A computer-implemented method for managing computational cluster access to multiple domains includes generating, using a ticket-based computer network authentication protocol, a primary set of keys based on remote system access credentials for a primary domain and a secondary set of keys based on remote system access credentials for a secondary domain. The method includes merging the primary set of keys with the secondary set of keys to form a merged set of keys. The method further includes activating a system daemon to provide access to the primary domain and the secondary domain by a computational cluster based on the merged set of keys. The method further includes connecting, using the ticket-based computer network authentication protocol via the system daemon, a remote computing device of the primary domain and a remote computing device of the secondary domain to the computational cluster.
A method is disclosed and includes determining a test plan to test a kernel on a mobile device, and determining an interaction input message according to the test plan, the interaction input message comprising first data. The method also includes transmitting the interaction input message comprising the first data to the mobile device over a network-based communication channel. The kernel in the mobile device generates the interaction output message in response to receiving the interaction input message. The method also includes receiving, from the mobile device, the interaction output message comprising second data from the mobile device over the network-based communication channel, and determining if the interaction output message is consistent with the test plan.
A method and system for provisioning credentials is disclosed. The method includes receiving, by a server computer from an authorizing entity computer, a provisioning request message. The provisioning request message can include resource provider identifiers for a set of resource providers and a set of credentials to be associated with the set of resource providers. The method further includes transmitting, by the server computer, a provisioning instruction message to an intermediate computer. The provisioning instruction message can include the resource provider identifiers and credential reference identifiers associated with the set of credentials. The intermediate computer can transmit one or more token request messages to a token service computer, receive tokens corresponding to the credential reference identifiers, and provision the tokens to the resource providers associated with the resource provider identifiers.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Methods, systems, and computer program products are provided for ensemble learning. An example system includes at least one processor configured to: (i) generate a rejection region for each baseline model of a set of baseline models (ii) generate a global rejection region based on the rejection regions of each baseline model; (iii) train an ensemble machine learning model; (iv) update, based on a baseline model predictive performance metric for each baseline machine learning model, the set of baseline machine learning models; and (iv) repeat (i) - (iv) until there is a single baseline model in the set of baseline models or a predictive performance or global acceptance ratio of the ensemble model satisfies a threshold.
Methods and systems for securely generating secret shares in a distributed manner and distributing those secret shares to cryptographic devices are disclosed. The cryptographic devices can subsequently use these secret shares to perform threshold distributed cryptographic operations (such as encryption or decryption). A threshold number of generating cryptographic devices can each generate their own secret shares. These devices can also each generate partial secret shares that can be combined by receiving cryptographic QC devices to generate their own respective secret shares. Additionally, the generating devices can generate commitments corresponding to their secret shares. The generating devices can transmit the commitments to the other cryptographic devices and the partial secret shares to their corresponding receiving devices. At a later time, cryptographic devices possessing at least a threshold number of secret shares can collectively perform cryptographic operations using those secret shares.
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
6.
INTEGRATION OF VERIFICATION TOKENS WITH MOBILE COMMUNICATION DEVICES
A method is disclosed. The method includes receiving, from a user device via near field communications, a cryptogram, the cryptogram associated with a primary account number. The method includes transmitting, by the computer, to a server computer over a communications network comprising the Internet or a cellular phone network, a request for dynamic account information associated with the primary account number, the request including the cryptogram, wherein the server computer receives the cryptogram and then obtains and sends the dynamic account information to the computer. The method includes receiving, from the server computer over the communications network comprising the Internet or the cellular phone network, the dynamic account information. The method includes conducting, with a merchant computer, a payment transaction using the dynamic account information.
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p.ex. clés électroniques ou cartes à puce intelligentes
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/42 - Confirmation, p.ex. contrôle ou autorisation de paiement par le débiteur légal
H04L 9/10 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité avec un boîtier, des caractéristiques physiques ou des commandes manuelles particuliers
H04L 9/14 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Conducting secure transfers between computing devices can pose a challenge. Therefore, an oblivious transfer can be used to conduct a secure transfer. The oblivious transfer (OT) is an interactive protocol between two parties: a sender computing device and a receiver computing device. An OT protocol involves the sender computing device holding two messages m0 and m1, and the receiver computing device holding a bit b? {0, 1}. At the end of the protocol, the receiver computing device should only learn the message mb and nothing about the other message m1?b, while the sender computing device should learn nothing about the bit b. With the steady progress in quantum computing, several post-quantum oblivious transfer protocols can be derived.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
8.
Method to Manage Pending Transactions, and a System Thereof
A computer-implemented method is provided. A first transaction from a sender made via the sender PSP server to a receiver via a receiver PSP server is identified. When the first transaction is pending, at least one subsequent transaction from the sender to the receiver is detected. Transaction parameters of the at least one subsequent transaction is compared with transaction parameters of the first transaction for determining that the first transaction and the at least one subsequent transaction are associated with a single payment. One or more messages are transmitted, when one of the first transaction and the at least one subsequent transaction is identified as successful to indicate that one of the first transaction and the at least one subsequent transaction is successful and to discard other transactions.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
In some embodiments, a computer-implemented method includes receiving a smart card applet for program execution on a smart card; determining whether a memory allocation type keyword provided via the smart card applet is of a transient memory allocation type; and when the memory allocation type keyword is of the transient memory allocation type, allocating volatile memory from the smart card for temporary storage of an object entity. In some embodiments of the computer-implemented method, the transient allocation type keyword is utilized to indicate whether the memory allocation type keyword is the transient memory allocation type.
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06F 12/02 - Adressage ou affectation; Réadressage
G06F 12/04 - Adressage de mots de longueur variable ou de parties de mots
G06F 12/06 - Adressage d'un bloc physique de transfert, p.ex. par adresse de base, adressage de modules, extension de l'espace d'adresse, spécialisation de mémoire
10.
SYSTEM AND METHOD FOR FACILITATING FRICTIONLESS PAYMENT TRANSACTIONS FIELD
A method, for conducting a secure and frictionless payment transaction involving a merchant device and a cardholder device, includes receiving, by a payment solution provider, transaction details from the merchant device, storing, by the payment solution provider, the transaction details, generating, by the payment solution provider, based on the transaction details, a unique resource locator (URL) for a communication to the cardholder device, wherein the URL is configured to permit the cardholder device to provide payment information for the payment transaction independent of the merchant device, capturing, by the payment solution provider, the payment information communicated by the cardholder device independently of the merchant device, matching, by the payment solution provider, the payment information with the transaction details, and initiating, by the payment solution provider, a transaction authorization request based on the matching of the payment information with the transaction details being successful.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
11.
Method, System, and Computer Program Product for Embedding Learning to Provide Uniformity and Orthogonality of Embeddings
Methods, systems, and computer program products are provided for embedding learning to provide uniformity and orthogonality of embeddings. A method may include receiving a dataset that includes a plurality of data points including a first plurality of data points having a first classification and a second plurality of data points having a second classification, generating a first normalized class mean vector of the first plurality of data instances having the first classification, generating a second normalized class mean vector of the second plurality of data instances having the second classification, performing a class rectification operation on the first plurality of data instances having the first classification and the second plurality of data instances having a second classification, and generating embeddings of the dataset based on original embedding space projections of the dataset.
A method of using a processing computer comprising a memory comprising a hash index table and an array index table is disclosed. The method includes receiving an initial request message comprising a plurality of data fields with data elements for a transaction, and creating service request messages, where each service request message comprises a transaction key and data elements. The method includes transmitting the service request messages to server computers, which process them and generate service response messages, each service response message having the transaction key and response data. The method includes receiving the service response messages. The method includes for each of the service response messages: accessing the hash index table and determining a row address identifier for a row in the array index table based on the transaction key, and accessing data in the row of the array index table associated with the row address identifier.
“Updatable” private set intersection (PSI) protocols allow parties that each have an updatable private set to determine the intersection of their sets after an update without the need to compare each element of each set and without compromising privacy. In some protocols, a first party can determine an update to the intersection by determining an intersection of elements that were previously in the first party's set with elements that were added to the second party's set and determining an intersection of elements that were added to the first party's set with elements that are in the second party's (updated) set. In some protocols, both parties can determine the updated intersection.
Provided are systems, methods, and computer program products for transferring assets with a virtual account. The system may receive a request from a first device operated by a first user to transfer a payment amount from a first user account corresponding to the first user and a first payment processing network to a second user having a peer-to-peer (P2P) payment account, and determine a payment system corresponding to the P2P payment account. A virtual account creation request may be generated based on the P2P payment account and communicated to the payment system associated with the P2P payment account. The system may receive a virtual account identifier corresponding to the second user in response to the virtual account creation request and transfer the payment amount from the first user account associated with the first user to an account corresponding to the virtual account identifier.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
15.
System, Method, and Computer Program Product for Host Based Purchase Restriction
Systems, methods, and computer program products that receive, from a merchant system, an authorization request associated with a transaction at the merchant system using a chip-based payment device storing a chip-based purchase restriction in a chip-card format, the authorization request including a purchase restrictions flag indicating whether the merchant system supports host-based purchase restrictions; determine, based on the purchase restrictions flag, that the merchant system supports host-based purchase restrictions; and transmit, to the merchant system, an authorization response associated with the transaction, wherein the authorization response includes a field including a host-based purchase restriction in the same chip-card format that the chip-based purchase restriction is stored on the chip-based payment device, and wherein the host-based purchase restriction is configured to cause the merchant system to override the chip-based purchase restriction with the host-based purchase restriction for processing the transaction
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
One embodiment of the invention is directed to a method comprising: receiving, by a token requestor computer from a point of interaction device, verification of authentication data and the linking data; determining, by the token requestor computer, a token based on the linking data after analyzing the verification of the authentication data; transmitting, by the token requestor computer to a token service computer, a cryptogram request message; receiving, by the token requestor computer from the token service computer, a cryptogram associated with the token; generating, by the token requestor computer, an authorization request message comprising the token and the cryptogram to a processor computer; and receiving, by the token requestor computer, an authorization response message from the processor computer.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
17.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR SECURE APPLICATION DISTRIBUTION
Provided is a system, method, and computer program product for secure application distribution. The system includes at least one processor programmed or configured to: receive, from a requesting system, an initial request for an application package, determine application data based on the initial request, generate a cryptographic token based on the application data, generate at least one link including at least one asset URL, the at least one asset URL including the cryptographic token in a content path of the at least one asset URL, communicate the at least one link to the requesting system, and serve the application package from at least one server to the requesting system in response to the requesting system accessing the at least one link.
H04W 12/00 - Dispositions de sécurité; Authentification; Protection de la confidentialité ou de l'anonymat
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04W 4/50 - Fourniture de services ou reconfiguration de services
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
18.
A SYSTEM FOR PARTIALLY SYNCHRONOUS SCALABLE BLOCKCHAINS
A system for a verifying a transaction in a sharded blockchain network. The system comprises a plurality of worker shards that allows the system to scale the transaction processing power with the increase in the number of worker shards. The plurality of worker shards that allow multiple committees of nodes to process incoming transactions in parallel. A data shard coordinates the commitment of blocks to ensure that the highest block in a chain is accurately committed.
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p.ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
19.
METHOD AND SYSTEM FOR GENERATING A SECRET KEY USING NON-COMMUNICATING ENTITIES
A method for performing a key recovery process is disclosed. The method comprises entering, in a user device, a user identifier unique to a user. The user device may then obscure the user identifier to form an obscured user identifier. The user device may then transmit the obscured user identifier to a first and second entity computer. The method may then include the first entity computer generating a first output using the obscured user identifier and a first share, and the second entity computer generates a second output using the obscured user identifier and a second share. As a response to transmitting the obscured identifier, the user device may receive the first output from the first entity computer and the second output from the second entity computer. The user device may then generate a secret key after processing the first output and the second output, completing the key recovery process.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A method, performed by a digital identity computer, for processing a resource request is disclosed. The method includes receiving. from a user device operated by a user, a resource request and indication of identity attributes needed to process the resource request. The digital identity computer may then retrieve an identity token associated with the user and compute an authentication score based on the sensitivity and rarity of the identity attributes indicated. The authentication score can be used to determine an authentication process. After determining and executing the authentication process with the user device, the digital identity computer may then grant the user device access to the resource requested.
A method performed by a server computer is disclosed. The method comprises generating a binary compositional code matrix from an input matrix. The binary compositional code matrix is then converted into an integer code matrix. Each row of the integer code matrix is input into a decoder, including plurality of codebooks, to output a summed vector for each row. The method then includes inputting a derivative of each summed vector into a downstream machine learning model to output a prediction.
In some embodiments, a computer-implemented method, includes determining, at a communication device, whether a user of a payment application on the communication device desires additional security underlying the payment application; when the user of the communication device desires the additional security, ascertaining user-specific information from the payment application; generating a frontend security framework specific to the user of the payment application; mapping the frontend security framework to the user-specific information; and utilizing the frontend security framework to secure a payment transaction conducted using the payment application.
G06F 21/30 - Authentification, c. à d. détermination de l’identité ou de l’habilitation des responsables de la sécurité
G06F 21/50 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
23.
TESTING FRAMEWORK WITH DYNAMIC APPLICABILITY MANAGEMENT
Embodiments of the invention are directed to systems, methods, and devices for providing dynamic applicability management with respect to a testing framework. Executable code segments can be provided in/with various test procedures that include instructions for testing hardware, software, capabilities, features, functionalities, or protocols of a computing device. Each code segment can encapsulate logic that, when executed, identifies whether a corresponding test procedure is applicable to a device given that device's configuration. By executing each code segment, a set of applicable test procedures can be identified. Identifiers or the test procedures may be provided to the device to be tested or a testing platform configured to conduct the test of that device. Transmitting the identifiers and/or procedures configures those devices to perform the test through simulating a legitimate data exchange.
A method is disclosed. The method includes processing a group interaction request for an interaction involving a group. Better assurance for the interaction is provided by providing a one-time password that has a number of portions that are sent to a plurality of user devices. The portions are received and one user device may concatenate the portions to form the one-time password. It may then be entered to authenticate the interaction. Other examples include the use of an authorization request message that is authorized for an initial value. Later, separate authorization request messages with different credentials may be transmitted for different users in the group.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Disclosed herein are systems and methods for secure, mutual, peer-to-peer payments. In one aspect, an encrypted secure system for peer to peer payments, comprising an authentication server is disclosed to receive, a model hash key and an encrypted transaction, from an initiator account; store, the model hash key in an associated database; setting, by the authentication server, a validation time limit for storing the hash key; send, the encrypted transaction to a recipient account; receive by the authentication server a response from the recipient account, the response comprising a response hash key; and validate the response, by the authentication server, based on a match between the response hash key and the model hash key.
Systems, methods, and computer program products are provided for predicting a specified geographic area of a user. An example system includes a processor configured to determine a verified geographic area associated with each user, and determine a feature vector associated with an account of each user. The processor is also configured to receive transaction data and determine a value of each parameter of the feature vector for each user based on the transaction data to produce a training matrix. The processor is further configured to train and validate a geographic area prediction model based on the training matrix. The processor is further configured to repeatedly generate a prediction that a user will conduct a transaction in a geographic area, communicate an offer to the user based on the prediction, receive new training data, and update the geographic area prediction model based on the new training data.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Provided is a computer-implemented method for generating a machine learning model to classify an account based on merchant activation, including providing an input to a generator network of a generative adversarial network (GAN) to generate an output; providing the output as input to a discriminator network; providing a training dataset as input to the discriminator network; and updating the generator network based on a first output of the discriminator network having a label that indicates whether a set of values of each of the plurality of features is a real set of values or a fake set of values. The method may include updating the discriminator network based on a second output of the discriminator network having a label that indicates whether a selected account of the plurality of accounts is going to conduct a first payment transaction. A system and computer program product are also provided.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 30/0201 - Modélisation du marché; Analyse du marché; Collecte de données du marché
28.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR MODELLING AND GOVERNANCE FOR TRANSITIVE PRIVILEGED ACCESS
Methods, systems, and computer program products for modelling and governance for transitive privileged access are provided. A method may include receiving potential transitive access data associated with at least one potential transitive access path, receiving privileged access data associated with a plurality of privileged accesses including a current privileged access, and determining a first target privileged access based on the current privileged access, the potential transitive access data, and the privileged access data. The method may also include generating a first directional graph edge from a first graph node associated with the current privileged access to a second graph node associated with the first target privileged access, the first directional graph edge representing a first transitive access path from the first graph node to the second graph node. The method may also include terminating the current privileged access based on the first transitive access path.
29.
SECURE REMOTE TRANSACTION SYSTEM USING MOBILE DEVICES
Described herein is a secure system and methods for enabling a user to remotely generate a token to be used in a transaction. In the disclosure, the user may provide a mobile device identifier to a resource provider to complete a transaction. A service provider, upon receiving the mobile device identifier, may generate a message to be transmitted to a mobile device associated with that mobile device identifier that includes details of the transaction to be complete. Upon receiving the message, the user may be asked to elect a token service installed on the mobile device with which the transaction should be completed. This token service may be used to authenticate the user and subsequently generate or provide the requested token. The service provider computer may then use the generated token to complete the transaction.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
A method is disclosed. The method includes transmitting, by a service provider computer to a token service computer, a token request message comprising a service provider identifier associated with the service provider computer, and a token requestor identifier associated with a token requestor of a plurality of token requestors operatively coupled to a service provider computer. In response to transmitting the token request message, receiving, by the service provider computer from the token service computer, a token. The method also includes transmitting, by the service provider computer to the token requestor, the token.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
31.
TEXT AND MEDIA ENCODERS FOR CLASSIFYING MEDIA, DETERMINING PROMPTS, AND UNCOVERING BIAS IN MACHINE LEARNING MODELS
Embodiments are directed to methods and systems for media classification that may be used to better improve classification models and understand results of such classification. Various embodiments can determine a classification for a media item and can determine a prompt that includes the classification for a media item. Further embodiments can train a machine learning model using media items with known classifications. The results of each training iteration may be used to understand the result and improve the machine learning model.
A method is disclosed. The method includes transmitting a verification request comprising a wallet account identifier associated with a digital wallet to a smart contract on a blockchain network or a smart contract application associated with the smart contract. The smart contract or the smart contract application verifies the wallet account identifier using a blockchain on the blockchain network. The method also includes receiving from the smart contract on the blockchain network or the smart contract application, a verification response verifying the wallet account. The method further includes initiating transmitting to an authorizing entity computer, an authorization request message comprising a credential associated with the wallet account identifier.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
33.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR MULTI-LAYER ANALYSIS AND DETECTION OF VULNERABILITY OF MACHINE LEARNING MODELS TO ADVERSARIAL ATTACKS
Methods, systems, and computer program products are provided for multi-layer analysis and detection of vulnerability of machine learning models to adversarial attacks. An example method includes selecting a sample, inputting the sample to a machine learning model, perturbing the sample to generate perturbed samples, inputting each respective perturbed sample to the machine learning model, and determining a smallest perturbation distance for the input layer. For each respective hidden layer of the machine learning model, a respective hidden layer representation of the sample is perturbed to generate perturbed hidden layer representations. Each respective perturbed hidden layer representation is inputted to the machine learning model, and a respective smallest perturbation distance for each respective hidden layer is determined. At least one vulnerability metric is determined based on the smallest perturbation distance for the input layer and the hidden layer(s). The machine learning model is retrained based on the vulnerability metric(s).
G06F 18/214 - Génération de motifs d'entraînement; Procédés de Bootstrapping, p.ex. ”bagging” ou ”boosting”
G06V 10/764 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant la classification, p.ex. des objets vidéo
G06V 10/774 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant l’intégration et la réduction de données, p.ex. analyse en composantes principales [PCA] ou analyse en composantes indépendantes [ ICA] ou cartes auto-organisatrices [SOM]; Séparation aveugle de source méthodes de Bootstrap, p.ex. "bagging” ou “boosting”
A disclosed method includes receiving, by a first device from a server computer, a first hash value along with a plurality of other hash values, and a random value. The first hash value is generated by inputting at least a first credential and the random number into a hash function. The method includes reading a second credential from a second device operated by a second user, and generating a second hash value by inputting at least the second credential and the random value into the hash function. The method includes comparing the first hash value and the second hash value, and determining that the first hash value and the second hash value match. The method also includes validating an action of the second user when the first hash value and the second hash value match.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
35.
System, Method, and Computer Program Product for Generating Embeddings for Objects
Provided are computer-implemented methods for generating embeddings for objects which may include receiving heterogeneous network data associated with a plurality of objects in a heterogeneous network; selecting at least one pattern of objects; determining instances of each pattern of objects based on the heterogeneous network data; generating a pattern matrix for each pattern of objects based on the instances of the pattern of objects; generating pattern sequence data associated with a portion of each pattern matrix; generating network sequence data associated with a portion of the heterogeneous network data; and combining the pattern sequence data and the network sequence data into combined sequence data. In some non-limiting embodiments or aspects, methods may include generating a vector for each object of the plurality of objects based on the combined sequence data. Systems and computer program products are also provided.
The present disclosure provides various devices, systems, and methods for securely providing a personal identification number (PIN), for securely accepting a PIN, and for authenticating a transaction based on a securely provided PIN. In one aspect, a method for securely providing a user PIN can include receiving, by a portable electronic device, a device key provisioned by a server. The device key can be associated with a payment card. The method can further include receiving, by the portable electronic device, a request for an encrypted PIN to authenticate a transaction initiated using the payment card and generating, by a PIN encryption application executed by the portable electronic device, the encrypted PIN based on the user PIN and the device key. The encrypted PIN can be provided to an access device. The access device can be configured to communicate the encrypted PIN to the server.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
An exemplary communication device receives transaction data associated with an e-commerce transaction. The communication device provides, to a portable transaction device of a user, the transaction data via short range wireless communication. The portable transaction device generates a cryptogram based at least on the transaction data and a credential associated with an account. The communication device receives, from the portable transaction device, a payload including at least the cryptogram via the short range wireless communication; and transmits, to a token service computer, a token provisioning request message comprising the cryptogram. The communication device receives, from the token service computer, a token provisioning response message comprising a one-time use token associated with the credential upon validation of the cryptogram by a validation server; and transmits the one-time use token to a resource provider computer to finalize the e-commerce transaction.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04W 12/47 - Dispositions de sécurité utilisant des modules d’identité utilisant la communication en champ proche [NFC] ou des modules d’identification par radiofréquence [RFID]
38.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR ADVERSARIAL TRAINING FOR COLLABORATIVE FILTERING
Provided is a system, method, and computer program product for adversarial training for collaborative filtering. The system includes at least one processor programmed or configured to train a collaborative filtering model through a plurality of iterations by inputting a training data set including adversarial perturbations, update weights of the collaborative filtering model after each iteration or subset of iterations of the plurality of iterations, determine a training loss between each consecutive iteration or subset of iterations of the plurality of iterations, resulting in a plurality of training losses, and determine a loss function for the collaborative filtering model by minimizing a difference between an initial training loss and the plurality of training losses for the plurality of iterations.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
A method is disclosed. The method includes receiving by a tokenization server, a request to process an interaction from a user device, where the request includes a user identifier associated with a user. The tokenization server generates a first token using a first one-way cryptographic hash function based on the user identifier, and a second token using a second one-way cryptographic hash function based on the first token. The tokenization server retrieves first information stored in a first data storage associated with the tokenization server based on the second token, and transmits the first token and the first information to a processing computer. The processing computer is programmed to retrieve, from a second data storage associated with the processing computer, second information based on the first token, and execute the interaction based on the first information and the second information.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
A technique for embedding and utilizing credentials in a network address may include requesting a network address for a client device by providing an account identifier to a server computer associated with a service provider. A network address that is mapped to the account identifier can be assigned to the client device. The network address may include a routing prefix field and a network interface identifier field. The routing prefix field may include an issuer identifier of an issuer of the account, and the network interface identifier field may include an interface identifier that maps to the account identifier. By embedding credentials such as an account identifier in the network address, the actual account identifier need not be transmitted to perform actions on the account.
A computer-implemented method of processing a Structured Query Language (SQL query. The method can include identifying a parameter of the SQL query, generating a plurality of input vectors based on the parameter of the SQL query, transmitting the plurality of input vectors to an input layer of a neural network, and receiving a predicted number of rows associated with the input vectors generated by an output layer of the neural network. The predicted number of rows can be generated based on a descent gradient of the neural network. The method can further include modifying the parameter of the SQL query based on the predicted number of rows to generate a modified parameter, wherein the modified parameter is configured to reduce computational resources required to generate an SQL query result, and wherein the modified parameter is configured to improve an accuracy of the SQL query result.
A computer-implemented method is disclosed herein. The method includes receiving cryptocurrency account information associated with a digital asset account hosted by a cryptocurrency exchange, generating a token associated with the cryptocurrency account information, receiving a unique identifier from an issuer system, wherein the unique identifier is associated with a fiat-based asset account hosted by the issuer system, linking the token to the unique identifier, and storing the token in a token vault of the payment network. The method can further include displaying the cryptocurrency account information and the fiat-based account information based on the token via a user device to display. The method can further include generating a machine-readable code associated with the token based on a user input, wherein the machine-readable code initiates a transaction authorization request based on the cryptocurrency account information and the fiat-based account information when registered by an acceptance device.
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
A method for dispensing funds including receiving a withdrawal initiation request generated by a user device of a user, generating an authentication code associated with the withdrawal initiation request, receiving a withdrawal completion request from at least one of an automated teller machine (ATM) and/or a merchant point-of-sale (POS) device, validating the withdrawal completion, identifying an issuer system associated with the withdrawal completion request, generating an authorization request, transmitting the authorization request to the issuer system, receiving an authorization response, and transmitting a cash dispense message to cause the at least one of the ATM and/or the merchant POS device to dispense the withdrawal amount. Systems and computer program products for dispensing funds are also disclosed.
G07F 19/00 - Systèmes bancaires complets; Dispositions à déclenchement par carte codée adaptées pour délivrer ou recevoir des espèces ou analogues et adresser de telles transactions à des comptes existants, p.ex. guichets automatiques
45.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PROCESSING INFERENCE REQUESTS TO EXECUTE A MACHINE-LEARNING MODEL
Provided is a system, method, and computer program product for processing inference requests to execute a machine-learning model. The system includes at least one processor programmed or configured to receive an inference request at a request handler having a first programming language capable of multithreading, communicate a first message based on the inference request from the request handler to at least one object associated with a machine-learning model, the at least one object having a second programming language different than the first programming language, determine whether to call at least one external service based on the first message and the at least one object, communicate a second message from the at least one object to an asynchronous function having the first programming language based on determining whether to call the at least one external service, and call the at least one external service via the asynchronous function while the at least one object associated with the machine-learning model executes.
A computer implemented method of securely transferring at least one repayment obligation associated with a payment plan set for a first user to a second user includes receiving a transfer request from a first user device, associated with the first user, to transfer the at least one repayment obligation to the second user, wherein the transfer request includes a payment plan account identifier associated with the second user. The method includes pushing a confirmation request to a second user device, associated with the second user, to confirm acceptance of a transfer of the at least one repayment obligation, wherein the confirmation request comprises an identifier associated with the first user. The method includes receiving a confirmation, from the second user device, of the acceptance of the transfer of the at least one repayment obligation, and updating a payment status associated with the payment plan to a transferred status.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/24 - Schémas de crédit, c. à d. de "paiement différé"
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/42 - Confirmation, p.ex. contrôle ou autorisation de paiement par le débiteur légal
One embodiment of the present disclosure may include a method for providing access to resources by a resource provider computer during a first web session with a client device. The resource provider can provide a first web page to the client device, the first web page including a first option to complete a first access request with the resource provider computer as a guest for access to a first resource. The resource provider computer can receive a first selection of the first option from the client device and provide a second web page including a second option to remember the user device. The resource provider computer can, in response to receiving a second selection of the second option from the client device, send a remember flag to a server computer. The resource provider computer can then receive a recognition identifier from the server computer and store the recognition identifier.
H04L 67/146 - Marqueurs pour l'identification sans ambiguïté d'une session particulière, p.ex. mouchard de session ou encodage d'URL
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
A method for dispensing funds including receiving a withdrawal initiation request generated by a user device of a user, generating an authentication code associated with the withdrawal initiation request, receiving a withdrawal completion request from at least one of an automated teller machine (ATM) and/or a merchant point-of-sale (POS) device, validating the withdrawal completion, identifying an issuer system associated with the withdrawal completion request, generating an authorization request, transmitting the authorization request to the issuer system, receiving an authorization response, and transmitting a cash dispense message to cause the at least one of the ATM and/or the merchant POS device to dispense the withdrawal amount. Systems and computer program products for dispensing funds are also disclosed.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
49.
AUTHENTICATION USING GROUP SIGNATURES OF USER DEVICES
A method is disclosed. The method includes generating, by a first user device in association with a second user device, a second secret key on the second user device. The second secret key is derived from a first secret held by the first user device. The method includes generating a first commitment, transmitting., to the second user device, the first commitment, receiving, from the second user device, a second commitment, receiving, from the second user device, a random value and a ciphertext. The ciphertext is generated using the first commitment, the second commitment, and the random value. The method also includes verifying the ciphertext, and in response to verifying the ciphertext, modifying a group to include the second user device.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
Systems and methods are disclosed herein for continuous token monitoring and control, in one example comprising receiving, by a credentialing agent, a token protection request from a client, to generate a time code for the token to allow client access to a service of a provider; receiving, by the credentialing agent, at least one of risk data, a time code model, or secret parameters associated with the token; generating, by the credentialing agent, an ETA model, based on at least one of the risk data, the time code model, or the secret parameters; cryptographically binding, by the credentialing agent, the token, the risk data and the ETA model to generate a time code; and transmitting, the time code to at least one of the client, provider, or a provider credentialing service, to facilitate a validation of the time code and the token to allow the client access to the service.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
51.
PROCESSING SYSTEM USING SECRET LINKED TO MULTIPLE ACCOUNTS
A method is disclosed. The method includes receiving from a user device operated by a user via a first channel, a user device identifier and a secret associated with the user. The method also includes storing a first token, the user device identifier, and a first channel identifier. The first token is associated a credential. The method also includes receiving, from the user device via a second channel, the user device identifier and the secret. The secret is subsequently validated. After the secret is validated, the server obtains a second token based on the first token and stores the second token, the user device identifier, and a second channel identifier. The second token is associated with the credential.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Methods for performing oblivious transfer are disclosed. These methods include a method for performing random single bit oblivious transfer (a “first method”), a method for performing random string oblivious transfer (a “second method”), and a method for performing non-random string oblivious transfer (a “third method”). In the first method, a sender computer can use a hardcore predicate function to obfuscate either a first message or a second message, generating an obfuscated message. The receiver computer can de-obfuscate this obfuscated message to randomly receive either the first message or the second message. The second method and third method can be implemented, with some modification, by repeatedly performing the first method, once for each “message bit” of the sender's messages. In the second and third methods, the receiver computer can send “indicator bits” to the sender computer, enabling the sender computer to transmit a random or non-random message strings to the receiver.
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
A method is disclosed. The method includes determining, by a delegated certificate authority computer, a tier from a plurality of tiers for a digital wallet provider based on a list of qualifying criteria. The method also includes generating a digital certificate based on the tier, where the digital certificate is used by a digital wallet application computer associated with the digital wallet provider to complete interactions using a digital currency maintained by a blockchain network. The method further includes transmitting, by the delegated certificate authority computer to a digital wallet application computer, the digital certificate.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
54.
Systems and Methods to Manage Transaction Between Providing Entity and Receiving Entity
The present disclosure relates to systems and methods for managing a transaction between a providing entity and a receiving entity. Initially, a request to initiate a transaction is received from a receiving entity. One or more entity parameters associated with the receiving entity are extracted upon receiving the request. Each of the one or more entity parameters is matched with pre-determined transaction rules related to a plurality of providing entities registered with the system to identify at least one providing entity for the receiving entity. The transaction from the at least one providing entity to the receiving entity is enabled for the request. Using the proposed system, transactions are performed in accordance with the preferences of the one or more providing entities. Also, the proposed system provisions to keep transactions transparent between the providing entity and the receiving entity.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
55.
System, Method, and Computer Program Product for Time-Based Ensemble Learning Using Supervised and Unsupervised Machine Learning Models
Provided are systems for ensemble learning with machine learning models that include a processor to receive a training dataset of a plurality of data instances, wherein each data instance comprises a time series of data points, add an amount of time delay to one or more data instances to provide an augmented training dataset, select a first plurality of supervised machine learning models, select a second plurality of unsupervised machine learning models, train the first plurality of supervised machine learning models and the second plurality of unsupervised machine learning models based on the augmented training dataset, generate an ensemble machine learning model based on outputs of the supervised machine learning models and unsupervised machine learning models, and generate a runtime output of the ensemble machine learning model based on a runtime input to the ensemble machine learning model. Methods and computer program products are also provided.
Methods and systems for analyzing request to access resources and determining a resource access policy are provided. The resource access system can train, store, evaluate, and deploy machine learning models that learn to output a trust score associated with a resource access request, the trust score relating to the request's legitimacy. A resource access system can receive a request for a resource from a requesting entity. The resource access system can determine an entity profile using request data in the request. The resource access system can request data from the request to determine whether the request is normal or anomalous. Using a policy engine, the resource access system can determine a resource access policy, such as allowing or denying access to the resource.
A system, method, and computer program product for incorporating knowledge from more complex models in simpler models. A method may include obtaining first training data associated with a first set of features and second training data associated with a second set of features different than the first set of features; training a first model based on the first training data and the second training data; and training a second model, using a loss function that depends on an output of an intermediate layer of the first model and an output of the second model, based on the second training data.
One embodiment can include a method comprising: receiving, by a second authorizing entity computer from a first authorizing entity computer, a push transfer message comprising a credential and an amount; adjusting, by the second authorizing entity computer, a value of the account based on the amount in the push transfer message; and transmitting, by the second authorizing entity computer to a cryptocurrency exchange computer, a credit message comprising the credential and the amount, wherein the cryptocurrency exchange computer communicates with an alias directory computer to obtain an alias associated with credential, and then credits a cryptocurrency account associated with the alias in an amount of cryptocurrency corresponding to the amount in the push transfer message.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
A method for providing interactive recording networks is disclosed. Multiple separate local networks can be connected through a central network. Digital tokens can be used to perform transfers from a first local network across the central network to a second local network. Digital tokens can be redeemed, and digital tokens can be verified using counter values.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
60.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PROCESSING PAYMENTS IN A BLOCKCHAIN NETWORK
Provided is a system, method, and computer program product for processing payments in a blockchain network. The system includes at least one processor of a transaction processing system, the at least one configured to: receive a transaction request identifying a payer and a payee, each of the payer and the payee associated with a unique blockchain address in a blockchain network; create a smart contract on the blockchain network based on the unique blockchain address of the payer, the unique blockchain address of the payee, and a transaction amount, the smart contract configured to automatically transfer the transaction amount to an account associated with the payee; detect a release event; and execute the smart contract in response to detecting the release event.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
A method includes transmitting a challenge to a server as part of a request for a service provided by the server. The method further includes receiving, a signed response, wherein the signed response was generated using the challenge and is signed with a private key of the server. The method further includes, responsive to receiving the signed response, verifying the signed response with a public key corresponding to the private key of the server, the public key corresponding to a first mode of the authenticator device. The method further includes responsive to verifying the signed response, switching a current mode of the authenticator device to the first mode corresponding to the public key. The method further includes providing a second request to a user of the authenticator device to authenticate using one or more authentication factors corresponding to the first mode.
A method is disclosed. The method includes receiving, by an electric vehicle, a list of available services associated with an electricity supply terminal. The list of available services includes one or more methods that do not transmit credentials or tokens via a charging cable and one or more methods that do transmit credentials or tokens via the charging cable. The method also includes determining, by the electric vehicle, a set of services in the list of available services. The set of services includes services supported by the electric vehicle. The method also includes transmitting, by the electric vehicle to the electricity supply terminal, a service selection request comprising a service in the set of services. The method also includes receiving, by the electric vehicle from the electricity supply terminal via the charging cable, electricity from the electricity supply terminal.
B60L 53/66 - Transfert de données entre les stations de charge et le véhicule
B60L 53/30 - PROPULSION DES VÉHICULES À TRACTION ÉLECTRIQUE; FOURNITURE DE L'ÉNERGIE ÉLECTRIQUE À L'ÉQUIPEMENT AUXILIAIRE DES VÉHICULES À TRACTION ÉLECTRIQUE; SYSTÈMES DE FREINS ÉLECTRODYNAMIQUES POUR VÉHICULES, EN GÉNÉRAL; SUSPENSION OU LÉVITATION MAGNÉTIQUES POUR VÉHICULES; CONTRÔLE DES PARAMÈTRES DE FONCTIONNEMENT DES VÉHICULES À TRACTION ÉLECTRIQUE; DISPOSITIFS ÉLECTRIQUES DE SÉCURITÉ POUR VÉHICULES À TRACTION ÉLECTRIQUE Échange d'éléments d’emmagasinage d'énergie dans les véhicules électriques - Détails de construction des stations de charge
H02J 7/00 - Circuits pour la charge ou la dépolarisation des batteries ou pour alimenter des charges par des batteries
An enhanced federated custodian system is described. One embodiment is directed to a computer system executing instructions to: receive, from one or more members of a federated blockchain on a network of computing devices, an approval for a transaction associated with an authentication capsule; generate, via a first trusted execution environment, a first machine readable code in response to receiving the approval for the transaction; transmit to a cold interaction system, the first machine readable code; and the cold interaction system comprising one or more processors and one or more memories, the one or more memories comprising instructions executable by the one or more processors to: receive the first machine readable code comprising the encrypted information and the approval; decrypt the encrypted information for the transaction and the approval; and generate a private key that corresponds to a public key for the transaction.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
Methods and systems for gateway agnostic tokenization are disclosed. Gateway agnostic tokenization enables a resource provider to quickly, safely, and efficiently route a token for authorization via any appropriate gateway computer. As part of an interaction with a user, a resource provider can transmit a token to an edge computer. The edge computer can then forward the token to a gateway computer. The gateway computer can identify a data item comprising two ciphertexts associated with the token. The edge computer and gateway computer can collectively decrypt the two ciphertexts to obtain a credential. The gateway computer can then forward the credential to an authorizing entity computer. The authorizing entity computer can then determine whether or not to authorize the interaction.
A reader device may include a midrange wireless transceiver, a controller coupled to the midrange wireless transceiver, and a memory coupled to the controller. The memory may store executable code, which when executed by the controller, causes the reader device to implement various operations including maintaining a transaction service attributes database in the memory. The operations may also include broadcasting a beacon including a transaction service indicator at a periodic interval using the midrange wireless transceiver, receiving a connection request from a communication device, and establishing a wireless connection with the communication device. The operations may further include performing an application selection process with the communication device, performing application data processing with the communication device, and performing authorization request processing for the communication device.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
The present disclosure provides various devices, systems, and methods for window enrichment. For example, in one aspect, the present disclosure provides a computer-implemented method. The method can include adding a new event from a data stream into a series store. The series store can store events from the data stream that include values and timestamps. The events can be sorted in the series store based on the timestamps. The method can further include sliding the window along the series store based on the timestamps to capture the new event and the events preceding the new event up to a limit of the time range, updating a state of the operator based on the values of the events captured by the window, and modifying the new event based on the state of the operator to generate a modified event.
H04L 51/212 - Surveillance ou traitement des messages utilisant un filtrage ou un blocage sélectif
H04L 43/106 - Surveillance active, p.ex. battement de cœur, utilitaire Ping ou trace-route en utilisant des informations liées au temps dans des paquets, p.ex. en ajoutant des horodatages
67.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR PROVIDING A TYPE AWARE TRANSFORMER FOR SEQUENTIAL DATASETS
Provided are methods that include receiving interaction data associated with a plurality of interactions, the interaction data including interaction records that include a plurality of fields including a static field and a dynamic field, generating a static interaction embedding representation based on static field data associated with the static field and a first transformer model, generating a plurality of dynamic interaction embedding representations based on dynamic field data associated with the dynamic field of a sequence of interaction records and a second transformer model, generating a first intermediate input and a plurality of second intermediate inputs, generating a static sequence embedding representation and dynamic sequence embedding representations based on a third transformer model, and generating at least one prediction based on inputting the static sequence embedding representation and the plurality of dynamic sequence embedding representations to a machine learning model. Systems and computer program products are also disclosed.
G06N 5/02 - Représentation de la connaissance; Représentation symbolique
G06N 5/04 - Modèles d’inférence ou de raisonnement
G06Q 10/04 - Prévision ou optimisation spécialement adaptées à des fins administratives ou de gestion, p. ex. programmation linéaire ou "problème d’optimisation des stocks"
68.
SECURE PERSONAL IDENTIFICATION NUMBER ENTRY FOR TRANSACTIONS USING A PORTABLE ELECTRONIC DEVICE
The present disclosure provides various devices, systems, and methods for securely providing a personal identification number (PIN), securely receiving a PIN, and/or authenticating a transaction based on a securely provided PIN. In one aspect, a method for securely providing a PIN can include receiving, by a user portable electronic device, a request from a merchant portable electronic device to provide the PIN. The method can further include receiving, by a PIN entry application executed by the user portable electronic device, a user input to approve the request from the merchant portable electronic device. The method can further include generating, by the PIN entry application, an encrypted binary large object (BLOB) based on the PIN and communicating, by the user portable electronic device, the encrypted BLOB to the merchant portable electronic device.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04W 4/80 - Services utilisant la communication de courte portée, p.ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
36 - Services financiers, assurances et affaires immobilières
Produits et services
Financial services; monetary services; banking services; credit card services; debit card services; charge card services; pre-paid card services; provision of prepaid cards and tokens; smart payment card services; electronic credit and debit transactions; electronic funds transfer; payment processing services; transaction authentication and verification services; cash replacement rendered by credit cards and debit cards; currency exchange services; online banking services; bill payment services; deposit access and automated teller machine services; check cashing and cash disbursement services; dissemination of financial information and electronic payment data including via a global computer network; processing of financial transactions online via computer or telecommunication networks or via telecommunication, mobile or wireless devices.
70.
ACCELERATED ADVERSARIAL TRAINING FOR LARGE-SCALE SOURCE CODE DATASETS VIA FEATURE-SPACE TRANSFORMATION
The present disclosure describes a method and system for training a robust source code model in a neural network. The neural network trains on a large-scale dataset and adversarial examples to improve the classification accuracy of the source code model. The system generates adversarial examples based on a sequence of transformations, modeled by a mapping function in the feature-space.
A merchant website includes a QR code button to initiate a payment transaction. The QR code button is selected by a consumer at checkout. If selected, a QR code is generated on a second computing device. The QR code is displayed on a second computing device and contains embedded data such as a token for a PAN stored in a memory of the second computing device and two cryptograms. A webcam in communication with the first computing device is used to scan the QR code. The data embedded in the QR code is passed from the second computing device to the merchant website via the first computing device and used to complete the payment transaction.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/24 - Schémas de crédit, c. à d. de "paiement différé"
G06Q 20/26 - Schémas de débit, c. à d. de "paiement immédiat"
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
72.
PRIVACY-PRESERVING IDENTITY ATTRIBUTE VERIFICATION USING POLICY TOKENS
Methods and systems for privacy-preserving identity attribute verification are presented. During an interaction between a relying entity and a user, a relying entity computer can transmit a policy token to a user device. The policy token may indicate the information needed by the relying entity in order to perform the interaction. The user device can verify the policy token, then use the policy token in conjunction with an identity token to generate a zero-knowledge proof. The user device may transmit the zero-knowledge proof to an identity service provider computer. The identity service provider computer may verify the zero-knowledge proof, then generate a verification message. The identity service provider computer may sign the verification message and transmit the signed verification message to the relying entity computer. The relying entity computer may verify the verification message and complete the interaction with the user.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Systems and methods for decentralized automatic synchronization of nodes is described, which can comprise a plurality of data centers, connected to an event source node, each data center comprising a memory storing instructions executable by a processor to initiate, based on a condition, a synchronization event; query, a log queue for events processed by at least one of the plurality of data centers; retrieve, from the log queue the events processed in at least one of the plurality of data centers; identify, a discrepancy between the events processed by at least one of the plurality of data centers and events stored in a local event log; determine, a compromised event associated with the event error in the local event log based on the discrepancy; and retrieve, a non-compromised copy of the compromised event from a staging storage of a peer data center.
Provided are systems for authenticating an individual using image feature templates that include at least one processor to train a first machine learning model based on a training dataset of a plurality of images of a user, generate a plurality of image feature templates using the first machine learning model, wherein each image feature template of the plurality of image feature templates is associated with a positive authentication of the identity of the user during a time interval, generate a second machine learning model based on the plurality of image feature templates, generate a predicted image feature template using the second machine learning model, determine whether to authenticate the identity of the user based on an input image of the user, and perform an action based on determining whether to authenticate the identity of the user. Methods and computer program products are also provided.
36 - Services financiers, assurances et affaires immobilières
41 - Éducation, divertissements, activités sportives et culturelles
Produits et services
Financial consulting services, namely, the provision of financial information; Financial sponsorship of cultural events, charitable events, concerts, sporting events, festivals and awards shows; Philanthropic and charitable fundraising services, namely, providing financial assistance for programs and services of others. Educational services, namely, providing seminars, lectures, teleseminars, workshops, webinars, courses, podcasts, television shows, videos, articles, books and other written resources in connection with entrepreneurship, financial empowerment, and education for individuals and small businesses; Dissemination of materials in the area of entrepreneurship, financial empowerment, financial literacy and money management skills; Promoting and providing training and educational programs to educate consumers about financial literacy, money management skills and business management skills; Providing motivational and educational speakers in the field of financial and business empowerment; providing career counseling and advisory services; Entertainment services, namely, providing interactive games designed for financial education and the promotion of financial literacy.
77.
TRUSTED QR CODE GENERATION FOR FINANCIAL TRANSACTIONS
In some embodiments, a computer-implemented method includes receiving, at an acquirer, a trust-verification-use-case-specific root certificate from a certificate authority of a payment processing network, the trust-verification-use-case-specific root certificate being associated with a trust verification use case; receiving an intermediate certificate from the certificate authority, the intermediate certificate being associated with the trust-verification-use-case-specific root certificate; generating, at the acquirer, a key pair for identity associated with an end-entity; signing the key pair for identity associated with the end-entity using the intermediate certificate; generating a digital certificate based upon the signing of the key pair for identity; generating a secure QR code utilizing the digital certificate, identify information associated with the end-entity, and an associated certificate chain; and providing the secure QR code to the end-entity for scanning by a user of a communication device to allow the user to provide financial compensation to the end-entity.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
78.
SYSTEM AND METHOD TO USE PAST COMPUTER EXECUTABLE INSTRUCTIONS TO EVALUATE PROPOSED COMPUTER EXECUTABLE INSTRUCTIONS
Computer executable instructions including code sections are received and compared to previously analyzed computer executable instructions. The code sections are then analyzed and assigned a risk score. If the risk score is over a threshold, an alarm may be communicated or the system may substitute computer executable instructions that may have been created according to a standard or have been previously approved.
Systems and methods are provided to enable a user to conduct a transaction using their credentials stored on a secure server computer (e.g., a computer associated with a partner such as another merchant) by merely presenting their authentication data at a physical location via an auxiliary device. An auxiliary device may be provided for interfacing with a partner's backend server (e.g., the secure server computer). In some embodiments, biometric authentication may provide a mechanism for a true seamless and potentially frictionless (in the case of modalities that do not require physical contact) interaction. Payment can occur without any need for a card, phone, wearable, or any other user device as long as the auxiliary device is able to recognize the user and retrieve a credential that can be linked to that user.
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A method is disclosed. The method comprises receiving, by a server computer comprising an auto-encoder module, a first dataset containing first feature values corresponding to features of an interaction. The first dataset may be input into the auto-encoder module. The auto-encoder module may output a second dataset, the second dataset containing a second feature values corresponding to features of the interaction. The server computer may then compute a feature deviation dataset using the first dataset and the second dataset. The method can then comprise determining a type of activity based on the feature deviation dataset.
Methods and systems for token-based off-chain interaction authorization are disclosed. A hub computer can maintain a network of off-chain (or “layer two”) channels between itself, cryptocurrency issuer computers, and cryptocurrency custodian computers. These off-chain channels correspond to one or more underlying blockchains. The hub computer can receive an access token, a resource provider identifier, and an interaction value. The hub computer can use the access token to identify a cryptocurrency issuer computer associated with the mobile device, and use the resource provider identifier to identify the cryptocurrency custodian computer associated with the access device. The hub computer can update the state of the off-chain channels corresponding to these two computers based on the interaction value, then transmit an authorization response message.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
82.
TRUSTED QR CODE GENERATION FOR FINANCIAL TRANSACTIONS
In some embodiments, a computer-implemented method includes receiving, at an acquirer, a trust-verification-use-case-specific root certificate from a certificate authority of a payment processing network, the trust-verification-use-case-specific root certificate being associated with a trust verification use case; receiving an intermediate certificate from the certificate authority, the intermediate certificate being associated with the trust-verification-use-case-specific root certificate; generating, at the acquirer, a key pair for identity associated with an end-entity; signing the key pair for identity associated with the end-entity using the intermediate certificate; generating a digital certificate based upon the signing of the key pair for identity; generating a secure QR code utilizing the digital certificate, identify information associated with the end-entity, and an associated certificate chain; and providing the secure QR code to the end-entity for scanning by a user of a communication device to allow the user to provide financial compensation to the end-entity.
83.
MEMORY ALLOCATION TECHNIQUE FOR LOAD BALANCED SYSTEMS
A memory management for a computer system that executes multiple concurrent jobs can use machine learning techniques, such as reinforcement learning, to learn and exploit patterns of memory requests. Patterns or sequences of allocations that result in increased memory utilization can be learned, and subsequent decisions to grant allocation requests or wait for additional requests can be informed by the learned patterns.
Methods and systems for establishing a cryptographic binding between a secure element of a reader and a driver of a communication device are disclosed. Such a cryptographic binding can enable data (e.g., credentials) read or otherwise acquired by the reader to be securely transmitted to the driver of the communication device, and can prevent interception of those data using e.g., packet sniffing or protocol analysis malware as those data are transmitted over components of the communication device, such as a communication bus. The communication device can use the driver to verify the secure element of the reader using identification data associated with the secure element. Upon successful verification, the communication device can establish a mutual secret key between the secure element of the reader and the driver, thereby enabling encrypted communication between the two.
G06F 21/33 - Authentification de l’utilisateur par certificats
G06F 21/35 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p.ex. clés électroniques ou cartes à puce intelligentes communiquant sans fils
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
85.
METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR UPDATING ENCRYPTION KEYS
Systems, methods, and computer program products are provided for updating encryption keys. An example method includes distributing an SDK including a software function to establish a secure connection between a client-side application running the SDK and a remote server computer; transmitting, to the merchant application, a key value; receiving a transaction request associated with a transaction, the transaction request initiated through the merchant application; in response to receiving the transaction request, transmitting an authentication request to the merchant application; receiving encrypted data from the merchant application, the encrypted data generated with the key value and based on device data; generating an authentication decision for the transaction based on determining that the encrypted data is valid; and updating, in the merchant application, the key value to replace the key value with updated key value.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G06F 21/30 - Authentification, c. à d. détermination de l’identité ou de l’habilitation des responsables de la sécurité
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
86.
MULTIPLE NFC ANTENNA ARRAY AND USER DEVICE DETECTION
A communication device is disclosed. The communication device includes a housing comprising an active surface, and a processor associated with the housing. An NFC antenna array is coupled to the processor and is under the active surface of the housing. Each NFC antenna in the NFC antenna array is configured to detect a user device that is proximate to the NFC antenna. The user device comprises a user device NFC antenna and access data. A non-transitory computer readable medium is coupled to the processor. The non-transitory computer readable medium comprises code, executable by the processor, to cause the processor to perform operations. The operations include sequentially polling the NFC antennas in the NFC antenna array until the user device is detected by an NFC antenna in the NFC antenna array and the access data is received by the NFC antenna in the NFC antenna array.
G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
87.
MULTIPLE ANTENNA ARRANGEMENT FOR DETECTING USER DEVICES OF VARYING SIZE
A communication device including a housing comprising an active surface and a processor associated with the housing. A plurality of nested NFC antennas coupled to the processor respectively configured to detect and receive access data from user devices of different sizes proximate to the plurality of antennas. A computer readable medium is coupled to the processor and comprising instructions for: initiating a first polling of a first NFC antenna in the plurality of antennas; determining a second NFC antenna in the plurality of antennas with which to initiate a second polling; initiating the second polling of the second NFC antenna; detecting the user device using the second NFC antenna; and receiving the access data from the user device via the second NFC antenna.
H01Q 1/24 - Supports; Moyens de montage par association structurale avec d'autres équipements ou objets avec appareil récepteur
H04W 4/80 - Services utilisant la communication de courte portée, p.ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
88.
DISPLAY APPARATUS WITH TRANSPARENT RF ANTENNA LAYER
A communication device, comprising: a processor; and a display apparatus coupled to the processor, wherein the display apparatus comprises a transparent top layer, an image layer proximate to the transparent top layer, and an antenna layer comprising a first RF antenna formed of a transparent conductive material proximate to the image layer for communicating with a user device comprising a second RF antenna.
H01Q 1/22 - Supports; Moyens de montage par association structurale avec d'autres équipements ou objets
G06F 3/14 - Sortie numérique vers un dispositif de visualisation
G09G 3/3225 - Dispositions ou circuits de commande présentant un intérêt uniquement pour l'affichage utilisant des moyens de visualisation autres que les tubes à rayons cathodiques pour la présentation d'un ensemble de plusieurs caractères, p.ex. d'une page, en composant l'ensemble par combinaison d'éléments individuels disposés en matrice utilisant des sources lumineuses commandées utilisant des panneaux électroluminescents semi-conducteurs, p.ex. utilisant des diodes électroluminescentes [LED] organiques, p.ex. utilisant des diodes électroluminescentes organiques [OLED] utilisant une matrice active
A method includes rendering, by a display of a communication device, a user interface to a user after the user interacts with the communication device. A processor associated with the communication device determines a location of a contactless reader device in the display of the communication device. Responsive to determining the location, the method includes rendering an interaction graphic associated with the contactless reader device on the display proximate to the location.
G06F 3/04817 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport utilisant des icônes
G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
90.
System, Method, and Computer Program Product for Segmentation Using Knowledge Transfer Based Machine Learning Techniques
Provided is a system for segmenting large scale datasets according to machine learning models based on transfer learning that includes at least one processor programmed or configured to train a base machine learning model using a training dataset to generate a trained machine learning model, evaluate the trained machine learning model using an evaluation dataset, wherein, when evaluating the trained machine learning model using the evaluation dataset, the at least one processor is programmed or configured to generate a confidence score for each data instance of the evaluation dataset with the trained machine learning model, augment the evaluation dataset based on the confidence score for each data instance of the evaluation dataset to generate an augmented evaluation dataset, and retrain the trained machine learning model using the augmented evaluation dataset to generate a final machine learning model. Methods and computer program products are also provided.
A method is disclosed. The method includes receiving, by a token service computer, a detokenization request message comprising a first token from a network processing computer, and then determining a first credential that is stored in association with the first token in a database. The method includes determining a user identifier that is stored in association with the first credential in the database, determining that a second credential is stored in association with the user identifier, generating a detokenization response message comprising the second credential, and providing the detokenization response message to the network processing computer.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
A method is disclosed and includes receiving, by a record server computer from a first processing network computer, a token, a device identifier associated with a user device, a session identifier associated with a registration request, and metadata about the token, and then receiving a metadata request from a second processing network computer in response to the second processing network computer receiving an authorization request message comprising the token, and the device identifier and/or the session identifier. The metadata request comprises at least the device identifier and/or the session identifier. The method also includes retrieving, by the record server computer, metadata associated with the metadata request, and providing the metadata to the second processing network computer. The second processing network computer processes the authorization request message using the token and the metadata.
The present disclosure describes a cross cluster failover framework configured to switch a synchronous or asynchronous connection from a first cluster datacenter to a second cluster datacenter based on a health evaluation of the first and second cluster, on an application level, data stream level, or topic level basis. The connections between the first cluster and the consumer application, and second cluster and the consumer application are maintained throughout the failover framework allowing the failover process to be invisible on the consumer application side.
A computer obtains node embeddings, node periodicity classifications, edge embeddings, and edge periodicity classifications for each time of a time period. The computer determines subgraph embeddings based on a subgraph of the graph, times in the time period, the node embeddings for nodes in the subgraph, the edge embeddings for edges in the subgraph, the node periodicity classifications for the nodes in the subgraph, and the edge periodicity classifications for the edges in the subgraph. The computer translates each subgraph embedding of the subgraph embeddings for each time of the time period into projected subgraph embeddings. For the subgraph, the computer aggregates the plurality of projected subgraph embeddings into an aggregated subgraph embedding. The computer determines if the subgraph is periodic based upon at least the aggregated subgraph embedding.
In some embodiments, a method includes receiving, from a user of a user device, a request for an authorization-by-proxy payment on delivery (POD); requesting, at the user device, the user identify an authorized proxy for the authorization-by-proxy POD; generating an authorization-by-proxy code based upon buyer-controlled payment control parameters; and using the buyer-controlled payment parameters to control processing of a payment for the authorization-by-proxy POD. In some embodiments, the method further includes pre-authorizing, at shipment time of merchandise associated with the authorization-by-proxy POD, a hold on a monetary amount associated with an order of the merchandise associated with the authorization-by-proxy POD.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
96.
Method, System, and Computer Program Product for Embedding Compression and Regularization
A method, system, and computer program product is provided for embedding compression and reconstruction. The method includes receiving embedding vector data comprising a plurality of embedding vectors. A beta-variational autoencoder is trained based on the embedding vector data and a loss equation. The method includes determining a respective entropy of a respective mean and a respective variance of each respective dimension of a plurality of dimensions. A first subset of the plurality of dimensions is determined based on the respective entropy of the respective mean and the respective variance for each respective dimension of the plurality of dimensions. A second subset of the plurality of dimensions is discarded based on the respective entropy of the respective mean and the respective variance for each respective dimension of the plurality of dimensions. The method includes generating a compressed representation of the embedding vector data based on the first subset of dimensions.
A method includes: receiving a linking request from a first user device, the linking request identifying a first payment device of a first user and a second payment device of a second user, where the first payment device and the second payment device are not linked by an issuer system; retrieving contact data of a second user device of the second user based on the second payment device; authorizing the linking request by: transmitting a confirmation request to the second user device; and receiving a confirmation response; generating a linking identifier; storing the first payment device and the second payment device in a database in association with the linking identifier; receiving a transaction request for a transaction, the transaction request identifying the first or second payment device; and invoking a linking protocol by storing transaction data associated with the transaction in the database in association with the linking identifier.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
98.
Method, system, and computer program product for generating a payment device using a virtual environment
A computer-implemented method includes: receiving user identifying data; launching a virtual environment including an interactive graphical user interface configured to receive user selection inputs; in the virtual environment: receiving a first user selection input selecting an avatar corresponding to a payment device reward; associating the avatar and the payment device reward with the user; displaying payment device design components; receiving a second user selection input selecting a payment device design component; and associating the payment device design component with the user; and redirecting the user to an issuer system by communicating a payment device issuance request to generate and issue a payment device to the user, where the payment device issuance request contains at least one of the following: the user data, the first user selection input, the second user selection input, and/or any combination thereof.
G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
G06F 3/04815 - Interaction s’effectuant dans un environnement basé sur des métaphores ou des objets avec un affichage tridimensionnel, p.ex. modification du point de vue de l’utilisateur par rapport à l’environnement ou l’objet
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p.ex. des menus
G06F 3/04845 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs pour la transformation d’images, p.ex. glissement, rotation, agrandissement ou changement de couleur
G06Q 20/30 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques
Systems and methods for low communication distributed systems are disclosed. An example method can comprise receiving, by each node in a distributed system, a correlation function with a plurality of inputs comprising at least an identifier; receiving, at a node of the distributed system, a request comprising the identifier; identifying, by the node, a service node to serve the request based on the correlation function, the identifying comprising determining, by the node, based on a status of the node, the status of other nodes in the distributed system; determining a local state, based on at least one of the status of the node, the status of the other nodes, or a number of nodes in the distributed system; and calculating, based on the local state and the plurality of inputs, a target response that identifies the service node; and processing the request by the service node.
Provided is a system, method, and computer program product for automatically updating credentials. The system includes at least one processor programmed or configured to receive, from a first issuer system, a migration request identifying an original account identifier, a new account identifier, and a credential request history associated with the original account identifier, analyze the credential request history to identify at least one provisioned credential associated with the original account identifier, the at least one provisioned credential including at least one of a card-on-file merchant credential and a device token, and in response to identifying the at least one provisioned credential, automatically generate an update request configured to cause at least one of the following to update the at least one provisioned credential based on the new account identifier: a merchant system, a payment gateway associated with a merchant system, a user device, or any combination thereof.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 40/00 - Finance; Assurance; Stratégies fiscales; Traitement des impôts sur les sociétés ou sur le revenu
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système