Systems and methods are provided for converting account credentials in mobile devices. An example method includes receiving a request to digitize a second account in a mobile device, in place of a first account, and determining a type of the second account is different than a type of the first account. The method also includes identifying a first application identifier (AID) for the second account and transmitting, to a digital platform computing device, a request to digitize the second account to the mobile device. The method then further includes receiving, from the digital platform computing device, a notice to digitize the second account to an instance of the application for the second account in the mobile device, where the notice includes an AID for the first account, validating the AID for the first account, and generating and transmitting personalization data to the digital platform computing device.
An automatic name change computer includes a database and processor. An account information table includes a first record with a first account identifier. The processor receives an update file from a first server. The update file includes a second record including a second account identifier, a current legal name of a cardholder, and an updated legal name of the cardholder. Based on the account identifiers matching, the processor writes the updated legal name to the first record. The processor transmits a soft credit check inquiry to a second server and receives one or more accounts associated with the first account identifier. The processor presents a list of the accounts to a cardholder, receives a selection of one or more of the accounts, and writes the updated legal name to a cardholder update file. The processor then transmits the cardholder update file to an account provider.
A method for distributing event data for smart contracts executed on a blockchain to subscribing systems includes: collecting, by a processor of a blockchain node in a blockchain network, a set of event data emitted by a smart contract executed on a blockchain associated with the blockchain network; identifying, by the processor of the blockchain node, communication data for one or more subscriber computing systems; and after a predetermined period of time, transmitting, by a transmitter of the blockchain node, the collected event data to each of the one or more subscriber computing systems using the communication data.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
H04L 67/06 - Protocoles spécialement adaptés au transfert de fichiers, p.ex. protocole de transfert de fichier [FTP]
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p.ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
Systems and methods are provided for replicating data between different services used to update databases. One example system includes a database and a computing device coupled in communication with the database, wherein the computing device is configured to perform a create, update or delete operation on the data included in the database and to post an entry representative of the operation to an outbox data structure. The computing device is also configured to retrieve the entry from the outbox data structure; publish the entry as a first message to a message bus, thereby informing a different data system of the operation in the database; receive a second message from the message bus indicative of a create, update or delete operation at a database included in a different data system; and direct a service of the system to perform the create, update or delete operation of the second message.
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
A method for authentication of non-fungible tokens (NFTs) includes receiving a validation request for an NFT from an external platform including a smart contract identifier; calculating an authentication score for the NFT based on at least (i) wallet activity associated with a creator blockchain wallet identified based on the smart contract identifier, and (ii) a fraud score of the external platform; and if the calculated authentication score for the NFT is below a predetermined threshold value, transmitting a negative response message to the validation request indicating unsuccessful validation of the NFT, or if the calculated authentication score for the NFT is above the predetermined threshold value, transmitting a positive response message to the validation request indicating successful validation of the NFT and instructing the external platform to execute a smart contract associated with the smart contract identifier.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
A system includes a processor and a memory including computer program code. The memory and the computer program code are configured to, with the processor, cause the processor to: receive historical campaign data; determine a likelihood that a vendor will accept a card offer by inputting the historical campaign data into a machine learning model that has been trained for at least one campaign using training data comprising past campaign performance data; automatically recommend a campaign strategy tailored for the vendor using the machine learning model, wherein the recommended campaign strategy is an output of the machine learning model that is based on the determined likelihood that the vendor will accept the card offer; and automatically display the recommended campaign strategy output from the machine learning model on a graphical user interface (GUI).
The computer implemented image matching method involves the use of a quantum computer communicating with a classical computer. The method includes the following steps: (a) The classical computer receives input data. (b) The classical computer generates an input graph representing the input data, (c) The classical computer augments the input graph, (d) An iteration block is performed. (e) The iteration block is repeated using the new permutation parameter, the permuted first adjacency matrix, and a new existing graph until a threshold is met. In the first iteration of the iteration block, the accumulated permutation is the identity, making the permuted first adjacency matrix equal to the first adjacency matrix. The first graph is isomorphic with the second graph when the loss is minimized, indicating a match between the first data and the existing data.
A computer implemented method for optimising, an objective optimisation problem. The methods begins by receiving the objective optimisation problem. The objective optimisation problem is represented by an L×L objective matrix comprising a plurality of matrix components A set of frozen variables is received. The method determines a set of freezable matrix components corresponding to the set of frozen variables. Then, a contribution vector is determined based on the set of freezable matrix components and the set of frozen variables An equivalent optimisation problem is determined based on the contribution vector and the objective optimisation problem. The equivalent optimisation problem excludes the freezable matrix components such that the equivalent optimisation problem may be solved on a quantum computer using fewer quantum bits than the objective optimisation problem would require.
Digital notification servers, methods, and non-transitory computer-readable media. In one embodiment, a server including a communication interface, a memory, and an electronic processor. The electronic processor is configured to receive supplier information and a plurality of digital notifications from the supplier interface device, each of the plurality of digital notifications linked to one or more remuneration vehicles of a plurality of remuneration vehicles and the supplier information, store the supplier information and the plurality of digital notifications in the memory, receive a request for the plurality of digital notifications from the third-party server, the request including the supplier information, and output the plurality of digital notifications to the third-party server, wherein the plurality of digital notifications notify a user of the third-party server of a difference between the plurality of remuneration vehicles and other remuneration vehicles.
A method for conversion of digital assets to fiat currency using a secondary blockchain and mirrored accounting includes: receiving transaction data corresponding to a first blockchain transaction processed using a first blockchain, the transaction data including a payer identifier, recipient identifier, and blockchain currency amount; validating an entity as an authorized entity associated with the payer identifier; determining a fiat currency amount based on the blockchain currency amount; generating a second blockchain transaction, the second blockchain transaction including an unspent transaction output, destination address associated with the authorized entity, and the blockchain currency amount and/or the fiat currency amount; confirming addition of the second blockchain transaction to a second blockchain; and initiating a transfer for the fiat currency amount from a first transaction account to a second transaction account, the second transaction account being associated with the authorized entity.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A computer implemented method for updating a database schema. The method comprises reading (101a, 101b) and then comparing (102) first and second database schemata. Tasks are then generated (103) in dependence on the comparison. The tasks are for converting a database defined by the first schema into a database defined by the second schema. The tasks are then executed (104) in a defined order in order to carry out the database update.
Systems, methods, and computer program code are provided to contactlessly provision payment card information into a mobile wallet application of a mobile device are provided.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
13.
SYSTEMS AND METHODS FOR GENERATING CUSTOMER SATISFACTION SCORE
A gratuity analytics computing system, for generating gratuity analytics for a plurality of transactions of a customer at a service provider within a date range, is in communication with an electronic device of the service provider over an electronic network. The system includes a gratuity analytics computing device, a database including a memory in operable electronic communication with the gratuity analytics computing device, and a processor configured to: receive transaction data for the plurality of customer transactions occurring within the date range, match a plurality of authorization messages with a respective plurality of clearing messages, generate gratuity analytics for the plurality of customer transactions over the date range based on average tip data from the customer, and calculate a customer satisfaction score for one customer transaction of the plurality of customer transactions based on the generated gratuity analytics.
G06Q 30/016 - Fourniture d’une assistance aux clients, p. ex pour assister un client dans un lieu commercial ou par un service d’assistance après-vente
14.
DATA MANAGEMENT AND ENCRYPTION IN A DISTRIBUTED COMPUTING SYSTEM
A method of providing a secure service at a computing node for a requesting party external to the computing node is described. The following steps are taken at the computing node. A service request comprising a request to generate a credential is received from a requesting party. The computing node generates the credential and obtains service-related information. A clear message part is created comprising service-identifying information. A checksum is then created from at least a part of the service-identifying information and from at least a part of the credential and the service-related information. The credential, the service-related information and the checksum are then encrypted to form an encrypted message part. A message comprising the clear message part and the encrypted message part is then sent to the requesting party. Methods for providing secure services to validate the credential and to obtain the service-related information are also described, as is computing apparatus adapted to perform all these methods.
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
15.
METHOD AND SYSTEM FOR FACILITATING TRUSTLESS PAYMENT TRANSACTIONS USING SMART CONTRACTS
A method for processing a trustless blockchain transfer via a card payment network includes: storing, in a blockchain associated with a blockchain network, a smart contract configured to control an amount of blockchain currency in the blockchain; receiving, by a blockchain node in the blockchain network, an authorization request message from a first computing system, where the blockchain nodes submits the authorization request message as input to the smart contract; receiving, by a blockchain node, an authorization response message from a second computing system, where the blockchain nodes submits the authorization response message as input to the smart contract; and executing, by a blockchain node, the smart contract in the blockchain causing the smart contract to (i) verify the authorization request message and authorization response message, and (ii) transfer at least a portion of the amount of blockchain currency to a predetermined blockchain address.
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
16.
ARTIFICIAL INTELLIGENCE-BASED SYSTEMS AND METHODS FOR DETECTING ANOMALOUS DATA
A computer system for analyzing data using AI modeling tools to detect anomalous data associated with a person. The computer system includes at least one processor and an AI model. The at least one processor is programmed to receive person data associated with the person including payment transaction records, input the person data into the at least one AI model to generate one or more outputs including (i) identifying anomalous data of the person, (ii) identifying at least one present need of the person from the anomalous data, and (iii) outputting a recommendation for addressing the at least one present need and transmit a notification message to a caregiver computer.
G16H 40/20 - TIC spécialement adaptées à la gestion ou à l’administration de ressources ou d’établissements de santé; TIC spécialement adaptées à la gestion ou au fonctionnement d’équipement ou de dispositifs médicaux pour la gestion ou l’administration de ressources ou d’établissements de soins de santé, p.ex. pour la gestion du personnel hospitalier ou de salles d’opération
A computer system for multi-stage residual modeling for authorizing an online user is provided. The computer system is programmed to store a plurality of models for analyzing transactions including a first model and a second model; receive a plurality of authorization data associated with a user and a transaction associated with the user; execute in real-time the first model using the plurality of authorization data to receive a first output for the first model, wherein the first output is within an output range; determine a remainder from the first model based on the first output and the output range; execute the second model using the plurality of authorization data and the remainder to generate a second output; combine the first output and the second output to generate a final output; and return the final output for decisioning on whether to authorize the transaction.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06F 30/20 - Optimisation, vérification ou simulation de l’objet conçu
18.
MEMORY REDUCTION IN FRAUD DETECTION MODEL PERFORMANCE OPTIMIZATION USING COMPRESSED DATA
Fraud detection model performance is represented as compressed data in the form of polynomial curve coefficients. A data compression setting, a set of independent variable values, and a set of dependent variable values are used in polynomial regression to generate coefficients of a polynomial curve. The data compression setting is related to the order of the polynomial, for example set to the degrees of freedom (DOF) defined as the polynomial order. A lower DOF yields a higher error, but with a higher degree of compression. The lowest DOF with a tolerable error is selected and the polynomial coefficients are transmitted to a remote node. The remote node regenerates the polynomial curve for comparison with a polynomial curve from a prior time period, in order to determine a performance trend. The trend is used to either generate an alert or trigger further training of the fraud detection model.
A method of transferring information with verification from a first party to a second party using suitably programmed computing apparatus is described. Information from a first party private address to a first party public address. This information is then sent from the first party public address to a second party address. The information is also provided for public recordal on a block of a block chain for verification. The first party private address is not communicated to the second party but the first party public address is communicated to the second party. This approach is particularly suitable for transfer of cryptocurrency, as it allows for an effective refund mechanism. Computing apparatus and application software adapted to implement this approach is also described.
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
20.
SYSTEMS AND METHODS FOR INTELLIGENT STEP-UP FOR ACCESS CONTROL SYSTEMS
Some embodiments may provide systems, methods and computer program code to method to facilitate an interaction involving a user which include determining that a user authentication is required to complete the interaction, identifying at least a first verified device associated with the user, and transmitting an authentication message to the at least first verified device.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
The disclosure herein describes automatically maintaining and updating content data on a compliance platform. Case content data is obtained from a compliance platform and cached in a case cache, including user content data and team content data associated with users of cases on the compliance platform. Team content data is then obtained from a team data platform and cached in a team cache. User content data and team content data on the compliance platform that needs to be updated is identified using the cached case content data and the cached data in the team cache. Up-to-date content data corresponding to the identified user content data and identified team content data from a user data platform and the team cache is then used to update compliance cases on the compliance platform. The compliance cases of the compliance platform are updated periodically and automatically using the described processes.
An authentication platform for authenticating an online user is provided. The authentication platform includes a memory device including an authentication profile and at least one processor coupled to the memory device. The at least one processor is programmed to collect a plurality of authentication data from a plurality of transactions initiated by users attempting to perform a transaction over a computer network, analyze the plurality of authentication data to detect a plurality of insights representing relationships between data elements of different authentication requests of the plurality of authentication requests, wherein the insights represent a likelihood of fraud or potential approval with the corresponding authentication requests, determine a plurality of rules from the plurality of insights, filter the plurality of rules based on one or more thresholds, and provide the filtered plurality of rules to analyze a plurality of subsequent real-time transactions for detecting legitimate authentication requests.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
23.
SYSTEMS AND METHODS FOR VERIFYING USERS, IN CONNECTION WITH TRANSACTIONS USING PAYMENT DEVICES
Systems and methods for verifying users in connection with transactions are disclosed. One exemplary method includes, based on the payment card device being presented at a terminal, initiating, by a security chip of the payment card device, a timer and then based on the timer being unexpired, capturing, by a biometric sensor of the payment card device, a biometric image and verifying, by the security chip, the captured biometric image against reference biometric data stored the payment card device. The method also includes, based on the captured biometric image being verified, cooperating, by the security chip, with the terminal, to initiate a transaction to an account using a first account number specific to a biometric application of the payment card device.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
A method for facilitating benefit disbursements through the use of tokens and blockchain includes: receiving beneficiary information from a first computing system, the beneficiary information including a beneficiary identifier; storing a blockchain data entry, the blockchain data entry including a disbursement token associated with the beneficiary information and a recipient value generated using a public key of a cryptographic key pair; receiving a redemption message from a second computing system, the redemption message including the disbursement token, a digital signature generated using a private key of the cryptographic key pair, transaction account data, and a redemption amount; validating the digital signature using the public key of the cryptographic key pair; and transmitting a transfer message to the first computing system, the transfer message including the transaction account data and the redemption amount.
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
A computing system including a processor in communication with a memory with instructions stored thereon is described. The instructions, when executed by the processor, cause the processor to receive application data associated with a user and a first offering, identify whether the user qualifies for the first offering, and compare the application data with stored parameters associated with a second offering. The instructions further cause the processor to, based on the application data satisfying the stored parameters, cause display of a first display area and a second display area at a graphical user interface (GUI) of a user computing device wherein the first display area includes a confirmation indicating whether the user qualifies for the first offering, and the second display area includes a description of the second offering, receive an input indicating acceptance of the second offering, and initiate activation of credentials associated with the second offering.
Systems and methods are provided for use in appending log entries to a data structure. One exemplary method includes receiving, at a communication device, a log entry from a terminal and signing the log entry with a private key of a key pair specific to the communication device. The method also includes transmitting the signed log entry to an identity provider (IDP) and receiving, by the communication device, from the IDP, a signed, encrypted log entry. The method further includes verifying, by the communication device, a signature of the signed, encrypted log entry based on a public key associated with a key pair specific to the IDP and then appending the encrypted log entry to a digital identity included in the communication device.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p.ex. des interruptions ou des opérations d'entrée–sortie
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
27.
METHOD AND SYSTEM FOR BLOCKCHAIN ITINERARY SUPPORT
Methods and systems for management, payment, and real-time updating of travel itineraries using a blockchain includes: storing, in a blockchain, a plurality of smart contracts including funding transaction account data, payee data, an itinerary type, and itinerary details and configured to initiate a payment transaction from a first transaction account to a second transaction account upon fulfillment of criteria in the itinerary details; receiving event data including a conflict with the itinerary details of a smart contract; identifying alternative itinerary data for the smart contracts based on the respective itinerary details; generating a modified smart contract for the smart contracts based on the identified alternative itinerary data; and transmitting a new blockchain data entry that includes the generated modified smart contract for storing in the blockchain.
A computing system is configured to receive raw transaction data from a database. The computing system performs a multipattern substring matching operation on the raw transaction data using an expert system model. The computing system identifies one or more predefined keywords within one or more of description and memo data fields for each transaction data piece of a set of transaction data pieces. The computing system filters one or more predefined rules based on the identified one or more predefined keywords and assign a category label to each transaction data piece. The assigned category label is based on a highest priority rule determined to be true for the respective transaction data piece.
A computer-implemented method of providing enriched transaction data for a transaction requiring an authorization is provided, the transaction performed using a computer system having a processor and a memory device. The method includes storing transaction data received from an input channel, the transaction data including a transaction identifier. An execution plan is retrieved based at least in part on the transaction identifier. The transaction data is processed across an enrichment processor based on the execution plan to generate at least one fraud score for the transaction. The transaction data is enriched to include at least one of the fraud score and an enriched data object. The enriched data is transmitted to an authorizing party for authorization.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
A system and method for performing a transaction at a software-based POS system of a merchant includes receiving, from the software-based POS system, a payment authorization request message. A processor is programmed to extract a dynamic hashed security token from the payment authorization request message. In addition, the processor is programmed to validate the dynamic hashed security token and, upon validating the dynamic hashed security token, determine that the software-based POS system that transmitted the payment authorization request message is running a mobile POS software application. Furthermore, the processor is programed to extract the hardware identifier and the application identifier from the transaction data and compare them to account registration information stored with a merchant account. The processor then determines that the hardware identifier and the application identifier match with the account registration information and transmits the payment authorization request message to an issuer associated with the transaction card details.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
31.
METHOD AND SYSTEM FOR ACTIVATING WALLET PRIVATE KEYS THROUGH BLOCKCHAIN ADDRESSES
A method for registration of an identified blockchain wallet using a payment card includes: receiving payment details for a payment card issued for a transaction account, the payment details including a card identifier and received from one of: an integrated circuit payment card and a financial application program; receiving wallet details for a blockchain wallet including a wallet identifier; transmitting the card identifier and the wallet identifier to an activation server that stores an association between the wallet identifier and the transaction account; receiving an activation message from the activation server; and transmitting an instruction to the integrated circuit payment card or the financial application program to enable use of a private key of a cryptographic key pair associated with the blockchain wallet.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
32.
SYSTEMS AND METHODS FOR PRIORITIZING RULES FOR AN EXPERT SYSTEM
A computing system receives rules and transaction data from a database. The system creates a potential rule list and stores the rules in the list on the database. The system creates an ordered rule list, a rule-to-transaction lookup table, and a transaction-to-rule lookup table. The system applies each rule to each transaction and identifies each transaction for which each rule is true. The system adds each rule and the identified transactions to the lookup tables and generates a priority-ordered list of the rules iteratively until all rules have been removed from the potential rule list. In each iteration, the system calculates an accuracy of each rule based on all transactions for which the rule is true, appends the highest accuracy rules to the ordered rule list, removes the rules from the potential rule list, and removes the transactions from all entries in the rule-to-transaction lookup table.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
33.
SYSTEMS AND METHODS FOR PRIORITIZING A PLURALITY OF PREDEFINED RULES FOR AN EXPERT SYSTEM
A computing system is configured to receive a plurality of predefined rules from a database. The rules include a first set of predefined rules that includes a hardcoded priority value for each respective predefined rule and a second set of predefined rules that do not have a hardcoded priority value. Furthermore, each rule is associated with a keyword. The computing system determines, for the first set of predefined rules, that each respective predefined rule includes the hardcoded priority value and orders the first set of predefined rules in order of priority based on the hardcoded priority values. The computing system performs a super rule/subrule prioritization operation on the second set of predefined rules, which includes prioritizing one or more super rules over its associated one or more subrules. The computing system then performs an accuracy-based prioritization operation on the second set of predefined rules after the super rule/subrule prioritization operation.
A classifier is trained to classify business supplier relationships using synthetic training data samples. Real training data samples are collected and transformed into sample encodings using an encoder. The real training data samples include feature data associated with health class indicators indicative of relationships between suppliers and service providers. A set of synthetic training data samples is generated from the sample encodings using a generator and discrimination feedback data is generated using a discriminator based on the real training data samples and the synthetic training data samples. The discrimination feedback data is used to train the generator. A classifier model is trained to classify suppliers with health class indicators using the set of synthetic training data samples. The use of the encoder, generator, and discriminator enables the generation of accurate synthetic training data that represents the source distribution of real data which are often partially observed.
Registering a biometric template with a computing device includes receiving a first scan of a biometric feature from a biometric sensor. The first scan includes first biometric data. The computing device extracts two or more distinct elements of the biometric feature and writes a biometric template to a memory. The first characterization data for each of the two or more distinct elements is recorded in the biometric template. After recording the first characterization data in the biometric template, the computing device receives an additional scan of the biometric feature from the biometric sensor. The additional scan includes second biometric data. The computing device validates the biometric template against the second biometric data. After validating the biometric template, the biometric template is updated with second characterization data. The second characterization data is associated with two or more additional distinct elements of the biometric feature contained in the second biometric data.
A message traffic analysis system is provided. The message traffic analysis system includes a memory device and at least one processor. The at least one processor is programmed to receive a plurality of historical messages between a plurality of sources and a destination server, for each of the plurality of historical messages, time shift the corresponding timestamp by an amount, transform the plurality of time shifted timestamps based on a portion of an entire time period completed, generate a model of message traffic based on the plurality of historical messages with the transformed and time shifted timestamps, receive one or more real-time messages between a first source and the destination server, execute the model of message traffic using the one or more real-time messages as inputs, and determine whether or not to allow the one or more real-time messages based on the execution of the model.
Systems and methods dynamically compute and assign a variable fee for cross-border transactions. Raw data associated with a pending transaction is prepared for analysis by a scenario-specific model. The pending transaction is assigned to a scenario. The scenario-specific model generates a recommended variable fee for the pending transaction based on the prepared data. The recommended variable fee is output to an issuer processing the pending transaction. Feedback is received from the issuer regarding the recommended variable fee and the scenario-specific model is trained using the received feedback.
A driver monitoring (DM) computing device for monitoring driving behavior of a driver in real-time is provided. The DM computing device detects a user computer device associated with a driver inside the vehicle. The DM computing device collects state data of the user computer device. The state data includes data as to a state of the user computer device during a currently occurring trip. The DM computing device collects vehicle operation data of the vehicle while the driver and the user computer device are inside the vehicle. The DM computing device compares the collected vehicle operation data and the state data of the user computer device to determine whether the user computer device was activated during the currently occurring trip. The DM computing device causes a driving reward to be applied to an account associated with the driver for inactivity of the user computer device during the currently occurring trip.
G06Q 50/40 - Procédés d’affaires s’appliquant à l’industrie du transport (expédition G06Q 10/83)
G06V 20/59 - Contexte ou environnement de l’image à l’intérieur d’un véhicule, p.ex. concernant l’occupation des sièges, l’état du conducteur ou les conditions de l’éclairage intérieur
A method for adapting text message communications in electronic financial transactions to accommodate users with color vision deficiency. During a registration process, a primary account number, a selection of an enrollment in a color vision deficiency accommodation service, a selection of a preferred critical text color, and an electronic device identifier are received from a user. During a subsequent electronic card present transaction process, the primary account number and the electronic device identifier are received from the user via a payment gateway webpage. During an adaptation process, a text of a message containing a critical text element communicated to the user regarding the transaction is adapted by presenting the critical text element in the preferred critical text color previously selected by the user. The message may be adapted within a template, or the message may be dynamically adapted by searching the message and identifying the critical text element.
G09G 5/02 - Dispositions ou circuits de commande de l'affichage communs à l'affichage utilisant des tubes à rayons cathodiques et à l'affichage utilisant d'autres moyens de visualisation caractérisés par la manière dont la couleur est visualisée
G06F 40/109 - Maniement des polices de caractères; Typographie cinétique ou temporelle
40.
SYSTEMS AND METHODS FOR MESSAGE CONVERSION AND VALIDATION
A computer-implemented method for validating and converting a data message is provided. The method is implemented using a data message validation and conversion (DMVC) computer device in communication with a memory. The method includes receiving from a client device a first data message in a first communication protocol. The first data message includes a plurality of data elements that include a format and a content. The method also includes converting the first data message into a second communication protocol, determining if the format and the content of each data element of the plurality of data elements is valid, if the determination is that at least one of the format and the content of at least one data element is not valid, generating a detailed report about the first data message and providing the detailed report to the client device, and otherwise transmitting the converted first data message.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
H04L 69/08 - Protocoles d’interopérabilité; Conversion de protocole
41.
SYSTEMS AND METHODS FOR IDENTIFYING FULL ACCOUNT NUMBERS FROM PARTIAL ACCOUNT NUMBERS
A system for identifying complete account identifiers from partial account identifiers is provided. The system includes an account identification computing device including at least one processor and a memory device in communication with the at least one processor. The processor is configured to receive transaction data including unique merchant identifiers, build a merchant table using the transaction data, and receive a list including partial account identifiers. The processor is further configured to determine, for each unique merchant identifier, a number of candidate account identifiers and calculate at least one metric based on the number of candidate account identifiers. The processor is further configured to identify a source unique merchant identifier and match at least one candidate account identifier to a complete account identifier by matching one of the partial account identifiers to the at least one candidate account identifier.
Systems and methods are provided for use in providing aggregation to users. One example computer-implemented method includes receiving, by a computing device, an authorization request for an interaction by a user with a first party, the authorization request including an account number and a category code and identifying an aggregate profile based on the account number. In response to identifying the aggregate profile, the method the includes identifying the authorization request to the aggregate profile based on the category code being included in the aggregate profile. The method further includes transmitting, by the computing device, an approval for the authorization request and updating a balance specific to the aggregate profile and associated with a first interval based on the authorization request.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
A network services bridge system including a direct service access (“DSA”) platform is provided. The DSA platform includes a processor configured to receive a request data signal including one or more identifiers, and query a registered services database using the one or more identifiers, where the query returns an identification of a plurality of services for which the one or more identifiers is registered. The processor is also configured to receive, from a first services platform, a first services result signal indicating a result of an application of a first service to the request data signal, receive, from a second services platform, a second services result signal indicating a result of an application of a second service to the request data signal, and transmit a response data signal that includes a consolidated response code indicating whether the authorization process should be completed based on the first and second result signals.
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
44.
SYSTEMS AND METHODS FOR USE IN TRANSFERRING FUNDS BETWEEN PAYMENT ACCOUNTS
Systems and methods are provided for facilitating fund transfers between accounts. One example method includes capturing a computer-readable indicia representative of a destination account identifier specific to a destination account of a first party and a name of the first party, and in response to the captured indicia, displaying the name of the first party, at a mobile device of the user, as a confirmation that the first party is associated with the destination account. The method also includes identifying a payment amount for a fund transfer from a source account issued by a financial institution to the destination account, based on a user input at the mobile device, and compiling and transmitting a transfer request for the fund transfer to a payment network, where the transfer request includes the destination account identifier, a source account identifier for the source account, and the identified payment amount.
A system for communicating between blockchains on heterogeneous blockchain networks. The system can include a sending blockchain configured to transmit a first message via a sending blockchain protocol, wherein the sending blockchain forms a part of a sending blockchain network. The system can include a sending adapter node configured to receive the first message from the sending blockchain, and translate the first message from the sending blockchain protocol to an adapter protocol. The system can include a receiving adapter node configured to receive the first message from the sending adapter node, and translate the first message from the adapter protocol to a receiving blockchain protocol. The system can include a receiving blockchain configured to receive the first message from the receiving adapter node, and validate the first message, wherein the receiving blockchain forms a part of a receiving blockchain network.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
The disclosure herein describes collecting transaction class codes of transactions at a POS interface and organizing those transactions based on the class codes. A class code manager receives a notification that a transaction associated with an account has been initiated. The class code manager sends a prompt to collect a transaction class code of the transaction. In some examples, the transaction class code is a code from a plurality of transaction class codes associated with the account. A transaction class code is received in response to the prompt and the received transaction class code is associated with the transaction. A transaction record of the transaction is recorded by the class code manager, including the associated transaction class code and transaction data of the transaction. The recorded class codes of transactions are used to organize and analyze transaction data. Further, suggested class codes are generated using machine learning in some examples.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
47.
METHODS AND SYSTEMS FOR SMART IDENTIFICATION AND STEP-UP AUTHENTICATION
The disclosure describes systems and techniques for assessing risk of an open Wi-Fi network, at a consumer's request, before the consumer performs a transaction. The system receives a Wi-Fi network risk assessment request associated with a Wi-Fi network connection of a mobile device. Upon receiving the request, the system retrieves connection-related data from the mobile device. The connection-related data is associated with the Wi-Fi network connection. The system performs a Wi-Fi risk assessment of the Wi-Fi network connection. The system transmits a result of the risk assessment to the mobile device for presentation on the mobile device. The system also transmits the result of the risk assessment to an issuer server. The issuer server is associated with a payment account of the consumer. Moreover, the system transmits a step-up authentication alert to the issuer server.
An inverse recommender system for detecting out-of-pattern payment transactions includes a memory device and a processor programmed to receive transaction data. The transaction data corresponds to historical payment transactions between account holders and merchants. The processor is programmed to generate a merchant correspondence matrix including the merchants and counters indicating the number of historical payment transactions between merchant pairs of the merchants and the account holders. The processor is programmed to store the merchant correspondence matrix in a memory device linking the merchant pairs to each account holder. The processor receives additional transaction data associated with a new payment transaction between an account holder and a merchant, and to generate an inverse recommender score for the new payment transaction based on the account holder's historical payment transaction data. The account holder's historical payment transaction data includes historical payment transaction data associated with the merchants visited by the account holder.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
50.
SYSTEMS AND METHODS FOR USE IN PROVISIONING CREDENTIALS
Systems and methods are provided for provisioning identity credentials based on interactions with verified or trusted users. One exemplary computer-implemented method includes receiving a request for a digital identity from a user, where the request includes identifying information for the user, and transmitting, to a verified user, an attestation request for the user. The method also includes receiving, from the verified user, an attestation response to the attestation request with regard to at least some of the identifying information for the user, generating the digital identity for the user based on a number of attestation responses of the identifying information for the user satisfying a threshold, and sharing a digital identity notice with the user including an identifier for the user, whereby the user is permitted to share the digital identity with a relying party via the identifier.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 21/44 - Authentification de programme ou de dispositif
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
A method for confirming configuration of a new current genesis block in a blockchain configured to enable pruning before the new current genesis block includes: receiving, by a blockchain node in a blockchain network, a genesis response message from another node in the network, the message including a configuration value and an ordinal value; identifying a plurality of standard blocks in the blockchain added subsequent to an earlier genesis block that includes a number preceding the ordinal value; aggregating smart contract state changes from each of the identified plurality of standard blocks; and validating the configuration value included in the received genesis response message based on the aggregated smart contract state changes. The aggregating of smart contract states can be done by the processor of the blockchain node configuring the new current genesis block, or by another blockchain node.
A computer-implemented method for processing a real-time money transfer with a screening payment network having a screening module communicatively coupled to a server computing device is provided. The method includes receiving a request to transfer funds from a payor account associated with an originating institution to a payee account associated with a receiving institution. The request includes money transfer data indicative of a payor's identifying information. The method also includes determining a sanction score based at least in part on the money transfer data, the sanction score indicative of the likelihood that the payor is on at least one sanctioned entity list. The method also includes transmitting the money transfer data and the sanction score to the receiving institution, and transmitting a response message to the originating institution, the response message indicating whether the receiving institution authorizes or denies the request to transfer the funds.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Examples provide a multi-currency transaction settlement system that utilizes customizable settlement rules to select different types of currencies for use in a settlement process. When a settlement transaction request is received from a requestor, the system applies the settlement rules to identify a currency type to be used to settle the payment amount or a portion of the payment amount regardless of the initial currency type utilized by the customer completing the payment transaction. The rules are used to select a fiat currency or cryptocurrency based on attributes of the transaction, such as the location of the transaction, type of transaction, amount of the transaction, payment installments, time of the transaction, etc. The rules are user-generated to specify which currency type is used for transaction settlement based on one or more of the attributes for improved flexibility and customization of the settlement process.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
54.
METHOD AND SYSTEM FOR AUTHORIZATION USING A PUBLIC LEDGER AND ENCRYPTION KEYS
A method for conveying a data message using a public ledger includes: generating, by a generation module of a processing server, a data message, wherein the data message comprises one or more data values; electronically transmitting, by a transmitting device of the processing server, a data signal superimposed with the generated data message to a first computing system; receiving, by a receiving device of the processing server, a data signal superimposed with an encrypted message from the first computing system, wherein the encrypted message is generated via application of one or more encryption algorithms to the generated data message using at least one encryption key; appending, by the generation module of the processing server, an identification value to the encrypted message; and submitting, by the transmitting device of the processing server, the appended encrypted message to a public ledger associated with a second computing system.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
H04L 9/14 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A system and method are provided for automating the development of artificial intelligence projects. The system includes a project store that enables the storage, searching and retrieval of existing artificial intelligence projects. The system also includes a data store that enables the storage, searching and retrieval of data sets. A search engine is provided that enables selected features to be applied to neural networks as part of the existing artificial intelligence projects. An artificial intelligence project server is also provided which utilizes a model training and validation module, a model interference module and an input module.
A system and method authenticate payment transactions using risk based analysis modeling when multiple payment accounts are identified by input biometric data. An authentication request includes the biometric data associated with a user. Multiple user payment accounts associated with the biometric data are identified. A confidence score is generated for each of the multiple user payment accounts based on context data associated with the payment transaction. The payment account with the highest confidence score is selected. The selected payment account is authenticated for use in processing the payment transaction to ensure payment transactions are performed on the correct payment account.
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
57.
EXTRA SECURITY ELEMENT ON CARDS TO PROTECT AGAINST FRAUD
Authenticating a secure element payment card includes transmitting a cold reset signal to the payment card and receiving an answer-to-reset message therefrom. The answer-to-reset message includes governing rules for performing a transaction, including a rule indicating that a secure data element is to be used to authenticate the payment card. The process also includes receiving payment account details for a payment account associated with the payment card. A payment authorization request message is transmitted to an interchange network and a card authentication request message is then received from the interchange network. The card authentication request message includes an encrypted instruction, which is transmitted to the secure element payment card. The secure data element is received from the payment card and a card authentication request response message is then transmitted to the interchange network. A payment authorization request response message is then received from the interchange network.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
Systems and methods are described for specifying capability requirements and/or performance criteria, generating a device certification profile, conducting a test based on the device certification profile, and generating a device certificate based on the test. Applications on the device may use the device certificate to enable or disable various functions that access a service that may require a device to have certain capability requirements and/or performance criteria.
The disclosure relates to methods and systems of joining data structures based on a composite similarity score (CSS). For example, a computer system may use a plurality of similarity models to generate respective similarity scores. Each similarity score may be a metric that indicates a confidence that a first data value of a first data record is similar to a second data value of a second data record. The computer system may generate the CSS based on the plurality of similarity sub-scores. The CSS may indicate a confidence that the records being compared are similar. Thus, the CSS may be used to detect similar data records across different data structures. The disclosure also relates to a string similarity model that detects similarity among strings without respect to an order of words in each string and in a way that tolerates errors or omissions in one or both strings.
Embodiments provide methods and systems for training a transaction monitoring model based on a multi-component event-aware loss function. The method performed by a server system includes accessing historical transaction data of payment transactions associated with an acquirer server. Method includes determining acquirer features associated with the acquirer server and transaction features associated with an individual payment transaction based on the historical transaction data. Method includes generating, via an embedding layer, a latent representation corresponding to the individual payment transaction. Method includes training a fraud classifier and an acquirer classifier based on the latent representation and the multi-component event-aware loss function. Method includes computing the multi-component event-aware loss function based on execution of the fraud classifier and the acquirer classifier. Moreover, method includes updating network parameters of the fraud classifier, the acquirer classifier, and the embedding layer based on the multi-component event-aware loss function.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
61.
SYSTEM AND METHOD FOR SPREADING PAYMENTS ACROSS A PLURALITY OF PUSH NETWORKS
A routing computing system configured to receive a request for payment from the client, the request for payment including a payment amount, a specific originating deposit commercial financial institution, and a specific receiving deposit commercial financial institution; determine that the payment amount is greater than the maximum amount limit of each of the plurality of push networks; split the payment amount into a plurality of sub-payments such that each of the plurality of sub-payments does not exceed the maximum amount limit of at least one of the plurality of push networks; assign each of the plurality of sub-payments to a specific one of the plurality of push networks whose maximum amount limit is greater than or equal to an assigned sub-payment.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Systems, methods, and apparatus are described herein data extraction and analysis, and more particularly, to the generation of compliant and optimized peer data.
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04N 21/466 - Procédé d'apprentissage pour la gestion intelligente, p.ex. apprentissage des préférences d'utilisateurs pour recommander des films
63.
SYSTEMS AND METHODS FOR REDUCING AUTHENTICATION NETWORK MESSAGING WITH UPDATED AUTHORIZATION REQUESTS
A method for linking an initial authentication of an online transaction to a subsequent authorization of the online transaction is provided. The method includes: receiving an authentication request message including transaction data, storing in an authentication database authentication data including an initial transaction amount, causing margin data representative of an authentication margin to be associated with the authentication data in the authentication database, receiving a request to link an authorization request message for the online transaction to the authentication data wherein the authorization request message including a fulfillment transaction amount greater than the initial transaction amount, determining that the fulfillment transaction amount does not exceed the initial transaction amount by more than the authentication margin, and transmitting an indication that the authorization request message is successfully linked to the authentication data, thereby enabling authorization by the payment network of the online transaction including the fulfillment transaction amount.
Systems and methods are provided for use in token management. One example computer-implemented method includes receiving, from a first user, a request to redeem a first token having a first value, where the first token is issued by a consortium of multiple parties. In response to the request, the method includes identifying, based on one or more criteria, one of the multiple parties to settle a redemption of the first token. And, the method then includes initiating transfer of the first value from the one of the multiple parties to an account specific to the first user.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
Systems and methods are provided for use in securing open service connections. One example computer-implemented method includes initiating communication between a user and an account host as part of a request for an open service connection by the user, whereby the user provides login credentials to the account host for an account issued by the account host to the user. In response to the request, the method includes receiving access tokens for the open service connection from the account host and identifying data for the user and/or the account. The method also includes performing an assessment of the open service connection based on the identifying data, wherein the assessment is based on current and prior usage of the identifying data, and returning the access token and a result of the assessment to the open service customer.
A convertor computing device operable to reduce cross-border traffic over a network is provided. The convertor computing device is configured to store institution profile data associated with an institution and user profile data for a plurality of users associated with the institution. The convertor computing device is also configured to generate, based on the user profile data, sets of transfer data, each set identifying a recipient, associated recipient country, and transfer amount from a user. The convertor computing device is also configured to aggregate individual transfer amounts into a batch transfer amount based on matching recipient country, transfer the batch transfer amount in a single cross-border transaction from an institution account to a batch receiver in the matching country, and generate an instruction data file that instructs the batch receiver to distribute the individual transfer amounts to the associated recipients within the matching country.
A method for generation of an application cryptogram for use in a payment transaction includes: storing, in a first memory, a single use key associated with a transaction account; electronically transmitting the single use key to a processing server; receiving an encrypted session key and a server encryption key from the processing server; executing a first query to store the encrypted session key in the first memory and a second query to store the server encryption key in a second memory; decrypting the encrypted session key using the server encryption key; generating an application cryptogram based on the decrypted session key; and electronically transmitting the generated application cryptogram for use in a payment transaction.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
A method for optimizing invoice payments according to supplier and buyer controls includes: receiving one or more received data message including invoice data, a buyer identification value, a supplier identification value, and a plurality of buyer optimization priorities, wherein the invoice data is associated with an invoice and includes an invoice amount and due date; identifying a plurality of supplier controls associated with the supplier identification value; identifying one or more buyer preferences associated with the buyer identification value; determining an optimal payment schedule for one or more payment transactions for the invoice based on the invoice data, the buyer optimization priorities, the plurality of supplier controls, and the one or more buyer preferences; transmitting a transmitted data message including the determined optimal payment schedule.
Systems and methods are described for providing neutral data access across multiple data structures. One example computer-implemented method includes accessing, by a computing device, a first data element in a data structure and assigning a first unique identifier to the first data element. The method also includes replacing, by the computing device, the first data element in the data structure with the first unique identifier, whereby the first data element is removed from the data structure, and encrypting the first unique identifier of the data structure. The method then also includes storing, by the computing device, the data structure, with the encrypted first unique identifier, in a multi-tenant data structure, for access by a data host.
Systems and methods are provided for use in identifying synthetic party identities. One exemplary method includes receiving, at a computing device, a request from a relying party to assess validity of an identity presented by an asserting party in a network communication between the asserting party and the relying party, where the request includes identity data associated with the identity of the asserting party. The method also includes calculating, by the computing device, an assessment metric representative of the validity of the identity of the asserting party, where the assessment metric is based on at least one score derived from the identity data, and transmitting, by the computing device, the assessment metric to the relying party, whereby the relying party utilizes the assessment metric to determine whether or not to further interact with the asserting party in connection with the network communication.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Embodiments provide methods and systems for preventing a fraudulent payment transaction. The method performed by issuer system associated with payment account of user includes generating unique data for payment transaction of the user upon approval of payment transaction authorization request signal. The method includes facilitating encryption of the unique data based on encryption key and sending payment transaction authorization response signal to payment server associated with payment network. The payment transaction authorization response signal includes at least the encrypted unique data. The method includes processing the payment transaction upon receiving a notification of a successful validation of the payment transaction authorization response signal from payment server. The validation of the payment transaction authorization response signal is performed by payment server. For validation, payment server decrypts unique data received in payment transaction authorization response and determines match between decrypted unique data and payment data associated with payment transaction authorization request signal.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
A method for processing offline cryptocurrency transfers includes: receiving, by a receiver of a computing device, a first transfer message, wherein the first transfer message is cryptographically signed using a first private key of a first key pair; validating, by a processor of the computing device, the cryptographic signature of the first transfer message using a first public key of the first key pair; storing, in a memory of the computing device, the validated first transfer message; receiving, by an input device of the computing device, a transfer instruction, the transfer instruction including at least a communication address; and electronically transmitting, by a transmitter of the computing device, the validated first transfer message to an external device based on at least the communication address.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
The present disclosure relates to a computer-implemented method of processing a data transfer. The method comprises generating a first identifier for a first entity; linking the first identifier with a second identifier associated with a second entity; sending the first identifier and the second identifier to the first server; verifying the first entity based at least on the first identifier and the second identifier; sending a message to a second server, the message comprising at least the first identifier, the second identifier, and a name associated with the first identifier; and authenticating the data transfer for the first entity based at least on the information contained in the message.
A cardholder authentication method includes receiving, at an authentication network, an authentication request involving an account. The method further includes determining, based at least in part on a portion of an account identifier associated with said account, an authentication service. In addition, the method includes determining, based at least on said authentication service and a portion of said account identifier, an authentication response. The method also includes transmitting, to a merchant associated with a transaction involving said account, said authentication response.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
75.
Devices, Methods, and Computer Readable Mediums for Security and Authentication
Disclosed are various computer implemented devices, methods and readable mediums for security and authentication. In one aspect there is provided a wearable device for authenticating a user, including: one or more sensors for obtaining sensor data related to movement of fingers of the user wearing the wearable device to provide authentication data; and one or more processors configured to: receive the sensor data; interpret the sensor data using one or more classifiers to determine the authentication data; and use the authentication data to access a service.
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G06F 21/35 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p.ex. clés électroniques ou cartes à puce intelligentes communiquant sans fils
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Systems and methods for linking a plurality of data records to a tokenized identifier such that each data record is accessible via the tokenized identifier are disclosed. A first data record associated with a first account and a second data record associated with a second account may be loaded into a digital wallet. Next, a token primary account number (PAN) may be generated and linked to the first account and the second account. Available prepaid funds associated with the first account may be verified and displayed on a user interface. In response to an initiation of a transaction, an optimal payment structure based on the available funds of the first account may be determined. In response to authorization of the transaction from the issuing banks associated with the first account and the second account, an authorization message may be sent to a bank associated with the token PAN.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
77.
METHODS AND SYSTEMS FOR IDENTIFYING INVALID CERTIFICATES
Embodiments provide methods and systems for determining validity of certificates while performing a transaction in a network. A method performed by server system includes receiving a check certificate request message from a plug-in server upon detecting by the plug-in server that a certificate associated with an access control server (authentication server) during a payment transaction is invalid. The check certificate request message includes at least a message reference identifier. The method further includes accessing one or more certificate attributes of the certificate associated with the authentication server based, at least in part, on message reference identifier; determining validity of the certificate associated with the authentication server based, at least in part, on the one or more certificate attributes; and transmitting an update certificate request message to the authentication server based, at least in part, on determining that the certificate associated with the authentication server is invalid.
Methods and server systems for computing fraud risk scores for various merchants associated with an acquirer described herein. The method performed by a server system includes accessing merchant-related transaction data including merchant-related transaction indicators associated with a merchant from a transaction database. Method includes generating a merchant-related transaction features based on the merchant-related indicators. Method includes generating via risk prediction models, for a payment transaction with the merchant, merchant health and compliance risk scores, merchant terminal risk scores, merchant chargeback risk scores, and merchant activity risk scores based on the merchant-related transaction features. Method includes facilitating transmission of a notification message to an acquirer server associated with the merchant. The notification message includes the merchant health and compliance risk scores, the merchant terminal risk scores, the merchant chargeback risk scores, and the merchant activity risk scores.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
79.
ARTIFICIAL INTELLIGENCE BASED METHODS AND SYSTEMS FOR PREDICTING CREDITWORTHINESS OF MERCHANTS
Embodiments provide methods and systems for determination of creditworthiness of a first merchant. The method performed by a server system includes receiving invoice data of the first merchant from a merchant invoice database. The invoice data includes information of past invoices associated with the first merchant. Additionally, the method includes generating a homogeneous graph based, at least in part, on the information of past invoices. Further, the method includes determining a feature representation of the first merchant based on data features associated with the first merchant in the homogenous graph. Furthermore, the method includes calculating a credit risk score for the first merchant based on the credit risk score model.
Methods and server systems for improving accuracy of authorization optimizer are described herein. Method performed by server system includes receiving a Non-Sufficient Funds (NSF) error message from an acquirer server. Method includes accessing historical transaction data from a transaction database. The historical transaction data includes transaction related information associated with a plurality of users. Method includes generating a plurality of transaction features associated with the user based on the historical transaction data. Method includes determining via an authorization optimizer model, an optimal time slot from a plurality of time slots for the user based on the plurality of transaction features associated with the user. The optimal time slot indicates an optimal time window for the acquirer server to transmit an upcoming recurring payment request to the payment account of the user. Method includes facilitating transmission of a notification message including the optimal time slot to the acquirer server.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
81.
Systems and Methods for Use in Authenticating Users in Connection With Network Transactions
Systems and methods are provided for authenticating users. An exemplary method includes receiving, by a directory server (DS), an authentication request for a transaction to an account where the request includes a token and a cryptogram, and transmitting the token and cryptogram to a digital service server (DSS). The method also includes mapping, by the DSS, the token to an account number for the account, validating the cryptogram, generating a directory server nonce (DSN) for the request, and transmitting the DSN and the account number to the DS. The method further includes transmitting, by the DS, the DSN and the account number to an access control server (ACS) associated with an issuer of the account and, in response to an issuer authentication value (IAV), compiling an accountholder authentication value (AAV) including the IAV, the DSN and an amount of the transaction and transmitting the AAV to a merchant or server.
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
82.
SYSTEMS AND METHODS FOR MERGING NETWORKS OF HETEROGENEOUS DATA
A method and system for merging heterogeneous data types are provided. The method includes receiving a first corpus of first data, the first data includes an indicator of an interaction between a first element of the first corpus of first data and a second element of the first corpus of first data, receiving a second corpus of second data, the second data includes an indication of an interaction between a third element of the second corpus of second data and a fourth element of the second corpus of data, and generating a third matrix using correlations of the first and second elements with correlations of the third and fourth elements.
Described herein is a data security system for enabling tokenized access to sensitive data, including a token provider configured to initiate a secure connection with a remote client computing device of a first data subject, and receive, from the remote client computing device, a request for an access token to provide a service provider with access to sensitive data associated with the first data subject. The request includes a data definition and authorization parameters including a data source identifier. The token provider is also configured to generate the access token that enables access to the sensitive data from the data source, store the access token in a token database, and transmit, to the remote client computing device, a response including the access token and instructions that enable the remote computing device to display the access token to the first data subject or transmit the access token to the service provider.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
G16H 10/60 - TIC spécialement adaptées au maniement ou au traitement des données médicales ou de soins de santé relatives aux patients pour des données spécifiques de patients, p.ex. pour des dossiers électroniques de patients
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
The present invention relates to an apparatus, a method, and a system for determining location. The apparatus comprises an apparatus comprising a camera, and a processor. The camera is configured to capture an image of a microscopic object located at a predetermined location. The microscopic object comprises coded information. The processor is configured to process the image to decode the coded information and to determine a location of the device as being the predetermined location based on the decoded information. The apparatus may further comprise a manually operated inventory carrier (such as a shopping trolley or cart) or a robotic inventory carrier. The predetermined location may be in a supermarket or an inventory facility. The microscopic object may comprise a QR code or other barcode, and may be one of an array or repeating patterns of microscopic objects.
A token management computing system for provisioning at least one secure payment token for use in payment transactions is provided. The token management computing system includes a token storage device in communication with a plurality of user computing devices each associated with a respective user, and a token management (“TM”) server. The TM server is programmed to receive a token request for at least one token, generate, upon receiving the token request, the at least one token, wherein the at least one token includes at least one of i) a prepaid token including prepaid funds, ii) multiple tokens each associated with a different user, and iii) a budgeting token associated with a plurality of virtual budget accounts.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/28 - Schémas de prépaiement, c. à d. de "paiement préalable"
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
86.
SYSTEM AND METHOD FOR AUTHENTICATION OF PROCESSED AUDIO FILES
An audio file authentication system configured to extract a plurality of audio features for a plurality of raw audio files containing a digital recording of a specific user's voice, provide an authenticated audio file that includes a digital recording the specific user's voice based on the authentication information for the specific user, generate a parent hash key and sequential child hash keys that are unique to the authenticated audio file, and generate a processed audio file in which the parent hash key and each of the sequential child hash keys is inserted sequentially as data within the audio gaps of the audio file.
G10L 17/06 - Techniques de prise de décision; Stratégies d’alignement de motifs
G10L 17/02 - Opérations de prétraitement, p.ex. sélection de segment; Représentation ou modélisation de motifs, p.ex. fondée sur l’analyse linéaire discriminante [LDA] ou les composantes principales; Sélection ou extraction des caractéristiques
G10L 17/04 - Entraînement, enrôlement ou construction de modèle
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
87.
METHODS AND SYSTEMS OF USING SUB-DOMAINS TO FEDERATE DEVICE CREDENTIALS SCOPED TO A COMMON DOMAIN
A computer-implemented method for authenticating a user device via a device credential scoped to a common domain shared among a plurality of payment networks may be provided. The method may include receiving, by a server of a payment network, a first request redirected from a sub-domain assigned to the payment network to a domain name associated with the payment network, responsive to the first request, transmitting, to the user device, an authentication request comprising a challenge, a user identifier that identifies the user, and the common domain to which the device credential is scoped, receiving, from the user device, a response, accessing the device credential, the device credential having been stored by the payment network, validating the response based on the device credential, and causing, by the server, the user identifier and the device credential to be federated to the other ones of the plurality of payment networks based on the validating.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
88.
SYSTEMS AND METHODS FOR INCORPORATING BREACH VELOCITIES INTO FRAUD SCORING MODELS
A method and system for detecting fraudulent network events in a payment card network by incorporating breach velocities into fraud scoring models are provided. A potential compromise event is detected, and payment cards that transacted at a compromised entity associated with the potential compromise event are identified. Subsequent transaction activity for the payment cards is reviewed, and a data structure for the payment cards are generated. The data structure sorts subsequent transaction activity into fraud score range stripes. The data structure is parsed over a plurality of time periods, and at least one cumulative metric is calculated for each of the time periods in each fraud score range stripe. A plurality of ratio striping values are determined, and a set of feature inputs is generated using the ratio striping values. The feature inputs are applied to a scoring model used to score future real-time transactions initiated using the payment cards.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Described is a computer system for creating a digital record of a physical item of value. The computer system includes a network computer device comprising at least one processor communicatively coupled to at least one memory and a distributed network of computer nodes each associated with a respective entity of a plurality of entities, each computer node comprising a camera and an optical character recognition (OCR) application executable thereon, each computer node is communicatively coupled to the network computer device.
Systems and methods are provided for use in redeeming tokens. One example computer-implemented method includes receiving, by a processing network, from a first institution, an authorization request for redemption of a token by a user and checking a data structure escrow address associated with the redemption of the token. The method also includes, in response to the data structure address being indicative of the token, authorizing the redemption, whereby the institution transfers value associated with the token to the user.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
A method for facilitating permission-based cryptographic transactions across service providers includes: receiving an onboarding request including permission data and an identification value from a first computing system, the identification value being associated with a first blockchain wallet for a blockchain associated with a blockchain network; generating a permission token based on the permission data and an alias, the permission token including verified identity data points; transmitting the generated alias to the first computing system in response to the onboarding request; receiving a token request from a second computing system, the token request including the alias; and transmitting the generated permission token identification value to the second computing system in response to the token request.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
92.
PLATFORM-AGNOSTIC ENTITY IDENTIFICATION THROUGH COMPUTATIONAL MODELING
The disclosure relates to methods and systems of generating a platform-agnostic identification of an entity through rules-based computational modeling of entity relationships. For example, the platform-agnostic identification of an entity may be used to identify an acquirer entity across different data platforms, such as payment networks, that each assign respective acquirer identifiers to the acquirer entity. The computational modeling may generate a mapping between a first acquirer identifier assigned by a first payment network to the acquirer entity and a second acquirer identifier assigned by a second payment network to the acquirer entity. The mapping may be based on an anchor value that is associated with both the first acquirer identifier and the second acquirer identifier. The mapping may be validated by multi-validation rules and/or issuer-validation rules that reduce false positive results that may occur through computational modeling.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
93.
ACCELERATED VIRTUAL CARD PAYMENTS IN B2B TRANSACTIONS
The disclosure herein relates to methods and systems of that facilitate instant payment of invoices based on automatic, intelligent, predictions that a buyer will approve an invoice without express input by the buyer. For example, a system may determine a probability that an invoice will be approved for payment by a buyer with express approval from the buyer. Once an invoice is automatically approved for payment, the system may employ various automated systems to facilitate payment to suppliers without the need for suppliers to extract virtual card data or other payment information from email payment requests or other invoice payment requirements to receive payment. For example, the system may generate calls to automatically generate virtual card numbers on behalf of buyers and submit payment messages for payments to suppliers using the virtual card numbers.
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 30/016 - Fourniture d’une assistance aux clients, p. ex pour assister un client dans un lieu commercial ou par un service d’assistance après-vente
94.
CONSERVING SYSTEM RESOURCES WITH CREDENTIAL DIGITIZATION AND ENROLLMENT
Examples provide a system and method for digitization of payment credentials via a point-of-sale (POS) device. When a physical payment credential is presented, the system determines, in real-time, if the credential is enrolled in a digitized payment credential service. If the credential is not enrolled and the user is qualified for enrollment based on eligibility rules, the system prompts the user to consent to automatic enrollment via the POS device. If consent is obtained, the system triggers digitization of the payment credential, which is stored at the digitized payment credential service. A token corresponding to the digitized payment credential is linked to one or more identifiers of the user, such as email, phone number, shopper account number, biometric data, or other identifiers. When enrollment is complete, the user can provide linked identifier(s) at the POS to complete payment of future transaction without presenting the tokenized physical payment credential.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Systems and methods are provided for replicating data between different services used to update databases. One example system includes a database and a computing device coupled in communication with the database, wherein the computing device is configured to perform a create, update or delete operation on the data included in the database and to post an entry representative of the operation to an outbox data structure. The computing device is also configured to retrieve the entry from the outbox data structure; publish the entry as a first message to a message bus, thereby informing a different data system of the operation in the database; receive a second message from the message bus indicative of a create, update or delete operation at a database included in a different data system; and direct a service of the system to perform the create, update or delete operation of the second message.
G06F 17/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
Various implementations described herein may refer to a compliance platform for use with identity data. In one implementation, a method may include receiving a compliance data package from a user, where the compliance data package includes encrypted evidence data corresponding to digital identity data of the user. The method may also include encrypting the compliance data package using a first cryptographic key. The method may further include generating a user key shard, a requestor key shard, and a regulator key shard based on the first cryptographic key. The method may include generating an unlock data package that includes the requestor key shard and encrypting the unlock data package using a second cryptographic key. The method may also include transmitting the user key shard, the encrypted unlock data package, and the encrypted compliance data package to the user. The method may include transmitting the regulator key shard to a regulator.
H04L 9/14 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p.ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
Methods and server systems for detecting fraudulent transactions are described herein. Method performed by server system includes accessing base graph including plurality of nodes further including plurality of labeled nodes and unlabeled nodes. Method includes assigning via Graph Neural Network (GNN) model, fraudulent label or non-fraudulent label to each unlabeled node based on the base graph. This assigning process includes generating plurality of sub-graphs based on splitting the base graph and filtering these sub-graphs via Siamese Neural Network model based on pre-defined threshold values. Then, the GNN model generates plurality of sets of embeddings based on plurality of filtered sub-graphs. Further, aggregated node embedding is generated for each node and then, final node representation for each node is generated via dense layer of GNN model. Then, fraudulent label or the non-fraudulent label is assigned to each unlabeled node of plurality of unlabeled nodes based on final node representation.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
A data center rack assembly includes a rack, an electronic device, and an adjustable air duct. The rack includes a frame defining opposite first and second rack sides spaced apart in a longitudinal direction. The electronic device presents an intake side configured to receive air therethrough for passage into the electronic device. The electronic device is mounted to the frame such that the intake side is disposed intermediately between the rack sides and is spaced from the first rack side to define a longitudinal dimension therebetween. The duct includes relatively shiftable first and second duct sections that extend in the longitudinal direction to cooperatively present an adjustable longitudinal duct length, and a drive mechanism operably coupled to the first and second sections to control relative shifting of the sections in the longitudinal direction to thereby adjust the longitudinal duct length to correspond with the longitudinal dimension.
The invention secures contactless payment cards against misuse at ‘unattended type’ terminal devices having near field communication capabilities. The invention involves receiving from a communication device a first unique identifier associated with a contactless payment card, and a second unique identifier associated with the communication device. Transmission of the first unique identifier and the second unique identifier from the communication device is implemented in response to the communication device detecting a contactless card tap event, and the communication device retrieving the first unique identifier from the contactless payment card. The invention involves selectively implementing one of a first payment authorization communication flow and a second payment authorization communication flow. The selective implementation is based on whether the first and second unique identifiers have been recorded within a database that stores combinations of payment card identifiers and communication device identifiers for payment transactions that have been previously successfully authorized.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
100.
SYSTEM AND METHOD FOR PROVIDING PUSH PAYMENT TRANSACTION PROCESSING IN A CARD-PRESENT ENVIRONMENT
Systems and methods for providing push payment transaction processing in a card-present environment are provided. The described push payment transactions processing enables a user having any form factor visiting at a merchant location accepting payment cards to perform push payment transactions. Indeed, push payment transactions can be supported from physical point-of-sale (“POS”) or originate from POS terminals. During the described push payment transaction processing, a merchant acquirer can receive, from a POS terminal, a push payment transaction request comprising at least a transaction type indicating a push payment transaction, transaction information, authorization data, and sender information. In response to receiving the push payment transaction request, the merchant acquirer can generate an application programming interface (API) request package comprising the push payment transaction request; and communicate the API request package to an intermediary platform connected to a payment network.
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives