Disclosed embodiments may include a system for tracing cloud service costs. The system may receive data corresponding to a first node cluster, the first node cluster indicative of a plurality of cloud services utilized by one or more users. The system may extract metrics associated with the plurality of cloud services. The system may determine a relationship between each cloud service of the plurality of cloud services based on the metrics. The system may determine one or more costs associated with the first node cluster, the one or more costs based on the relationship. The system may determine whether the first node cluster is utilized within a predetermined threshold. Responsive to determining the first node cluster is not utilized within the predetermined threshold, the system may automatically conduct one or more actions associated with the one or more costs.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
G06Q 30/0283 - Estimation ou détermination de prix
Embodiments may generally be directed components and techniques to detect a request to provide banking account information over a one or more voice connections, identify the requested banking account information, and generate speech data representing the banking account information requested. In embodiments further include communicating the speech data to another device.
In some implementations, a server device may obtain an indication of an incoming call, associated with a user device, to the call center service. The server device may perform a lookup in a database for information associated with the user device, wherein the information indicates the authentication status of a user that is established via the user device. The server device may determine whether an amount of time that the information has been stored in the database is less than or equal to a time threshold. The server device may generate an authentication token for the incoming call based on the authentication status and based on the amount of time being less than
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04M 3/523 - Dispositions centralisées de réponse aux appels demandant l'intervention d'un opérateur avec répartition ou mise en file d'attente des appels
In some implementations, a cloud management device may receive, from a user device, a configuration associated with a task for cloud computing. The cloud management device may input one or more properties, associated with the configuration, to a model that is trained on historical cloud computing task information. Accordingly, the cloud management device may receive, from the model, an indication of a selected cloud environment, from a plurality of possible cloud environments based on credentials associated with the user device. The cloud management device may generate instructions for the task based on the selected cloud environment and may trigger execution of the task by the selected cloud environment using the instructions.
G06F 9/48 - Lancement de programmes Commutation de programmes, p. ex. par interruption
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
In some implementations, a scheduling system may receive a scheduling tag to define a custom schedule that includes one or more downtime windows for a cloud resource over a scheduling period. The scheduling system may determine a regular continuous schedule for the cloud resource that recurs over multiple scheduling periods based on the one or more downtime windows defined in the scheduling tag. The scheduling system may determine at a current scan time, whether a target state for the cloud resource is a running state or a suspended state based on the one or more uptime windows and the one or more downtime windows included in the regular continuous schedule. The scheduling system may align a current state of the cloud resource with the target state.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
H04L 47/70 - Contrôle d'admissionAllocation des ressources
H04L 67/1001 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour accéder à un serveur parmi une pluralité de serveurs répliqués
Methods and systems are described herein for novel uses and/or improvements in application or service authentication for a provider of disparate applications and/or services using blockchain technology. As one example, a method and a system are described herein for a unified user device authentication mechanism across multiple lines of service using cryptographic tokens. The system may receive, as part of a login request from a user, an address associated with a cryptography-based storage application, a cryptographic signature, and an identifier associated with a cryptographic token. The system may verify that the cryptographic token is valid and that the cryptography-based storage application controls the cryptographic token to grant the user access to the application or line of service.
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuéesArchitectures de systèmes de bases de données distribuées à cet effet
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p. ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
7.
SYSTEMS AND METHODS FOR EXTERNAL ACCOUNT AUTHENTICATION
Systems and methods for external account authentication are disclosed herein. They include receiving a call to pair the external account with a secure account, extracting external data from the external account, the external data corresponding to external account content, providing user activity data from the secure account as an input to an authentication machine learning model, providing the external data as an input to the authentication machine learning model, the authentication machine learning model configured to output a certainty level that the external account is associated with a user of the secure account based on the external data and the activity data, receiving the certainty level from the authentication machine learning model, determining that the certainty level meets a certainty threshold, and pairing the external account with the secure account based on determining that the certainty level meets the certainty threshold.
COMPUTER-BASED SYSTEMS AND/OR COMPUTING DEVICES PROGRAMMED FOR INSTANT ISSUANCE OF A REPLACEMENT PHYSICAL ACCESS INSTRUMENT; AND METHODS OF USE THEREOF
A computer-based method includes receiving an activity data associated with a user; where a first user activity profile of the activity data is associated with: a) a first profile identifier, and b) a first instrument, where the first instrument comprises a first security measure; receiving an authentication request to authenticate an identity of the user; generating a security challenge to identify the user; the security challenge being based on a second user activity profile of the activity data; receiving a security response to the a security challenge from an instrument generation module; the security response comprising a second profile identifier associated with a second instrument; authenticating the user based on the security response; generating a third profile identifier to replace the first profile identifier; instructing the instrument generation module to dispense a third instrument; where the third instrument includes: a) the third profile identifier, and b) a second security measure.
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
G06Q 40/02 - Opérations bancaires, p. ex. calcul d'intérêts ou tenue de compte
G07F 19/00 - Systèmes bancaires completsDispositions à déclenchement par carte codée adaptées pour délivrer ou recevoir des espèces ou analogues et adresser de telles transactions à des comptes existants, p. ex. guichets automatiques
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
10.
TECHNIQUES TO PROVIDE SECURE CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS BY DISTRIBUTED ENTITIES
G06F 21/44 - Authentification de programme ou de dispositif
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
11.
SYSTEMS AND METHODS FOR DETERMINING TRUSTED DEVICES
G06F 21/30 - Authentification, c.-à-d. détermination de l’identité ou de l’habilitation des responsables de la sécurité
G06F 21/50 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation
Disclosed embodiments may include a system for identifying a statement. This may include receiving document image data which is then processed using optical character recognition to create language data and position data. The system may include identifying a plurality of dates from the language data and determining whether the plurality of dates is aligned in a first direction using the position data. The system may include determining whether the plurality of dates is within a predetermined time threshold or counting the plurality of dates to determine whether the count is greater than a predetermined count threshold. The system may create a label for the document and generate and transmit a graphical user interface to a user device for displaying the label and/or the document image data. The user may be able to interact with the user device to change the document label.
G06V 30/19 - Reconnaissance utilisant des moyens électroniques
G06V 30/30 - Reconnaissance de caractères fondée sur le type de données
G06V 30/40 - Reconnaissance des formes à partir d’images axée sur les documents
G06V 30/416 - Extraction de la structure logique, p. ex. chapitres, sections ou numéros de pageIdentification des éléments de document, p. ex. des auteurs
A system including: one or more processors; a memory storing instructions that, when executed by the one or more processors are configured to cause the system to: receive a plurality of user names and a plurality of anonymized user identifiers; receive a plurality of user attributes associated with one or more users of the plurality of users; receive a first plurality of hash values that uniquely identify an association between each user attribute and one or more users; receive a first request for a listing of user names associated with a first user attribute; receive a first secret key; generate a second plurality of hash values; determine a first subset of the first plurality of hash values that match the second plurality of hash values; generate a first graphical user interface including the listing of user names; and transmit the first graphical user interface to the first user device.
A method may include receiving data related to a plurality of items and processing the data using a machine learning model. The machine learning model may have been trained to output a score for each of the plurality of items based on one or more target variables and to process the data using a grouped linear regression for groups of items based on sub-divisions of the groups. The method may include storing the output in a data store. Each entry in the data store may include at least an item identifier for an item, a group name, and the score. The method may include receiving search criteria for a search and identifying a set of search results in a group of items. The method may include determining an order of the set of search results and outputting the set of search results.
In some embodiments, a computing system may monitor authentication input and modify authentication requirements based on detection of user-specific input errors. The computing system may use machine learning or other techniques to detect whether an incorrect authentication input corresponds to a common input mistake of a user. If the incorrect authentication input does correspond to a common input mistake of the user, a computing system may modify one or more authentication requirements to make the authentication process easier for the user.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
19.
PARALLEL SECRET SALT GENERATION AND AUTHENTICATION FOR ENCRYPTED COMMUNICATION
G06F 21/30 - Authentification, c.-à-d. détermination de l’identité ou de l’habilitation des responsables de la sécurité
G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes
G06F 21/35 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes communiquant sans fils
G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
21.
SYSTEMS AND METHODS FOR REVERSE CARD AUTHENTICATION WITH SINGLE-STEP VERIFICATION
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
22.
TECHNIQUES FOR PERSONAL IDENTIFICATION NUMBER MANAGEMENT FOR CONTACTLESS CARDS
G06F 21/35 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes communiquant sans fils
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G07F 7/08 - Mécanismes actionnés par des objets autres que des pièces de monnaie pour déclencher ou actionner des appareils de vente, de location, de distribution de pièces de monnaie ou de papier-monnaie, ou de remboursement par carte d'identité codée ou carte de crédit codée
A computing system may obtain text corresponding to a conversation between an outside caller and an agent. The computing system may obtain data associated with the conversation that may be used to determine whether the outside caller is attempting malicious activity or not. The obtained text and data may be provided to a machine learning model to generate a probability score indicative of whether the outside caller is attempting to obtain unauthorized access or attempting other malicious activity. Based on determining that the probability score satisfies a threshold, the computing system may modify a permission (e.g., an API permission) of the agent. The computing system may deny the request to perform the action and may cause display of an indication that the request was successful.
G06F 21/50 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
H04L 67/00 - Dispositions ou protocoles de réseau pour la prise en charge de services ou d'applications réseau
H04L 67/02 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP]
H04M 3/51 - Dispositions centralisées de réponse aux appels demandant l'intervention d'un opérateur
H04W 4/14 - Services d'envoi de messages courts, p. ex. SMS ou données peu structurées de services supplémentaires [USSD]
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p. ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
A computing device (e.g., a server, a cloud-based device, a request management device, etc.), for example, such as a computing device associated with a vehicle dealership and/or the like, may receive a plurality of transaction requests, such as requests to purchase, lease, and/or finance a vehicle. Each transaction request may include user information associated with the transaction, such as a phone number, a home/mailing address, email address, a credit score, vehicle trade-in information, and/or any other data elements. For each transaction request, the computing device may invoke one or more microservices to verify data elements of user information and use responses from the microservices to rank each transaction requests on its potential to progress to a completed transaction.
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p. ex. une autorité de certification, un notaire ou un tiers de confiance
H04W 12/069 - Authentification utilisant des certificats ou des clés pré-partagées
H04W 12/106 - Intégrité des paquets ou des messages
H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles
H04W 12/47 - Dispositions de sécurité utilisant des modules d’identité utilisant la communication en champ proche [NFC] ou des modules d’identification par radiofréquence [RFID]
In some embodiments, an authentication system may be configured to process one or more tokens that incorporates one or more tailored-wavelength-range coded patterns, codes represented within a steganographic image, or "overlapping" codes. As an example, such a token may include (i) one or more invisible-ink-printed patterns printed using infrared ink corresponding to different tailored wavelength ranges within the infrared light spectrum, (ii) one or more steganographic images in which invisible-ink-printed patterns are interweaved within the steganographic images, (iii) visible-ink-printed patterns and invisible-ink-printed patterns printed substantially within the visible ink portions of the visible-ink-printed patterns, or (iv) other features, where the invisible-ink-printed patterns correspond to one or more authentication codes or other data for token authentication.
Systems and methods is provided for implementing a strong user authentication across a public network. One operational aspect of the disclosed systems and methods involves the integration of a browser functionality to communicate with processes and hardware elements on a device initiating the network connection to implement a context-switching authentication scheme. Disclosed system and process further involves an implementation of a two-factor strong authentication based on a single authentication input from a user involving an NFC read of a contactless card by a mobile device within Bluetooth proximity of the device initiating the network connection.
G06F 9/48 - Lancement de programmes Commutation de programmes, p. ex. par interruption
G06F 21/35 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes communiquant sans fils
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
Disclosed herein are systems and methods of automated teller machine (ATM) management. The method can include receiving, from an ATM, an operating log from an out-of-band management chip. The method can further include determining, from the operating log, that the ATM is in an out-of-service state. The method can further include transmitting instructions to the out-of-band management chip to capture a system image of the ATM. In response, the method can include receiving the system image of the ATM from the out-of-band management chip and diagnosing a fault in the ATM based on the system image. The fault in the ATM can be the fault which caused the ATM to be in the out-of-service state. Finally, the method can include transmitting instructions for one or more corrective actions to the out-of-band management chip. The corrective actions can remedy the fault in the ATM.
G07F 19/00 - Systèmes bancaires completsDispositions à déclenchement par carte codée adaptées pour délivrer ou recevoir des espèces ou analogues et adresser de telles transactions à des comptes existants, p. ex. guichets automatiques
34.
VERIFICATION BASED ON AN ENCRYPTED REPRESENTATION OF A PHYSICAL IDENTIFIER ASSOCIATED WITH A USER
In some implementations, a server may receive, from a first user device, a request to use an encrypted representation of a digital representation of a physical identifier (ID) associated with the user. Accordingly, the server may transmit, to a second user device, a prompt associated with validation of the request, and may receive, from the second user device, a response to the prompt. The server may validate the request using the response to the prompt. The server may transmit, to a first remote server, at least a first portion of the encrypted representation with a request to perform a first action associated with the user. The server may additionally transmit, to a second remote server, at least a second portion of the encrypted representation with a request to perform a second action associated with the user.
H04L 9/28 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant un algorithme de chiffrement particulier
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Locks may rely upon identity credentials to act as keys for unlocking and/or locking the locks, such as door locks. The identity credentials may be digital credentials that hold identity information and evidence of knowledge of secret information, such as a password or a private cryptographic key. The door locks in exemplary embodiments may be connected to an access system via wireless network, such as a low power low frequency Wi-Fi network, like a HaLow network. The wireless network enables the door locks to communicate with the access system, such as a server for a lodging establishment. The access system may receive identity credentials and forward the identity credentials to an authentication service for authentication. The access system may also pass the identity of the guest to an authorization service to determine if the guest is authorized to unlock the door lock or not.
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
G07C 9/27 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer une station centrale gérant l’enregistrement
G07C 9/29 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer comportant des éléments électroniques actifs, p. ex. des cartes à puce
36.
MULTI-PURPOSE DEVICE SECURE MOBILE DEVICE CHARGING LOCATIONS
In some implementations, a multi-purpose device may include a secure charging location for charging mobile devices. The multi-purpose device may receive authentication information associated with a user. The multi-purpose device may communicate with a fraud detection device, to authenticate the user and to identify that the user is associated with an account. The multi-purpose device may detect that a mobile device associated with the user has been placed in the secure charging location. The multi-purpose device may transmit to the fraud detection device and based on authenticating the user, an indication that the mobile device associated with the user has been placed in the secure charging location.
G07F 19/00 - Systèmes bancaires completsDispositions à déclenchement par carte codée adaptées pour délivrer ou recevoir des espèces ou analogues et adresser de telles transactions à des comptes existants, p. ex. guichets automatiques
H02J 7/00 - Circuits pour la charge ou la dépolarisation des batteries ou pour alimenter des charges par des batteries
H04W 4/021 - Services concernant des domaines particuliers, p. ex. services de points d’intérêt, services sur place ou géorepères
Disclosed herein are system, method, and computer program product embodiments for for authenticating a user at a kiosk device based on a unique token received by a client device to verify that an identity of the user is authentic, and further permit the user to access an account at the kiosk device. The unique token can be generated responsive to receiving an electronic notification that a card to access the kiosk device associated with the account has been reported lost or stolen. The unique token can be transmitted to the client device associated with the account and the user. The user can be authenticated when the unique token is received from the kiosk device responsive to input data provided by the user. Once authenticated, the user can access the account at the kiosk device.
G06F 21/33 - Authentification de l’utilisateur par certificats
G06Q 40/02 - Opérations bancaires, p. ex. calcul d'intérêts ou tenue de compte
G07F 19/00 - Systèmes bancaires completsDispositions à déclenchement par carte codée adaptées pour délivrer ou recevoir des espèces ou analogues et adresser de telles transactions à des comptes existants, p. ex. guichets automatiques
38.
PRESENTATION AND CONTROL OF USER INTERACTIONS WITH A TIME-DEPENDENT USER INTERFACE ELEMENT
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect
G06F 3/04847 - Techniques d’interaction pour la commande des valeurs des paramètres, p. ex. interaction avec des règles ou des cadrans
G06F 3/0488 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p. ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p. ex. des gestes en fonction de la pression exercée enregistrée par une tablette numérique utilisant un écran tactile ou une tablette numérique, p. ex. entrée de commandes par des tracés gestuels
39.
PRESENTATION AND CONTROL OF USER INTERACTION WITH AN ICON-BASED USER INTERFACE ELEMENT
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p. ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes
A system may program a plurality of dynamic transaction cards, wherein a threshold number of the plurality of dynamic transaction cards is required for approving a transaction. The system may assign each dynamic transaction card of the plurality of dynamic transaction cards to a respective user of a plurality of users. The system may receive, from a first respective user of the plurality of users, a request to complete the transaction. The system may cause a respective mobile device, associated with second respective user(s) of the plurality of users, to display an approval request. The system may receive approval(s) from a respective dynamic transaction card, via the respective mobile device of the second respective user(s), in response to the approval request. The system may determine whether a total number of the approval(s) matches the threshold number of dynamic transaction cards, and responsive to making that determination, may approve the transaction.
43.
PRESENTATION AND CONTROL OF USER INTERACTION WITH A MULTI-TAB USER INTERFACE ELEMENT
In some implementations, a system may identify one or more account identifiers associated with a user identifier. Each account identifier may be associated with one or more categories each representing a type of interaction of one or more interactions associated with the account identifier. A respective interaction amount may be associated with each interaction. The system may determine, for each category, a total category amount that is a sum of interaction amounts for interactions in a particular category occurring within a particular time frame. The system may transmit user interface (UI) data associated with a multi-tab UI element including a plurality of tabs corresponding to the plurality of categories. Each tab may be associated with benefits information related to a category corresponding to that tab. A first tab, corresponding to a category having a highest total category amount, may be presented in a particular position in the multi-tab UI element.
A hollow core insulator is provided for housing an electronics module for use in power transmission and distribution lines, the hollow core insulator comprising: a fibre-reinforced plastic (FRP) core which includes a first flange, a second flange and a body therebetween, the insulating core defining a bore, wherein the flanges and body are integral and the first flange and the second flange each include a face and a plurality of threaded apertures extending into the face; and a silicone mold which encases the body and includes a series of sheds extending outward from the body, wherein at least one shed includes a perimeter lip.
Disclosed herein are systern, method, and computer program product embodiments for executing automatic internet browsing sessions using pseudo-user profiles. In some embodiments, a plug-in integrated by a browser receives a request to execute an automated browsing session for the user profile. The plug-in retrieves a set of parameters associated with the user profile. The set of parameters comprise one or more rules for executing an automated browsing session. The plug-in executes the automated browsing session by automatically navigating to one or more websites, as indicated in the set of parameters. The plug-in interacts with the one or more websites based on the set of parameters.
Disclosed are systems and methods for node management performed by a client driver of a client device comprising receiving cluster topology data from the cluster system; transmitting, a data request to each of a plurality of nodes in a cluster system; receiving a reply from each of the nodes that are responsive; assigning, by the client driver, based on the received replies, a responsive status for each of the nodes that are responsive or a non-responsive status for each of nodes that are non-responsive; updating a listing of management data, wherein the management data includes: an identification of each of the plurality of nodes, and a current status of each of the plurality of nodes; and routing, by the client driver, a client request to one of the plurality of nodes that are responsive based on the cluster topology data.
H04L 43/0805 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité
H04L 43/103 - Surveillance active, p. ex. battement de cœur, utilitaire Ping ou trace-route avec interrogation adaptative, c.-à-d. adaptation dynamique du taux d'interrogation
48.
SYSTEMS AND METHODS FOR LEADER NODE ELECTION IN CLUSTER SERVER CONFIGURATIONS
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p. ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
G06F 11/20 - Détection ou correction d'erreur dans une donnée par redondance dans le matériel en utilisant un masquage actif du défaut, p. ex. en déconnectant les éléments défaillants ou en insérant des éléments de rechange
49.
KEY RECOVERY BASED ON CONTACTLESS CARD AUTHENTICATION
Systems, methods, apparatuses, and computer-readable media for key recovery based on contactless card cryptograms. A server may receive, from an application, a request to recover a private key for a digital wallet, the request includes a first cryptogram generated by a contactless card. The server may decrypt the first cryptogram based on a key for the contactless card. The server may determine, based on the decryption, a unique identifier of the contactless card and a diversification factor associated with the digital wallet. The server may generate the private key based on the unique identifier and the diversification factor. The server may transmit the private key to the application via a network.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
50.
SYSTEMS AND METHODS FOR GENERATING PREDICTIVE RISK OUTCOMES
Disclosed embodiments may include a method for generating predictive risk outcomes by receiving data and generating, using a first machine learning model (MLM), associated data. Then generating from the associated data, using a second MLM, correlated and uncorrelated data, which is then filtered to a reduced data set. The reduced data set is then used to generate, using a third MLM, risk event predictions that are output to an interactive graphical user interface (GUI) in a ranked, dynamic index. The system can be adjusted and run in near-real time from the GUI.
A computing system retrieves historical transaction data associated with a plurality of users. The historical transaction data includes stock-keeping unit (SKU) level data. The computing system trains a first prediction model to identify transaction patterns across the plurality of users and relationships between items to each transaction based on the historical transaction data. The computing system accesses transaction data corresponding to a first user of the plurality of users. The computing system generates a second prediction model by fine-tuning the first prediction model based on the transaction data of the first user. The computing system receives inventory data corresponding to one or more merchants with which the first user has transacted. The computing system accesses a news feed to identify upcoming events or ongoing events. The second prediction model learns a baseline spending pattern of the first user based on the transaction data. The computing system recommends a new transaction for the first user based on the baseline spending pattern, the inventory data, and the news feed.
Disclosed are a system, computer readable medium and a method in which a notification is received from a website that an authentication request will be received at the financial institution system within a predetermined time period. A prompt that includes a request for confirmation of a pending transaction via a near-field communication interaction with a contactless card, is presented on a mobile device that corresponds to the verification identifier of the user. In response to a near-field communication interaction responsive the prompt, an encrypted authentication payload may be received at an authentication web address as confirmation of the pending transaction. The payload is decrypted, and parameters obtained from the decrypted authentication payload. The user may be authenticated as a holder of the contactless card using one or more of the parameters. In response, the pending transaction is completed by sending user identifying information to the website.
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/42 - Confirmation, p. ex. contrôle ou autorisation de paiement par le débiteur légal
53.
SYSTEMS AND TECHNIQUES FOR AUTHENTICATING INSURANCE CLAIMS
Disclosed are a computing apparatus, a computer-readable storage medium, a system and a method that enable authentication of a claim request. An insurance provider application receive a claim request message related to an insured object. Encrypted information enabling authentication may be obtained from a user identifier apparatus of the user associated with the insured object. The information may include a reference link to an authentication application and multiple parameters. State information related to insured object and a mobile device associated with the insured object may be retrieved. The user of the insured object may be authenticated based on one or more of the multiple parameters by the authentication application. Confirmation that the retrieved state information corresponds to the insured object may be received. Based on an evaluation of the confirmation and a response to the request for authentication, processing of the claim request message may proceed.
G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes
Disclosed herein are systems and methods that can classify a plurality of nodes in a knowledge graph, where each of the plurality of nodes representative of an education medium, establish a plurality of links in the knowledge graph, where each of the plurality of links connects to at least two nodes of the plurality of nodes and each of the plurality of links represents an education relationship between the at least two nodes, receive, from a computing device associated with a user, data representative of qualifications associated with the user, determine a first set of nodes from the plurality of nodes, the first set of nodes representative of education mediums known by the user, create a user path through the knowledge graph, and assign, to each node in the second set of nodes, a chronological identity representative of an order by which the user proceeds through the user path.
A system, process, and computer-readable medium for updating an application cache using a stream listening service is described. A stream listening service may monitor one or more data streams for content relating to a user. The stream listening service may forward the content along with time-to-live values to an application cache. A user may use an application to obtain information regarding the user's account, where the application obtains information from a data store and/or cached information from the application cache. The stream listening service, by forwarding current account information, obtained from listening to one or more streams, to the application cache, reduces traffic at the data store by providing current information from the data stream to the application cache.
G06F 12/0891 - Adressage d’un niveau de mémoire dans lequel l’accès aux données ou aux blocs de données désirés nécessite des moyens d’adressage associatif, p. ex. mémoires cache utilisant des moyens d’effacement, d’invalidation ou de réinitialisation
G06F 16/957 - Optimisation de la navigation, p. ex. mise en cache ou distillation de contenus
56.
SYSTEMS AND METHODS FOR CLASSIFYING A WEBPAGE OR A WEBPAGE ELEMENT
Disclosed are methods and systems for classifying a webpage or one or more webpage elements. For instance, a method include detecting, by a user device, that a user of the user device has navigated to the webpage using a web browser installed on the user device and classifying, by the user device, the webpage or the one or more webpage elements into a classification by inputting first input data into one or more machine learning models. The method may further include, in response to classifying the webpage or the one or more webpage elements into the classification, causing the user device to display a user interface associated with an electronic application. The user interface may include information identifying the classification of the webpage.
Techniques to autofill data. A web browser may detect a payment field in a web page and determine that an application associated with a contactless card is installed on a device. The browser may generate a uniform resource identifier (URI) directed to the application. The URI may include a merchant identifier, a session identifier, and an action identifier as parameters. A mobile operating system may launch the application based on the URI. The application may authenticate, based on the action identifier parameter of the URI, an account associated with the contactless card based on a cryptogram generated by the contactless card. The application may receive, based on the authentication, payment information associated with the contactless card. A WebView component of the application may access the web page and autofill the payment information into the payment field. The WebView component may then process a transaction based on the autofilled payment information.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
58.
GRAPHICAL USER INTERFACE FOR CENTRALIZED REGISTER DEVICE MANAGEMENT AND MONITORING
In some implementations, a device may receive, via a data stream, log data associated with a set of register devices and may extract state information associated with the set of register devices from the log data. The device may transmit, to a client device, presentation information to cause the state information associated with the set of register devices and one or more user selection options for initiating actions to be performed by the set of register devices to be displayed by the client device via a graphical user interface (GUI). The device may receive an indication of a user input provided via the GUI associated with a user selection option of the one or more user selection options, that indicates an action to be performed by a register device. The device may communicate, with the register device, to cause the register device to perform the action.
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect
G06F 3/04842 - Sélection des objets affichés ou des éléments de texte affichés
G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
G07F 19/00 - Systèmes bancaires completsDispositions à déclenchement par carte codée adaptées pour délivrer ou recevoir des espèces ou analogues et adresser de telles transactions à des comptes existants, p. ex. guichets automatiques
59.
SUPERVISED AND/OR UNSUPERVISED MACHINE LEARNING MODELS FOR SUPPLEMENTING RECORDS STORED IN A DATABASE FOR RETRIEVAL
In some implementations, a system may receive interaction data based on an interaction of a user with a terminal, wherein the interaction data indicates a location of the terminal. The system may determine a plurality of entities having a corresponding plurality of locations that are within a geographic area that includes the location of the terminal. The system may determine, based on the plurality of entities, one or more categories for categorizing a purpose associated with the interaction of the user with the terminal. The system may transmit, to a user device of the user, information that identifies the one or more categories. The system may receive, from the user device, information that identifies one or more user-specified categories of the one or more categories. The system may store, in the database, a record that includes the information that identifies the one or more user-specified categories.
Systems and methods are disclosed herein for building contextual transcripts. A computing system may receive a textual transcript of a meeting that contains a variety of statements made by various attendees of the meeting, select the first statement made during the meeting, and determine which meeting attendee made the statement. A machine learning model corresponding to the particular attendee that has been trained using previously received statements by the particular attendee may be used on the utterance to determine the tone of the utterance. That tone may be recorded within the transcript and this process may be repeated for each utterance to build a contextual transcript.
Disclosed herein are financial article handling devices comprising an external aperture connected to a rotary table. The rotary table can contain two or more financial article handling units disposed on the rotary table, each of which can be configured to form an interface with the external aperture. The financial article handling devices can receive an indication from a first financial article handling unit that the first financial article handling unit is no longer functional, disconnect the first financial article handling unit from the external aperture, and articulate the rotary table such that a second financial article handling unit is in communication with the external aperture.
G07D 11/24 - Gestion de l’inventaire de papiers de valeur
G07F 9/02 - Dispositifs pour donner l'alarme ou une indication, p. ex. quand l'appareil est videAménagements publicitaires des appareils déclenchés par des pièces de monnaie
G07F 19/00 - Systèmes bancaires completsDispositions à déclenchement par carte codée adaptées pour délivrer ou recevoir des espèces ou analogues et adresser de telles transactions à des comptes existants, p. ex. guichets automatiques
62.
SYSTEMS AND METHODS FOR CONDUCTING REMOTE USER AUTHENTICATION
Disclosed embodiments may include a system that may receive, from a user device associated with a user, authentication rule(s), each authentication rule associated with respective merchant(s) and comprising respective required authentication factor(s) for completing a transaction with the respective merchant(s). The system may identify a user has navigated to a merchant webpage and may determine at least one rule of the authentication rule(s) associated with the merchant. The system may identify first required authentication factor(s) corresponding to the at least one rule, and may cause the user device to display, via a GUI, the first required authentication factor(s). The system may receive, via the user device, authentication information associated with the user. The system may determine whether the authentication information satisfies the first required authentication factor(s). Responsive to making that determination, the system may enable the user to complete a transaction via the merchant webpage.
63.
SYSTEMS AND METHODS FOR CONDUCTING REMOTE ATTESTATION
Disclosed embodiments may include a system that may receive a document associated with an entity and may generate a first hash associated with the document. The system may prompt a first user to provide a first signature of the document and may generate a second hash associated with the first signature. The system may prompt the first user to provide authentication information and may determine whether received authentication information matches stored authentication information. In response to determining the authentication information matches the stored authentication infomiation, the system may prompt a second user to provide a second signature of the document, may generate a third hash associated with the second signature, may generate a fourth hash associated with a verified record of the first, second, and third hashes, may generate a block comprising the first, second, third, and fourth hashes, and may publish the block to a blockchain.
Disclosed embodiments may include a device that may receive data corresponding to transaction card(s) associated with a user. The device may receive first photograph(s) of the user, the first photograph(s) associated with first respective date(s) and first respective time(s). The device may dynamically display a first most recent photograph. The device may receive a request from the user to complete a transaction, the request comprising a selection to utilize first data of the data corresponding to at least one transaction card of the transaction card(s). The device may retrieve the first data to enable the user to complete the transaction. The device may also receive a second photograph associated with a second date and a second time. The device may update the dynamic display with a second most recent photograph by comparing the first respective date(s) and first respective time(s) to the second date and second time.
G06F 3/147 - Sortie numérique vers un dispositif de visualisation utilisant des panneaux de visualisation
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
65.
EVALUATION OF A VEHICLE SERVICE FOR A VEHICLE BASED ON INFORMATION ASSOCIATED WITH A USER OF THE VEHICLE
In some implementations, a system may receive exchange information associated with a vehicle and a user. The system may identify, based on the exchange information, a type of the vehicle. The system may determine a characteristic of the user based on a user profile associated with vehicle usage by the user. The system may determine, using a service evaluation model and based on the type of the vehicle and the characteristic of the user, an evaluation score associated with the vehicle service. The system may generate, based on the evaluation score satisfying a threshold, a recommendation that the exchange include a service package associated with the vehicle. The system may provide, to the user, the recommendation, to permit the user to opt into receiving the vehicle service based on including the service package in the exchange.
Exemplary embodiments may provide keys for unlocking access to a location, like a user room, a secure location, a door at an employee location, a trunk, a closet or other locked location or item, on a payment card. Examples of a payment card include but are not limited to a credit card, a debit card, a smart card, an employee identification card, etc. A secure token that acts as digital key may be uploaded to the payment card. The payment card may then be put in close proximity of a wireless reader at the lock. The wireless reader obtains the secure token and extracts the contents. If the contents are proper, the lock is unlocked. Otherwise, the lock remains locked.
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G07C 9/00 - Enregistrement de l’entrée ou de la sortie d'une entité isolée
G07C 9/27 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer une station centrale gérant l’enregistrement
67.
DEVICES AND TECHNIQUES TO PERFORM ENTROPY-BASED RANDOMNESS VIA A CONTACTLESS CARD
A system may include processor(s), and memory in communication with the processor(s) and storing instructions configured to cause the system to orient webpage content based on user attention. The system may determine a user has navigated to a webpage. The system may generate an attention level based on received user feature(s) associated with activity of the user on the webpage. Responsive to determining the attention level exceeds a predetermined threshold, the system may identify a duration associated with the attention level, transmit an offer to one or more entities to submit predetermined content based on the duration, receive predetermined content from the one or more entities, identify, based on a predetermined amount of predetermined content space, selected content of the received predetermined content for placement on the webpage, and cause a GUI of the user device to display the selected content.
Embodiments discussed herein are generally directed to systems, devices, methods, and techniques to perform authentication and payment operations with a contactless card to provide items and services.
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
G06Q 20/14 - Architectures de paiement spécialement adaptées aux systèmes de facturation
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
70.
SYSTEMS AND METHODS FOR RESETTING AN AUTHENTICATION COUNTER
Systems and methods for counter resynchronization can include one or more servers each including a memory and one or more processors. The one or more servers can be in data communication with a transmitting device. The one or more processors can be configured to determine one or more reset events. The one or more processors can be configured to generate a resync value. The one or more processors can be configured to transmit, via one or more scripts, the resync value to the transmitting device according to one or more prioritization factors and in response to the one or more reset events. The one or more processors can be configured to replace the counter value with the resync value in accordance with the one or more prioritization factors.
G06F 21/35 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes communiquant sans fils
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
71.
SYSTEM AND METHOD FOR IMPROVING CYBERSECURITY FOR TELECOMMUNICATION DEVICES
Methods and systems are described herein for improvements for cybersecurity of telecommunication devices. For example, cybersecurity for telecommunication devices may be improved by analyzing activity log data of telecommunication devices for a candidate event (e.g., the uploading of malware) and disabling one or more services of a telecommunication device. By doing so, cybersecurity for telecommunication devices may be improved by detecting a possible malware intrusion attempt and disabling one or more services of the telecommunication devices. For example, activity log data of telecommunication devices may be obtained. A candidate event indicating malware may be detected in the activity log data. A number of proximate telecommunication devices satisfying a proximity threshold condition may be detemined. The number of proximate telecommunication devices that satisfy a density threshold condition may be detemined. Responsive to the number of telecommunication devices satisfying a density threshold condition, services of telecommunication devices may be disabled.
In some implementations, a point of sale (POS) system may store a card read failure indication based on detecting that a transaction terminal failed to read information associated with a transaction card, wherein the card read failure indication includes information that indicates whether the transaction terminal failed to read the information associated with the transaction card from a chip, a magnetic stripe, or a contactless device. The POS system may transmit information associated with the card read failure indication to an external device based on detecting a successful transaction subsequent to the transaction terminal failing to read the information associated with the transaction card, wherein the information associated with the card read failure indication is transmitted to enable the external device to determine whether one or more of the transaction card or the transaction terminal is defective.
G06K 7/01 - Méthodes ou dispositions pour la lecture de supports d'enregistrement Détails
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G07F 7/08 - Mécanismes actionnés par des objets autres que des pièces de monnaie pour déclencher ou actionner des appareils de vente, de location, de distribution de pièces de monnaie ou de papier-monnaie, ou de remboursement par carte d'identité codée ou carte de crédit codée
73.
SYSTEMS AND METHODS FOR DETERMINING TRANSACTION LOCATIONS
Systems and methods for determining transaction locations are disclosed. In one embodiment, a method includes receiving, from a computing terminal, information indicating the completion of a transaction associated with a mobile device, sending, to the mobile device, a confirmation of the completion of the transaction, receiving, from the mobile device, location information indicating latitude and longitude information of the mobile device, confirming that the location information is within a predetermined distance of a stored location of the computing terminal, updating the location information associated with the computing terminal to include the received location information, and determining, based on the location information associated with the computing terminal, a location of the computing terminal..
In some implementations, a system may establish an interview session between a first client device associated with an interviewer and a second client device associated with a candidate. The system may transmit, to the first client device associated with the interviewer, a first user interface during the interview session between the first client device and the second client device. The system may transmit, to the second client device associated with the candidate, a second user interface during the interview session between the first client device and the second client device. The system may receive, from the first client device, the feedback associated with the interview session. The system may transmit, to a human resource system, the feedback to enable a hiring recommendation regarding whether to offer the position associated with the interview session to the candidate.
H04W 12/47 - Dispositions de sécurité utilisant des modules d’identité utilisant la communication en champ proche [NFC] ou des modules d’identification par radiofréquence [RFID]
H04W 12/63 - Sécurité dépendant du contexte dépendant de la localisationSécurité dépendant du contexte dépendant de la proximité
76.
SYSTEM AND METHODS FOR MANAGING GRAPHICAL USER INTERFACES FOR ONE OR MORE AUTOMATED TELLER MACHINES
Disclosed embodiments may include a system that may receive an indication that a user is accessing an ATM, receive, from the ATM, average session duration data over a predetermined period, generate, using a machine learning model, a busyness score for the ATM based on the average session duration data over the predetermined period, and determine whether the busyness score for the ATM exceeds a busyness score threshold. When the busyness score for the ATM does not exceed the busyness score threshold, the system may cause the ATM to present, via a first graphical user interface, a default ATM experience. When the busyness score for the ATM exceeds the busyness score threshold, the system may cause the ATM to present via, a second graphical user interface, a busy ATM experience.
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect
G07F 19/00 - Systèmes bancaires completsDispositions à déclenchement par carte codée adaptées pour délivrer ou recevoir des espèces ou analogues et adresser de telles transactions à des comptes existants, p. ex. guichets automatiques
77.
SYSTEMS AND METHODS FOR DETECTING HUMAN PRESENCE NEAR A TRANSACTION KIOSK
Disclosed embodiments may include a system that may receive first level authentication data from a first user, identify a first user device associated with the first user, and determine whether a current location of the first user device is within a predetermined proximity of a first computing device. In response to the determination, the system may detect one or more objects within the predetermined proximity of the first computing device using the one or more positional sensors. The system may determine that at least one of the one or more objects is associated with a human, and in response, trigger a security measure. The system may transmit an indication of the triggered security measure to the first computing device, and may transmit instructions to the first user device configured to cause the first user device to provide an alert to the first user.
G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G07F 19/00 - Systèmes bancaires completsDispositions à déclenchement par carte codée adaptées pour délivrer ou recevoir des espèces ou analogues et adresser de telles transactions à des comptes existants, p. ex. guichets automatiques
Methods, systems, and apparatuses for managing and selecting virtual warehouses for execution of queries on one or more data warehouses are described herein. A request to execute a query may be received. An execution plan, for the query, may be identified. A processing complexity for the query may be predicted based on the query and the execution plan. A plurality of virtual warehouses may be identified. An operating status and processing capabilities of the plurality of virtual warehouses may be determined. A subset of the plurality of virtual warehouses may be selected based on the processing complexity, the operating status of the plurality of virtual warehouses, and the processing capabilities of the plurality of virtual warehouses. The query may be executed on one of the subset of the plurality of virtual warehouses.
A system may include processor(s), a memory in communication with the processor(s), and storing instructions, that when executed by the processor(s), are configured to cause the system to prevent unnecessary payments. The system may receive a signal indicative of an event in which a user device associated with a user enters a geofenced area associated with a merchant. The system may identify a merchant category code (MCC) associated with the merchant, and determine whether benefit(s) related to the MCC are associated with account(s) of the user. The system may receive an attempted purchase associated with the merchant, and may determine whether the attempted purchase relates to the benefit(s). The system may automatically block the attempted purchase related to the benefit(s) and associated with the user, and may transmit a message to the user via the user device, the message providing the benefit(s).
Methods and systems are disclosed herein for authenticating a user. A security device may use an object associated with a user and a device of the user to authenticate the user, for example, if the user has forgotten a password. A user may insert the object (e.g., a card, or other object) into the security device and may select an option to authenticate via a device that is trusted by both the security device and the user, rather than authenticating by entering a password at the security device.
G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
In some implementations, a user device may receive, from a user of the user device, a request to initiate an application session that is associated with an application. The user device may provide, to a server device based on receiving the request, an optical code associated with the server device establishing the application session. The user device may output the optical code via an output component. The user device may receive, from the server device, a notification that an agent device has joined the application session via a scan of the optical code from the output component. The user device may enable a function of the application based on the notification indicating that the agent device is capable of facilitating a service via the application session, wherein the service is associated with the function.
In some implementations, a system may receive, from a user device, a user-side request associated with establishing an application session, wherein the user-side request includes an optical code. The system may receive, from an agent device, an agent-side request associated with the agent device joining the application session, wherein the agent-side request includes authentication information that indicates that the agent device scanned the optical code from an output component of the user device. The system may send, to the user device, a notification to permit the user device to join the application session. The system may activate the application session to permit the user device and the agent device to communicate via the application session.
G06Q 40/02 - Opérations bancaires, p. ex. calcul d'intérêts ou tenue de compte
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 67/141 - Configuration des sessions d'application
H04L 67/143 - Interruption ou inactivation de sessions, p. ex. fin de session contrôlée par un événement
A system, process, and computer-readable medium for configuring agents for monitoring deployed applications is described. A system, process, and computer-readable medium for configuring monitoring user interfaces, e.g., monitoring dashboards, that use information made available from the agents is also described. Through using application data available during creation of the agents, the agents may be configured using the user interface as modified by selections and displaying subsequent choices from the received application data. Using knowledge of the generated agents, monitoring dashboards may be generated via developers interacting with a user interface providing a list of available metrics accessible by the generated agents. Using the one or more user interfaces, developers may generate agents and/or monitoring dashboards with greater efficiency.
H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance
84.
SYSTEMS AND METHODS FOR SCALABLE CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS
Systems and methods for authentication may include an authentication server. The authentication server may include a processor and a memory. The processor may be configured to transmit an authentication request. The processor may be configured to receive a first response that is responsive to the authentication request, the first response comprising a first cryptogram. The processor may be configured to generate a first challenge based on the first response. The processor may be configured to encrypt the first challenge with a symmetric key. The processor may be configured to transmit the first challenge receive a second response that is responsive to the first challenge, the second response comprising a second cryptogram. The processor may be configured to authenticate the second response.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04W 12/069 - Authentification utilisant des certificats ou des clés pré-partagées
H04W 12/47 - Dispositions de sécurité utilisant des modules d’identité utilisant la communication en champ proche [NFC] ou des modules d’identification par radiofréquence [RFID]
85.
SERVER-SIDE REDIRECT OF UNIFORM RESOURCE LOCATOR GENERATED BY CONTACTLESS CARD
Systems, methods, apparatuses, and computer-readable media for server-side redirect of uniform resource locators (URLs) generated by contactless cards. In one aspect, a server may receive, from a client, a first request comprising a uniform resource locator (URL), where parameters of the URL include a cryptogram and a customer identifier of an account associated with the contactless card. The server may decrypt the cryptogram and determine a context of the account based on one or more attributes of the account. The server may select, based on the decryption of the cryptogram and the determined context, a first redirect URL of a plurality of redirect URLs. The server may transmit, to the client, a response including the redirect URL. The server may receive, from the client, a second request including the redirect URL. The server may transmit, to the client, a response including a resource at the redirect URL.
G06F 21/35 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes communiquant sans fils
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de transfert électronique de fondsArchitectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
86.
CRYPTOGRAPHIC AUTHENTICATION TO CONTROL ACCESS TO STORAGE DEVICES
Systems, methods, apparatuses, and computer-readable media for cryptographic authentication to control access to storage devices. An applet executing on a processor of a contactless card may receive, via a wireless communications interface of the contactless card, a request to access a storage device of the contactless card, where the storage device is in a locked state. The applet may generate a cryptogram based on the request and transmit the cryptogram to a computing device via the wireless communications interface. The applet may receive, from the computing device, an indication specifying that a server decrypted the cryptogram. The applet may transmit, to a controller of the storage device and based on the indication specifying that the server decrypted the cryptogram, an indication specifying to unlock the storage device. The controller may transition the storage device from the locked state to an unlocked state based on the indication received from the applet.
G06F 21/44 - Authentification de programme ou de dispositif
G06F 21/78 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données
H04W 12/069 - Authentification utilisant des certificats ou des clés pré-partagées
87.
SYSTEMS AND METHODS FOR VALIDATING CUSTOMER INTERACTIONS
A method may include generating, by a computing device, a first dynamic QR code comprising a plurality of QR code frames, each QR code frame transmitted at a first frequency, the plurality of QR code frames comprising non-viable QR code frame(s) and at least one viable QR code frame. The method may include displaying, by the computing device, the first dynamic QR code, the at least one viable QR code frame displayed at a first time. The method may include transmitting, by the computing device, a first pulse to a user device. The method may include capturing, by the user device at the first time and in response to receiving the first pulse, the at least one viable QR code frame. The method may include generating and displaying, by the user device, a second dynamic QR code, causing the computing device to complete a requested transaction.
Systems and methods for securely generating and printing documents are disclosed. For example, processor(s) of a computer system may receive information for the document from a computing device through a network, verify the information for the document, and upon verification, generate document generation data using at least a portion of the information for the document. The document generation data may include document metadata that enables generation of an image of the document and/or the image of the document. Upon the processor(s) verifying first authentication information of a first code associated with a printing device received from the computing device through the network and second authentication information of a second code associated with the computing device received from the printing device through the network, the processor(s) may transmit the document generation data to the printing device through the network, and cause the printing device to print the image of the document.
Methods and systems are disclosed herein for secure communication between computing devices. A mobile device may communicate with an untrusted device to cause the untrusted device to send information (e.g., encrypted information that the untrusted device is unable to decrypt) to a server using an Internet connection of the untrusted device. The mobile device may have limited or no access to the Internet. To prevent potential security risks associated with using a public or untrusted device, the mobile device may encrypt information stored on the mobile device (e.g., stored in a mobile application associated with the server), send it to the untrusted device (e.g., by displaying a QR code to a camera of the untrusted device), and the untrusted device may send the information to the server via a network connection of the untrusted device.
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
G06F 21/35 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes communiquant sans fils
G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p. ex. lecture de la lumière blanche réfléchie
Methods, systems, and apparatuses are described herein for improving computer authentication processes through the generation of synthetic merchants. A plurality of different real merchant names may be received. The plurality of different real merchant names may be processed to determine one or more name elements. A request for access to an account associated with a user may be received. Based on the one or more name elements, one or more synthetic merchant names may be generated. Based on the one or more synthetic merchant names, synthetic transaction data may then be generated. A synthetic authentication question may be generated and presented to a user. A candidate response to the synthetic authentication question may be received. Based on the candidate response, access to the account may be provi ded.
In some implementations, a device may detect that a page is associated with an entity and an exchange is associated with the entity. The device may modify a document used to generate the page to present a field associated with shared virtual identifiers to be displayed. The device may receive request information for a shared virtual identifier, the request information indicating one or more parameters associated with the shared virtual identifier, a first identifier associated with a first account, and a second identifier associated with a second account. The device may transmit, to a server device, the request information and exchange information associated with the exchange. The device may receive, from the server, presentation information that identifies the shared virtual identifier. The device may modify the document used to generate the page based on the presentation information to cause the shared virtual identifier to be provided for display.
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
G06F 16/958 - Organisation ou gestion de contenu de sites Web, p. ex. publication, conservation de pages ou liens automatiques
Systems and methods for authentication may include an authenticator. The authenticator may include a processor and a memory. The processor may be configured to: receive one or more challenges; generate a first instruction, the first instruction including a request to retrieve a first Fast Identity Online (FIDO) key; transmit the first instruction; receive the first FIDO key; sign the one or more challenges using the first FIDO key; and transmit one or more signed challenges for validation using a second FIDO key.
Systems and methods for authentication may include an authentication server. The authentication server may include a processor and a memory. The processor may be configured to receive an authentication request. The processor may be configured to transmit a notification. The processor may be configured to receive a response that is responsive to the notification, the response comprising a ciphertext and input data. The processor may be configured to generate a Fast Identity Online (FIDO) key pair including a FIDO public key and a FIDO private key. The processor may be configured to encrypt a challenge using the FIDO private key. The processor may be configured to transmit the FIDO public key to decrypt the challenge so as to complete the authentication request.
In some implementations, a system may receive a record associated with an operation of the terminal. The system may determine that the operation is associated with a service involving a user of the terminal. The system may determine, based on the service and from location information in the record, a location of the terminal. The system may determine that an agent device is available in association with providing the service for the user, wherein the agent device is determined to be available based on a status of an application session of the agent device. The system may perform an action associated with the application session to enable the agent device to facilitate performance of the service for the user.
G07F 19/00 - Systèmes bancaires completsDispositions à déclenchement par carte codée adaptées pour délivrer ou recevoir des espèces ou analogues et adresser de telles transactions à des comptes existants, p. ex. guichets automatiques
96.
SYSTEMS AND METHODS FOR SECURE REMOVAL OF PRINTING RIBBON
Systems and methods for secure card printing ribbon removal may include a shredding unit, a collection unit, and a processor. The shredding unit may shred card printing ribbon and generate ribbon waste. The collection unit may be removably attached to the shredding unit and receive ribbon waste from the shredding unit. The collection unit may comprise a transparent material, a visual fill line, and a sensor that determines the amount of ribbon waste contained in the collection unit. Upon determination that the amount of ribbon waste exceeds a threshold, the sensor may generate a signal. The processor may operate the shredding unit and the collection unit, receive the signal generated by the collection unit, and generate, based on the signal, a prediction of a remaining capacity of the collection unit. The ribbon may include material containing sensitive infomi ati on .
Methods, systems, and apparatuses are described herein for improving computer authentication processes using vocal confidence processing. A request for access to an account may be received. An authentication question may be provided to a user. Voice data indicating one or more vocal utterances by the user in response to the authentication question may be received. The voice data may be processed, and a first confidence score that indicates a degree of confidence of the user when answering the authentication question may be determined. An overall confidence score may be modified based on the first confidence score. Based on determining that the overall confidence score satisfies a threshold, data preventing the authentication question from being used in future authentication processes may be stored. The data may be removed when a time period expires.
Methods and systems are described herein for manipulating a communication acceptance screen, manipulating an interactive communication acceptance icon, and restricting access to accounts based on voice communication parameters. In particular, when a communication is detected from one device to another device, that communication may be risky. Thus, the risk is mitigated by giving a user information about the source of the communication to give a user a chance to reject the communication. In addition, in instances where the user accepts the communication, the system enables monitoring the communication and restricting any accounts that are disclosed within the communication.
H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
H04W 72/02 - Sélection de ressources sans fil par un utilisateur ou un terminal
H04W 92/08 - Interfaces entre des dispositifs formant réseau hiérarchiquement différents entre un utilisateur et un dispositif terminal
99.
ESTABLISHING ONE-TO-MANY RELATIONSHIPS FOR EVENTS IN A RELATIONAL DATABASE
In some implementations, a device may receive an indication of an event that is associated with a first account and an entity, and an amount associated with the event. The device may establish a record, in a relational database, to link an identifier associated with the first account with the event. The device may receive, from a device associated with the first account, a request to associate the event with the first account and a second account. The device may modify the record to link the identifier associated with the event with the identifier associated with the first account and an identifier associated with the second account. The device may update a first balance associated with the first account to reduce the first balance and update a second balance associated with the second account to increase the second balance based on modifying the record.
A computer-implemented method of diagnosing a technology environment using augmented reality may include: receiving status information corresponding to the technology environment; generating, based on the status information, a 3D visualization of the technology environment; causing an augmented reality device to display the 3D visualization, the 3D visualization including one or more first level icons; receiving first selection information from the augmented reality device, the first selection information corresponding to a first selection gesture performed by a user of the augmented reality device; and in response to the first selection information, causing the augmented reality device to display one or more second level icons as part of the 3D visualization.
G06F 3/04815 - Interaction s’effectuant dans un environnement basé sur des métaphores ou des objets avec un affichage tridimensionnel, p. ex. modification du point de vue de l’utilisateur par rapport à l’environnement ou l’objet
G06F 3/04817 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p. ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comportement ou d’aspect utilisant des icônes
G06T 19/00 - Transformation de modèles ou d'images tridimensionnels [3D] pour infographie