavior fingerprint using the telemetry data; calculating a fingerprint similarity score between the current user behavior fingerprint and a past user behavior fingerprint; determining the fingerprint similarity score is above a threshold similarity score; and based on the second determining, authorizing the action.
A63F 13/71 - Aspects de sécurité ou de gestion du jeu utilisation d'une communication sécurisée entre les dispositifs de jeu et les serveurs de jeu, p. ex. en encryptant les données de jeu ou en authentifiant les joueurs
60.
SYSTEMS AND METHODS FOR SECURING TRANSACTIONS USING A GENERATIVE ARTIFICIAL INTELLIGENCE MODEL
A provider computing system includes a processing circuit having at least one processor coupled to at least one memory device and at least one artificial intelligence (AI) system. The processing circuit performs operations including receiving a first request for a first transaction having one or more first parameters; analyzing a transaction history comprising one or more previous transactions having at least one of the one or more first parameters; determining a response to the first request; and transmitting the response to the first request. The at least one AI system is configured to perform operations including: simulating one or more transactions; identifying one or more second parameters of the one or more simulated transactions; comparing the one or more second parameters to the one or more first parameters; and determining a legitimacy value associated with the first transaction based on the comparison.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
A computing system is configured to manage and synchronize indicators-of-attack (IOA) rules across multiple tenants of an Endpoint Detection and Response (EDR) tool. The computing system is configured to compare rules between an indicated source tenant and a destination tenant. The computing system may then generate output indicating common rules, updated rules, and missing rules between the source and destination tenants. A user, or the system itself, may update the rules at the destination tenant based on the rules at the source tenant. Such an endpoint security synchronization system avoids problems that may occur with manually transferring IOA rules across multiple tenants of an EDR tool which may result in errors that result in false or misleading security alerts.
Aspects of this technical solution can include identifying, by an NFT transaction processor, a first localization property corresponding to an NFT that restricts transfer of the NFT to a first locality, identifying, by the NFT transaction processor, a second localization property corresponding to a second NFT account that restricts transfer of the NFT to a second locality, generating, by the NFT transaction processor in response to a determination that the first localization property and the second localization property differ, a container linked with the second localization property, transferring, by the NFT transaction processor in response to the determination, the NFT to the container, and linking, by the NFT transaction processor, the second public and private key pair with the container to transfer the NFT to the second NFT account.
G06Q 40/04 - TransactionsOpérations boursières, p. ex. actions, marchandises, produits dérivés ou change de devises
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A system includes a processing circuit configured to receive a first input during a conversation. The processing circuit is further configured generate a first message parameter associated with the first input. The first message parameter corresponds with a first task that the processing circuit is authorized to autonomously perform. The processing circuit is further configured to autonomously perform the first task. The processing circuit is further configured to receive a second input from during the conversation. The processing circuit is further configured to generate a second message parameter associated with the second input. The second message parameter corresponds with a second task that the processing circuit is unauthorized to autonomously perform. The processing circuit is further configured to add a human agent device associated with a human agent to the conversation to provide a second response based on the second input and to perform the second task.
H04L 51/02 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p. ex. courriel en utilisant des réactions automatiques ou la délégation par l’utilisateur, p. ex. des réponses automatiques ou des messages générés par un agent conversationnel
G06F 40/35 - Représentation du discours ou du dialogue
64.
Systems and methods for identifying activities of individuals in virtual spaces using identity linking
Systems, apparatuses, methods, and computer program products are disclosed for constructing a foundational identity to establish the identity of an individual and linking the foundational identity to various other identities of the individual in virtual spaces. An example method includes linking identities across virtual spaces. The example method further includes verifying identity activity associated with the various other identities using the link between the various other identities and the foundational identity, and based on the verification of the identity activity, generate outputs.
G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
A system includes a processing circuit configured to receive a request associated with an offer. The processing circuit is further configured to determine a category of the offer. The processing circuit is further configured to model the category with the offer to generate a first amount corresponding to a first transaction instrument and a second amount corresponding to a second transaction instrument for the offer. The processing circuit is further configured to generate and provide an interface corresponding to the first amount and the second amount. The processing circuit is further configured to receive a transaction request corresponding to the first transaction instrument or the second transaction instrument. The processing circuit is further configured to authorize the transaction request for either the first amount or the second amount based on the transaction request corresponding to the first transaction instrument or the second transaction instrument.
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 30/0207 - Remises ou incitations, p. ex. coupons ou rabais
System and techniques to distinguish an artificial satellite from another object are described herein. A physical measurement is gathered of a candidate object for a known satellite in an orbit. This physical measurement is compared to a corresponding known value for the known satellite traveling in the orbit. Based on this comparison, a score is created, the score being a representation of certainty as to whether the candidate object is the known satellite. The score is used to modify a planned communication with the known satellite.
Systems and techniques for are described herein. An application programming interface (API) gateway receives an onboarding request from a self-service onboarding portal. Requirements data is queried for onboarding requirements. The onboarding requirements are deduplicated based on a common taxonomy to create a standardized requirements set. User interface elements are selected for presentation in a user interface based on the standardized requirements set. The user interface is presented in the self-service onboarding portal. An onboarding workflow is executed across internal systems to fulfill the requirements using input received from the user interface. A status of the onboarding request is returned to the self-service onboarding portal.
Systems and methods may generally provide a non-fungible token for automatic execution of aspects of an estate. An example method may include receiving information from a user, corresponding to a financial asset, the information identifying a right to be conferred to an entity on occurrence of a trigger event, generating a non-fungible token encapsulating the right to be conferred to the entity related to the financial asset, and storing the non-fungible token on a secure chain at a server. The example method may include determining whether the trigger event related to the user has occurred, and automatically outputting, in response to determining the trigger event has occurred, an indication of the non-fungible token to the entity.
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
Various examples are directed to computer-implemented systems and methods for a family advisor safety net. A method includes receiving a next generation input indicating desired investment activity of a next generation user and identity of a guardian of the next generation user, and receiving a guardian account input including information regarding an account of the guardian to be used by the next generation user and associated guardrail information. A family safety net platform is generated by linking the next generation user to the guardian account for the desired investment activity, and customized guardrails are calculated for the family safety net platform using the associated guardrail information. Limited access by the next generation user is provided to the guardian account using the customized guardrails for the family safety net platform, and proceeds from investment activity of the next generation user are dynamically divided between the guardian and the next generation user.
Systems and techniques may generally be used for detecting a spoofing or mimicking attempt of a customer or employee voice. A method for training a machine learning model to detect a fraudulent attempt to mimic an employee using a synthetic voice copy includes receiving a voice sample of an employee of an enterprise, normalizing the voice sample through a signal processing pipeline, generating a synthetic voice sample using the voice sample, training a model to identify whether received audio includes a synthetically generated voice sample using the voice sample and the synthetic voice sample, and outputting the trained model.
G10L 25/69 - Techniques d'analyse de la parole ou de la voix qui ne se limitent pas à un seul des groupes spécialement adaptées pour un usage particulier pour l’évaluation de signaux de voix synthétiques ou décodés
G10L 17/04 - Entraînement, enrôlement ou construction de modèle
G10L 17/26 - Reconnaissance de caractéristiques spéciales de voix, p. ex. pour utilisation dans les détecteurs de mensongeReconnaissance des voix d’animaux
Systems and techniques may be used for detecting fraudulent interactions during a session by analyzing user behavior using a trained machine learning model. An example technique may include receiving transaction data including metadata related to a plurality of transactions with a plurality of accounts, identifying, using the transaction data, a subset of transactions of the plurality of transactions that trigger at least one suspect condition, and determining, from respective metadata of the subset of transactions, at least one related feature of a portion of the subset of transactions. The example technique may include generating a graph of the portion of the subset of transactions based on the at least one related feature, the graph identifying respective accounts of the plurality of accounts corresponding to the subset of transactions, and outputting the graph for display.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
72.
ARTIFICIAL INTELLIGENCE DRIVEN DOMAIN-SPECIFIC VALIDATION SYSTEM
Systems, apparatuses, methods, and computer program products are disclosed for efficiently handling queries. An example method includes receiving a query from a user device and generating an embedding representation of the query. The example method further includes performing a similarity comparison between the embedding representation of the query and a set of embedding representations of historical document sections stored in a historical document repository and selecting a relevant embedding representation of a historical document section stored in the historical document repository for the query. The example method further includes querying a target large language model using the embedding representation of the query and the relevant embedding representation of the historical document section and providing a query response to the user device.
Embodiments of the present disclosure enable improved methodologies of scanning files for target files, for example EUCTs, in large, complex data systems. Embodiments of the present disclosure sufficiently narrow the population of candidate files to a reduced candidate file set that narrowly targets candidate files in a manner that enables processing of such significant candidate files while remaining accurate and efficient. Embodiments reduce the amount of manual effort that may be involved in scanning for target files in file repositories of a data system. Example embodiments identify a plurality of candidate data files associated with one or more file repositories, determine, from the plurality of candidate files, a reduced set of candidate data files, wherein the reduced set of candidate data files are determined by applying a hierarchy of scan criteria to the plurality of candidate data files, and output the reduced set of candidate data files.
A system includes a processing circuit configured to receive transaction data of a person. The transaction data relates to a transaction associated with a category. The processing circuit is further configured to determine proximity parameters of the person. The proximity parameters correspond to a proximity to at least one merchant belonging to the category. The processing circuit is further configured to receive property data relating to real estate properties. The processing circuit is further configured to model the property data with the proximity parameters to generate property match data for the person. The property match data corresponds to at least one of the real estate properties that include the proximity to the at least one merchant belonging to the category associated with the transaction. The processing circuit is further configured to generate and provide, to a user device, an interface corresponding to the property match data.
A computing system may be configured for generating a source-based confidence score in association with output from a Large Language Model (LLM). The computing system may obtain computer-generated text output from the LLM as an answer to an inquiry submitted by a computing device. The computing system may determine a confidence score in association with the answer to the inquiry based on an evaluation of one or more sources used by the LLM to generate the answer and determine whether the confidence score associated with the answer satisfies a quality threshold. Based on the confidence score associated with the answer satisfying the quality threshold, the computing system may generate an annotated answer including the answer and an indication of quality based on the evaluation of the one or more sources used by the LLM to generate the answer. The annotated answer may be output in response to the inquiry.
Systems and techniques may generally be used for chatbot-based fraud assistance. An example method may include initiating a chatbot session with a user and receiving a prompt from the user related to suspected suspicious activity in an account. The method may include retrieving, using a Retrieval-Augmented Generation (RAG) component, contextual information from at least one of transaction data and a knowledge base. The method may include evaluating the prompt using a large language fraud model and the retrieved contextual information to determine a response.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06F 16/3329 - Formulation de requêtes en langage naturel
H04L 51/02 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p. ex. courriel en utilisant des réactions automatiques ou la délégation par l’utilisateur, p. ex. des réponses automatiques ou des messages générés par un agent conversationnel
Systems, methods, and apparatuses for providing a customer a central location to manage permissions provided to third-parties and devices to access and use customer information maintained by a financial institution are described. The central location serves as a central portal where a customer of the financial institution can manage all access to account information and personal information stored at the financial institution. Accordingly, the customer does not need to log into each individual third-party system or customer device to manage previously provided access to the customer information or to provision new access to the customer information. A user additionally is able to have user data and third-party accounts of the user deleted from devices, applications, and third-party systems via a central portal. Restrictions on how user data is used by devices, applications, and third-party systems can be imposed via a central portal.
G06Q 20/14 - Architectures de paiement spécialement adaptées aux systèmes de facturation
G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 30/018 - Certification d’entreprises ou de produits
A method may include accessing a semantic map between a schema of a relational database (RDB) and a resource description framework (RDF) data model, the semantic map defined according to a first semantic ontology; applying the semantic map to data loaded from the RDB to generate a first set of semantic objects; storing the first set of semantic objects in a staging RDF triplestore; executing a script to transform the first set of semantic objects into a second set of semantic objects according to a second semantic ontology; and storing the second set of semantic objects into a production RDF triplestore.
Various embodiments described herein relate to systems, methods, and non-transitory computer-readable media structured to perform server-to-device secure data exchange using a device access token. In an embodiment, a smart device receives, from a requestor entity provided to the smart device, an account data provisioning request for an account. Based on the account data provisioning request, an account identifier for the account is determined. In some arrangements, the account identifier comprises or is associated with a device access token. Based on the device access token, a data element associated with the account is determined. In some embodiments, the data element is accessible to the requestor entity only if it is not access-restricted based on the device access token. Based on the data element, an executable graphic rendering instruction is generated. The executable graphic rendering instruction is executed, which includes generating and displaying, on a user interface of the smart device, a dynamic account status indicator relating to the account.
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes
G06F 21/44 - Authentification de programme ou de dispositif
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
H04L 67/133 - Protocoles pour les appels de procédure à distance [RPC]
80.
System and method for financial health visualization
Various examples are directed to computer-implemented systems and methods for financial health visualization. A method includes providing an interactive interface for a user on a graphical user interface (GUI) of a local user device, where providing the interactive interface includes using an instance of a program that is prevented from accessing networks once running to ensure security of user input. Input is received from the user generated by user manipulation of a plurality of sliders on the interactive interface. In response to the input, a plurality of financial measures indicative of a financial health of the user are calculated based on the input, and the plurality of financial measures are displayed on the interactive interface. Further in response to the input, a plurality of vertical stacked line graphs are adjusted based on the input, and the adjusted plurality of vertical stacked line graphs are displayed on the interactive interface.
G06F 3/04847 - Techniques d’interaction pour la commande des valeurs des paramètres, p. ex. interaction avec des règles ou des cadrans
G06F 3/04817 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect utilisant des icônes
G06Q 40/06 - Gestion de biensPlanification ou analyse financières
G06T 11/20 - Traçage à partir d'éléments de base, p. ex. de lignes ou de cercles
81.
Systems and methods for monitoring a budget scope in real time
Systems, methods, and apparatuses include a provider computing system including a network interface structured to facilitate data communication via a network and a processing circuit comprising a processor and memory. The processing circuit is structured to receive a scope and a budget. The processing circuit includes a management circuit structured to determine a scope merchant category for items offered for sale by a merchant that match the scope and wherein the management circuit is structured to interpret the budget to determine a maximum amount of funds for the purchase. The processing circuit receives a selected item. The management circuit determines a category in comparison to the scope and a cost item in comparison to the budget to determine if the cost of the item is less than the maximum amount of funds.
A computing system including one or more processing circuits configured to receive a request from a first user device of a first user associated with a first account to create an allocated user portion within the first account, create the allocated user portion based on the request from the first user device, generate credentials for a second user configured to allow the second user to perform one or more actions associated with allocated funds of the allocated user portion within the first account and to disallow the second user from performing actions associated with non-allocated funds within the first account that are outside of the allocated user portion, and transmit the credentials to one of the first user device of the first user or a second user device of the second user.
G06Q 40/02 - Opérations bancaires, p. ex. calcul d'intérêts ou tenue de compte
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
83.
SYSTEMS AND METHODS FOR DEPOSIT TRANSFER CUSTOMIZATION
A system includes a processing circuit configured to determine a billing period based on a billing frequency corresponding to a bill payment. The processing circuit is further configured to determine deposits that will be made into a first account that will occur during the billing period. The processing circuit is further configured to generate transfer preferences for the deposits. The processing circuit is further configured to receive an indication that a deposit has been received by the first account. The processing circuit is further configured to transfer an amount associated with the deposit from the first account to a second account, wherein the second account is associated with the bill payment and the amount transferred is based on a bill payment amount.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 40/02 - Opérations bancaires, p. ex. calcul d'intérêts ou tenue de compte
Systems and techniques for trusted validation agent platform are described herein. A transaction is detected as potentially fraudulent based on user profile data of a user. A trusted validation agent is determined for the transaction using the user profile data. Remediation instructions are generated for the trusted validation agent using transaction data of the transaction. The remediation instructions are transmitted to the trusted validation agent. A disposition is determined for the transaction based on input received from the trusted validation agent. Transaction handling instructions are transmitted to a transaction processing system based on the disposition.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
85.
DEVICE-SPECIFIC PASSKEY COMMUNICATION SYSTEMS AND TECHNIQUES
Systems and techniques may generally be used for device-specific passkey communication. An example technique may include authenticating a customer at a banking device, determining, at the banking device, that the customer is a registered mobile app user, and retrieving, in response to determining that the customer is the registered mobile app user, a passkey paired to an account of the customer and paired to a mobile device of the customer. The example technique may include sending, from the banking device via a proximity-based communication protocol, the passkey to the mobile device of the customer.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
With the increasing reliance on digitization, evolving business models, and increasing regulatory and compliance requirements, organizations face new and unknown operational risks An example product resiliency and health assessment system provides product-level risk identification, resiliency and health reporting by automatically retrieving and assessing multi-dimensional data, creating a health scorecard to convey discrete measurement of the health of the overall product and the sub-components of the product, and providing actionable remediation plans for identified weaknesses.
Disclosed in some examples are methods, systems, and machine-readable mediums for simultaneously capturing an image of multiple checks for deposit. An example method includes receiving, by a bank computing system and from a user device, a multi-check image depicting a front side of multiple checks for deposit with a bank during a communication session. The bank computing system may generate a front side image for each of the multiple checks from the multi-check image. The bank computing system may receive electronic signature data for a customer, during the communication session, and generate a back side data for each of the multiple checks using the electronic signature data. A check image file may be stored for each respective check of the multiple checks, with each check image file including the back side data, such as a generated image, and the front side image for the respective check.
Various systems and methods for providing a digital estate plan system are described herein. An online system for managing beneficiaries and assets of a will is configured to access transaction data related to a user; identify a person or a property based on the transaction data; present a confirmation request to the user to confirm that the person is a beneficiary of the will or that the property is an asset of the will; and add, in response to receiving a confirmation from the user, the person to a list of beneficiaries of the will, or the property to a list of assets of the will.
Systems, apparatuses, methods, and computer program products are disclosed for user-defined synthetic data generation. A method includes generating, by interface generation circuitry, a synthetic data generation user interface (UI) comprising a plurality of synthetic data generation UI elements. The method also includes causing presentation, by communications hardware, of the synthetic data generation UI. The method also includes receiving, by the communications hardware, a user input set comprising a plurality of user input indications generated based on user interactions with the synthetic data generation UI elements. The method also includes preprocessing, by synthetic data generation circuitry, the user input set to generate a parameter specification set for generating a synthetic dataset.
Systems and methods relating to a distributed ledger-based payment rail are provided. A computer-implemented method includes determining whether a sending financial institution of a sender of a funds transfer and a receiving financial institution of a recipient of the funds transfer each operates a node on a permissioned distributed ledger network. The method further includes routing a funds transfer request message to the permissioned distributed ledger network in response to determining that the sending financial institution and the receiving financial institution each operates a node on the permissioned distributed ledger network. The method further includes destroying, by an issuer, the cash states in response to the recipient redeeming cash states associated with the funds transfer.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/06 - Circuits privés de paiement, p. ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/42 - Confirmation, p. ex. contrôle ou autorisation de paiement par le débiteur légal
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
91.
Computer-based system to validate build integrity of software products
Techniques are described for validating build integrity of software products, such as applications or containers. More specifically, this disclosure describes a build integrity validation system that analyzes build artifacts resulting from a software build process to create source code assertions, and compares the assertions against the source code from which the build artifacts were produced. The build integrity validation system validates that a particular build artifact is producible by the source code to ensure that no additional code was introduced during the build process. The build integrity validation system may also reverse the analysis to validate that the source code is able to produce the build artifacts to ensure that no code was removed or modified during the build process. The build integrity validation system identifies and reports identified discrepancies between the source code and the build artifacts resulting from the software build process of the source code.
A provider computing system can include at least one processing circuit having at least one processor coupled to at least one memory device. The at least one memory device can store instructions thereon that, when executed by the at least one processor, cause the at least one processing circuit to detect initiation of a session to access an account by a user device of a user, detect correlations between an event and one or more previous occurrences of one or more events similar to the event, generate a plurality of actions to address the event, transmit one or more signals to cause the user device to display a user interface including selectable elements to indicate the plurality of actions, receive an indication of a selection of a selectable element of the selectable elements, and implement an action to address the event.
G06F 40/40 - Traitement ou traduction du langage naturel
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
A merchant device provides merchant data to a customer device. The merchant data cause a mobile application to launch on the customer device. Customer authentication data are received at a merchant server from the mobile application on the customer device. A customer is authenticated at the merchant server as a function of the customer authentication data. A line of communication is maintained between the customer device, the merchant server and the merchant device.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
A method may include generating a digital avatar data structure; associating the digital avatar data structure with a user account; presenting an original appearance of a digital avatar in a user interface based on appearance values in the digital avatar data structure; receiving an indication of user financial activity associated with the user account; in response to receiving the indication, inputting the user financial activity into a machine learning model; updating the appearance values of the digital avatar data structure based on an output of the machine learning model; and presenting an updated appearance of the digital avatar after the updating in accordance with the updated appearance values
A method may include presenting a user interface, the user interface including: a graph presentation area; and a graph link type confirmation area; executing a knowledge graph database search query; in response to the executing, receiving a set of tuple objects corresponding to relationships between entities in the knowledge graph database; populating the graph presentation area with representations of the entities and links connecting the representations of the entities; populating the graph link type confirmation area with a selectable user interface element configured to confirm a relationship of the relationships between entities; receiving activation of the selectable user interface element; and in response to receiving the activation, updating the graph presentation area.
A financial reporting framework adapted to provide business-specific financial reporting tailored to anticipated reporting needs. The system begins by collecting data encompassing customer transactions, historical financial details, and business-specific parameters, which is analyzed through a blend of artificial intelligence (AI) and machine learning (ML) algorithms. Reporting content is then customized to align with individual business characteristics and requirements. A predictive algorithm further enhances the system, forecasting future reporting needs based on analysis of historical data trends, current financial activities, and market analysis. Thereafter, the system and method enable automatic generation of reports, each precisely tailored to the anticipated future requirements of the business. To maintain accuracy and relevance, the AI and ML algorithms frequently incorporate new data and customer feedback to ensuring reports remain aligned with the evolving needs of commercial banking.
G06Q 10/067 - Modélisation d’entreprise ou d’organisation
G06Q 10/0631 - Planification, affectation, distribution ou ordonnancement de ressources d’entreprises ou d’organisations
G06Q 10/0637 - Gestion ou analyse stratégiques, p. ex. définition d’un objectif ou d’une cible pour une organisationPlanification des actions en fonction des objectifsAnalyse ou évaluation de l’efficacité des objectifs
97.
SECURED POSITION AWARE CONTINUOUS AUTHENTICATION MESH NETWORK
Systems and methods are directed to securing network access using a digital gate constructed by position-aware compute beacons that form a beacon mesh. A compute beacon in the beacon mesh, detects a request for access from a client device. In response, the beacon mesh, performs a validation process to validate that the client device is located within a digital gate formed by the beacon mesh. The validation process includes detecting, by at least three compute beacons within the beacon mesh, a received signal strength indicator (RSSI) from the client device; triangulating a position of the client device based on the RSSI; and determining whether the position of the client device is within the digital gate. Based on a result, the compute beacon provides a reply to the client device either comprising a challenge request or a session rejection. Subsequently authentication of the client device results in network access.
H04W 12/104 - Intégrité de la localisation, p. ex. géolocalisation sécurisée
H04W 12/64 - Sécurité dépendant du contexte dépendant de la localisationSécurité dépendant du contexte dépendant de la proximité utilisant des zones géorepérées
H04W 84/18 - Réseaux auto-organisés, p. ex. réseaux ad hoc ou réseaux de détection
98.
MODEL-BASED PROCESS TO VALIDATE BUILD INTEGRITY OF SOFTWARE PRODUCTS
Techniques are described for a model-based process to validate build integrity of software products. A build integrity validation system generates a build artifact model including one or more software components extracted from a build artifact resulting from a software build process of source code and generates a source code including one or more software components extracted from the source code. The system compares the software components of the build artifact model and the software components of the source code model, and identifies at least one discrepancy between the build artifact model and the source code model. The system determines a level of risk associated with the at least one discrepancy and, in response to determining the level of risk associated with the at the least one discrepancy, generates a decision indicating whether the at least one build artifact is approved for use in a software product.
G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
99.
Cryptographic random identification (CRID) for authentication and indentification of users
The arrangements of the present disclosure relate to systems, apparatuses, methods, and non-transitory computer-readable media for authenticating a participant associated with a first device by a second device, including generating, by the second device, a random number, determining, by the second device, a first Random Identifier (RID) using an ID of the first participant associated with the first device, the random number, and a key, sending, by the second device to the first device, the random number in response to a request received by the second device from the first device, receiving, by the second device from the first device, a second RID, and at least one of identifying or authenticating, by the second device, the first participant using the second RID for the request.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A system and method for verifying code bundles. One method includes receiving, from a client device, a request for information to verify an authorization of a code bundle, the code bundle associated with a first signed code segment and a second signed code segment. The method further includes generating a list of certificates associated with the code bundle and including a first certificate associated with the first signed code segment and a second certificate associated with the second signed code segment. The method further includes transmitting, to the client device, a message comprising the list of certificates, the list of certificates generated by a code sign management system (CSMS) and associated with the code bundle. The method further includes verifying, from the message causing the client device to verify the code bundle and based on the list of certificates, the code bundle.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité