A method is disclosed. The method includes transmitting interaction history information comprising at least a plurality of addresses to a server computer, receiving a challenge summary from the server computer, the challenge summary associates each address of the plurality of addresses to a challenge rate from a range of challenge rates, and determining a challenge rate threshold based on the challenge summary. The method also includes interacting with a user utilizing at least an address, determining if the challenge rate associated with the address exceeds the challenge rate threshold, performing an authentication of the user if the challenge rate associated with the address does not exceed the challenge rate threshold; and initiating an authorization process of the interaction with the user.
Disclosed are a system, method, and computer program product for user network activity anomaly detection. The method includes generating a multilayer graph from network resource data, and generating an adjacency matrix associated with each layer of the multilayer graph to produce a plurality of adjacency matrices. The method further includes assigning a weight to each adjacency matrix to produce a plurality of weights, and generating a merged single layer graph by merging the plurality of layers based on a weighted sum of the plurality of adjacency matrices using the plurality of weights. The method further includes generating a set of anomaly scores by generating, for each node in the merged single layer graph, an anomaly score. The method further includes determining a set of anomalous users based on the set of anomaly scores, detecting fraudulent network activity based on the set of anomalous users, and executing a fraud mitigation process.
An issuing authority (IA) may validate the identity of a user and issue a digital license to the user. IA may generate IA public-private key pair, and provide IA public key to the certification authority (CA). IA may sign the digital license with IA private key, and provision the signed digital license on the user device. IA may request CA to certify the digital license. CA may use IA public key to validate the digital license, and sign IA public key with CA private key, thereby generating a digital certificate associated with the issuing authority that is linked to the digital license. A relying party may use CA public key to validate the digital license. The relying party can retrieve the information from the digital license and trust that the retrieved information is legitimate.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 21/10 - Protection de programmes ou contenus distribués, p.ex. vente ou concession de licence de matériel soumis à droit de reproduction
G06F 21/33 - Authentification de l’utilisateur par certificats
A method is disclosed. The method includes receiving, from a resource provider computer, a token request message comprising a credential, after a user provides the credential to the resource provider computer. The method also includes transmitting, to the resource provider computer, a token response message comprising one or more supplemental data identifiers and one or more tokens associated with the one or more supplemental data identifiers. The one or more tokens are linked to the credential. Then, a user selects a supplemental data identifier. The method also comprises receiving, from the resource provider computer, an authorization request message comprising a token of the one or more tokens, the token linked to the selected supplemental data identifier, and a value, determining the credential using the token; and transmitting, to an authorizing entity computer, a modified authorization request message comprising the credential, the value, and the supplemental data identifier.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
5.
System, Method, and Computer Program Product for Efficiently Joining Time-Series Data Tables
Described are a system, method, and computer program product for efficiently joining time-series data tables. The method includes loading a first table and a second table into a memory and generating a set of first key-value pairs based on a set of first time-series records and a set of second key-value pairs based on a set of second time-series records. The method also includes sorting the set of first key-value pairs and the set of second key-value pairs. The method further includes interleaving the set of first key-value pairs with the set of second key-value pairs and sequentially matching the sets of time-series records to form a joined table. The method further includes, in response to matching each respective second time-series record with the respective first time-series record, removing the respective second time-series record from the at least one memory.
G06F 7/08 - Tri, c. à d. rangement des supports d'enregistrement dans un ordre de succession numérique ou autre, selon la classification d'au moins certaines informations portées sur les supports
G06F 16/2458 - Types spéciaux de requêtes, p.ex. requêtes statistiques, requêtes floues ou requêtes distribuées
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
Embodiments of the invention are directed to methods, apparatuses, computer readable media and systems for providing, along with a token, a token assurance level and data used to generate the token assurance level. At the time a token is issued, one or more Identification and Verification (ID&V) methods may be performed to ensure that the token is replacing a PAN that was legitimately used by a token requestor. A token assurance level may be assigned to a given token in light of the type of ID&V that is performed and the entity performing the ID&V. Different ID&Vs may result in different token assurance levels. An issuer may wish to know the level of assurance and the data used in generating the level of assurance associated with a token prior to authorizing a payment transaction that uses the token.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
A user may conduct a plurality of access requests with a plurality of resource provider computers. A processor server computer may determine whether resource provider computers store access data associated with the user in various ways, including detecting patterns in sets of a plurality of access requests conducted between the user and each of the plurality of resource provider computers. Upon detecting that access data has changed, the processor server computer may automatically send the updated access data to each of the identified resource provider computer.
A computer-implemented method includes: receiving an inquiry request message identifying a first payment transaction having a plurality of transaction parameters and a risk score, where the risk score is generated by a machine-learning model based on the plurality of transaction parameters; for each transaction parameter of the plurality of transaction parameters, perturbing a value of the transaction parameter and re-analyzing the first payment transaction with the machine-learning model to generate a perturbed risk score based on the perturbed transaction parameter; determining at least one impact parameter from the plurality of transaction parameters by comparing the perturbed risk scores generated for each of the plurality of transaction parameters; and generating an inquiry response message based on the at least one impact parameter.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
A method for conducting cryptocurrency transactions at an access device. The method includes initiating communication with an access device operated by a second user in a transaction between the first user and the second user, and then transmitting a request for transaction data to the access device. The method also includes receiving the transaction data comprising a transaction amount and a second cryptocurrency address from the access device from the access device, and signing, using a private cryptographic key, the first cryptocurrency address, the second cryptocurrency address, and the amount to create a signed cryptocurrency transaction. The method also includes transmitting the signed cryptocurrency transaction to a node of a blockchain network, and receiving a cryptocurrency transaction identifier from the node. The method also comprises generating a cryptogram using at least an access token on the mobile application and at least some of the transaction data.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
10.
System, Method, and Computer Program Product for Monitoring and Improving Data Quality
Provided is a computer-implemented method for monitoring and improving data quality of transaction data that may include receiving transaction data associated with a plurality of payment transactions from an acquirer system. The transaction data may include a transaction record associated with each payment transaction of the plurality of payment transactions. Each transaction record may include a plurality of data fields. Each respective data field of the plurality of data fields may be categorized into a respective type of a plurality of types. A data quality score for each respective data field of the plurality of data fields may be determined based on the respective type of the respective data field. A system and computer program product are also provided.
G06F 16/215 - Amélioration de la qualité des données; Nettoyage des données, p.ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
Provided are methods for determining a dominant account profile of an account. The method may include receiving transaction data associated with a plurality of payment transactions conducted within a predetermined time interval of activation of an account involved in the plurality of payment transactions, generating a dominant account profile classification model, determining a plurality of prediction scores for the account based on the dominant account profile classification model and the transaction data, where determining the plurality of prediction scores includes determining, for the user, a prediction score for each dominant account profile, where a prediction score includes a prediction of whether the user will conduct a threshold value of payment transactions using the account in one or more payment transaction categories of a plurality of payment transaction categories, and communicating data associated with the plurality of prediction scores. Systems and computer program products are also disclosed.
A method includes receiving, by a network computer from a resource provider computer, a settlement request associated with an installment plan and a total amount associated with a user account. The network computer transmits, to the resource provider computer, a settlement response associated with the installment plan and the total amount. The network computer configures an installment record, the installment record comprising a plurality of installment times. Based on occurrence of an installment time, of the plurality of installment times in the installment record, the network computer transmits, to an authorizing computer, installment data associated with the installment record to an authorizing computer, wherein the authorizing computer transmits an installment payment request to a user responsive to receiving the installment data from the network computer.
In some embodiments, a malware detection system includes an attack channel removal unit, a feature extraction unit coupled to the attack channel removal unit, and a graphical encoding unit coupled to the feature extraction unit and a malware detection unit. In some embodiments, based upon graphically-encoded component-based features and monotonic features extracted from attack-channel-free software output by the attack channel removal unit, the malware detection unit detects malware in software input into the malware detection system. In some embodiments, the monotonic features extracted from the attack-channel free software and the graphically-encoded component-based features are combined to generate a combination monotonic-component based feature vector. In some embodiments, the combination monotonic-component based feature vector is used to detect malware using the malware detection system.
A method of communicating a payment request from a first payment platform to a second payment platform is disclosed. The method may receive a payment request from a sending user on the first payment platform to a receiving user on the second payment platform where the payment request from the sending user is translated into a protected payment request. In response to the sending user being known, the protected payment request may be communicated to the second payment platform. An acceptance of the protected payment request from the second payment platform may be received. A transaction settlement request may be communicated to the first payment platform and the second payment platform.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Provided are systems for conducting private set intersection (PSI) techniques with multiple parties using a data repository that include at least one processor to generate a data repository, receive, from a submission entity system associated with a submission entity, a private set intersection (PSI) data query that includes a match parameter for performing the PSI data query, transmit, to the submission entity system, a data classification encryption key, wherein the data classification encryption key is associated with a data field that corresponds to a match parameter data field of the match parameter, determine whether to authorize the PSI data query on the data repository, transmit, to the submission entity system, a data authorization encryption key based on determining to authorize the PSI data query on the data repository, and perform the PSI data query on the data repository. Methods and computer program products are also provided.
An application data exchange technique may include a communication device establishing a communication channel with an access device, receiving an access device profile of the access device, and emulating a virtual access device on the communication device based on the access device profile. The virtual access device executing on the communication device may issue a set of application commands to a transaction applet executing on the communication device, and receive a set of application data responses from the transaction applet in response to the set of application commands. The communication device, may then generate a data packet by concatenating application data contained in the set of application data responses, and transmitting the data packet to the access device via the communication channel.
H04W 4/80 - Services utilisant la communication de courte portée, p.ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04W 76/10 - Gestion de la connexion Établissement de la connexion
Embodiments of the present invention are directed to methods and systems for managing a cryptocurrency payment network comprising one or more issuer nodes and one or more distributor nodes. Issuer nodes may be granted different rights from distributor nodes with respect to the issuance and distribution of digital currency within the cryptocurrency payment network. A management system server computer may generate unique node verification key pairs for each node in the cryptocurrency payment network, where the node verification key pairs may be used to identify and authenticate issuer nodes and distributor nodes.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
19.
SYSTEM AND METHOD FOR DEVICE TRANSACTION AUTHORIZATION
A computer-implemented method includes registering a user device and an internet-of-things (IOT) device for use in a transaction-by-proxy service; collecting behavior-related data associated with a user of the user device and the first IOT device; and using the behavior-related data as part of the transaction-by-proxy service to generate a transaction-by-proxy at the IOT device on behalf of the user of the user device. The computer-implemented method further includes generating a transaction-by-proxy model using the behavior-related data associated with the user and training the transaction-by-proxy model to determine whether to request the transaction-by-proxy.
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/30 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques
20.
INTEGRATING IDENTITY TOKENS AND PRIVACY-PRESERVING IDENTITY ATTRIBUTE ATTESTATIONS INTO INTERACTIONS
A method is disclosed. The method comprises receiving, by an identity network computer, a query set including a plurality of test identity attributes. After receiving the query set, the identity network computer may retrieve derivatives of identity attributes associated with a user, and an encrypted trapdoor, then compute an obscured query set using the query set, and optionally the derivatives of identity attributes. The identity network computer may transmit the obscured query set (i) and the encrypted trapdoor to a user device associated with the user, which generates and transmits a first modified trapdoor and the obscured query set to a relying party computer, or (ii) and a second modified trapdoor to the relying party computer. The relying party computer may thereafter use the obscured query set, and the first modified trapdoor or the second modified trapdoor, to determine if the identity attributes is a member of the query set.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
An identity chaining fraud detection method that allows each current transaction to be linked to other transactions through commonly shared identities. Over a period of time the links create a chain of associated transactions which can be analyzed to determine if identity variances occur, which indicates that fraud is detected. Additionally, if a specific identity is detected as being fraudulent, that identity can be tagged as fraudulent and can be referenced by a plurality of other merchant transaction chains to determine fraud.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
22.
System, Method, and Computer Program Product for Efficiently Storing Multi-Threaded Log Data
Systems, methods, and computer program products are provided for efficiently storing multi-threaded log data. A method includes receiving multi-threaded log data comprising logs, markers, and thread identifiers. For each respective log, the respective thread identifier is set as a most recently used item in a thread reference cache. A respective log cache in a map data structure is determined based on the respective thread identifier. The respective log is added to the respective log cache. Whether to communicate the respective log and/or the respective log cache to a first repository is determined based on the respective marker. The respective log is communicated to a second repository. Whether to remove an oldest log from the log cache is determined based on a log cache size limit and/or a time limit. Whether to remove a least recently used log cache is determined based on at least one map data structure size limit.
A method, system, and computer program product is provided for embedding compression and reconstruction. The method includes receiving embedding vector data comprising a plurality of embedding vectors. A beta-variational autoencoder is trained based on the embedding vector data and a loss equation. The method includes determining a respective entropy of a respective mean and a respective variance of each respective dimension of a plurality of dimensions. A first subset of the plurality of dimensions is determined based on the respective entropy of the respective mean and the respective variance for each respective dimension of the plurality of dimensions. A second subset of the plurality of dimensions is discarded based on the respective entropy of the respective mean and the respective variance for each respective dimension of the plurality of dimensions. The method includes generating a compressed representation of the embedding vector data based on the first subset of dimensions.
A direct payment token generation method provides executable codes to a client device. The executable codes invokes functionalities in a browser application. The set of executable codes further provides login prompts to the user for logging to a virtual wallet account. The method provides a list of products for purchase from merchants in response to a successful login to the virtual wallet account. A graphical element is provided for purchasing one provided product from one of the merchants. In response to receiving a selection of the provided graphical element confirming the purchase, a payment token is generated for the virtual wallet account. The received selection includes confirming detailed information of the purchase. The payment token is transmitted to the client device and is embedded in a payment payload with the detailed information of the purchase. The payment load is transmitted to the one of the merchants to complete the purchase.
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
Embodiments relate to systems, apparatuses, and methods for performing transaction signing utilizing asymmetric cryptography and a private ledger. A transaction data is signed by a user device using a private key, and may be utilized in an authorization request message without including a real credential of the user. A transaction verification and accounting module (TVAM) can verify the signed transaction data and can continue processing the transaction.
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/28 - Schémas de prépaiement, c. à d. de "paiement préalable"
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
26.
SYSTEM FOR DESIGNING AND VALIDATING FINE GRAINED FRAUD DETECTION RULES
A method includes receiving historical interaction data, which includes a plurality of historical interactions. Each historical interaction is associated with a plurality of data fields. The method includes assigning a plurality of weights to the plurality of data fields, generating a neural network using the plurality of weights and the plurality of data fields, identifying a first plurality of feature indicators indicative of a first class, the first class being different from a second class; receiving a second plurality of feature indicators derived from data relating to compromised accounts, updating, a probability distribution component using the first plurality of feature indicators and the second plurality of feature indicators, and receiving current data for an interaction. The method also includes applying the probability distribution component to the current data, and scoring the interaction using the probability distribution component.
G06F 18/213 - Extraction de caractéristiques, p.ex. en transformant l'espace des caractéristiques; Synthétisations; Mappages, p.ex. procédés de sous-espace
G06F 18/214 - Génération de motifs d'entraînement; Procédés de Bootstrapping, p.ex. ”bagging” ou ”boosting”
Abstract: Embodiments of the invention are directed to a user device. A fingerprint sensor can be located adjacent to electrical contacts. As a result, both the fingerprint sensor and the electrical contacts can be directly connected to an underlying memory within the user device. The direct connection allows the user device to be free of wires.
Provided are systems for generating a machine learning model and a prediction based on encoded time series data using model reduction techniques that include a processor to receive a training dataset of a plurality of data instances, wherein each data instance includes a time series of data points, perform an encoding operation on the training dataset to provide an encoded dataset having a lower dimension space than a dimension space of the training dataset, generate one or more prediction models based on the encoded dataset, determine an output of the one or more prediction models in the lower dimension space based on an input provided to the one or more prediction models, and perform a decoding operation on the output to project the output from the lower dimension space to the dimension space of the training dataset. Methods and computer program products are also provided.
Systems, apparatuses, and methods are provided for enabling a transaction using a token associated with a first payment network to be conducted using a second payment network. When a transaction using a token is submitted to a payment network, the payment network can determine the payment network associated with the token. If the token is associated with a second payment network, a token verification request including the token can be sent to the second payment network. The second payment network can then return a token verification response including a primary account identifier such as a primary account number (PAN) corresponding to the token and a validation result. The transaction may then be processed using the primary account identifier.
A requestor and a responder may conduct secure communication by making API calls based on a secure multi-party protocol. The requestor may send a request data packet sent in a API request to the responder, where the request data packet can include at least a control block that is asymmetrically encrypted and a data block that is symmetrically encrypted. The responder may return a response data packet to the requestor, where the response data packet can include at least a control block and a data block that are both symmetrically encrypted. The requestor and the responder may derive the keys for decrypting the encrypted portions of the request and response data packets based on some information only known to the requestor and the responder. The secure multi-party protocol forgoes the need to store and manage keys in a hardware security module.
Systems, methods, and computer program products may store, in a distributed cache, a rule associated with a plurality of accounts in a Real-Time Payments (RTP) network, the rule being stored in association with account data associated with the plurality of accounts; receive an account level exclusion directive associated with the account; store, in the distributed cache, the account level exclusion directive in association with the account; receive transaction data associated with a transaction in the RTP network between the account and another account; retrieve, from the distributed cache, the rule, the account level exclusion directive, and the account data associated with the account; exclude, based on the account level exclusion directive, use of the rule for processing the transaction; and process, without applying the rule, the transaction in the RTP network.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
Methods and systems for managing cryptographic keys in on-premises and cloud computing environments and performing multi-party cryptography are disclosed. A cryptographic key can be retrieved from a hardware security module by a key management computer. The key management computer can generate key shares from the cryptographic key, and securely distribute the key shares to computer nodes or key share databases. The computer nodes can use the key shares in order to perform secure multi-party cryptography.
Described herein are systems and techniques for privacy-preserving unsupervised learning. The disclosed system and methods can enable separate computers, operated by separate entities, to perform unsupervised learning jointly based on a pool of their respective data, while preserving privacy. The system improves efficiency and scalability, while preserving privacy and avoids leaking a cluster identification. The system can jointly compute a secure distance via privacy-preserving multiplication of respective data values x and y from the computers based on a 1-out-of-N oblivious transfer (OT). In various embodiments, N may be 2, 4, or some other number of shares. A first computer can express its data value x in base-N. A second computer can form an ×N matrix comprising random numbers mi,0 and the remaining elements mi,j=(yjNi−mi,0) mod . The first computer can receive an output vector from the OT, having components mi=(yxi Ni−mi,0) mod .
A method comprises a security evaluation computer receiving access data from a user device of a user during an access request. The security evaluation computer analyzes the access data using authentication rules that each specify one of a plurality of authentication protocols for authenticating the user or the user device. At least one of the authentication rules specifies a security level flag for when no authentication is to be performed. The security evaluation computer triggers a first authentication rule corresponding to a first authentication protocol of the plurality of authentication protocols and implements the first authentication protocol. The security evaluation computer sends an authorization request message to an authorization server in a manner consistent with the first authentication protocol and then receive an authorization response message. The security evaluation computer analyzes, using authorization rules, the access data and the authorization response message to determine whether to complete the access request.
Systems, methods, and computer program products train a residual neural network including a first fully connected layer, a first recurrent neural network layer, and at least one skip connection for anomaly detection. The at least one skip connection directly connects at least one of (i) an output of the first fully connected layer to a first other layer downstream of the first recurrent neural network layer in the residual neural network and (ii) an output of the first recurrent neural network layer to a second other layer downstream of a second recurrent neural network layer in the residual neural network.
A method for verifying that event can take place before the event is executed is disclosed. A verification system is incorporated into an event processing network, such that the verification system can identify newly proposed events and determine whether they can be completed. The verification system can inform the network about verification results through distributed blockchain records. Other changes in event status can also be communicated through and stored in blockchain records.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
37.
System, Method, and Computer Program Product for Diagnosing Faulty Components in Networked Computer Systems
Described are a system, method, and computer program product for diagnosing faulty components in networked computer systems. The method includes receiving a plurality of alerts associated with a fault in a networked computer system. The method also includes generating a graph of a network topology of the networked computer system. The method further includes associating each alert with a node of the graph to determine a set of nodes affected by the fault. The method further includes determining a common node of the graph having a plurality of edges connected to nodes affected by the fault. The method further includes determining a faulty component based on the common node, retrieving a set of records of operational changes to the networked computer system, and determining, based on the set of records and the faulty component, an operational change that caused the fault in the networked computer system.
H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p.ex. la hiérarchie ou l’analyse temporelle ou arborescente
H04L 41/0659 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau en isolant ou en reconfigurant les entités défectueuses
H04L 41/12 - Découverte ou gestion des topologies de réseau
38.
Method, System, and Computer Program Product for Determining Solvency of a Digital Asset Exchange
Disclosed is a method, system, and computer program product for determining solvency of a digital asset exchange system. The method includes identifying a plurality of blockchain addresses corresponding to a plurality of users of a digital asset exchange system, generating a first commitment to an amount of digital assets corresponding to the plurality of blockchain addresses, and generating a second commitment to a balance of each user of the plurality of users. The method also includes generating a first component of a zero-knowledge algorithm that is configured to receive, as input, the first commitment. The method further includes generating, with at least one processor, a second component of the zero-knowledge algorithm that is configured to receive, as input, the second commitment. The method further includes determining that the digital asset exchange system is solvent based on the zero-knowledge algorithm.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A method for efficiently storing and verifying records is disclosed. The method may comprise receiving a first hash of first interaction data and determining an interaction identifier associated with the first hash, then storing the first hash in a database along with the interaction identifier and determining a root hash of a hash tree. In addition, the method may also comprise providing the root hash of the hash tree to a public blockchain. Embodiments of the invention also allow users to easily present records to a third party or inquiring entity. Furthermore, interactions may be processed more quickly than previous blockchain methods that publish to a block during each individual interaction.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
40.
Systems And Methods For Protecting Against Relay Attacks
Systems, methods, and devices are disclosed for preventing relay attacks. A user device may receive (e.g., when proximate to the first access device), from an intervening device, device identification data for a first access device. A message may be received from a second access device via the intervening device. The message may include a digital signature generated based at least in part on second access device identification data. The user device may validate the message utilizing the digital signature and a public key. If the message is invalid, the user device may discard the message. If the message is valid, (e.g., unaltered), the user device may determine that the user has not confirmed an intent to interact with the second access device and may terminate an further interaction with the second access device accordingly.
H04W 4/80 - Services utilisant la communication de courte portée, p.ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
G07F 15/00 - Appareils déclenchés par pièces de monnaie avec distribution de liquide, de gaz ou d'électricité commandée par le comptage
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
An application or device is authenticated using secure application data validation. A server computer receives an authentication request comprising an application identifier or a user device identifier associated with a user device, the authentication request originating from the user device. The server computer receives a set of behavioral data associated with the application or the user device. Responsive to receiving the application identifier or device identifier, the server computer obtains a fuzzy vault associated with the application identifier or the user device identifier. The server computer determines a reconstructed key value using the fuzzy vault and the set of behavioral data. The application or the user device is authenticated using the reconstructed key value.
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
42.
System, Method, and Computer Program Product for Secured, Encrypted Transaction Processing
A system, method, and computer program product is provided for secured, encrypted transaction processing. The method includes receiving a transaction request including a first user token including a first account balance, a second user token including a second account balance, and a transaction value. The method also includes generating a new first account balance by executing a zero-knowledge subtraction, and a new first user token including the new first account balance. The method further includes generating a new second account balance by executing a zero-knowledge addition, and a new second user token including the new second account balance. The method further includes transmitting the new tokens to the respective computing devices. The method further includes receiving a new transaction request including the new first user token and/or the new second user token, and generating a new account balance by executing a zero-knowledge computation based on the new transaction request.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
43.
Computer-Implemented Method, System, and Computer Program Product for Automated Forecasting
A computer-implemented method for automated forecasting of cash flow includes: monitoring, while a plurality of first transactions are being processed in a payment network, payable transaction data associated with the plurality of first transactions, the plurality of first transactions initiated with at least one account issued to a merchant; monitoring, while a plurality of second transactions are being processed in a payment network, receivable transaction data associated with the plurality of second transactions, the plurality of second transactions between the merchant and a plurality of users; determining, based on the payable transaction data and the receivable transaction data, a plurality of seasonal variables; and generating a cash flow forecast associated with the merchant, the cash flow forecast generated based on the plurality of seasonal variables. A system and computer program product for automated forecasting of cash flow are also disclosed.
G06Q 10/04 - Prévision ou optimisation spécialement adaptées à des fins administratives ou de gestion, p. ex. programmation linéaire ou "problème d’optimisation des stocks"
A method is disclosed. The method includes: a) receiving node identifiers from nodes of a plurality of nodes in a computer network; b) determining a plurality of node committees in a sampler graph comprising a plurality of nodes, wherein the node is present in a node committee in the plurality of node committees; c) and i) generating a random string; ii) performing a proof of work process using the random string and a hash function; iii) if the proof of work process yields a solution that is acceptable, then broadcasting the solution to all other nodes in the plurality of nodes, wherein the other nodes verify the solution; and iv) if the other nodes verify the solution, the node is elected to a subcommittee for the node committee, wherein the subcommittee updates the sampler graph; and d) repeating steps b) and c) until a leader committee is determined.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 12/18 - Dispositions pour la fourniture de services particuliers aux abonnés pour la diffusion ou les conférences
H04L 41/0893 - Affectation de groupes logiques aux éléments de réseau
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
Embodiments are directed to a method for determining an interview script in a claims submission. The method may comprising receiving data relating to a claim being submitted, which may include claims submission data input by a user, information relating to the user, and one or more features. Data associated with the one or more features may be determined from an artificial intelligence model. A first score based on the data associated with the one or more features and data associated with the information relating to the user may be determined and used to determine an interview script. In one embodiment, questions in the interview script may continue to be provided to the interviewer computer if a continually updated score remains above a predetermined threshold. In another embodiment, the user may be routed to a live interview with a human representative if a continually updated score drops below a predetermined threshold.
G06Q 30/016 - Fourniture d’une assistance aux clients, p. ex pour assister un client dans un lieu commercial ou par un service d’assistance après-vente
A method performs efficient data searches in a distributed computing system. The method may include, receiving a first key. The method may further include determining a hash map associated with the first key from among a plurality of hash maps. In some examples, the obtained hash map maps a partition of a set of keys to particular index values. The method may further include determining an index value associated with a second key using the determined hash map. The method may further include determining transaction processing data associated with the first key using the determined index value and providing the transaction processing data. Utilization of the plurality of hash maps may enable a data search to be performed using on-board memory of an electronic device of the distributed computing system.
G06F 16/22 - Indexation; Structures de données à cet effet; Structures de stockage
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
G06F 16/00 - Recherche d’informations; Structures de bases de données à cet effet; Structures de systèmes de fichiers à cet effet
A method is disclosed, and includes receiving from a token requestor, a token data request message comprising an initial resource provider identifier, and determining a permanent resource provider identifier using the initial resource provider identifier. The method also includes determining a verification value, and associating the permanent resource provider identifier with a token, the verification value, and domain controls. The method also includes providing a token data response message including a verification value to the token requestor, receiving an authorization request message comprising the token, the verification value, and one or more data elements in a plurality of data fields, determining the permanent resource provider identifier using the one or more data elements in the plurality of data fields, and determining that the verification value in the authorization request message matches the verification value that was provided to the token requestor, and that a transaction satisfies the domain controls.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
48.
System, Method, and Computer Program Product for Generating Synthetic Data
Provided are a method, system, and computer program product for generating synthetic data. The method includes generating a correlation graph of a plurality of data types based on a plurality of correlations. The method also includes generating a directed acyclic graph of the plurality of data types based on the correlation graph. The method further includes traversing the directed acyclic graph to produce a hierarchical graph of the plurality of data types, wherein the hierarchical graph includes a plurality of nodes, and wherein each node of the plurality of nodes is associated with a data type of the plurality of data types. The method further includes generating synthetic training data including a plurality of records of data by repeatedly traversing the hierarchical graph and based on a plurality of sets of values and a plurality of sets of interdependencies.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
A computer-implemented method performed by a user device is provided. The computer-implemented method includes receiving a message including an encrypted credential from a server computer; determining a response shared secret using a private key and a server public key; decrypting the encrypted credential using the response shared secret to determine a credential; obtaining a key derivation parameter from the credential; determining a first cryptogram key using the key derivation parameter; generating a first cryptogram using the first cryptogram key; and sending the first cryptogram to a second computer.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Provided are systems for ensemble learning with machine learning models that include a processor to receive a training dataset of a plurality of data instances, wherein each data instance comprises a time series of data points, add an amount of time delay to one or more data instances to provide an augmented training dataset, select a first plurality of supervised machine learning models, select a second plurality of unsupervised machine learning models, train the first plurality of supervised machine learning models and the second plurality of unsupervised machine learning models based on the augmented training dataset, generate an ensemble machine learning model based on outputs of the supervised machine learning models and unsupervised machine learning models, and generate a runtime output of the ensemble machine learning model based on a runtime input to the ensemble machine learning model. Methods and computer program products are also provided.
A system includes a processor and a non-transitory computer readable medium coupled to the processor. The non-transitory computer readable medium comprises code that when executed by the processor, causes the processor to receive a money transfer amount indicative of an amount of funds to be transferred to a recipient. The processor generates a key code associated with the money transfer amount that is provided to a user of the system and given to the recipient by the user. The key code is programmed by the processor to enable the recipient to use the key code to redeem the amount of funds associated with the money transfer amount.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
52.
OFFLINE SECURITY VALUE DETERMINATION SYSTEM AND METHOD
A method includes receiving, by a server computer, data of a communication device; training, by the server computer, a neural network model based on the data of the communication device and communication device metadata from one or more additional communication devices, to generate a machine learning model configured to determine, based on a metadata associated with an application, a security value related to an indication of a security threat; and transmitting the machine learning model to the communication device. The communication device can use the machine learning model to determine the security value, by inputting the metadata associated with the application, as a vectorized data into the machine learning model. The communication device can determine whether to run or install the application based upon the security value.
Methods for updating an application programming interface (API) field of a transaction message may include receiving, with at least one processor, a payment transaction message, wherein the payment transaction message comprises data associated with a payment transaction; determining, with at least one processor, one or more API fields of the payment transaction message based on the data associated with the payment transaction; and modifying, with at least one processor, one or more API fields of the payment transaction message. Methods may also include transmitting, with at least one processor, a modified payment transaction message based on modifying the one or more API fields of the payment transaction message. Systems and computer program products are also disclosed.
Described are a system, method, and computer program product for wait time estimation using predictive modeling. The method includes receiving a request for a predictive wait time estimate from a user including a designated time and a selection of a merchant. The method also includes determining an initial queue length and determining a service rate for each subinterval of a plurality of subintervals from the current time to the designated time. The method further includes producing a plurality of arrival rates using a trained predictive model, and determining a difference between an arrival rate and a service rate for each subinterval, to produce a plurality of changes in queue length. The method further includes determining a queue length based on the plurality of changes in queue length, generating the predictive wait time estimate based on the queue length, and transmitting the predictive wait time estimate to the user.
A thin client may be utilized to facilitate data exchanges between two devices (e.g., a remote computer and a portable device). In some embodiments, the two devices may utilize differing communications protocols. The thin client may further be configured with a rules engine that determines one or more actions to be performed in response to one or more stimuli. The thin client may manage the processing flow between the two devices according to one or more predefined rules that are interpretable by the rules engine. The rules may be pushed to the thin client via any suitable device enabling the functionality of the thin client to be configured and/or modified without having to update the hardware and/or software of the thin client.
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
56.
System and Method for Processing Deferred Authorization Transactions
A method of processing a deferred authorization transaction including: receiving at least one transaction processing request associated with a transaction, where the transaction is initiated using a portable financial device associated with a user, the at least one transaction processing request including a deferred authorization indicator; determining that the at least one transaction processing request includes the deferred authorization indicator; determining that the transaction is a deferred authorization transaction based on determining that the at least one transaction processing request includes the deferred authorization indicator; and processing the transaction using at least one deferred authorization transaction rule in response to determining that the transaction is a deferred authorization transaction. A system for processing a deferred authorization transaction is also disclosed.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
57.
Model Management System for Developing Machine Learning Models
Provided is a system for developing a geographic agnostic machine learning model. The system may select transaction data associated with payment transactions conducted by a first plurality of users, wherein the transaction data includes first transaction data associated with payment transactions conducted by a first plurality of users in a first geographic area and second transaction data associated with payment transactions conducted by a second plurality of users in a second geographic area, normalize the first transaction data associated with payment transactions conducted by the first plurality of users in the first geographic area and the second transaction data associated with payment transactions conducted by the second plurality of users in the second geographic area to provide training data, generate a machine learning model using the training data, and determine a classification of an input using the machine learning model. A method and computer program product are also disclosed.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
58.
System, Method, and Computer Program Product for Implementing a Generative Adversarial Network to Determine Activations
Provided is a computer-implemented method for generating a machine learning model to classify an account based on merchant activation, including providing an input to a generator network of a generative adversarial network (GAN) to generate an output; providing the output as input to a discriminator network; providing a training dataset as input to the discriminator network; and updating the generator network based on a first output of the discriminator network having a label that indicates whether a set of values of each of the plurality of features is a real set of values or a fake set of values. The method may include updating the discriminator network based on a second output of the discriminator network having a label that indicates whether a selected account of the plurality of accounts is going to conduct a first payment transaction. A system and computer program product are also provided.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Provided is a computer-implemented method, system, and computer program product for automatic selection of tests for software system regression testing using machine learning including generating a test mapping including at least one test of a plurality of tests corresponding to a source file. The plurality of tests and the at least one source file are associated with a software repository. Further, determining a defective score for the at least one test based on historical test data of the at least one test, receiving a component criticality score and a defect definition corresponding to the source file, generating a key value corresponding to at least one test based on the defective score, component criticality score, and defect definition, determining a subset of tests of the plurality of tests based on the key value corresponding to the at least one test; and executing the subset of tests with the software repository.
Described are a method, system, and computer program product for operating dynamic shadow testing environments for machine-learning models. The method includes generating a shadow testing environment operating at least two transaction services. The method also includes receiving a plurality of transaction authorization requests. The method further includes determining a first percentage associated with a first testing policy of the first transaction service and a second percentage associated with a second testing policy of the second transaction service. The method further includes replicating in the shadow testing environment, in real-time with processing the payment transactions, a first portion of the plurality of transaction authorization requests and a second portion of the plurality of transaction authorization requests. The method further includes testing the first transaction service using the first set of replicated transaction data and the second transaction service using the second set of replicated transaction data.
A first user device can transmit an interaction request to a remote computer via a long range communication channel. The first user device can receive an authentication request message from the remote computer and can then transmit the authentication request message to a second user device via a short range communication channel. The first user device can then receive an authentication response message comprising a response value from the second user device via the short range communication channel. The first user device can then transmit the authentication response message to the remote computer causing the remote computer to verify the response value and perform further processing if the response value is verified.
Provided is a method for normalizing embeddings for cross-embedding alignment. The method may include applying mean centering to the at least one embedding set, applying spectral normalization to the at least one embedding set, and/or applying length normalization to the at least one embedding set. Spectral normalization may include decomposing the at least one embedding set, determining an average singular value of the at least one embedding set, determining a respective substitute singular value for each respective singular value of a diagonal matrix, and/or replacing the at least one embedding set with a product of the at least one embedding set, a right singular vector, and an inverse of the substitute diagonal matrix. The mean centering, spectral normalization, and/or length normalization may be iteratively repeated for a configurable number of iterations. A system and computer program product are also disclosed.
G06F 5/01 - Procédés ou dispositions pour la conversion de données, sans modification de l'ordre ou du contenu des données maniées pour le décalage, p.ex. la justification, le changement d'échelle, la normalisation
Described are a system, method, and computer program product for reconfiguring a data table for processing on a server cluster. The method includes extracting a data table from a relational database and determining whether the data table includes a column having a range of values with a uniform distribution. The method also includes, in response to determining that the data table includes the column, classifying the column as a candidate column for splitting the data table. The method further includes, in response to determining that the data table does not include the column, inserting an index column into the data table and classifying the index column as the candidate column. The method further includes splitting the data table based on the candidate column and distributing each subdivision to a node of the server cluster so as to cause the server cluster to collectively process the data table.
Systems, methods, and computer program products for detecting merchant data shifts may identify a shift in transaction volume of a merchant system across Merchant Category Codes (MCCs) using a combination of time series analysis and machine learning.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
At an authorization server, a shared secret electronic key may be shared with a second computer. A selection to use a system to complete a transaction may be received from a first computing device. An image may be communicated to the first computing device. A digital representation entered by the user representing the image and a PIN based on the copy of the shared electronic key may be received from the second computing device. The system and method may determine if the digital representation entered by the user on the second computing device matches the image communicated to the first computing device. The system and method may determine if the PIN based on the copy of the shared electronic key from the second computing device is as expected. In response to determining the digital representation entered by the user matches the image and the PIN the second computing device is as expected, the user may be authorized.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
67.
Method, System, and Computer Program Product for Configuring at Least One Rule via a Graphical User Interface
Provided is a method for configuring at least one rule, e.g., using a graphical user interface. The method may include displaying a graphical user interface including a polygon having at least three edges and an icon at a first position within the polygon. Each edge of the polygon may be associated with a potential outcome of at least one rule. An input to move the icon to a second position within the polygon may be received. The graphical user interface may be displayed with the icon at the second position within the polygon. A distance from the second position of the icon to each edge of the polygon may be determined. The rule(s) may be adjusted based on the distance from the second position of the icon to each edge of the polygon. A system and computer program product are also disclosed.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06F 3/04847 - Techniques d’interaction pour la commande des valeurs des paramètres, p.ex. interaction avec des règles ou des cadrans
A method includes a validation computer receiving an authorization request message comprising a user state and a user proof from a user device. The user state comprises first and second user state elements. The user proof comprises first, second, and third user proof elements. The validation computer computes a first verification value by multiplying the first user proof element raised to the power of the second user state element, and the second user proof element raised to the power of the first user state element. The computer computes a second verification value by raising the second user proof element to the power of the second user state element. The computer compares the first verification value to a first accumulated state element of an accumulated state. The compares the second verification value to a second accumulated state element. The validation computer authorizes the authorization request message based on the comparison steps.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
A method includes a server computer receiving a cryptogram request message comprising a token associated with a first credential during an interaction between a user of a user device and a resource provider of a resource provider application on the user device. The server computer generates a detokenization request message comprising the token. The server computer then provides the detokenization request message to a token service computer. The server computer receives a detokenization response message comprising a second credential from the token service computer. The server computer obtains a cryptogram for the interaction. The server computer generates a cryptogram response message comprising the second credential and the cryptogram, and then provides it in response to the cryptogram request message.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
70.
Method, system, and computer program product for local approximation of a predictive model
A method for local approximation of a predictive model may include receiving unclassified data associated with a plurality of unclassified data items. The unclassified data may be classified based on a first predictive model to generate classified data. A first data item may be selected from the classified data. A plurality of generated data items associated with the first data item may be generated using a generative model. The plurality of generated data items may be classified based on the first predictive model to generate classified generated data. A second predictive model may be trained with the classified generated data. A system and computer program product are also disclosed.
A processing system for fuel transactions analyzes transactions for symbols indicating a purchase amount and directs information about the purchase to a loyalty platform. The loyalty platform may identify and communicate in real time or near real time with a personal device associated with the purchaser of the fuel. A user interface of the personal device may allow the purchaser to review and select options for processing the fuel purchase using value from a loyalty program account. The selected option may be used to modify fuel purchase parameters prior to settlement of the transaction or simply add points to the user loyalty program account.
G06Q 30/0226 - Systèmes d’incitation à un usage fréquent, p.ex. programmes de miles pour voyageurs fréquents ou systèmes de points
B60S 5/02 - Alimentation des véhicules en combustible; Disposition générale des installations dans les stations d'approvisionnement
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 30/0207 - Remises ou incitations, p.ex. coupons ou rabais
A user can associate a digital asset corresponding to a value with a transaction device to be used by another user. For example, a first user can load a digital asset corresponding to a cryptocurrency amount onto a transaction device, where the first user then provides the transaction device to a second user. The second user can utilize the cryptocurrency amount on the transaction device to conduct a transaction. The generation and use of digital assets can be managed using ledgers that store data in the form of block chains.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
73.
System, Method, and Computer Program Product for Real-Time Automatic Authorization of a Payment Transaction
Provided is a computer-implemented method for real-time automatic authorization of a payment transaction that is independent of an authorization input from a consumer. The method may include receiving first data associated with a consumer, generating a payment transaction classification model based on the first data associated with the consumer, receiving second data associated with the consumer, determining whether to process a payment transaction in real-time between the consumer and a merchant independent of an authorization input received from the consumer using the payment transaction classification model and the second data associated with the consumer, and processing a payment transaction between the consumer and the merchant based on determining to process the payment transaction in real-time between the consumer and the merchant.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
74.
System, Method, and Computer Program Product for Processing a Transaction as a Push Payment Transaction
Described are a system, method, and computer program product for processing a transaction as a push payment transaction. The method may include receiving, with a payment gateway processor, a transaction request from a merchant system. The transaction request may include transaction data associated with a payment device of a user, the payment device being associated with an issuer system. The method may also include generating, with the payment gateway processor, an authentication request based on the transaction data. The method may further include communicating, with the payment gateway processor, the authentication request to the issuer system. The method may further include, in response to the issuer system authenticating the authentication request, generating a push payment request including an account identifier associated with the merchant system, and communicating the push payment request to the issuer system.
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
Systems and methods are described for provisioning access credentials to a mobile device using device and authorization codes. Once provisioned, a mobile device can be used to conduct a transaction.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
Disclosed are methods and systems for securely providing identity attributes. A server computer may receive, from a relying entity, a request for identity attributes associated with a target entity, wherein the request for identity attributes includes a session identifier associated with the target entity and an identifier of the relying entity. The server computer may validate the request based on the session identifier. The server computer may identify, based on the identifier of the relying entity, a package defining types of identity attributes for the relying entity and a data access token associated with the package. Based on validating the request, the server computer may transmit, to a digital identity provider, a request for a set of identity attributes corresponding to the package, the request comprising the data access token. The server computer may receive, from the digital identity provider, the set of identity attributes.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Embodiments of the invention are directed to a method for submitting a tokenization request via an access device. Embodiments allow tokens to be retrieved for complex mobile devices as well as basic card-type devices. Token requests can be formatted as authorization request messages and transmitted along authorization communication channels.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/42 - Confirmation, p.ex. contrôle ou autorisation de paiement par le débiteur légal
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
78.
ZERO-KNOWLEDGE INTERACTION PROCESSING SYSTEM AND METHOD
A user device generates an initiate interaction request message comprising a state commitment. The user device provides the initiate interaction request message to a first server computer, which creates a verify state request message comprising an interaction index, an interaction index commitment, and a first commitment signature formed from the state commitment and the interaction index commitment. The user device receives the verify state request message, then generates a modified verify state request message comprising a user device public key, the state commitment, the interaction index commitment, and the first commitment signature. The user device provides the modified verify state request message to a second server computer. The second server computer verifies the state commitment, verifies the first commitment signature, and creates a second commitment signature formed from the state commitment and the interaction index commitment. The user device receives a verify state response message comprising the second commitment signature.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
79.
System and Method for Biometric Fallback Authentication
A method for validating user credentials in a transaction initiated with a portable payment device associated with a biometric verification process including establishing a communication protocol between the portable payment device and the point-of-sale system, determining at least one result corresponding to a verification requirement of the biometric verification process, in response to determining an absence result or a failure result of the verification requirement of the biometric verification process, determining an alternate verification process associated with the portable payment device, determining a verification requirement of the alternate verification process, and transmitting the verification requirement of the alternate verification process to the point-of-sale system. A system and computer program product for validating user credentials in a transaction are also disclosed.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
A method is disclosed. One embodiment of the invention is directed to a method. The method comprises: prompting, by an access device, a user to enter an access code; receiving, by the access device, the access code from the user; transmitting, by the access device, the access code to a validation computer, which validates the access code; receiving, by the access device, an access identifier or access token from the validation computer in response to validating the access code; transmitting, by the access device, an authorization request message including the access identifier or the access token to an authorizing computer; and receiving, by the access device, an authorization response message from the authorizing computer.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
81.
Systems, Methods, and Computer Program Products for Generating Node Embeddings
Provided are systems, methods, and computer program products for generating node embeddings. The system includes at least one processor programmed or configured to generate a graph comprising a plurality of nodes, generate an embedding for each node of the plurality of nodes, each embedding comprising at least one polar angle and a vector length. store each embedding of a plurality of embeddings in memory, and in response to processing the graph with a machine-learning algorithm, convert at least one embedding of the plurality of embeddings to Cartesian coordinates.
Provided is a computer-implemented method for authenticating an identification document. The method includes determining, with at least one processor, whether image data associated with the identification document has at least one predetermined indicia. In response to determining that the image data has the at least one predetermined indicia, the method includes determining whether the at least one predetermined indicia corresponds to at least one invalidation mark on the identification document, and, in response to determining that the at least one predetermined indicia corresponds to the at least one invalidation mark, determining, that the identification document is invalid. In response to determining that the identification document is invalid, the method includes preventing or causing the prevention of at least one action from being performed. A system and computer program product for authenticating identification documents are also disclosed.
G06V 10/22 - Prétraitement de l’image par la sélection d’une région spécifique contenant ou référençant une forme; Localisation ou traitement de régions spécifiques visant à guider la détection ou la reconnaissance
G06V 30/414 - Extraction de la structure géométrique, p.ex. arborescence; Découpage en blocs, p.ex. boîtes englobantes pour les éléments graphiques ou textuels
83.
Authentication Based on Biometric Identification Parameter of an Individual for Payment Transaction
Provided is a computer-implemented method for authenticating a customer during payment transactions based on biometric identification parameters of the customer that includes receiving image data associated with an image template for identification of a customer, receiving image data associated with an image of a biometric identification parameter of the customer during a payment transaction between the customer and a merchant, establishing a short-range communication connection with a user device associated with the customer during the payment transaction between the customer and the merchant, authenticating an identity of the customer for the payment transaction via the short-range communication connection, determining an account identifier of an account of the customer based on authenticating the identity of the customer for the payment transaction, and processing the payment transaction using the account identifier of the account of the customer. A system and computer program product are also disclosed.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/42 - Confirmation, p.ex. contrôle ou autorisation de paiement par le débiteur légal
G06V 40/16 - Visages humains, p.ex. parties du visage, croquis ou expressions
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
84.
SYSTEM AND METHOD FOR ADDITIONAL SECURITY IN A VEHICLE BASED TRANSACTION
Identification elements may be added to a vehicle and the identification elements may be required before a transaction through the vehicle may be approved. The identification elements may be a second layer of security to ensure that a payment request is valid and not fraudulent.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06F 21/44 - Authentification de programme ou de dispositif
G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p.ex. lecture de la lumière blanche réfléchie
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
85.
System, Method, and Computer Program Product for Dynamic User Interfaces for RNN-Based Deep Reinforcement Machine-Learning Models
A method for evaluating a RNN-based deep learning model includes: receiving model data generated by the RNN-based model, the model data including a plurality of events associated with a plurality of states; generating a first GUI based on the events and states including a chart visually representing a timeline for the events in relation to a parameter value; generating a second GUI including a point chart visually representing a two-dimensional projection of the multi-dimensional intermediate data, each point of the point chart representing a time step and an event from the time step, based on multi-dimensional intermediate data between transformations in the model that connect a state to an event; and perturbing the environment at a time step based on user interaction with at least one of the first and second GUIs.
G06T 11/20 - Traçage à partir d'éléments de base, p.ex. de lignes ou de cercles
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
86.
SECURE AUTHORIZATION FOR ACCESS TO PRIVATE DATA IN VIRTUAL REALITY
Techniques for secure authentication in virtual reality are provided. A virtual reality application executing on a virtual reality device can provide virtual reality environment. The virtual reality application may communicate with a server that provides a plurality of objects for display in the VR environment. The environment can include an object that, once selected, may initiate an authentication process. Once initiated, an authentication application may be launched on the VR device, so that a private authentication environment may be provided to the user. The user may be prompted to provide a biometric sample using one or more input devices coupled to the VR device. The biometric sample can then be sent to the authentication server, so that an authentication result may be determined from a comparison of the sample to a biometric template established during registration.
Described are a system, method, and computer program product for reconfiguring a transaction during network processing. The method includes receiving, from a merchant system, a transaction request including transaction data and configured in an initial configuration associated with a single-message transaction or a dual-message transaction. The method includes determining, based at least partly on the transaction data and/or at least one parameter of a merchant profile associated with the merchant system, a recommended configuration associated with a single-message transaction or a dual-message transaction, the recommended configuration different from the initial configuration. The method includes reconfiguring the transaction request based on the recommended configuration. The method includes generating a communication to a transaction processing system configured to cause the transaction processing system to process the transaction request as a single-message transaction or a dual-message transaction based on the recommended configuration.
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
88.
SYSTEM AND METHOD FOR ACCOUNT VERIFICATION BY AERIAL DRONE
A verification application executing at a user's mobile phone directs the user to take a photo of an identification document (e.g., driver's license or other form of government issued identification) or of their face. After the verification application sends the image to a backend service, the service may then dispatch a drone to the user's location and take a photograph of the user. The service may then validate the previously-imaged document or photo of the user's face against the photograph of the user and the geolocation sent with the first image. The service may then verify the new account and provision a token to the verification application to complete a secured account generation.
G06V 40/16 - Visages humains, p.ex. parties du visage, croquis ou expressions
H04W 4/80 - Services utilisant la communication de courte portée, p.ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
A token specifying a payment account is issued to a party to which payments are to be made and the token is installed in a specially configured camera. Whenever a photograph is captured by the camera, a copy of the token, among other things, is embedded in the photograph’s metadata. The metadata may also include photo-specific information and a selling price. When a buyer selects the photo for purchase, the token may be used to facilitate a payment to the party, such as the photographer. The buyer may initiate the transaction by simply dragging the selected photograph or photographs onto a purchase application which automatically extracts price and the token for initiating the purchase transaction. The seller can view the purchase details in the payment account.
A method is disclosed and includes receiving, by a record server computer from a first processing network computer, a token, a device identifier associated with a user device, a session identifier associated with a registration request, and metadata about the token, and then receiving a metadata request from a second processing network computer in response to the second processing network computer receiving an authorization request message comprising the token, and the device identifier and/or the session identifier. The metadata request comprises at least the device identifier and/or the session identifier. The method also includes retrieving, by the record server computer, metadata associated with the metadata request, and providing the metadata to the second processing network computer. The second processing network computer processes the authorization request message using the token and the metadata.
A method may include obtaining feature data associated with a set of feature inputs of a machine learning model, determining a probability that a subset of the feature data is concurrently used as the set of feature inputs for the machine learning model, and storing the subset of the feature data on a same cache node or server of a plurality of cache nodes or servers based on the probability.
A method is disclosed. The method comprises generating by a processing network computer, a first attribute correlation matrix comprising correlations between attributes of a first interaction dataset, wherein the first interaction dataset comprises interaction data of a plurality of interactions conducted over a first time period. The processing network computer may generate a second attribute correlation matrix, similar to the first attribute correlation matrix, comprising interaction data conducted over a second time period. The method then comprises identifying sets of attributes from the first attribute correlation matrix and the second attribute correlation matrix. After identifying sets of attributes, the processing network computer may compute residuals between the first attribute correlation matrix and the second attribute correlation matrix. The processing network computer may then determine a number of interaction anomalies in the first interaction dataset using the residuals.
Embodiments are directed to a method of performing autonomous learning for updating input features used for an artificial intelligence model, the method comprising receiving updated data of an information space that includes a graph of nodes having a defined topology, the updated data including historical data of requests to the artificial intelligence model and output results associated with the requests, wherein different categories of input data corresponds to different input nodes of the graph. The method may further comprise updating edge connections between the nodes of the graph by performing path optimizations that each use a set of agents to explore the information space over cycles to reduce a cost function, each connection including a strength value, wherein during each path optimization, path information is shared between the rest of agents at each cycle for determining a next position value for each of the set of agents in the graph.
G06N 5/022 - Ingénierie de la connaissance; Acquisition de la connaissance
G06N 3/006 - Vie artificielle, c. à d. agencements informatiques simulant la vie fondés sur des formes de vie individuelles ou collectives simulées et virtuelles, p.ex. simulations sociales ou optimisation par essaims particulaires [PSO]
Systems and methods allow for the integrated circuit cards (ICCs) to removably couple to each other and transmit information to an access device as a single device. One among the two or more ICCs coupled together may read data from the remaining ICCs and provide the data to an access device via contactless communication. The ICC may include a substrate; an integrated circuit embedded in the substrate; input ports exposed on a first surface of the substrate, and output ports exposed on a second surface of the substrate. The input ports and the output ports are electrically coupled to the integrated circuit. The output ports are configured to be removably coupled to the input ports of a second ICC.
G06K 19/077 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré - Détails de structure, p.ex. montage de circuits dans le support
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
96.
System, Method, and Computer Program Product for Dynamic Authorization Response Timeout
Systems, methods, and computer program products may receive, from a merchant system, an authorization request associated with a transaction; communicate the authorization request to an issuer system and initiate a response timer associated with the transaction; in response to the response timer satisfying a predetermined response time amount without receiving, from the issuer system, an authorization response associated with the authorization request, determine an extended response time; and in response to receiving the authorization response from the issuer system before the response timer satisfies a sum of the extended response time amount and the predetermined response time amount, communicate, to the merchant system, the authorization response.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
97.
UNSUPERVISED EMBEDDINGS DISENTANGLEMENT USING A GAN FOR MERCHANT RECOMMENDATIONS
Embodiments for training a recommendation system to provide merchant recommendations comprise receiving, by a processor, raw merchant embeddings and raw user embeddings generated from payment transaction records, wherein the raw merchant embeddings include a plurality of embedded features. A generative adversarial network (GAN) is trained to generate modified merchant embeddings from the raw merchant embeddings, where the modified embeddings remove a location feature. Subsequent to training and responsive to receiving a request for merchant recommendations in the target location for the target user, the GAN and a trained preference model are used to generate a list of merchant rankings based on a new set of modified merchant embeddings, past preferences of a target user, and the target location to recommend merchants in the target location.
Systems and methods for secure peer-to-peer communications are described. Devices registered into trusted network may be capable of establishing a shared data encryption key (DEK). In embodiments, each device may be configured to obtain a share of a data encryption key (DEKi) that can be stored locally. The shares may be shares in an M of N Secret Sharing Scheme. This may involve a network that includes an integer, N, devices, and in which M devices may share a secret (i.e. the DEK) during communications, M being an integer less than or equal to N. To obtain the entire DEK during encryption/decryption, a requesting device may send requests to M of N devices for their shares of the DEK. Once M shares are obtained, they may be used generate the DEK for encrypting/decrypting data between the devices.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A method for utilizing a registration authority computer to facilitate a certificate signing request is provided. A registration authority computer may receive a certificate signing request associated with a token requestor. The registration authority computer may authenticate the identity of the token requestor and forward the certificate signing request to a certificate authority computer. A token requestor ID and a signed certificate may be provided by the certificate authority computer and forwarded to the token requestor. The token requestor ID may be utilized by the token requestor to generate digital signatures for subsequent token-based transactions.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
Systems and method of managing mass access transactions are disclosed. One method includes receiving, by an access operator computer from an access device of an access provider, a first transaction request with a credential and first transaction amount. The access operator computer identifies a token, based on the credential, and transmits a pre-authorization request message with the credential and a pre-authorization amount, then receives a pre-authorization response message. The access operator computer then receives, from the access device or another access device, a second transaction request for a second transaction, with the credential and a second transaction amount. The access operator computer identifies the token and determines that the token has been used at the access provider. Then, a total amount is formed by aggregating the first transaction amount and the second transaction amount, and the access operator computer initiates the transmission of a clearing message including the total amount.