Methods, systems, and computer program products for modelling and governance for transitive privileged access are provided. A method may include receiving potential transitive access data associated with at least one potential transitive access path, receiving privileged access data associated with a plurality of privileged accesses including a current privileged access, and determining a first target privileged access based on the current privileged access, the potential transitive access data, and the privileged access data. The method may also include generating a first directional graph edge from a first graph node associated with the current privileged access to a second graph node associated with the first target privileged access, the first directional graph edge representing a first transitive access path from the first graph node to the second graph node. The method may also include terminating the current privileged access based on the first transitive access path.
2.
TEXT AND MEDIA ENCODERS FOR CLASSIFYING MEDIA, DETERMINING PROMPTS, AND UNCOVERING BIAS IN MACHINE LEARNING MODELS
Embodiments are directed to methods and systems for media classification that may be used to better improve classification models and understand results of such classification. Various embodiments can determine a classification for a media item and can determine a prompt that includes the classification for a media item. Further embodiments can train a machine learning model using media items with known classifications. The results of each training iteration may be used to understand the result and improve the machine learning model.
A method is disclosed. The method includes transmitting a verification request comprising a wallet account identifier associated with a digital wallet to a smart contract on a blockchain network or a smart contract application associated with the smart contract. The smart contract or the smart contract application verifies the wallet account identifier using a blockchain on the blockchain network. The method also includes receiving from the smart contract on the blockchain network or the smart contract application, a verification response verifying the wallet account. The method further includes initiating transmitting to an authorizing entity computer, an authorization request message comprising a credential associated with the wallet account identifier.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
4.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR MULTI-LAYER ANALYSIS AND DETECTION OF VULNERABILITY OF MACHINE LEARNING MODELS TO ADVERSARIAL ATTACKS
Methods, systems, and computer program products are provided for multi-layer analysis and detection of vulnerability of machine learning models to adversarial attacks. An example method includes selecting a sample, inputting the sample to a machine learning model, perturbing the sample to generate perturbed samples, inputting each respective perturbed sample to the machine learning model, and determining a smallest perturbation distance for the input layer. For each respective hidden layer of the machine learning model, a respective hidden layer representation of the sample is perturbed to generate perturbed hidden layer representations. Each respective perturbed hidden layer representation is inputted to the machine learning model, and a respective smallest perturbation distance for each respective hidden layer is determined. At least one vulnerability metric is determined based on the smallest perturbation distance for the input layer and the hidden layer(s). The machine learning model is retrained based on the vulnerability metric(s).
G06F 18/214 - Generating training patterns; Bootstrap methods, e.g. bagging or boosting
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06V 10/774 - Generating sets of training patterns; Bootstrap methods, e.g. bagging or boosting
5.
DYNAMIC ENCRYPTION FOR SECURE PERSONAL IDENTIFICATION NUMBER ENTRY
The present disclosure provides various devices, systems, and methods for securely providing a personal identification number (PIN), for securely accepting a PIN, and for authenticating a transaction based on a securely provided PIN. In one aspect, a method for securely providing a user PIN can include receiving, by a portable electronic device, a device key provisioned by a server. The device key can be associated with a payment card. The method can further include receiving, by the portable electronic device, a request for an encrypted PIN to authenticate a transaction initiated using the payment card and generating, by a PIN encryption application executed by the portable electronic device, the encrypted PIN based on the user PIN and the device key. The encrypted PIN can be provided to an access device. The access device can be configured to communicate the encrypted PIN to the server.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
An exemplary communication device receives transaction data associated with an e-commerce transaction. The communication device provides, to a portable transaction device of a user, the transaction data via short range wireless communication. The portable transaction device generates a cryptogram based at least on the transaction data and a credential associated with an account. The communication device receives, from the portable transaction device, a payload including at least the cryptogram via the short range wireless communication; and transmits, to a token service computer, a token provisioning request message comprising the cryptogram. The communication device receives, from the token service computer, a token provisioning response message comprising a one-time use token associated with the credential upon validation of the cryptogram by a validation server; and transmits the one-time use token to a resource provider computer to finalize the e-commerce transaction.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04W 12/47 - Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
7.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR ADVERSARIAL TRAINING FOR COLLABORATIVE FILTERING
Provided is a system, method, and computer program product for adversarial training for collaborative filtering. The system includes at least one processor programmed or configured to train a collaborative filtering model through a plurality of iterations by inputting a training data set including adversarial perturbations, update weights of the collaborative filtering model after each iteration or subset of iterations of the plurality of iterations, determine a training loss between each consecutive iteration or subset of iterations of the plurality of iterations, resulting in a plurality of training losses, and determine a loss function for the collaborative filtering model by minimizing a difference between an initial training loss and the plurality of training losses for the plurality of iterations.
A computer-implemented method of processing a Structured Query Language (SQL query. The method can include identifying a parameter of the SQL query, generating a plurality of input vectors based on the parameter of the SQL query, transmitting the plurality of input vectors to an input layer of a neural network, and receiving a predicted number of rows associated with the input vectors generated by an output layer of the neural network. The predicted number of rows can be generated based on a descent gradient of the neural network. The method can further include modifying the parameter of the SQL query based on the predicted number of rows to generate a modified parameter, wherein the modified parameter is configured to reduce computational resources required to generate an SQL query result, and wherein the modified parameter is configured to improve an accuracy of the SQL query result.
A computer-implemented method is disclosed herein. The method includes receiving cryptocurrency account information associated with a digital asset account hosted by a cryptocurrency exchange, generating a token associated with the cryptocurrency account information, receiving a unique identifier from an issuer system, wherein the unique identifier is associated with a fiat-based asset account hosted by the issuer system, linking the token to the unique identifier, and storing the token in a token vault of the payment network. The method can further include displaying the cryptocurrency account information and the fiat-based account information based on the token via a user device to display. The method can further include generating a machine-readable code associated with the token based on a user input, wherein the machine-readable code initiates a transaction authorization request based on the cryptocurrency account information and the fiat-based account information when registered by an acceptance device.
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
A method for dispensing funds including receiving a withdrawal initiation request generated by a user device of a user, generating an authentication code associated with the withdrawal initiation request, receiving a withdrawal completion request from at least one of an automated teller machine (ATM) and/or a merchant point-of-sale (POS) device, validating the withdrawal completion, identifying an issuer system associated with the withdrawal completion request, generating an authorization request, transmitting the authorization request to the issuer system, receiving an authorization response, and transmitting a cash dispense message to cause the at least one of the ATM and/or the merchant POS device to dispense the withdrawal amount. Systems and computer program products for dispensing funds are also disclosed.
G07F 19/00 - Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
11.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PROCESSING INFERENCE REQUESTS TO EXECUTE A MACHINE-LEARNING MODEL
Provided is a system, method, and computer program product for processing inference requests to execute a machine-learning model. The system includes at least one processor programmed or configured to receive an inference request at a request handler having a first programming language capable of multithreading, communicate a first message based on the inference request from the request handler to at least one object associated with a machine-learning model, the at least one object having a second programming language different than the first programming language, determine whether to call at least one external service based on the first message and the at least one object, communicate a second message from the at least one object to an asynchronous function having the first programming language based on determining whether to call the at least one external service, and call the at least one external service via the asynchronous function while the at least one object associated with the machine-learning model executes.
Systems and methods are disclosed herein for continuous token monitoring and control, in one example comprising receiving, by a credentialing agent, a token protection request from a client, to generate a time code for the token to allow client access to a service of a provider; receiving, by the credentialing agent, at least one of risk data, a time code model, or secret parameters associated with the token; generating, by the credentialing agent, an ETA model, based on at least one of the risk data, the time code model, or the secret parameters; cryptographically binding, by the credentialing agent, the token, the risk data and the ETA model to generate a time code; and transmitting, the time code to at least one of the client, provider, or a provider credentialing service, to facilitate a validation of the time code and the token to allow the client access to the service.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
One embodiment can include a method comprising: receiving, by a second authorizing entity computer from a first authorizing entity computer, a push transfer message comprising a credential and an amount; adjusting, by the second authorizing entity computer, a value of the account based on the amount in the push transfer message; and transmitting, by the second authorizing entity computer to a cryptocurrency exchange computer, a credit message comprising the credential and the amount, wherein the cryptocurrency exchange computer communicates with an alias directory computer to obtain an alias associated with credential, and then credits a cryptocurrency account associated with the alias in an amount of cryptocurrency corresponding to the amount in the push transfer message.
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
A method for providing interactive recording networks is disclosed. Multiple separate local networks can be connected through a central network. Digital tokens can be used to perform transfers from a first local network across the central network to a second local network. Digital tokens can be redeemed, and digital tokens can be verified using counter values.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
15.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PROCESSING PAYMENTS IN A BLOCKCHAIN NETWORK
Provided is a system, method, and computer program product for processing payments in a blockchain network. The system includes at least one processor of a transaction processing system, the at least one configured to: receive a transaction request identifying a payer and a payee, each of the payer and the payee associated with a unique blockchain address in a blockchain network; create a smart contract on the blockchain network based on the unique blockchain address of the payer, the unique blockchain address of the payee, and a transaction amount, the smart contract configured to automatically transfer the transaction amount to an account associated with the payee; detect a release event; and execute the smart contract in response to detecting the release event.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
A method includes transmitting a challenge to a server as part of a request for a service provided by the server. The method further includes receiving, a signed response, wherein the signed response was generated using the challenge and is signed with a private key of the server. The method further includes, responsive to receiving the signed response, verifying the signed response with a public key corresponding to the private key of the server, the public key corresponding to a first mode of the authenticator device. The method further includes responsive to verifying the signed response, switching a current mode of the authenticator device to the first mode corresponding to the public key. The method further includes providing a second request to a user of the authenticator device to authenticate using one or more authentication factors corresponding to the first mode.
A method is disclosed. The method includes receiving, by an electric vehicle, a list of available services associated with an electricity supply terminal. The list of available services includes one or more methods that do not transmit credentials or tokens via a charging cable and one or more methods that do transmit credentials or tokens via the charging cable. The method also includes determining, by the electric vehicle, a set of services in the list of available services. The set of services includes services supported by the electric vehicle. The method also includes transmitting, by the electric vehicle to the electricity supply terminal, a service selection request comprising a service in the set of services. The method also includes receiving, by the electric vehicle from the electricity supply terminal via the charging cable, electricity from the electricity supply terminal.
The present disclosure provides various devices, systems, and methods for window enrichment. For example, in one aspect, the present disclosure provides a computer-implemented method. The method can include adding a new event from a data stream into a series store. The series store can store events from the data stream that include values and timestamps. The events can be sorted in the series store based on the timestamps. The method can further include sliding the window along the series store based on the timestamps to capture the new event and the events preceding the new event up to a limit of the time range, updating a state of the operator based on the values of the events captured by the window, and modifying the new event based on the state of the operator to generate a modified event.
Provided are methods that include receiving interaction data associated with a plurality of interactions, the interaction data including interaction records that include a plurality of fields including a static field and a dynamic field, generating a static interaction embedding representation based on static field data associated with the static field and a first transformer model, generating a plurality of dynamic interaction embedding representations based on dynamic field data associated with the dynamic field of a sequence of interaction records and a second transformer model, generating a first intermediate input and a plurality of second intermediate inputs, generating a static sequence embedding representation and dynamic sequence embedding representations based on a third transformer model, and generating at least one prediction based on inputting the static sequence embedding representation and the plurality of dynamic sequence embedding representations to a machine learning model. Systems and computer program products are also disclosed.
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
20.
SECURE PERSONAL IDENTIFICATION NUMBER ENTRY FOR TRANSACTIONS USING A PORTABLE ELECTRONIC DEVICE
The present disclosure provides various devices, systems, and methods for securely providing a personal identification number (PIN), securely receiving a PIN, and/or authenticating a transaction based on a securely provided PIN. In one aspect, a method for securely providing a PIN can include receiving, by a user portable electronic device, a request from a merchant portable electronic device to provide the PIN. The method can further include receiving, by a PIN entry application executed by the user portable electronic device, a user input to approve the request from the merchant portable electronic device. The method can further include generating, by the PIN entry application, an encrypted binary large object (BLOB) based on the PIN and communicating, by the user portable electronic device, the encrypted BLOB to the merchant portable electronic device.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Systems and methods for decentralized automatic synchronization of nodes is described, which can comprise a plurality of data centers, connected to an event source node, each data center comprising a memory storing instructions executable by a processor to initiate, based on a condition, a synchronization event; query, a log queue for events processed by at least one of the plurality of data centers; retrieve, from the log queue the events processed in at least one of the plurality of data centers; identify, a discrepancy between the events processed by at least one of the plurality of data centers and events stored in a local event log; determine, a compromised event associated with the event error in the local event log based on the discrepancy; and retrieve, a non-compromised copy of the compromised event from a staging storage of a peer data center.
In some embodiments, a computer-implemented method includes receiving, at an acquirer, a trust-verification-use-case-specific root certificate from a certificate authority of a payment processing network, the trust-verification-use-case-specific root certificate being associated with a trust verification use case; receiving an intermediate certificate from the certificate authority, the intermediate certificate being associated with the trust-verification-use-case-specific root certificate; generating, at the acquirer, a key pair for identity associated with an end-entity; signing the key pair for identity associated with the end-entity using the intermediate certificate; generating a digital certificate based upon the signing of the key pair for identity; generating a secure QR code utilizing the digital certificate, identify information associated with the end-entity, and an associated certificate chain; and providing the secure QR code to the end-entity for scanning by a user of a communication device to allow the user to provide financial compensation to the end-entity.
23.
MEMORY ALLOCATION TECHNIQUE FOR LOAD BALANCED SYSTEMS
A memory management for a computer system that executes multiple concurrent jobs can use machine learning techniques, such as reinforcement learning, to learn and exploit patterns of memory requests. Patterns or sequences of allocations that result in increased memory utilization can be learned, and subsequent decisions to grant allocation requests or wait for additional requests can be informed by the learned patterns.
Methods and systems for establishing a cryptographic binding between a secure element of a reader and a driver of a communication device are disclosed. Such a cryptographic binding can enable data (e.g., credentials) read or otherwise acquired by the reader to be securely transmitted to the driver of the communication device, and can prevent interception of those data using e.g., packet sniffing or protocol analysis malware as those data are transmitted over components of the communication device, such as a communication bus. The communication device can use the driver to verify the secure element of the reader using identification data associated with the secure element. Upon successful verification, the communication device can establish a mutual secret key between the secure element of the reader and the driver, thereby enabling encrypted communication between the two.
G06F 21/33 - User authentication using certificates
G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
25.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR UPDATING ENCRYPTION KEYS
Systems, methods, and computer program products are provided for updating encryption keys. An example method includes distributing an SDK including a software function to establish a secure connection between a client-side application running the SDK and a remote server computer; transmitting, to the merchant application, a key value; receiving a transaction request associated with a transaction, the transaction request initiated through the merchant application; in response to receiving the transaction request, transmitting an authentication request to the merchant application; receiving encrypted data from the merchant application, the encrypted data generated with the key value and based on device data; generating an authentication decision for the transaction based on determining that the encrypted data is valid; and updating, in the merchant application, the key value to replace the key value with updated key value.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/30 - Authentication, i.e. establishing the identity or authorisation of security principals
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
A communication device is disclosed. The communication device includes a housing comprising an active surface, and a processor associated with the housing. An NFC antenna array is coupled to the processor and is under the active surface of the housing. Each NFC antenna in the NFC antenna array is configured to detect a user device that is proximate to the NFC antenna. The user device comprises a user device NFC antenna and access data. A non-transitory computer readable medium is coupled to the processor. The non-transitory computer readable medium comprises code, executable by the processor, to cause the processor to perform operations. The operations include sequentially polling the NFC antennas in the NFC antenna array until the user device is detected by an NFC antenna in the NFC antenna array and the access data is received by the NFC antenna in the NFC antenna array.
G06K 7/10 - Methods or arrangements for sensing record carriers by corpuscular radiation
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
27.
MULTIPLE ANTENNA ARRANGEMENT FOR DETECTING USER DEVICES OF VARYING SIZE
A communication device including a housing comprising an active surface and a processor associated with the housing. A plurality of nested NFC antennas coupled to the processor respectively configured to detect and receive access data from user devices of different sizes proximate to the plurality of antennas. A computer readable medium is coupled to the processor and comprising instructions for: initiating a first polling of a first NFC antenna in the plurality of antennas; determining a second NFC antenna in the plurality of antennas with which to initiate a second polling; initiating the second polling of the second NFC antenna; detecting the user device using the second NFC antenna; and receiving the access data from the user device via the second NFC antenna.
H01Q 1/24 - Supports; Mounting means by structural association with other equipment or articles with receiving set
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
28.
DISPLAY APPARATUS WITH TRANSPARENT RF ANTENNA LAYER
A communication device, comprising: a processor; and a display apparatus coupled to the processor, wherein the display apparatus comprises a transparent top layer, an image layer proximate to the transparent top layer, and an antenna layer comprising a first RF antenna formed of a transparent conductive material proximate to the image layer for communicating with a user device comprising a second RF antenna.
G09G 3/3225 - Control arrangements or circuits, of interest only in connection with visual indicators other than cathode-ray tubes for presentation of an assembly of a number of characters, e.g. a page, by composing the assembly by combination of individual elements arranged in a matrix using controlled light sources using electroluminescent panels semiconductive, e.g. using light-emitting diodes [LED] organic, e.g. using organic light-emitting diodes [OLED] using an active matrix
The present disclosure describes a cross cluster failover framework configured to switch a synchronous or asynchronous connection from a first cluster datacenter to a second cluster datacenter based on a health evaluation of the first and second cluster, on an application level, data stream level, or topic level basis. The connections between the first cluster and the consumer application, and second cluster and the consumer application are maintained throughout the failover framework allowing the failover process to be invisible on the consumer application side.
Systems and methods for low communication distributed systems are disclosed. An example method can comprise receiving, by each node in a distributed system, a correlation function with a plurality of inputs comprising at least an identifier; receiving, at a node of the distributed system, a request comprising the identifier; identifying, by the node, a service node to serve the request based on the correlation function, the identifying comprising determining, by the node, based on a status of the node, the status of other nodes in the distributed system; determining a local state, based on at least one of the status of the node, the status of the other nodes, or a number of nodes in the distributed system; and calculating, based on the local state and the plurality of inputs, a target response that identifies the service node; and processing the request by the service node.
Provided is a system, method, and computer program product for automatically updating credentials. The system includes at least one processor programmed or configured to receive, from a first issuer system, a migration request identifying an original account identifier, a new account identifier, and a credential request history associated with the original account identifier, analyze the credential request history to identify at least one provisioned credential associated with the original account identifier, the at least one provisioned credential including at least one of a card-on-file merchant credential and a device token, and in response to identifying the at least one provisioned credential, automatically generate an update request configured to cause at least one of the following to update the at least one provisioned credential based on the new account identifier: a merchant system, a payment gateway associated with a merchant system, a user device, or any combination thereof.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 40/00 - Finance; Insurance; Tax strategies; Processing of corporate or income taxes
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
32.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR GENERATING A SINGLE-USE DIGITAL ASSET
Provided is a method for generating a single-use digital asset. The method may include receiving a first instruction to exchange a selected amount of a cryptocurrency from a buyer account for a digital asset from a seller account. A second instruction to transfer the digital asset from the seller account may be transmitted. A third instruction to transfer the cryptocurrency from the buyer account may be transmitted. A smart contract may be generated within a first blockchain network. The cryptocurrency may be transferred from the buyer account, and the digital asset may be transferred from the seller account to the smart contract. The cryptocurrency may be transferred from the smart contract to the seller account. A non-retrievable address may be generated. The digital asset may be transferred from the smart contract to the non-retrievable address. Systems and computer program products are also provided.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Methods, systems, and computer program products are provided for determining performance of a machine learning model using decision boundary geometry. A method may include receiving data associated with a machine learning model, determining a decision boundary of the machine learning model, generating one or more metrics associated with a geometry of the decision boundary of the machine learning model, and determining whether to perform an action on the machine learning model based on the one or more metrics associated with the geometry of the decision boundary.
A method is disclosed. The method includes receiving, from a user device, interaction information associated with an interaction. The interaction information comprises a user device identifier. The server computer stores data relating to a set of user devices of the user. The set of user devices includes the user device. Responsive to receiving the interaction information, the method includes determining that additional data from additional user devices are needed to generate an authorization request message for the interaction. The method further includes determining a subset of the set of user devices that can provide the additional data, and generating an interaction identifier for the interaction, and communicating with the subset of user devices using the interaction identifier to obtain the additional data. The method also comprises generating the authorization request message including the obtained additional data, and transmitting the authorization request message to an authorizing entity computer for authorization.
In some embodiments, a systemincludes a processor and a non-transitory computer readable medium coupled to the processor, wherein the non-transitory computer readable medium includes code that: requests a comparison user expression from a user of an application of a user device; maps the comparison user expression to a comparison blend shape coefficient and a comparison blend shape coefficient value at the authentication server; requests from the authentication server, an authentication user expression from the user of the application on the user device; maps the authentication user expression to an authentication blend shape coefficient and an authentication blend shape coefficient value at the authentication server; and utilizes the authentication user expression and the comparison user expression to authenticate the user of the user device.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Embodiments of the present disclosure are directed to the methods and systems for generating artificial data records from (potentially private or sensitive) data records in a privacy-preserving manner, particularly using machine learning models such as generative adversarial networks (GANs). Such artificial data records can be used in place of the real data in data analysis applications, such as training machine learning models. These artificial data records can be generated such that they do not (or have a low or negligible probability of) leaking information from the data records used to generate the artificial data records. As a result, artificial data records (or any machine learning models trained to generate such artificial data records) can potentially be published or distributed without violating rules, regulations, or laws restricting the transmission of sensitive data.
Embodiments can provide authentication tokens that are linked. Authentication tokens can be linked in such a way where the current authentication token can be determined by using a previous authentication token. Such embodiment can enable the server computer to authenticate the user even if the authentication token received by the client computer is not up to date.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
A method is disclosed. The method includes receiving authentication result data associated with an authentication request initiated by an orchestrator computer and performed using a credential of a user. The authentication request can be in response to the user initiating a first process. The method also includes receiving, from a data processor computer, an authentication context request message associated with the credential. The authentication context request message can be in response to an initiation of a second process different than the first process. The method can also comprise performing a search for the authentication result data using the credential and transmitting the authentication result data or a derivative thereof to the data processor computer. The data processor computer analyzes the authentication result data or the derivative thereof and decides to perform the second process based on the authentication result data or the derivative thereof.
Described are a system, method, and computer program product for predictive modeling using hyperbolic knowledge graph embeddings. The method includes receiving graph data associated with a knowledge graph including at least one triple. The method also includes generating, in a hyperbolic space, a head embedding for each head vector, a tail embedding for each tail vector, and a relation embedding for each relation vector, of the at least one triple. The method further includes determining a score for each triple based on the head embedding, the tail embedding, and the relation embedding. The method further includes determining a loss based on the score for each triple and updating the head embedding, the tail embedding, and the relation embedding for each triple based on the loss. The method further includes repeating determining the score, determining the loss, and updating until a termination condition is satisfied.
Systems, methods, and computer program products are provided for multi account access based on a single credential. An example system includes at least one processor configured to receive an authorization request message associated with a transaction that has a first account identifier. Whether the transaction and/or the first account identifier qualifies for dynamic processing is determined. At least one processing option available for the dynamic processing of the transaction is identified. A modified authorization request message is transmitted to an issuer system that indicates the processing option(s). An authorization response message is received from the issuer system that has an authorization indicator and an identifier for a funding source compatible with a selected processing option. A modified authorization response message is transmitted based on the authorization indicator and the identifier for the funding source to the acquirer system.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/00 - Payment architectures, schemes or protocols
41.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR ADAPTIVE FEATURE OPTIMIZATION DURING UNSUPERVISED TRAINING OF CLASSIFICATION MODELS
Provided are systems that include a processor to receive a training dataset including a plurality of data records, calculate feature projection errors and classification scores for the plurality of data records using a machine learning model, determine a distribution of features according to feature projection error, apply a downscaling function to each feature value of a feature in a false positive classification distribution to provide a downscaled set of feature values, apply an upscaling function to each feature value of a feature in a false negative classification distribution to provide an upscaled set of feature values, combine the downscaled set of feature values and the upscaled set of feature values with the training dataset to provide an updated training dataset, and train the machine learning model using the updated training dataset to provide an updated trained machine learning model. Methods and computer program products are provided.
A method includes receiving from an access device in a transaction, a transaction value and a second address associated with the access device in a first interaction between the user device and the access device. The method also includes outputting the transaction value, and then generating a digital signature by signing a first address associated with the user device, the second address associated with the access device, and the transaction value with a user device private key associated with the first address. The user device then transmits, to the access device, a response message comprising the digital signature and the first address associated with the user device in a second interaction. The access device thereafter processes the transaction using the digital signature, the first address associated with the user device, the second address associated with the access device, and the transaction value.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
43.
DATA SEGMENTATION USING CLUSTERING AND DECISION TREE
Method includes receiving sets of historical access requests for resources from requestors. Each historical access request of each of the sets of historical access requests is associated with same requestor having a requestor identifier, where each requestor is associated with requestor feature. Requestor identifiers are clustered using requestor features to obtain clusters for requestor identifiers. Decision tree that segments requestor identifiers into segments is trained using clusters so that the segments match clusters obtained from clustering. The decision tree includes nodes, each node storing a rule. An application of decision tree on requestor features causes a segmentation being performed that replicates application of the clustering on requestor features to obtain clusters. Rules and architecture of the decision tree are transmitted to another computer system, allowing another computer system to perform segmentation using access requests for resources from requestors, where the access requests are stored locally on the other computer system.
Systems, methods, and computer program products are provided for secure inference in a multi-party computation (MPC) setting. The system may include at least one processor configured to receive data associated with a machine learning model, generate an approximation of a complex activation function of the machine learning model, generate an updated machine learning model based on the approximation of the complex activation function, and provide the updated machine learning model to a plurality of MPC nodes, wherein the plurality of MPC nodes perform an inference task using the updated machine learning model as part of an MPC protocol.
A computer implemented method providing one-stop merchant integrated mobile payment experiences and solutions is disclosed. A data object representing a selection of a payment provider is received on a user device to conduct a live payment transaction between a merchant and a user of the user device. An encrypted connection is established between the acquirer and the payment provider. The data object is pushed to the payment provider. A transaction-approval request is received from the payment provider. The transaction-approval request is pushed to the user device for display as a push notification, pushing a user response to the transaction-approval request to the payment provider. An authentication request is received from the payment provider. User authentication-verification information is pushed to the payment provider to complete the payment transaction, and a message indicating completion of the payment transaction is pushed to the user device.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/14 - Payment architectures specially adapted for billing systems
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/16 - Payments settled via telecommunication systems
46.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR EFFICIENT NODE EMBEDDINGS FOR USE IN PREDICTIVE MODELS
Described are a system, method, and computer program product for efficient node embeddings for use in predictive models. The method includes receiving graph data associated with a graph comprising a plurality of nodes associated with a plurality of entities and a plurality of edges associated with interactions between entities. The method also includes generating a plurality of node embeddings for the plurality of nodes, and generating a matrix based on each positive pair of nodes and the plurality of node embeddings. The method further includes decomposing the matrix to provide a left unitary matrix, a diagonal matrix, and a right unitary matrix. The method further includes determining a plurality of updated node embeddings for the plurality of nodes based on the left unitary matrix and the diagonal matrix. The method further includes communicating the plurality of updated node embeddings for inputting into a machine learning model to generate a prediction.
Methods, systems, and computer program products are provided for improving machine learning models which include receiving a data set including data records; inputting the data set to a pre-trained first machine learning model to generate first embeddings; inputting the first embeddings to a second machine learning model to generate second embeddings in a user-specific embedding space; inputting the plurality of second embeddings to a third machine learning model to extract feature data associated with a feature; inputting an output from a machine learning system and the feature data to a fourth machine learning model to generate a relevance score for each entity; determining a subset of entities based on the relevance score; communicating a feedback request to a user; receiving feedback data from the user; and training at least one of the models based on the feedback data.
Methods, systems, and computer program products for encapsulated multi-functional framework: obtain a plurality of features associated with an instance, the plurality of features including a first subset of the plurality of features associated with a first entity, a second subset of the plurality of features associated with a second entity, and a third subset of the plurality of features associated with each of the first entity and the second entity; train, based on the plurality of features, a plurality of machine learning models encapsulated in a single framework; generate, based on a plurality of first weighted outputs, a plurality of second weighted outputs, and a plurality of third weighted outputs, a prediction for the instance; and provide the prediction for the instance.
Provided is a system that includes a processor to receive a dataset comprising a plurality of feature values of a plurality of features; determine, for each feature of the plurality of features, a plurality of sequence deviation metrics; generate a plurality of sets of features for the plurality of sequence deviation metrics, wherein each set of features comprises a ranked set of features for a sequence deviation metric; train a plurality of machine learning models based on the plurality of sets of features, wherein the plurality of machine learning models comprises a machine learning model for each sequence deviation metric; determine a performance metric of each trained machine learning model for each sequence deviation metric; and select a ranked set of features for a sequence deviation metric that corresponds to a trained machine learning model that has a highest performance metric. Methods and computer program products are also provided.
In some embodiments, a system includes a processor; and a non-transitory computer readable medium coupled to the processor. In some embodiments, the non-transitory computer readable medium includes code that; receives a steganography -based scalable vector graphics (SVG) image request from a browser associated with a webpage; generates, based on the receipt of the steganography-based SVG image request, the steganography -based SVG image; and provides the steganography-based SVG image to a browser cache of the browser for use in determining whether a user of the webpage is a return user.
G06T 9/20 - Contour coding, e.g. using detection of edges
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 67/146 - Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
51.
METHOD AND SYSTEMS FOR IMPROVING COMPUTER NETWORK SECURITY
Automated systems and methods for monitoring computer networks via an intelligent widget, the system comprising an enterprise network comprising connected devices; the system configured to undertake a set of security monitoring activities for each of the connected devices, comprising instructions to detect a device of the connected devices logging into the enterprise network; detect a web call by the device to a web address via a proxy; generate a login log; generate a proxy log; combine data from the login log and the proxy log into concatenated data; aggregate the concatenated data from the device with concatenated data from the connected devices into aggregate data. The system comprising an admin device configured to receive the aggregate data to allow processing and display of selected content from the aggregate data; and display dynamically on a graphical user interface of the intelligent widget the selected content to monitor the enterprise network.
Described are a system, method, and computer program product for real-time change detection. The system includes at least one processor configured to receive transaction data associated with a transaction associated with an entity, and determine an aggregate value based on a portion of the transaction data for the transaction. The at least one processor is also configured to generate a predicted aggregate value for the entity by inputting historic transaction data associated with a plurality of historic transactions associated with the entity to a machine learning model. The at least one processor is further configured to determine a deviation of the aggregate value from the predicted aggregate value, and compare the deviation to a dynamic threshold associated with the entity. The at least one processor is further configured to, in response to determining that the deviation satisfies the dynamic threshold, trigger a risk mitigation process associated with the entity.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
Systems, methods, and computer program products for providing a dynamic interchange value based on a blockchain network. The system includes at least one processor configured to store account holder profile data for each account holder at a unique blockchain address, store merchant profile data for each merchant of a plurality of merchants at a unique blockchain address, receive a transaction request message for a first transaction comprising an account identifier, identify first account holder profile data from the account holder profile data stored in the blockchain network based on the account identifier, identify first merchant profile data from the merchant profile data stored in the blockchain network based on the first merchant, determine a dynamic interchange fee value based on the first merchant profile data and the first account holder profile data, and process the first transaction based on the dynamic interchange fee value.
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
e.g.e.g., payment cards, identification cards, driver's license cards) that are removably attachable to a portable electronic device. In some aspects, the portable electronic device is configured for reverse wireless charging and includes a device charging coil. The card includes a card charging coil, a capacitor electrically coupled to the card charging coil, and a circuit. The card charging coil can produce a current from magnetic flux generated by the device charging coil. The circuit can cause the capacitor to charge when the card is attached to the portable electronic device and cause the capacitor to discharge upon removal of the card from the portable electronic device.
H04B 5/00 - Near-field transmission systems, e.g. inductive loop type
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
55.
SYSTEM AND METHOD FOR A NETWORK AUTHENTICATION WITH DEVICE LEVEL AUTHENTICATION CONTROLS
A system and method for network authentication using device level authentication controls. The method comprises receiving a first payment transaction request from a user device. In response to receiving the consent, the method comprises, enabling the authentication mode for the user to perform an authentication using the selected authentication mode and generating a key pair for linking with the enabled authentication mode for further authentication of the user device in one or more further transaction requests. The method further comprises generating an enrolment completion message and executing the first payment transaction request upon successful signing using the linked key pair. In this manner, the present disclosure may be configured to utilize device authentication data as a part of network authentication risk checks leading to providing a more secure way of completing a transaction.
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
56.
METHOD AND SYSTEM FOR AUTOMATIC PAYMENT METHOD TRANSMISSION TO MERCHANTS
The present disclosure relates to a payment processing system and a method for automatic payment method transmission to merchants. The method comprises providing a list of plurality of merchants to a user for receiving a user selection on at least one of the plurality of merchants for performing one or more transactions. In response to the user selection, the method comprises authenticating the user, based on user details provided by the user, for authorizing the user to set one or more payment methods for the at least one of the plurality of merchants selected by the user. Subsequently, method comprises transmitting the user details, user authorization and the one or more payment methods set by the user to a payment processor associated with each of the plurality of merchants selected by the user. Finally, the method comprises receiving a merchant confirmation on acceptance of the one or more payment methods set by the user from the at least one of the plurality of merchants selected by the user. In some embodiments, the above process may be also used to delete the one or more payment methods set with the plurality of merchants selected by the user and/or delete a merchant from the list of the plurality of merchants selected by the user.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/16 - Payments settled via telecommunication systems
G06Q 20/14 - Payment architectures specially adapted for billing systems
G06Q 30/06 - Buying, selling or leasing transactions
57.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DETERMINING A PSEUDO-IDENTITY SCORE IN A VIRTUAL ENVIRONMENT BASED ON A BLOCKCHAIN NETWORK
Provided is a system, method, and computer program product for determining a pseudo-identity score in a virtual environment based on a blockchain network. The system includes at least one processor programmed or configured to identify a pseudo-identity in a virtual environment based on a blockchain address on a blockchain network, the pseudo-identity corresponding to the blockchain address, determine an age of the pseudo-identity, determine a measure of activity of the pseudo-identity based on transactions conducted by the pseudo-identity in the virtual environment, determine a pseudo-identity score based at least partially on the age of the pseudo-identity and the measure of activity of the pseudo-identity, and process a request generated by the pseudo-identity in the virtual environment based on the pseudo-identity score.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
Systems, methods, and computer program products are provided for detecting anomalies in computing systems using correlated session data from source servers and target servers. The method includes receiving a connection request for a connection to a target server from a source server, the connection request including a login request to a service account on the target server, the connection request initiated on the source server by a user account; generating a communication session for the user account between the source server and the target server based on the connection request; collecting target server session data associated with the target server and source server session data associated with the source server; correlating the target server session data with the source server session data to provide correlated session data; and detecting an anomaly based on the correlated session data.
Systems and methods for securely activating a physical card capable of NFC are disclosed. These may comprise authenticating, by a mobile device capable of NFC communication, a user via an issuer application on the mobile device; determining, by the mobile device, based on user data available to the issuer application, that the user has been issued the physical card, wherein the physical card is inactive and NFC-enabled; prompting, the user, by the mobile device, to place the physical card within a communication distance to the mobile device; detecting, by the mobile device, the physical card within the communication distance to the mobile device; executing, by the mobile device, an NFC-based ODA transaction with the physical card; based on a success of the ODA transaction, authenticating, by the mobile device, a validity of the physical card with the issuer, to allow activation of the card.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
In systems and methods for efficient remittance, a server computer receives, from a first issuer computer via an application programming interface (API), a request to transfer an amount of first currency to a receiving party. The server computer obtains an amount of digital currency corresponding to the amount of first currency and records a record of the transfer to a ledger of interactions. The server computer causes the record to be recorded to a blockchain. The server computer transmits, to a second issuer computer, a notification of the transfer and receives, from the second issuer computer via the API, a request for an amount of second currency corresponding to the amount of digital currency. The server computer transmits the amount of the second currency to the second issuer computer, causing the second issuer computer to provide the amount of second currency to the receiving party.
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
Embodiments of the present disclosure are directed to methods and systems for biometric authentication using superimposed biometric data. Using such methods and systems, a user can be authenticated for some purpose (e.g., gaining access to a secure facility, accessing a user account, etc.). Superimposed biometric data, unlike conventional biometric data, can comprise a combination of user biometric data and artificial biometric data. This combination can protect the user biometric data. For example, if an identity thief manages to acquire the superimposed biometric data, it may be difficult or impossible for the identity thief to acquire the user biometric data, thereby protecting the user's data privacy. The user can use a user device to capture and combine the user's biometric data with artificial biometric data stored on the user device, thereby determining superimposed biometric data, which can be sent to a biometric authentication server in order to authenticate the user.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
62.
METHOD AND SYSTEM FOR PROVIDING ENERGY TO VEHICLES USING SECURE CREDENTIAL TRANSFER
A method is disclosed. The method includes receiving, by a user device from an energy supply terminal, transaction data comprising an energy provider identifier for a transaction to provide energy from the energy supply terminal to a vehicle. The user device then determines a credential, and then transmits the energy provider identifier and a selection of the credential to a secure remote transaction server. The secure remote transaction server initiates transmission of an authorization request message comprising the energy provider identifier, the credential or a token corresponding to the credential, and an amount to an authorizing entity computer. The secure remote transaction server then receives an authorization response message for the transaction from the authorizing entity computer. The secure remote transaction server can also provide an indication of the authorization for the transaction the user device.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
63.
SYSTEM, METHOD, COMPUTER PROGRAM PRODUCT FOR USE OF MACHINE LEARNING FRAMEWORK IN ADVERSARIAL ATTACK DETECTION
Provided is a system that includes a processor to provide a first input to an autoencoder machine learning model; generate a first output of the autoencoder machine learning model based on the first input; provide the first input to a production machine learning model; provide the first output of the autoencoder machine learning model as a second input to the production machine learning model; generate a first output of the production machine learning model based on the first input; generate a second output of the production machine learning model based on the second input; determine a metric of divergence between the first output and the second output of the production machine learning model, wherein the metric of divergence comprises an indication of whether the first input is associated with an adversarial attack; and perform an action. Methods and computer program products are also provided.
In some embodiments, a system includes a processor and a non-transitory computer readable medium coupled to the processor, the non-transitory computer readable medium comprising code that constructs a minimum perfect hash (MPH)-based database file for use in an MPH database; generates, based upon MPH-based parameters, an MPH-based record for the MPH database file; generates, based on an MPH function and a first parameter of the MPH-based parameters and a second parameter of the MPH-based parameters, an MPH-based position index that maps to the MPH-based record; and utilizes the MPH-based position index to access the MPH-based record in the MPH database.
The present disclosure describes a non-custodial cryptocurrency wallet application, software development kit, method, and system that blend the advantages of custodial and non-custodial schemes. The system leverages existing user credentials and networks of users to generate seed phrases and encryption keeps for the end-users. The non-custodial cryptocurrency wallet application simulates the user interface of a custodial crypto wallet with the advantages and security of a non-custodial crypto wallet.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
Apparatus, system, and method for generating a synthetic finger are disclosed. A three-dimensional (3D) model of a fingerprint is generated based on fingerprint data received from a database. A mold is creating based on the 3D model. A casting material is applied on the mold to create a synthetic finger. The synthetic finger includes a fingerprint formed on the casting material by the mold.
B29C 39/02 - Shaping by casting, i.e. introducing the moulding material into a mould or between confining surfaces without significant moulding pressure; Apparatus therefor for making articles of definite length, i.e. discrete articles
A robotic apparatus, system, and method for testing a biometric sensor using synthetic fingers. The robotic system includes a robot and a biometric scanner. The robot includes a robotic arm having an end effector configured to select a synthetic finger assembly. The synthetic finger assembly includes a near field communication (NFC) circuit. A controller is electrically coupled to the robotic arm. The controller is configured to control movement of the robotic arm, cause the end effector to select the synthetic finger assembly, and identify the synthetic finger assembly. The biometric scanner includes a sensor configured to scan a fingerprint disposed on the synthetic finger.
Using historical access requests for resources received from requestors, base training data is generated as text and arranged as requestor books, each corresponding to a set of historical access requests associated with account of respective requestor and including paragraphs, each corresponding to respective historical access request from the set and including access context and access outcomes for access states associated with respective historical access request. Untrained model is trained using base training data to generate base model that predicts part of paragraph based on other parts of paragraph. Labels for group books are obtained, each group book including paragraphs from requestor books associated with same entity. Labels indicate security state of access requests included in group books. Classification training data is generated using labels and group books. Refinement training on base model is performed using classification training data, to generate refined model that classifies security states of group books.
A payment card configured to be wirelessly reconfigured is disclosed herein. The payment card can include a charging coil configured to generate electrical energy in response to a magnetic field generated by a corresponding charging coil of a computing device, and a wireless communication component electrically coupled to the charging coil, wherein the charging coil is configured to power the wireless communication circuit to communicate with the computing device via a wireless communication protocol.
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
70.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR SPATIAL-TEMPORAL GRAPH SANDWICH TRANSFORMER FOR TRAFFIC FLOW FORECASTING
Methods, systems, and computer program products for traffic flow forecasting: obtain a graph representing a traffic network; obtain historical time-series traffic data associated with historical traffic conditions at a number of historical time steps in the traffic network; process, with each spatial-temporal graph sandwich transformer of at least one spatial-temporal graph sandwich transformer, the graph and the historical time-series traffic data to generate a sandwich transformer output, wherein each spatial-temporal graph sandwich transformer includes a top temporal transformer, a spatial transformer that receives, as an input, an output of the top temporal transformer and the graph, and a bottom temporal transformer that receives, as an input, an output of the spatial transformer; and generate, based on the sandwich transformer output from each spatial-temporal graph sandwich transformer, predicted time-series traffic data associated with predicted traffic conditions at a number of next time steps in the traffic network.
H04L 43/00 - Arrangements for monitoring or testing data switching networks
H04L 41/00 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
H04L 69/16 - Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
H04L 45/00 - Routing or path finding of packets in data switching networks
H04L 69/00 - Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
71.
SYSTEMS AND METHODS FOR PROCESSING CRYPTOCURRENCY TRANSACTIONS
Embodiments of the invention are directed to systems and methods for conducting a transaction using a cryptocurrency. A server computer may receive a transaction request for a cryptocurrency transaction from a user associated a resource provider. The server computer may provide the transaction details to a user device for confirmation. Upon receiving confirmation from the user device, the server computer can provide an authorization message to the resource provider computer indicating authorization of the cryptocurrency transaction. The server computer may receive an acceptance message from the resource provider computer. The server computer can provide, to the cryptocurrency exchange computer, the acceptance message, such that a transfer of cryptocurrency funds in the transaction amount from the funding source to an account of the resource provider associated with the resource provider computer.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
72.
CONFIGURATION OF NODE PORT FOR MAINTENANCE WITHOUT LOAD BALANCER COORDINATION
A computer implemented method providing a network policy configured to prevent transaction data processing from being interrupted during maintenance performed on nodes in a cluster network. The network policy reduces maintenance period times and the amount of personnel needed to perform node maintenance by simulating node failure. The simulated node failure prevents new transaction data from being sent the node that is undergoing maintenance.
H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
Methods and systems for provisioning a token on a mobile device without the installation of an application thereon are provided. A server computer can: receive credentials associated with a user account; encrypt the credentials; generate a payload in form of a remote resource address; generate an application associated with the remote resource address; transmit the application to a mobile device in response to the mobile device navigating to the remote resource address; receive the payload from the application when the application is executed on the mobile device; and provision a token associated with the user account on a digital wallet of the mobile device when the application is executed on the mobile device without being installed thereon.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
74.
SYSTEM AND METHOD FOR PERFORMING A FAST LIMITED CHARACTER SEARCH
In some embodiments, a system includes a processor and a non-transitory computer readable medium coupled to the processor. In some embodiments, the non-transitory computer readable medium includes code that performs a first character assessment of a first character located at a first position in a character string, and during a search for a character subset in the character string, determines whether to bypass a character assessment of each character located in a search length span of the character string based upon the first character assessment of the first character located at the first position in the character string. In some embodiments, the non-transitory computer readable medium includes code that bypasses the character assessment of each character in the search length span when the first character is of a second type (e.g., not of a first type).
Methods, systems, and computer program products are provided for analyzing and/or improving transformer models. A method may include receiving a trained transformer model. The trained transformer model may include at least one multi-head self-attention layer including a plurality of attention heads. At least one sample may be received. The sample(s) may be inputted to the trained transformer model to generate at least one layer output of the multi-head self-attention layer(s) and at least one model output of the trained transformer model. Each respective attention head may be pruned, and the sample(s) may be inputted to the trained transformer model with the respective attention head pruned to generate at least one respective pruned layer output and at least one respective pruned model output. At least one importance metric may be determined for each respective attention head based on at least two of the aforementioned outputs.
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06V 10/94 - Hardware or software architectures specially adapted for image or video understanding
Provided are methods for identifying sub-merchants within a Global Merchant Repository (GMR) that include receiving sub-merchant data associated with one or more sub-merchants, from one or more payment facilitators associated with a plurality of sub-merchants, where the sub-merchant data comprises a Card Acceptor Identifier (CAID) associated with each of the one or more payment facilitators, assigning a plurality of pseudo acquirer identifiers to the sub-merchant data received from each of the one or more payment facilitators, and identifying the one or more sub-merchants in the GMR by mapping the sub-merchant data with transaction data associated with a plurality of merchants in the GMR, based on the plurality of pseudo acquirer identifiers and the CAID associated with the respective payment facilitators. Systems and computer program products are also disclosed.
A computer-implemented method of dispositioning a transaction associated with a payment account is disclosed herein. The method can include receiving a registration request for a computing device to host transactions associated with the payment account, generating a unique identifier for the computing device, correlating the payment account to the generated unique identifier for the computing device, receiving a transaction authorization request associated with the payment account, and routing the received transaction authorization request associated with the payment account to the computing device for dispositioning based on the correlation. The computing device can host funds associated with the payment account and wherein computing device can be configured to disposition the transaction authorization request in accordance with a predetermined rule.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
78.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR PROVIDING A FRAMEWORK TO IMPROVE DISCRIMINATION OF GRAPH FEATURES BY A GRAPH NEURAL NETWORK
Provided are methods for enhancing a distribution of graph feature embeddings in an embedding space to improve discrimination of graph features by a graph neural network (GNN) that may include receiving a dataset comprising graph data associated with a graph, calculating a distance between a first set of node embeddings and a second set of node embeddings, determining a measure of uniformity for the dataset, determining a plurality of groups of node embeddings, determining a measure of alignment for the plurality of groups of node embeddings, generating a set of graph features based on the measure of uniformity, the measure of alignment, and the distance, and training the GNN based on the set of graph features to provide a trained GNN. Systems and computer program products are also disclosed.
Provided are systems that include at least one processor to receive a dataset comprising a set of labeled anomaly nodes, a set of unlabeled anomaly nodes, and a set of normal nodes, randomly sample a node to provide a set of randomly sampled nodes, generate a plurality of new nodes based on the set of labeled anomaly nodes and the set of randomly sampled nodes, combine the plurality of new nodes with the set of labeled anomaly nodes to provide a combined set of labeled anomaly nodes, and train a machine learning model based on an embedding of each labeled anomaly node in the combined set of labeled anomaly nodes, a center of the combined set of labeled anomaly nodes in an embedding space, and a center of the set of normal nodes in the embedding space. Methods and computer program products are also disclosed.
Provided are methods for generating a multitask machine learning model based on time series data, that may include receiving input time series data associated with an input time series of data points, calculating a pairwise distance between the input time series and a plurality of time series templates, providing the pairwise distance as a first input to a building block of a residual neural network, where the residual neural network has a plurality of multi-dimensional convolutional layers; generating a first output of the first building block of the residual neural network based on the first input, generating a final output of the residual neural network based on the first output, and generating a first output of a multitask machine learning model using a first output layer and a second output of the multitask machine learning model using a second output layer. Systems and computer program products are also disclosed.
A method is disclosed. The method includes receiving, from a client device, a checkout request for a transaction between a user operating the client device and a resource provider operating the resource provider computer. The resource provider computer and the client device communicate via a first communication channel. The method includes obtaining a first one-time code, displaying, the first one-time code to the user on the client device, and determining an indication that the first one-time code matches a second one-time code that was provided by the user through a second communication channel that is different than the first communication channel. The method includes allowing the transaction to continue based on the determination that the first one-time code matches the second one-time code.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/16 - Payments settled via telecommunication systems
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
e.g.e.g., payment cards, identification cards, driver's license cards) that are removably attachable to a portable electronic device. In some aspects, the portable electronic device may include a charging coil, a ferromagnetic component disposed about the charging coil, and a ferromagnetic alignment component. The card can include a substrate and a magnet embedded the substrate. The magnet can magnetically couple to the ferromagnetic component disposed about the charging coil.
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
A method is disclosed. The method includes receiving, by a processing computer, a payout validate message for a transaction from an aggregator computer, which receives a payout inquiry message from an originator computer of a plurality of originator computers. The aggregator computer is in communication with the plurality of originator computers. The payout inquiry message and the payout validate message can comprise a transaction amount for the transaction. The processing computer validates the payout validate message, and then transmits a payout validate response message to the aggregator computer. The payout validate response message comprises data regarding validation of the payout validate message. After transmitting the payout validate response message to the aggregator computer, the method includes receiving, by the processing computer, from the aggregator computer, a payout message. The method also includes transmitting, by the processing computer, a payout response message to the aggregator computer.
Automated computer systems and methods to determine a sentiment of information in digital information or content are disclosed. One aspect includes deriving, by a processor, the digital information from a source; generating, by the processor, a domain-specific machine learning sentiment score, based on the digital information, by one model of at least two machine learning models; autonomously mapping, by the processor, a non-domain specific knowledge graph of associations between elements in a set of digital contextual information; receiving, by the processor, sentiment graphs, each sentiment graph defining a sentiment; generating, by the processor, a graph sentiment score based on the non-domain specific knowledge graph and the sentiment graphs; generating, by the processor, a final sentiment score based on the graph sentiment score and the domain-specific machine learning sentiment score; and determining the sentiment of the information in the digital information or content via the final sentiment score.
Systems and methods for entity linking using a graph neural network are disclosed. In one aspect, a method for entity linking can include extracting a first attribute set of an unknown entity from an information source and retrieving second attribute sets of known entities from a database, wherein each of the second attribute sets corresponds to one of the known entities. The method can further include generating an unknown entity graph based on the first attribute set, generating known entity graphs based on the second attribute sets, generating an unknown entity graph embedding by applying the unknown entity graph to a graph neural network, and generating known entity graph embeddings by applying the known entity graphs to the graph neural network. The method can further include assigning the information source to one of the known entities based on the unknown entity graph embedding and the known entity graph embeddings.
A method for personalizing a transaction via a blockchain network via payment network is disclosed herein. The method can include receiving an application programming interface ("API") call from a computing device of a user, wherein the API call includes a private key, a public key, and a unique identifier, detecting, a non-fungible token ("NFT") on the blockchain network based on the public key, authenticating the NFT asset on the blockchain network based on the private key, storing an NFT asset associated with the NFT, the private key, the public key, and the unique identifier upon authenticating the NFT, associating the unique identifier with the NFT upon authenticating the NFT, and transmitting the NFT asset to the computing device of the user, wherein the NFT asset is configured for use in association with a transaction associated with the unique identifier.
H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
Entity linking using a graph neural network is disclosed. Entity linking can include tokenizing an unknown name, tokenizing a known name from a set of known names, identifying a candidate from the set of known names, and generating a tripartite graph. The tripartite graph can include a first layer node corresponding to the unknown name, second layer nodes corresponding to words of the known name and the candidate, and a third layer node corresponding to the candidate. The method can further include assigning the unknown name to one of the known names by applying the tripartite graph to a graph neural network model.
Systems, methods, and computer program products are provided for determining influence of a node of a graph on a graph neural network (GNN). The method includes receiving a dataset including graph data associated with a graph. The method may further include selecting a target node of a plurality of nodes based on the graph data and determining target node data associated with the target node and target edge data associated with the target node. The method may further include removing the target node data and the target edge data from the dataset to provide a target graph dataset; determining a measure of influence of the target node on a GNN based on the target graph dataset, wherein the GNN was trained using the dataset; and performing an action based on the measure of influence of the target node on the GNN.
A method is disclosed. It includes prompting, by a second user device operated by a second user, a first user to interact a portable device of the first user with the second user device in a transaction and then receiving interaction data comprising a credential or token, from the portable device in a contactless communication. The method also includes determining that the transaction cannot be completed without further interaction by the first user, and responsive to determining that the transaction cannot be completed, providing at least one alternate transaction option for the first user. The method also includes receiving, from the first user, a selection of an alternate transaction option from the at least one alternate transaction option, and processing the transaction according to the selected alternate transaction option.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
Methods and systems for anonymizing time-series data are disclosed. An anonymizing computer can generate an anonymized sequence of time-series data that can share many useful properties, patterns, or characteristics with a private sequence of time-series data, without revealing sensitive or private information about the private sequence of time-series data. This may enable data researchers and scientists to study the anonymized sequence of time-series data in lieu of the private sequence of time-series data, thereby preserving the privacy of data subjects (e.g., people) corresponding to the private sequence of time-series data. The anonymized sequence of time-series data can be generated using an iterative optimization process that can involve updating the anonymized sequence of time-series data to minimize a loss value. The loss value can correspond to both the utility and privacy of the anonymized sequence of time-series data.
Provided are systems, methods, and computer program products for segmenting a master non-fungible token (NFT). The method includes minting an NFT on a blockchain network, segmenting the master NFT into a plurality of segments, each segment of the plurality of segments corresponding to at least one asset of a plurality of assets on the blockchain network, issuing assets of the plurality of assets to a plurality of users based on the plurality of users conducting eligible transactions, validating a request from a user of the plurality of users based on determining that the user has possession of a set of assets of the plurality of assets corresponding to the plurality of segments, and in response to validating the request, transferring the master NFT to the user via the blockchain network.
Various systems and methods of anonymously conducting a secured payment transaction between a consumer and a merchant are disclosed. The methods can be carried out at a transaction code computer in communication with an alias directory. According to the method a transaction code computer receives a request for a dynamic transaction code from a merchant computer. The request includes a merchant alias identifier. The transaction code computer queries an alias directory storing merchant information details. The transaction code computer validates the merchant with the alias directory based on the merchant alias identifier. The transaction code computer generates the dynamic transaction code and transmits a response to the request for the dynamic transaction code to the merchant computer.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
94.
SYSTEM AND METHOD FOR PERFORMING DEVICE ISOLATION IN AN AUTHENTICATION NETWORK
In some embodiments, a method includes monitoring behavior patterns of a plurality of devices associated with a user in an authentication network; generating a behavioral accuracy score for each device of the plurality of devices in the authentication network based on the behavior patterns of each device of the plurality of devices; generating a deviation score for each device of the plurality of devices based on a deviation in behavior of each device of the plurality of devices from conventional device behavior; and using the behavioral accuracy score and the deviation score to determine whether to isolate a device of the plurality of devices from the authentication network. In some embodiments, the method further includes determining whether the behavioral accuracy score of a first device of the plurality of devices is within a first behavioral accuracy score category, a second behavioral accuracy score category, or a third behavioral accuracy score category.
G06F 21/71 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
Systems and methods are disclosed for application run-time architectures that provide continuous and autonomous security protection from unauthorized access to sensitive data. Several aspects comprise running, on a client device, a software development kit (SDK) in a first application sandbox with a first unique identifier (UID); and running, on the client device, an application comprising an SDK interface in a second application sandbox with a second UID, the application communicating with the SDK via the SDK interface on a runtime service. The first UID and the second UID are each associated with their own resources. The resources may include files, keys, and registries. The first application sandbox may prevent access to resources associated with the first UID by applications without the first UID. The second application sandbox may prevent access to resources associated to the second UID by applications without the second UID.
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
Methods, systems, and computer program products may formulate an iterative data mix up problem into a Markov decision process (MDP) with a tailored reward signal to guide a learning process. To solve the MDP, a deep deterministic actor-critic framework may be modified to adapt a discrete-continuous decision space for training a data augmentation policy.
An authorization data can be captured and reused for an unauthorized purpose or context during the validity period by an adversity. Current anti-replay solutions are complex and unpractical. For example, conditional access anti-replay solution requires supplementary context or behavior control services to protect against replay. However, any authorization data can be issued with an authentication timecode, which is valid during a period of short time and is non-predictable, i.e., it can be stolen but not replayed. Therefore, a timecode can be issued with the authorization data to protect against a replay attack.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
Provided is a system for implementing a communication interface layer for managing online services, the system including at least one processor programmed or configured to receive a request for an authentication token for access to an online service, where the request includes a user identifier, generate an authentication token associated with the user identifier, transmit the authentication token to a user device, receive a request to access the online service to perform an action associated with the account via a first function of a communication interface layer, determine that the user device is authenticated for access to the online service, and perform an action involving the online service via a second function of the communication interface layer. Methods and computer program products are also provided.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
H04W 12/069 - Authentication using certificates or pre-shared keys
H04W 12/082 - Access security using revocation of authorisation
H04W 12/37 - Managing security policies for mobile devices or for controlling mobile applications
99.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR CRYPTOGRAM-BASED TRANSACTIONS
A computer-implemented method may include: transmitting a public key to a merchant system, the public key of a payment device provider system; receiving a request for a prepaid amount from a user device of a user; in response to receiving the request, generating a cryptogram based on a payment device of the user, the prepaid amount, and a private key corresponding to the public key of the payment device provider system, the public key and the private key forming a public-private key pair associated with the payment device provider system; and transmitting the cryptogram to the user device, the cryptogram configured to authenticate the user device during an electronic payment transaction initiated by the user device with a merchant system.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
An embodiment includes a node receiving one or more blocks of a blockchain. The node comprising a data storage can store, in the data storage, a plurality of sets of keys and data values associated with keys of the plurality of sets of keys, the data values being data associated with the blockchain. The node can perform a validation process for the one or more blocks. The validation process includes for each of the one or more blocks a) identifying a set of keys associated with the block, b) retrieving data values associated the identified keys from the data storage, c) storing the retrieved data values into volatile memory, and d) validating the block using the data values in the volatile memory. The node can then complete the validation of the one or more blocks.
H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06F 12/123 - Replacement control using replacement algorithms with age lists, e.g. queue, most recently used [MRU] list or least recently used [LRU] list