Patent classifications
G06Q20/305
Payment proxy including a user-defined identifier
In some examples, a system generates an identifier for association with a user financial account. The identifier may have a syntax including a currency indicator and a string including one or more characters concatenated together such that the currency indicator appears immediately before the string. The system generates a user-defined identifier and maps, in a database, the user-defined identifier to the user financial account. The system receives a message indicating an intent to transfer funds from a sending user to a receiving user. The message may include the user-defined identifier in lieu of account information of the user financial account, to identify the user as the receiving user. The system parses the message to identify the user-defined identifier and accesses the account information of the user financial account using the identifier. The system initiates a transfer of funds from the sending user account to the user financial account.
MONEY TRANSFER BY USE OF A PAYMENT PROXY
In some examples, a payment system generates, for a first user, a proxy identifier having a syntax including a symbol and a string of one or more characters that are concatenated such that the symbol appears immediately before the string. The proxy identifier is associated with a financial account of the first user. The payment system receives an indication of an intent to transfer funds from a second user to the first user. The indication includes the proxy identifier in lieu of financial account information of the first user, and to identify the financial account of the first user for receiving the funds. Based at least on identifying the proxy identifier, the payment system accesses the financial account information of the first user and initiates the transfer of funds from the financial account of the second user to the financial account of the first user.
Voice Analysis Platform for Voiceprint Tracking and Anomaly Detection
Aspects of the disclosure relate to voiceprint tracking and anomaly detection. A computing platform may detect voice information from a call management system. The computing platform may establish voiceprints for employees and clients of an enterprise. The computing platform may detect a call between an employee and a caller attempting to access a client account. The computing platform may identify a first voiceprint corresponding to the employee and a second voiceprint corresponding to the caller. The computing platform may compare the second voiceprint to a known voiceprint corresponding to the client. Based on the comparison of the second voiceprint to the known voiceprint, the computing platform may determine that the second voiceprint does not match the known voiceprint. The computing platform may identify that the second voiceprint corresponds to another employee of the enterprise, and may send a security notification indicating potential unauthorized account access to an enterprise computing device.
Voice analysis platform for voiceprint tracking and anomaly detection
Aspects of the disclosure relate to voiceprint tracking and anomaly detection. A computing platform may detect voice information from a call management system. The computing platform may establish voiceprints for employees and clients of an enterprise. The computing platform may detect a call between an employee and a caller attempting to access a client account. The computing platform may identify a first voiceprint corresponding to the employee and a second voiceprint corresponding to the caller. The computing platform may compare the second voiceprint to a known voiceprint corresponding to the client. Based on the comparison of the second voiceprint to the known voiceprint, the computing platform may determine that the second voiceprint does not match the known voiceprint. The computing platform may identify that the second voiceprint corresponds to another employee of the enterprise, and may send a security notification indicating potential unauthorized account access to an enterprise computing device.
Money transfer by use of a payment proxy
Described is a technology for facilitating money transfer between a sender and a recipient by use of a payment proxy associated with the recipient. The technology enables a sender, who desires to send cash to a recipient, using an application (e.g., a payment service application, a messaging application, etc.), to specify the recipient by inputting, in a message being created using the application, one or more alphanumeric characters and a monetary currency indicator prefixing the alphanumeric characters (e.g., $alex). The monetary currency indicator operates as a tagging mechanism that indicates to a computer system, receiving the message, to treat the input(s) as a request from the sender to transfer cash, wherein detection of a specified syntax, which includes the alphanumeric character tagged by a monetary currency indicator, triggers a transfer of cash.
Method of performing a financial transaction via unsecured public telecommunication infrastructure and an apparatus for same
An apparatus comprises at least one integrated circuit. The apparatus has a size and shape substantially similar to an ordinary Subscriber Identification Module (SIM) card. The at least one integrated circuit comprises a memory storing first software that, when executed, causes the card to communicate with second software stored on the device. The second software, when executed, causes the device to provide both a SIM and Payment Security Application Module (PSAM) functionality to a user of the device.
Voice activated remittances
A system is provided for voice activated remittances. The system may perform operations that include receiving at least one audio stream corresponding to a real-time voice communication between a first user and a second user and identifying, based on the at least one audio stream, a set of words. The operation may also include determining that the set of words indicates a desired payment transaction between the first user and the second user and determining a payment amount to be remitted from the first user to the second user. Further the operations may include causing the payment amount to be remitted from a first financial account corresponding to the first user to a second financial account corresponding to the second user.
SYSTEMS AND METHODS TO MANAGE MODELS FOR CALL DATA
Systems and methods for managing models for call data are disclosed. For example, the system may include one or more memory units storing instructions and one or more processors configured to execute the instructions to perform operations. The operations may include receiving, from a user device, an input indicating a segment of a first recorded call and an attribute associated with the segment. The operations may include determining a parameter of a model, wherein the model is associated with the attribute. The operations may include changing the parameter based on the input. The operations may include generating an updated model based on the changed parameter, wherein the updated model may be configured to analyze recorded calls having one or more segments with the same attribute.
Money transfer by use of a payment proxy
In certain embodiments, a method includes receiving, at a payment server via an application executing on a device of a user, a request to create a payment proxy identifier. The method includes associating, in a data store maintained by the payment server, the payment proxy identifier to a financial account associated with the user. The method includes generating a personalized interactive element for initiating a transaction to the financial account of the user. The method includes receiving an indication of an intent to transfer a value from a sender to the user. The indication is produced via interaction of a device associated with the sender with the personalized interactive element. The method includes, responsive to receiving the indication, identifying a financial account of the sender and initiating a transfer of the value between the financial account of the user and the financial account of the sender.
Systems and methods to manage models for call data
Systems and methods for managing models for call data are disclosed. For example, the system may include one or more memory units storing instructions and one or more processors configured to execute the instructions to perform operations. The operations may include receiving, from a user device, an input indicating a segment of a first recorded call and an attribute associated with the segment. The operations may include determining a parameter of a model, wherein the model is associated with the attribute. The operations may include changing the parameter based on the input. The operations may include generating an updated model based on the changed parameter, wherein the updated model may be configured to analyze recorded calls having one or more segments with the same attribute.