Systems and methods for customizing a machine learning model for responding to a user query. The system receives a user query from a user of a conversational program. The system determines a set of model requirements for a first machine learning model. Based on the set of model requirements, the system determines first supplemental data corresponding to the required input data and a formatting requirement corresponding to an activation pattern. The system performs pre-processing to obtain the first supplemental data from a first supporting software program and generates the first response using the first machine learning model.
A multi-function transaction card may receive, from shelf sensors, first data indicating that items have been removed from shelves by a customer of a merchant, and may receive, from shopping cart sensors, second data indicating that the items have been placed in a shopping cart. The multi-function transaction card may receive, based on the first data and the second data, item data identifying the items placed in the shopping cart, wherein the item data is received from price tags of the items. The multi-function transaction card may store the item data, and may provide, to a transaction terminal of the merchant, the item data identifying the items and customer data identifying the customer. The multi-function transaction card may receive, from the transaction terminal, transaction data identifying a transaction that charges the multi-function transaction card for a total cost of the items.
A47F 9/04 - Comptoirs de vérification, p. ex. pour magasins à libre-service
B62B 5/00 - Accessoires ou détails spécialement adaptés aux voitures à bras
G06Q 20/18 - Architectures de paiement impliquant des terminaux en libre-service, des distributeurs automatiques, des bornes ou des terminaux multimédia
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 30/0207 - Remises ou incitations, p. ex. coupons ou rabais
Systems as described herein may classify entities based on cleansed transactions. An entity classification server may obtain transaction data indicating an entity name and an entity code in a non-standardized format. A recommended entity code in a standardized format may be determined from a remote data store. The entity classification server may generate a score indicating a likelihood that the recommended entity code correctly identifies the entity indicated in the transaction data using a machine classifier. The entity classification server may update the entity code in the transaction data with the recommended entity code based on the score exceeding a threshold value. Accordingly, a transaction summary comprising the transaction data may be generated and provided to a computing device.
G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
In some implementations, a system may receive information related to a virtual credential cross-referenced with a deactivated credential and a primary credential that replaces the deactivated credential. The system may receive a request to authorize a transaction using a physical transaction device associated with the deactivated credential. The system may obtain authorized user information associated with the virtual credential based on the request. The system may present an interface to validate an identity of a user attempting to authorize the transaction using the physical transaction device. The system may receive, via the interface, information related to the identity of the user attempting to authorize the transaction using the physical transaction device. The system may authorize the request based on the information related to the identity of the user attempting to authorize the transaction matching the authorized user information associated with the virtual credential.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
5.
SELECTIVE UNLOCKING OF A PHYSICAL CARD TO RESTRICT UNAUTHORIZED ACCESS
In some implementations, a device may receive, from a user device, a request to activate a physical card. The request may indicate information relating to the physical card and request-specific data. The device may activate the physical card in response to the request. The device may monitor, while the physical card is activated, for an expiration of an activation time duration. The activation time duration may be according to the request-specific data. The device may detect that a deactivation condition for deactivating the physical card is satisfied. The deactivation condition may be the expiration of the activation time duration or an occurrence of an exchange involving the physical card. The device may deactivate the physical card in response to satisfaction of the deactivation condition and without involvement of the user device.
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
In some implementations, a user device may transmit, to an onboarding system, a first inquiry. The user device may receive a first response, from the onboarding system and in response to the first inquiry. The first response may have been determined by a machine learning model. The user device may transmit, to the onboarding system, a second inquiry. The user device may receive, from the onboarding system, an indication of an escalation contact in response to the second inquiry. The user device may transmit, to the onboarding system, feedback associated with the first response. The user device may receive, from the onboarding system, an indication that the machine learning model has been updated based on the feedback.
In some implementations, a device may obtain raw data including events data indicating a series of events involving interactions between an entity and an individual, and including identity data for the individual. The device may process the raw data to determine, based on the events data and the identity data, a communication type, a communication channel, and a content for a communication to the individual. The device may generate, in accordance with processing the raw data, communication data that includes the content and has a format used for the communication channel. The device may transmit the communication data for an endpoint of the communication channel to cause transmission of the communication, including the content and using the communication type, via the communication channel.
In some implementations, a cybersecurity enforcement system may generate a synthetic phishing attempt targeting a user. The cybersecurity enforcement system may update, based at least in part on a mode of the synthetic phishing attempt, a risk profile specific to the user.
Systems and methods for authentication may include an authentication server. The authentication server may include a processor and a memory. The processor may be configured to transmit an authentication request. The processor may be configured to receive a first response that is responsive to the authentication request, the first response comprising a first cryptogram. The processor may be configured to generate a first challenge based on the first response. The processor may be configured to encrypt the first challenge with a symmetric key. The processor may be configured to transmit the first challenge receive a second response that is responsive to the first challenge, the second response comprising a second cryptogram. The processor may be configured to authenticate the second response.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
Disclosed embodiments may include a method for authentication using partitioned authentication tokens. The system can receive an indication of a first and second user device associated with a user. The indication can include a priority order of the first and second user device. The system can then receive an authentication request associated with the user from an application. The system can generate an authentication token to authenticate the user and partition the authentication token to create a first token portion and a second token portion. The system can determine which device of the first and second user device has a higher priority based on the priority order and can transmit the first token portion and the second token portion to the devices in order of priority. The system can receive a receipt of the token portions and transmit instructions to the application to authenticate the user.
A computer-implemented method to enable short-range wireless communication via a webpage on a computing device includes receiving, via a web-browser executing on the computing device, from the webpage, a first request to execute a computer-executable instruction, the computer-executable instruction requests data from an enterprise server. The method also includes triggering, in response to a second request from the enterprise server to authenticate the first request, the web-browser to execute a predetermined computer program. The method also includes scanning, by the predetermined computer program a cryptogram from a contactless card to authenticate the cryptogram and cause the enterprise server to send the data. The method also includes executing, via the web-browser, the computer-executable instruction from the first request in response to receiving the data sent by the enterprise server.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 67/02 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP]
In some implementations, a user device may receive, from an authentication system, a first request for a location associated with the user device. The user device may transmit, to the authentication system, an indication of the location associated with the user device, in response to the first request. The user device may receive, from the authentication system, a second request for a location associated with a physical card. The user device may transmit a sequence, using short-range electromagnetic waves, to the physical card. The user device may monitor for a response from the physical card to determine the location associated with the physical card. The user device may transmit, to the authentication system, an indication of the location associated with the physical card, in response to the second request.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
13.
AUTOMATED ASSESSMENT OF SOFTWARE-AS-A-SERVICE PLATFORMS
In some implementations, a user device may transmit, to an assessment system, a request to onboard a software-as-a-service (SaaS) platform. The user device may receive, from the assessment system, a set of responses to a set of questions associated with the SaaS platform. The user device may further receive, from the assessment system, a report including a set of risk scores. The set of risk scores may be calculated from the set of responses (e.g., by the assessment system). The user device may transmit a command to onboard the SaaS platform based on the set of risk scores.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
14.
SYSTEMS AND METHODS FOR CUSTOMIZING A MACHINE LEARNING MODEL
Systems and methods for customizing a machine learning model for responding to a user query. The system receives a user query from a user of a conversational program. The system determines a set of model requirements for a first machine learning model. Based on the set of model requirements, the system determines first supplemental data corresponding to the required input data and a formatting requirement corresponding to an activation pattern. The system performs pre-processing to obtain the first supplemental data from a first supporting software program and generates the first response using the first machine learning model.
In some implementations, a device may obtain telemetry data associated with the cloud computing environment, wherein the telemetry data indicates one or more processing parameters of an application deployed in the cloud computing environment via a current virtualized node. The device may determine, for the application, a processing capacity utilization score of the application. The device may determine, based on the processing capacity utilization score and the one or more processing parameters, one or more recommended virtualized nodes from one or more virtualized nodes associated with the cloud computing environment. The device may perform an action associated with a selection of an operating virtualized node for the application from the current virtualized node and the one or more recommended virtualized nodes.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
16.
TEXT MESSAGES FOR INTERACTING WITH INTEGRATED APPLICATION PROGRAMMING INTERFACES
In some implementations, a user device may transmit a first text message that includes a first codeword. Accordingly, the user device may receive an indication of a first confirmation of a first request associated with the first text message. The user device may transmit a second text message that includes a second codeword. Accordingly, the user device may receive an indication of a second confirmation of a second request associated with the second text message.
In some implementations, a processing system may receive a plurality of email messages from an email service. The processing system may provide the plurality of email messages to a classification model in order to receive an indication of at least one relevant email message in the plurality of email messages. The processing system may extract, from the at least one relevant email message, a snippet corresponding to a field in the form. The processing system may generate a draft copy of the form that includes the snippet in the field and may output, to a user device, an indication that the snippet was added to the form.
A method and related system for generating a document using different portions of an embedding space includes obtaining a related document based on a first text, generating first vectors in an embedding space based on the first text and second vectors in the embedding space based on the related document, and determining a first region in the embedding space based on the first vectors and a second region in the embedding space based on the second vectors. The method further includes generating a first portion of a structured document based on the first vectors and third vectors in a third region within the first region but not within the second region. The method further includes generating a second portion of the structured document based on the first and second vectors and the first portion of the structured document.
G06F 16/383 - Recherche caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
In a method of processing a cash transaction, a transaction processing system receives an account transaction request identifying a user account and a cash transaction to be carried out using a cash service machine (CSM). A set of CSMs available for processing the account transaction request is determined and a list of available CSMs is transmitted to the requesting user device. A request to process the transaction including an identification of a selected CSM is received the user device or the selected CSM. A unique authentication code is generated and transmitted to the processing requester. The transaction processing system receives from the non-process requester, an authentication request including a purported authentication code. The system then verifies that the purported authentication code matches the unique authentication code. Upon positive verification, the system transmits an instruction to the CSM to carry out a cash exchange according to the requested account transaction.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p. ex. lecture de la lumière blanche réfléchie
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 40/02 - Opérations bancaires, p. ex. calcul d'intérêts ou tenue de compte
In some implementations, a system may obtain operation data associated with a plurality of operations assigned to a user. The system may compute a plurality of operation metrics based on the operation data, each operation metric in the plurality of operation metrics corresponding to a respective operation in the plurality of operations. The system may identify a single operation of the plurality of operations based on the plurality of operation metrics. The system may cause a user interface to be displayed, wherein the user interface includes an indication of the single operation, wherein the user interface does not include an indication associated with any other operation from the plurality of operations.
In some embodiments, the present disclosure provides an exemplary technically improved computer-based method utilizing an element level mapping module that determines a correlative relationships of interconnected nodes and edges in relation to an output data element and an input data element, and determines an appropriate graph of the relationships.
In some implementations, a connecting system may receive, from a first data source, event information associated with a travel itinerary and may receive, from a second data source, an indication of at least one destination location. The connecting system may further receive a preference associated with a user. The connecting system may provide the event information, the indication of the at least one destination location, and the preference to a machine learning model in order to receive an indication of a preferred vehicle option. The connecting system may output a representation of the preferred vehicle option to a user device associated with the user. The connecting system may receive, from the user device and in response to outputting the representation, a confirmation of the preferred vehicle option. The connecting system may communicate with an application programming interface function, in response to the confirmation, to secure the preferred vehicle option.
Systems and methods for generating user-specific textual and image-based outputs, in response to a user query, for provision of a matching item are disclosed herein. For example, the system may receive a query that includes a textual description. The system may retrieve a user profile for a user associated with the query. Based on the query and the user profile, the system may generate outputs and images using a machine learning model. Based on the outputs, the system may generate graphical representations. The system may receive a selection of a graphical representation. Based on the selection of the graphical representation, the system may enable access to an item that corresponds to the graphical representation.
In some implementations, a remediation system may receive, a tracking system, a set of tickets associated with at least one data record. The remediation system may search, in the at least one data record and using a set of contexts indicated in the set of tickets, for a set of sensitive data snippets. The remediation system may generate a set of proposed remediations corresponding to the set of sensitive data snippets. The remediation system ma6y output, for each sensitive data snippet in the set of sensitive data snippets, a corresponding proposed remediation in the set of proposed remediations. The remediation system may selectively apply the set of proposed remediations based on inputs from a user.
Systems and methods for generating user-specific textual and image-based outputs corresponding to existing items, in response to user queries, are disclosed herein. For example, the system may receive a query that includes a textual description. The system may retrieve a user profile for a user associated with the query. Based on the query, the system may obtain a description of an item. Based on the query, the user profile, and the description, the system may generate an output and an image using a machine learning model. Based on the output and the image, the system may generate a graphical representation of the item. The system may receive a selection of the graphical representation of the item. Based on the selection of the graphical representation, the system may enable access to the first item.
In some implementations, a device may receive, from a user device associated with an entity, a request identifying a content unit that is to be loaded into an electronic document. The device may transmit, via a first service, a configuration request for configuration data for the content unit. The device may receive, via the first service, the configuration data. The device may transmit, via a second service, a data request for entity-specific data for the content unit. The device may receive, via the second service, the entity-specific data. The device may transmit, for the user device, a response indicating presentation data to cause insertion of the content unit, in accordance with the presentation data, into a document object model of the electronic document, where the presentation data is based on the configuration data and the entity-specific data.
In some implementations, a content stage transitioning system may receive content interaction data, associated with a content stage of a plurality of content stages, that satisfies one or more content interaction conditions. The content stage transitioning system may receive an indication that a display associated with the content stage is inactive. The content stage transitioning system may transmit, based on the one or more content interaction conditions being satisfied and the display being inactive, an indication to transition to another content stage of the plurality of content stages.
G06F 16/958 - Organisation ou gestion de contenu de sites Web, p. ex. publication, conservation de pages ou liens automatiques
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect
Systems and methods for customizing the testing process of a software program. In some aspects, the system receives a set of requirements for a software program, including logical rules linking input values to output values of the software program. The system receives a set of failure types that correspond to previous deviations from the logical rules in the set of requirements. Based on the set of failure types and the set of requirements, the system generates a configuration file, including fixtures and validations, where the fixtures and validations describe logical relations between intermediate states of the software program during execution. Based on the configuration file, the system generates a plurality of test cases, including parameters and endpoints. Using the plurality of test cases, the system regulates the software program to produce output values from input values in accordance with the set of requirements.
A dynamic transaction card comprising an outer surface, a sensor, and a display disposed on the outer surface is disclosed. The dynamic transaction card can include an antenna and a microcontroller controlling a dynamic transaction card application. The dynamic transaction card can also include a secure payment chip having a plurality of contact points and storing a passive tag associated with a user. The passive tag can include a unique identifier and one or more log-in credentials for the user. When making a purchase, the user can be authenticated via a connection between the dynamic transaction card and a user device. The unique identifier can be used as an authentication token and the one or more log-in credentials can be verified against log-in credentials associated with the user.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
Auditing data containing sensitive data are stored in a data structure comprising data objects. Each data object comprises one or more pairs of a name and a value. Pairs that are flagged or identified as containing sensitive data are partially encrypted; the value is encrypted using an asymmetric key and the name corresponding to the encrypted value remains unencrypted. Some pairs that are not flagged or identified as containing sensitive data are left unencrypted. Unencrypted data may be stored in the partially encrypted auditing data as plain text. The auditing data may be analyzed to generate business metrics and identify application errors. The auditing data may also be queried, and data objects containing unencrypted pairs and/or partially encrypted pairs may be returned based on matching unencrypted names and/or values to the data query.
G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
G06F 40/18 - Édition, p. ex. insertion ou suppression de tableauxÉdition, p. ex. insertion ou suppression utilisant des lignes réglées de tableurs
G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p. ex. lecture de la lumière blanche réfléchie
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 30/018 - Certification d’entreprises ou de produits
G06Q 30/0201 - Modélisation du marchéAnalyse du marchéCollecte de données du marché
Systems and methods of the present disclosure include computer systems for improving data security. To do so, an authorization request associated with a user profile is received, including a time-stamp for a profile activity, a profile identifier, and a value. Application analytics data for a software application on a user device associated with the user profile is accessed, including an open event indicator indicating a time of a loading, and a close event indicator indicating a time of a termination. An open period of the software application at the time-stamp is determined based on the application open event indicator and the application close event indicator. A reduced set of fraud checks is selected and executed when the time-stamp associated with the profile activity is within the open period of the software application. A fraud determination is generated, and an authorization notification is generated based on the fraud determination.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
32.
SYSTEMS AND METHODS FOR RECOMMENDED SORTING OF SEARCH RESULTS FOR ONLINE SEARCHING
A method may include receiving data related to a plurality of items and processing the data using a machine learning model. The machine learning model may have been trained to output a score for each of the plurality of items based on one or more target variables and to process the data using a grouped linear regression for groups of items based on sub-divisions of the groups. The method may include storing the output in a data store. Each entry in the data store may include at least an item identifier for an item, a group name, and the score. The method may include receiving search criteria for a search and identifying a set of search results in a group of items. The method may include determining an order of the set of search results and outputting the set of search results.
Disclosed embodiments may include a method for determining effectiveness of data loss prevention testing. The system may include one or more processors, and memory in communication with the one or more processors and storing instructions that, when executed by the one or more processors, are configured to cause the system to receive data loss prevention (DLP) sample test data, run a plurality of DLP tests utilizing the DLP sample test data, and identify, for each data element type of a plurality of data element types, an inherent risk measure associated with the data type element. Then, after receiving DLP test results, determine a plurality of data element type-channel effectiveness measures and a plurality of residual risk measures, and output the plurality of residual risk measures for display via a graphical user interface of a user device.
Disclosed embodiments may include a method for automated generative data loss prevention testing. The system may include one or more processors, and memory in communication with the one or more processors and storing instructions that, when executed by the one or more processors, are configured to cause the system to receive an instruction to perform data exfiltration prevention testing, select one or more data element types and one or more data channels, and select, based on the one or more data element types, one or more test data generation programs from a plurality of test data generation programs. In some embodiments, the memory can be further configured to cause the system to generate and utilize a set of test data to conduct data exfiltration prevention testing. The data exfiltration prevention testing can be conducted by executing one or more transfers and monitoring the one or more data channels.
Systems and methods for monitoring external data sharing are provided and can be used to detect drift in metadata of a data share, volume and frequency anomalies, and/or drift in attribute level data. For example, some methods can include receiving baseline metadata and transmission details for a data transmission and determining whether there is conformity therebetween. Some methods can include receiving historical volume and frequency data, identifying a data transmission for external transmission, and determining whether a volume of the data transmission conforms with the historical volume and frequency data and whether a time at which the data transmission is transmitted or scheduled to be transmitted to a third party conforms with the historical volume and frequency data. Some methods can include receiving design time data, identifying a data transmission for external transmission, and determining whether runtime data for the data transmission conforms with the design time data.
H04L 67/1095 - Réplication ou mise en miroir des données, p. ex. l’ordonnancement ou le transport pour la synchronisation des données entre les nœuds du réseau
H04L 67/561 - Ajout de données fonctionnelles à l’application ou de données de commande de l’application, p. ex. métadonnées
36.
SELECTIVE PRUNING OF CANDIDATE LOAD-BALANCING SERVERS
In some implementations, a load-balancing system may identify one or more computational tasks. The load-balancing system may identify a plurality of candidate servers in a load-balancing server pool. The load-balancing system may identify one or more servers by selectively pruning the plurality of candidate servers. The load-balancing system may assign the one or more computational tasks to the one or more servers.
H04L 67/1012 - Sélection du serveur pour la répartition de charge basée sur la conformité des exigences ou des conditions avec les ressources de serveur disponibles
H04L 67/1008 - Sélection du serveur pour la répartition de charge basée sur les paramètres des serveurs, p. ex. la mémoire disponible ou la charge de travail
A modular transaction card assembly includes a card frame having the traditional dimensions of a credit card, and a transaction card that is smaller than a traditional card and that fits into a receptacle of the card frame. Each of the card frame and the transaction card may be capable of performing contactless data transactions individually. The combined assembly of the card frame with the transaction card secured in the receptacle is also capable of performing contact data transactions, and in some instances, with an identifier that is distinct from the card frame or the transaction card alone. The card frame may include a processor enabling it to perform data encryption and authentication of the smaller transaction card.
In some implementations, a user device may receive, from a web host, code associated with at least one webpage. The user device may initiate a plurality of instances of a micro-service using the code. The user device may perform a single application programming interface (API) call for a first instance in the plurality of instances. A response from the single API call is shared with remaining instances in the plurality of instances. The user device may render a plurality of web elements, corresponding to the plurality of instances, using the code and the response from the single API call. The user device may output the at least one webpage, including the plurality of web elements, to a user.
In some implementations, a user device may receive, from a web host, code associated with a webpage. The user device may perform, using a host application, at least one call to an application programming interface (API) function on behalf of a stateless web element in the webpage. The user device may receive, in response to the at least one call to the API function, encoded data. The user device may pass the encoded data to a stateless web element for decoding. The user device may output a rendered webpage with the stateless web element including a decoded version of the encoded data.
A method is provided including receiving, by a server from a user device, a cryptogram of a contactless card, wherein the user device receives a payment request message from a merchant device, and the user device receives the cryptogram from a contactless card upon tapping the contactless card to the user device. The method further includes validating and decrypting, by the server, the cryptogram, extracting, by the server, from the decrypted cryptogram a unique customer identifier associated with the user, and verifying, by the server, the unique customer identifier. The method further includes retrieving, by the server from a database, account information of the user, calling, by the server, one or more application programming interfaces (APIs) of the merchant device to make a payment in response to the payment request message, and provisioning, by the server, the account information to the merchant device via the APIs.
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
A computer implemented method, system, and non-transitory computer-readable device that may be used in a remote deposit environment. Upon receiving a user request, based on interactions with the UI, the method implements an electronic deposit of a financial instrument by activating a camera on the client device to generate a live video stream of image data of a field of view of at least one camera, wherein the live video stream includes imagery of at least a portion of each side of the financial instrument. The method continues by extracting data fields based on the formation of image objects of each side of the financial instrument from the live video stream of image data. Based on a shape or a shape rate of change of the financial instrument, a flip detection pauses the forming of image objects during the flip.
Systems for performing instant optical character recognition (OCR) of documents to be uploaded to a server process for allowing mid-stream adjustments during the document upload process are disclosed. A system may include a mobile device with a document upload application and a backend system to which a document is to be uploaded. The backend system may initiate the OCR process automatically upon receiving images of documents to be uploaded and provide options to the document upload application for managing the upload process based on the results of the OCR process.
In some implementations, a user device may receive, from a user of the user device, a request to initiate an application session that is associated with an application. The user device may provide, to a server device based on receiving the request, an optical code associated with the server device establishing the application session. The user device may output the optical code via an output component. The user device may receive, from the server device, a notification that an agent device has joined the application session via a scan of the optical code from the output component. The user device may enable a function of the application based on the notification indicating that the agent device is capable of facilitating a service via the application session, wherein the service is associated with the function.
G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p. ex. lecture de la lumière blanche réfléchie
44.
RESTRICTING ACCESS BASED ON VOICE COMMUNICATION PARAMETERS
Methods and systems are described herein for manipulating a communication acceptance screen, manipulating an interactive communication acceptance icon, and restricting access to accounts based on voice communication parameters. In particular, when a communication is detected from one device to another device, that communication may be risky. Thus, the risk is mitigated by giving a user information about the source of the communication to give a user a chance to reject the communication. In addition, in instances where the user accepts the communication, the system enables monitoring the communication and restricting any accounts that are disclosed within the communication.
H04M 1/663 - Dispositions pour empêcher les appels non autorisés vers un appareil téléphonique
G10L 15/26 - Systèmes de synthèse de texte à partir de la parole
H04M 1/57 - Dispositions pour indiquer ou enregistrer le numéro de l'abonné demandeur à l'appareil de l'abonné demandé
H04M 1/72469 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles pour faire fonctionner le dispositif en sélectionnant des fonctions à partir de plusieurs éléments affichés, p. ex. des menus ou des icônes
H04M 3/42 - Systèmes fournissant des fonctions ou des services particuliers aux abonnés
H04M 3/436 - Dispositions pour intercepter des appels entrants
A computer implemented method, system and non-transitory computer-readable device for a remote deposit environment activating, on a client device, a financial application, wherein the financial application is configured to instantiate a customer interface (UI) on the client device. Upon receiving a customer request, based on interactions with the UI, the method implements an electronic deposit of a financial instrument by generating a live stream of image data of a field of view of at least one camera, wherein the live stream of image data includes imagery of at least a portion of the financial instrument, determining, based on the live stream of image data and a machine learning model (ML), an impermissibility score of the financial instrument and, based on exceeding a selectable threshold of the impermissibility score, modifying a status of the remote deposit to pause or terminate the remote deposit.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
Systems and methods for generating directional information, including detecting an occurrence of a first trigger event, upon detecting the occurrence of the first trigger event, generating a first search query based on a predicted object, determining a target object based on the first search query, determining a recommended navigation path to the target object, generating a first graphical user interface (GUI) based on the recommended navigation path, and causing to display the first GUI.
G06F 16/954 - Navigation, p. ex. en utilisant la navigation par catégories
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p. ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
47.
SYSTEMS AND METHODS FOR AUTOMATED CREATION OF TRANSACTION CLEANSING OVERRIDES
Disclosed embodiments may include a method for automated creation of transaction cleansing overrides. The system may include one or more processors, and memory in communication with the one or more processors and storing instructions that, when executed by the one or more processors, are configured to cause the system to receive a communication from a card holder via one of one or more communication channels and analyze the communication using a first machine learning model to determine an identity of the card holder, detect a mislabeled name, and detect a temporal indicator. In some embodiments, the mislabeled name and the temporal indicator are associated with a transaction. In some embodiments, the memory can be further configured to cause the system to detect card holder records and raw data associated with the transaction; generate a key based on the raw data; and alter an override list to add the key.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
Disclosed is a method that may include receiving, at a remote device, a detection by a first electronic application operating on a user device, an interaction between a user of the user device and an entity via a second electronic application. The method may include determining that the interaction between the user and the entity is reviewable based on first interaction data. Upon determining that the interaction between the user and the entity is reviewable, the method may further include causing the first electronic application to prompt the user to enter second interaction data including a user review of the entity associated with the detected interaction. The method may include determining that the user review of the entity is authentic based on a classification model, the first interaction data and the second interaction data being input to the classification model.
A computer implemented method, system, and non-transitory computer-readable device that may be used in a remote deposit environment. Upon receiving a user request, based on interactions with the UI, the method implements an electronic deposit of a financial instrument by activating a camera on the client device to generate a live video stream of image data of a field of view of at least one camera, wherein the live video stream includes imagery of at least a portion of each side of the financial instrument. The method continues by extracting data fields based on the formation of image objects of each side of the financial instrument from the live video stream of image data. A flip detection pauses the forming of image objects during the flip. The extracted data fields are communicated to a remote deposit server to complete the remote deposit.
The present disclosure includes systems and methods enabling secure workflows by receiving an electronic event authentication message from an initiator device, where the electronic event authentication message comprises a user profile identifier, and an entity identifier. A first device-specific actions-sequence token is generated for an actions-sequence session to execute a device-specific instance of at least one automated processing actions-sequence. A workflow request message is received from the initiator device that includes the user profile identifier and the entity identifier, and a second device-specific actions-sequence token is generated. Where the first and second device-specific actions-sequence tokens match, the actions-sequence session is executed and a criterion update in response to the actions-sequence session is produced. The criterion update may then be transmitted to the initiator device.
Disclosed are methods, systems, and non-transitory computer-readable medium for mobile browser code testing. For instance, the method may include monitoring, using a mobile application, a user interaction with the mobile application to detect a mobile browser being launched; responsive to detecting the mobile browser being launched, launching, using the mobile application, a browser user interface within the mobile application and monitoring a mobile browser session to detect a user accessing a website from a plurality of websites; responsive to detecting the user accessing the website, injecting, using the mobile application, a script into a current web page of the website in the mobile browser; testing, using the mobile browser, codes using the script in the current web page; and updating, using the mobile application, the browser user interface with a result of testing.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie
G06Q 30/0207 - Remises ou incitations, p. ex. coupons ou rabais
52.
COMPUTER-BASED PLATFORMS AND SYSTEMS CONFIGURED TO ENHANCE A CALL SCREEN WITH USER-CONTROLLED NOTES ASSOCIATED WITH THE CALL AND METHODS OF USE THEREOF
In some embodiments, the present disclosure provides an exemplary method that may include steps of obtaining a permission from the user to monitor a plurality of activities executed within the computing device; continually monitoring the plurality of activities executed within the computing device for a predetermined period of time; identifying an indication of an incoming interaction session within the predetermined period of time; verifying at least one session interaction parameter associated with the incoming interaction session to identify the incoming interaction session as a repeat interaction session; dynamically retrieving at least one relation-specific notation from a plurality of relation-specific notations to display; instructing an input GUI element to display input data associated with the repeat interaction; automatically updating the plurality of relation-specific notations associated with the historical data relationship; and instructing at least one programmable output GUI to display a notification identifying the update of the plurality of relation-specific notations.
G06F 21/51 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade du chargement de l’application, p. ex. en acceptant, en rejetant, en démarrant ou en inhibant un logiciel exécutable en fonction de l’intégrité ou de la fiabilité de la source
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
53.
REMOTE CREATION OF VIRTUAL CREDENTIAL BOUND TO PHYSICAL LOCATION
In some implementations, a credential system may create a virtual credential bound to a physical location associated with a transacting entity based on a request from a user device. The credential system may send information to a transaction terminal at the physical location bound to the virtual credential to register the virtual credential and identify a user that owns an account associated with the virtual credential. The credential system may provide, to the user device, tokenized information related to the virtual credential. The credential system may receive the tokenized information from a transaction terminal requesting authorization for the transaction. The credential system may send, to the transaction terminal requesting the authorization for the transaction, an authorization decision associated with the transaction based on whether the transaction terminal is present at the physical location bound to the virtual credential.
A self-service lender portal provides lenders with a suite of tools for interacting with a multi-lender architecture configured to provide loan applicants with automated pre-qualification and eligibility evaluation for multiple candidate lenders. The lender portal provides lenders with an interface for uploading rule sets defining lending and eligibility criteria, downloading operational data generated from processing loan applicant information, generating and managing security keys for encryption and decryption of sensitive data, and managing access policies for providing single sign-on by interfacing with the lender's own identity management systems.
G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
G06F 40/18 - Édition, p. ex. insertion ou suppression de tableauxÉdition, p. ex. insertion ou suppression utilisant des lignes réglées de tableurs
G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p. ex. lecture de la lumière blanche réfléchie
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 30/018 - Certification d’entreprises ou de produits
G06Q 30/0201 - Modélisation du marchéAnalyse du marchéCollecte de données du marché
Systems as described herein may implement a mechanism for dynamic identity proofing. A dynamic identity proofing system may receive first user input information and browser information from a user device conducting a transaction with an interaction entity. The system may determine a risk score indicating a likelihood the transaction is fraudulent. Based on the risk score exceeding a threshold value, the system may use a machine learning model to determine confirmative information to lower the risk score. The system may cause display of one or more web elements on the checkout page prompting for the confirmative information. The system may determine an updated risk score based on second user input information responsive to the confirmative information. Accordingly, if the updated risk score does not exceed the threshold value, the system may cause the checkout page to be automatically populated with additional secure information.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
56.
Systems and Methods for Dynamically Manipulating Data
Disclosed embodiments may include a method for dynamically manipulating data. The method may include receiving, via a first graphical user interface, a first indication from the user device indicating a first selection of first input data and receiving or retrieving, using the input template, the first input data. Then the method may include receiving, via a second graphical user interface, a second indication from the user device indicating one or more selected assumption templates and receiving, via a third graphical user interface, a third indication from the user device indicating a selected output configuration. The method may then include calculating the data analysis using the one or more selected assumption templates and the first input data from the input template and outputting the data analysis according to the third indication from the user device using the selected output configuration.
Disclosed embodiments may include a method for dynamically automating submissions. The method may include receiving tabular data and one or more associations of columns from the tabular data to fields on a webpage for one or more submissions, and extracting column data from the tabular data, determining, using a first machine learning model, one or more suggested associations for the fields on the webpage based on data types for the fields, and determining, using a second machine learning model, one or more suggested associations for the fields based on column names of the extracted column data. In response to determining one or more suggested associations, sending to a user device the one or more suggested associations, receiving, from the user device, accepted suggested associations; and transmitting one or more submissions for each row in the tabular data using the one or more suggested associations and the accepted suggested associations.
Disclosed embodiments may include a method for systems and methods for real time monitoring of cloud resources. The system may include one or more processors, and memory in communication with the one or more processors and storing instructions that, when executed by the one or more processors, are configured to cause the system to receive an indication of a code update to source code at a source code repository and that the second set of source code has been deployed to a cloud infrastructure. In some embodiments, receive an alert associated with an event at an alerting resource, identify one or more interrelated resources, and communicate with the cloud infrastructure to obtain a snapshot of resource states. In other embodiments, the memory can be further configured to cause the system to identify a previous update to source code, generate aggregated alert information, and determine a rectification action.
H04L 41/0604 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant du filtrage, p. ex. la réduction de l’information en utilisant la priorité, les types d’éléments, la position ou le temps
G06F 8/71 - Gestion de versions Gestion de configuration
Methods, systems, and apparatuses are described herein for detecting human data. A machine learning model may be trained to predict, based on an input vector representing a column name, whether the column name corresponds to human data. A computing device may process, using a fuzzy string-matching algorithm, a column name to determine if the column name corresponds to one or more known human data categories. If the fuzzy string-matching algorithm does not find a match, an expanded column name might be generated by mapping the column name to a vector space using a transformer model. That expanded column name may be provided to one or more input nodes of the trained machine learning model and, based on output from the trained machine learning model, the computing device may store metadata, associated with the first column, that indicates whether the first column comprises human data.
A computer implemented method, system and non-transitory computer-readable device for a remote deposit environment activating, on a client device, a financial application, wherein the financial application is configured to instantiate a customer interface (UI) on the client device. Upon receiving a customer request, based on interactions with the UI, the method implements an electronic deposit of a financial instrument by generating a live stream of image data of a field of view of at least one camera, wherein the live stream of image data includes imagery of at least a portion of the financial instrument, determining, based on the live stream of image data and a machine learning model (ML), an impermissibility score of the financial instrument and, based on exceeding a selectable threshold of the impermissibility score, modifying a status of the remote deposit to pause or terminate the remote deposit.
G06V 30/142 - Acquisition d’images en utilisant des instruments déplacés manuellementDétails structurels des instruments
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 40/02 - Opérations bancaires, p. ex. calcul d'intérêts ou tenue de compte
61.
Display screen with animated graphical user interface for card communication
Systems and methods use independently sourced authentication for a bifurcated authentication process. For example, in furtherance of authentication of devices in a first device session (e.g., between a user and an interface provider), the systems and methods create a second device session (e.g., between the interface provider and an independent authentication source). To do so, the interface provider may facilitate the transmission of information from the user to the independent authentication source. The independent authentication source may use information (e.g., information only accessible to the independent authentication source) to authenticate the information provided by the user. The independent authentication source may then authenticate the user. By doing so, the interface provider has relied on information known to the other parties (e.g., the user and the independent authentication source) to authenticate the user.
Systems and methods for executing domain-specific controls on large language model-generated data are disclosed herein. The system may receive a textual communication and provide the textual communication to a first model to generate an output. Based on the output and the textual communication, the system may generate a communication profile. The system may determine that the communication profile satisfies first or second criteria. Based on determining that the communication profile satisfies the first criteria, the system may determine rulesets corresponding to domains and provide the communication to a second model to generate a second output according to these rulesets. Based on determining that the communication profile satisfies the second criteria, the system may cause execution of a termination protocol in lieu of generating the second output.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
A method may include receiving, from an external entity, information associated with a procedure that includes a control representing a security policy. The method may include transforming the information into transformed information. The method may include determining, using a first machine learning model, a plurality of features including an average reconciliation ratio and an indication of whether the security policy is accurate, based on the transformed information. The method may include determining, using a second machine learning model, a probability that the transformed information does not satisfy a plurality of criteria, based on the plurality of features. The method may include determining whether the probability is greater than a threshold value, and upon determining that the probability is greater than the threshold value, determining, using a third machine learning model, a recommendation to implement one or more actions associated with the control, based on the probability.
A dual-factor PIN based authentication system and method uses a cryptogram provided by a contactless card associated with the client in association with a PIN stored by the contactless card to authenticate the client. In some embodiments, cryptogram authentication may be preconditioned upon a PIN match determination by the contactless card. In other embodiments, the cryptogram may be formed at least in part using the personal identification number (PIN) stored on the contactless card encoded using a dynamic key stored by the contactless card and uniquely associated with the client. Authentication may be achieved by comparing the cryptogram formed using the PIN against an expected cryptogram generated an expected PIN and an expected dynamic key.
G07F 7/10 - Mécanismes actionnés par des objets autres que des pièces de monnaie pour déclencher ou actionner des appareils de vente, de location, de distribution de pièces de monnaie ou de papier-monnaie, ou de remboursement par carte d'identité codée ou carte de crédit codée utilisée simultanément avec un signal codé
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
66.
DEVICES AND TECHNIQUES TO PERFORM ENTROPY-BASED RANDOMNESS VIA A CONTACTLESS CARD
G06F 7/58 - Générateurs de nombres aléatoires ou pseudo-aléatoires
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06K 19/04 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par la forme
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
In some implementations, a user device may present, on a user interface (UI) associated with a user account, a first UI element. The user device may detect a user interaction, with the user device, indicating the first UI element. The user device may present, on the UI and based on the user interaction, a second UI element, which increases in length in a first direction from a start point, along a closed path around the first UI element and ending at the start point, while the user interaction is being detected. The second UI element completes the closed path when an interaction duration satisfies a duration threshold, which indicates a confirmation of a request for an action associated with the user account. The duration threshold is based on one or more parameters associated with one or more of the action, the user account, or the user interaction.
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p. ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect
G06F 3/04883 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p. ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p. ex. des gestes en fonction de la pression exercée enregistrée par une tablette numérique utilisant un écran tactile ou une tablette numérique, p. ex. entrée de commandes par des tracés gestuels pour l’entrée de données par calligraphie, p. ex. sous forme de gestes ou de texte
In some implementations, a device may receive via a form, a set of requirements associated with generation of program code. The device may generate a program code generation item based on the set of requirements. The device may store, via a first system, the program code generation item. The device may generate program code for the program code generation item based on the set of requirements. The device may receive information identifying a new requirement for the program code generation item. The device may obtain an approval of the new requirement. The device may generate updated program code for the program code generation item based on the new requirement and based on obtaining the approval. The device may store the updated program code in the first system in connection with the program code generation item.
Aspects described herein may relate to techniques and/or methods that process certain forms of event data and/or tabular data for input to one or more machine learning models, such as a large language model. Additional aspects may relate to using the output of a large language model as part of a process for detecting fraud based on the event data and/or tabular data. In some variations, the event data and/or tabular data may be processed into data tokens, embeddings, or other forms of data suitable for use as input to a large language model.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
70.
SYSTEMS AND METHODS FOR AUTHENTICATION AND CARD PROVISIONING IN DESKTOP MERCHANT CHECKOUTS
Systems and methods for user authentication and account provisioning involving scanning a QR code, authenticating a user, selecting a transaction account, and completing a transaction.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p. ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/42 - Confirmation, p. ex. contrôle ou autorisation de paiement par le débiteur légal
In some implementations, a device may obtain registration information, associated with an account, including one or more training handwriting samples of a user. The device may detect an initiation of an event associated with the account. The device may provide, to a terminal device associated with the event, the one or more authentication prompts to cause the terminal device to provide the one or more authentication prompts while the event is pending. The device may obtain, from the terminal device, one or more handwriting samples in response to the one or more authentication prompts. The device may determine, using a machine learning model, whether the user is associated with the event based on whether the one or more handwriting samples are in a handwriting of the user. The device may authenticate the event based on determining whether the one or more handwriting samples are in the handwriting of the user.
An EMV enabled terminal may communicate transaction related information to a user via a standard user interface of the terminal, for example, within a user interface displayed on a display screen of the terminal. The transaction related information may be spoken out loud to the user by the terminal. However, users with visual, audio, or other physical impairments may be unable to access the display of the terminal, view the displayed information, or hear the spoken information. Systems and methods disclosed herein communicate transaction related information via an alternate user interface. Instead of relying on the standard user interface related communications, information about the status of a transaction or transaction related information may be determined based on monitoring and evaluating the communications between an EMV secure element of a dynamic transaction card and the terminal via a contact connection.
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
Computer-implemented methods and systems include determining vehicle grades for a user by accessing a plurality of user platforms, identifying user-related content linked to the user via the user platforms, extracting user attributes based on the user-related content, applying weights to vehicle attributes in a vehicle recommendation engine, based on the extracted user attributes, generating the vehicle grades based on the weights, and providing the vehicle grades to the user via a vehicle grading platform.
The disclosed systems and methods are directed to generating a GPU-based mobile device signature to enhance the strength of an OTP card authentication signal. The proposed implementation leverages the NFC read capability of contactless OTP cards and WebGL image rendering functionality of mobile browser. An image, or a URL pointing to one, is received, via NFC transmission from a contactless card, for processing by a mobile browser. The output of the mobile browser image processing buffer can then be hashed and used as a device identifier for the specific mobile device performing electronic authentication of a transmission source by verifying, with high degree of certainty, the identity of the reading mobile device.
Systems and methods for classifying token sequences using clustering. In some aspects, the system receives a first set of input sequences and generates a corresponding first plurality of embeddings using a first machine learning model. The system generate a plurality of clusters, each containing embeddings, using a clustering model. For each cluster in the plurality of clusters, the system generates a set of common components in the cluster. The system generates a set of universal components based on the plurality of clusters. For each cluster in the plurality of clusters, the system generates a set of unique components by removing the set of universal components from its associated set of common components. The system classifies a second plurality of embeddings using the sets of unique components.
In some implementations, a device may receive a set of update expressions associated with updating one or more items in the distributed database. The device may store the set of update expressions in an input queue. The device may aggregate, based on a value of a parameter satisfying a threshold, the set of update expressions to obtain aggerated update values for respective items of the one or more items, wherein the aggregated update values are summed values indicated by update expressions, of the set of update expressions, for the respective items of the one or more items. The device may generate, for each item, an aggregated update expression that indicates an aggregated update value, of the aggerated update values, for that item. The device may update the one or more items in the distributed database using the aggregated update expression for each item.
Methods and systems for modifying a database of creative content resources using machine learning models. In some aspects, a system may be used to generate new resources and/or modify a subset of resources of the database. The system accesses the database and obtains data indicative of elements and (2) structural specifications for each resource. The system obtains and inputs (1) a user prompt for generating a new creative content resource and (2) a set of rules indicative of standardized assets and structural specifications into a machine learning model to obtain the new creative content resource. The system obtains an indication for replacing a recurring asset included in the new creative content resource with a replacement asset and replaces the recurring asset with the replacement asset in each creative content resource of a subset of creative content resources from the database.
Methods and systems are described herein for updating transformer machine learning models to account for relative timing within data. The system may retrieve a transformer model trained based on events. The events may include a first event associated with a first time and second events associated with second times. The system may generate event embeddings for the events. The system may input, into the transformer model, the event embeddings to cause the transformer model to perform a transformation on the event embeddings. The system may determine respective time differences between the first time of the first event and each corresponding second time of the second events. The system may generate attention values by aggregating the transformation and the respective time differences. The system may then update the transformer model with the attention values.
Systems and methods use independently sourced authentication for a bifurcated authentication process. For example, in furtherance of authentication of devices in a first device session (e.g., between a user and an interface provider), the systems and methods create a second device session (e.g., between the interface provider and an independent authentication source). To do so, the interface provider may facilitate the transmission of information from the user to the independent authentication source. The independent authentication source may use information (e.g., information only accessible to the independent authentication source) to authenticate the information provided by the user. The independent authentication source may then authenticate the user. By doing so, the interface provider has relied on information known to the other parties (e.g., the user and the independent authentication source) to authenticate the user.
SYSTEMS AND METHODS FOR EXECUTING OPERATIONS ACROSS DATA EXCHANGES THAT COMPRISE NON-STANDARDIZED DATA DESCRIPTIONS USING DYNAMICALLY GENERATED VALIDATION RULES
Systems and methods use dynamically generated validation rules. These validation rules comprise a first validation rule portion that is generated using a standardized validation process (e.g., corresponding to a standardized schema) and a second validation rule portion that is generated using a validation process selected based on a non-standardized schema that is specific to a respective asset type of the plurality of respective asset types.
A computer implemented method, system, and non-transitory computer-readable device for a remote deposit environment. In some embodiments, a predictive machine learning (ML) model may be trained to determine a likelihood an image will be successfully processed via OCR. The predictive ML model may determine the likelihood prior to the image being uploaded to a remote server and/or processed via OCR, allowing the image to be rejected and replaced in real time. In some embodiments, the predictive ML model may be implemented on a mobile device. Optionally, the predictive ML model may be supported by a deep learning model operating to refine the predictive ML model.
SYSTEMS AND METHODS FOR GENERATING VARIABLE SELF-EXECUTING PROGRAMS LINKED TO DESIGNATED OFF-CHAIN COMPUTER RESOURCES FOR USE IN SECURE ENCRYPTED COMMUNICATIONS ACROSS DISPARATE COMPUTER NETWORKS
Systems and methods related to a variable self-executing program. A variable self-executing program comprises a self-executing program that is minted with an indication of a non-transferable ownership wallet (e.g., a digital wallet for which the self-executing program is minted), a non-transferable network address that has permissions for updating metadata for the variable self-executing program, and an off-chain profile state based on a specific user corresponding to the digital wallet.
The invention relates generally to systems and methods for tracking a document by generating document variables, creating multiple new documents with different variables, and sending those new documents to different recipients. The document itself and the source of the document can be verified when a security leak occurs.
Techniques for improved management of data may include the aggregation of connections with data sources, the aggregation of data, and/or the dynamic caching of data using data caching models. The caching model(s) may be adaptable based on data characteristics, user information, and/or usage information.
Systems and methods for user authentication and account provisioning involving scanning a QR code, authenticating a user, selecting a transaction account, and completing a transaction.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
86.
AUTOMATIC COMPLIANCE ASSESSMENT OF CLOUD INFRASTRUCTURE CODE
In some implementations, a compliance system may receive, from a pipeline system, a set of properties associated with configuration of a cloud infrastructure. Additionally, the compliance system may receive, from a code repository, a set of computer code associated with the cloud infrastructure. The compliance system may provide the set of properties and the set of computer code to a machine learning model to receive a set of compliance indicators and a set of severity levels. Each compliance indicator in the set of compliance indicators being associated with a corresponding severity level in the set of severity levels. The compliance system may selectively deploy the cloud infrastructure in response to receiving the set of severity levels.
A computer implemented method, system, and non-transitory computer-readable device for a remote deposit environment. In some embodiments, a predictive machine learning (ML) model may be trained to determine a likelihood an image will be successfully processed via OCR. The predictive ML model may determine the likelihood prior to the image being uploaded to a remote server and/or processed via OCR, allowing the image to be rejected and replaced in real time. In some embodiments, the predictive ML model may be implemented on a mobile device. Optionally, the predictive ML model may be supported by a deep learning model operating to refine the predictive ML model.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 40/02 - Opérations bancaires, p. ex. calcul d'intérêts ou tenue de compte
Aspects described herein may relate to techniques and/or methods that process certain forms of event data and/or tabular data for input to one or more machine learning models, such as a large language model. Additional aspects may relate to using the output of a large language model as part of a process for detecting fraud based on the event data and/or tabular data. In some variations, the event data and/or tabular data may be processed into data tokens, embeddings, or other forms of data suitable for use as input to a large language model.
G06F 40/284 - Analyse lexicale, p. ex. segmentation en unités ou cooccurrence
G06F 40/40 - Traitement ou traduction du langage naturel
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
89.
SYSTEMS AND METHODS FOR TRAINING MACHINE LEARNING MODELS USING DIFFERENTIATION
Systems and methods for training machine learning models using differentiation. In some aspects, the system receives a set of triplet inputs. Each triplet input includes a resource access request, a correct reference classification, and an incorrect classification. The system initializes a first machine learning model. The system updates the first machine learning model by, for each triplet input in the set of triplet inputs, processing the resource access request using the first machine learning model first in conjunction with the correct reference classification then in conjunction with the incorrect classification to generate a set of first distances and a set of second distances, respectively. Based on the set of first distances and the set of second distances, the system computes a loss metric to update parameters for the first machine learning model. The system processes second resource access requests using the first machine learning model to generate predicted classifications.
G06N 5/022 - Ingénierie de la connaissanceAcquisition de la connaissance
90.
SYSTEMS AND METHODS FOR GENERATING VARIABLE SELF-EXECUTING PROGRAMS LINKED TO DESIGNATED OFF-CHAIN COMPUTER RESOURCES FOR USE IN SECURE ENCRYPTED COMMUNICATIONS ACROSS DISPARATE COMPUTER NETWORKS
Systems and methods related to a variable self-executing program. A variable self-executing program comprises a self-executing program that is minted with an indication of a non-transferable ownership wallet (e.g., a digital wallet for which the self-executing program is minted), a non-transferable network address that has permissions for updating metadata for the variable self-executing program, and an off-chain profile state based on a specific user corresponding to the digital wallet.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
91.
ADVERSARIAL LEARNING FRAMEWORK FOR PERSONA-BASED DIALOGUE MODELING
Various embodiments may be generally directed to the use of an adversarial learning framework for persona-based dialogue modeling. In some embodiments, automated multi-turn dialogue response generation may be performed using a persona-based hierarchical recurrent encoder-decoder-based generative adversarial network (phredGAN). Such a phredGAN may feature a persona-based hierarchical recurrent encoder-decoder (PHRED) generator and a conditional discriminator. In some embodiments, the conditional discriminator may include an adversarial discriminator that is provided with attribute representations as inputs. In some other embodiments, the conditional discriminator may include an attribute discriminator, and attribute representations may be handled as targets of the attribute discriminator. The embodiments are not limited in this context.
Computer-implemented methods, computer systems, and computer readable media for determining, sorting, or determining and sorting a set of items. The method includes receiving, via a user device, parameter values from a user and receiving parameter weights. The method further includes determining a sort score for each vehicle of a set of vehicles based on the received parameter values and parameter weights, and sorting the set of vehicles based on the sort score of each vehicle of the set of vehicles.
Systems and methods balance communication loads across computer networks. In particular, the systems and methods balance the communication loads across computer networks in instances of computer communication tasks that have variable transmission confirmations and network delivery locations. Additionally or alternatively, the systems and methods balance communication loads across computer networks for computer communication tasks based on real-time confirmation of network resource availability.
H04L 47/125 - Prévention de la congestionRécupération de la congestion en équilibrant la charge, p. ex. par ingénierie de trafic
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
H04L 47/70 - Contrôle d'admissionAllocation des ressources
H04L 47/80 - Actions liées au type d'utilisateur ou à la nature du flux
Disclosed herein are system, method, and computer program product embodiments for vaultless tokenization. Alphanumeric values may be determined based on numeric values generated from a hash of numeric user information shuffled through a plurality of randomly generated alphanumeric tables. The numeric user information and the alphanumeric values may be used to generate a table index. Shuffled numeric user information may be generated based on the table index and a plurality of randomly generated numeric tables, and transformed to alphanumeric user information (e.g., via format-preserving encryption, additive cipher, etc.). Each character of the alphanumeric user information may be shuffled through a different alphanumeric table of the plurality of alphanumeric tables identified for the character based on the table index. Moreover, an alphanumeric token may be generated based on the shuffled characters of the alphanumeric user information.
A first system may receive first data of a user associated with a first identifier and second data of the user associated with a second identifier that exclude user identifying information from a first and second data source, respectively. A key may be received from a second system that associates the first and second identifier with a common identifier generated to preserve user anonymity at the first system. The key may be used to generate aggregated data for the user that includes the first and second data and is associated with the common identifier. The aggregated data may be processed to determine the user as a candidate for an offer set. The common identifier for the user is included in a candidacy list for the offer set, and provided to the second system to facilitate request processing associated with the presentation of the offer set to candidate users.
Disclosed embodiments may include a system for generating aggregate records. The system may retrieve data corresponding to a first user. The system may receive, from the first user, first sharing preference(s) associated with a second user. The system may extract first data subset(s) from the data based on the first sharing preference(s). The system may generate block(s) of a blockchain ledger. The system may append the first data subset(s) to at least a first block of the block(s) of the blockchain ledger. The system may provide the second user with access to the first data subset(s) on the at least first block.
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
A batteryless device is disclosed. According to certain embodiments, the batteryless device may include a first communication system and a second communication system, the second communication system being a near-field-communication (NFC) system. The batteryless device may also include a power receiver coupled to the first communication system and configured to wirelessly receive power from an external device for powering the first communication system. The batteryless device may further include a controller configured to: when the first communication system is powered, establish, via the first communication system, a first wireless connection with a user device; receive, through the first wireless communication, a token from the user device; establish, via the second communication system, a second wireless connection with a terminal; and transmit, through the second wireless connection, the token to the terminal.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G07F 7/08 - Mécanismes actionnés par des objets autres que des pièces de monnaie pour déclencher ou actionner des appareils de vente, de location, de distribution de pièces de monnaie ou de papier-monnaie, ou de remboursement par carte d'identité codée ou carte de crédit codée
H02J 50/80 - Circuits ou systèmes pour l'alimentation ou la distribution sans fil d'énergie électrique mettant en œuvre l’échange de données, concernant l’alimentation ou la distribution d’énergie électrique, entre les dispositifs de transmission et les dispositifs de réception
H04B 5/79 - Systèmes de transmission en champ proche, p. ex. systèmes à transmission capacitive ou inductive spécialement adaptés à des fins spécifiques pour le transfert de données en combinaison avec le transfert d'énergie
Systems and methods described herein may generate a temporary location-associated cryptographic identification code (which can be used to uniquely identify the user) based on detection of the user at the associated location. As an example, such systems and methods allow for the user to be identified (e.g., as part of an authentication process) when the user visits a location without having to share personally identifiable information with any other users or computing systems at the location. Additionally, or alternatively, such systems and methods enable the practical use of shorter cryptographic identification codes as a primary identifier (or sole identifier) at the location for retrieving data related to the user (e.g., by avoiding or mitigating collision or security risks typically associated with short identifiers).
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 10/1093 - Ordonnancement basé sur un agenda pour des personnes ou des groupes
99.
COMPUTER-BASED SYSTEMS CONFIGURED TO DYNAMICALLY VERIFY A PLURALITY OF INTERACTION SESSIONS ASSOCIATED WITH AN INTERACTION SESSION DATA SOURCE AND METHODS OF USE THEREOF
In some embodiments, the present disclosure provides an exemplary method that may include steps of obtaining a permission from a user to monitor a plurality of activities; receiving monitoring data of the plurality of activities for a first period of time; verifying at least one common session parameter to identify an incoming interaction sessions; utilizing a software application to access an interaction session database; identifying an interruption associated with the software application for a second period of time; utilizing a machine learning algorithm to verify the interruption; determining a plurality of authentication rules; adjusting the plurality of authentication rules, receiving a response to an interactive communication; and updating the database of known session interaction parameters.
In some implementations, a device may obtain input data to a component of an application, the input data having a data type. The device may determine, based on the data type, one or more log events that are indicative of one or more test conditions for the component and the data type. The device may obtain, based on an execution of the component, a subset of application log data, from a set of application log data, that is associated with the one or more log events. The device may determine, using the subset of application log data, whether the one or more test conditions are validated. The device may perform one or more actions based on whether the one or more test conditions are validated.