G06Q20/407

Systems and methods for proactive call spam/scam protection using network extensions
11540134 · 2022-12-27 · ·

The disclosed computer-implemented method for proactive call spam/scam protection may include intercepting network traffic by the at least one processor employing a network extension feature of an operating system of a computing device. The method may additionally include capturing, by the at least one processor employing the network extension feature, a phone number in the network traffic. The method may also include comparing, by the at least one processor employing the network extension feature, the phone number to a plurality of entries in a spam/scam repository. The method may further include performing, by the at least one processor, a security action in response to the comparison. Various other methods, systems, and computer-readable media are also disclosed.

ARTIFICIAL INTELLIGENCE FOR FINDING DECEPTIVE MERCHANTS IN RECURRING TRANSACTIONS

The disclosure herein relates to AI-based methods and systems of using machine-learning to identify deceptive merchants in payment transactions such as recurring payment transactions. For example, the AI-based systems and methods may train and use an aggregate merchant matcher based on entity matching to identify merchant identifiers and/or acquirers that may be used by a merchant, train and use transaction classifiers to classify transactions as deceptive, recognize merchants based on an N-density aware transaction embedding learned from transaction data, and train and use a merchant classifier to classify merchants as deceptive.

TRANSACTION RECONCILIATION AND DEDUPLICATION

Provided are systems and methods for reconciling transactions from different financial accounts via machine learning. In one example, a method may include storing a data file comprising a plurality of electronic transactions and a plurality of transaction records corresponding to the plurality of electronic transactions in memory, inputting the data file into a first machine learning model and identifying respective transaction attributes of the plurality of transaction records based on the input data file, determining, via execution of a second machine learning model, that a first transaction and a second transaction in the data file correspond to a common transaction based on attributes of the first and second transactions which are identified from respective transactions records of the first and second transactions, and modifying the data file to indicate that the first and second transactions correspond to the common transaction and storing the modified data file in the memory.

SYSTEMS AND METHODS FOR CONTROLLING TRANSFERS OF DIGITAL ASSETS
20220398572 · 2022-12-15 · ·

A computer-implemented method is disclosed. The method includes: receiving a request to transfer a digital asset; appending, to a blockchain of a blockchain network, a transaction for deploying a smart contract for executing a transfer of the digital asset; receiving a first notification of an off-chain transaction in connection with transfer of the digital asset; sending a first transaction to the blockchain for invoking a first function of the smart contract to allow transfer of the digital asset to a destination address; and responsive to detecting a first condition associated with the off-chain transaction, sending a second transaction to the blockchain for invoking a second function of the smart contract for transferring the digital asset to the destination address. Related methods, apparatus, and computer-readable media are also disclosed.

System and method for price matching through receipt capture
11526893 · 2022-12-13 · ·

A system and method for generating a notification of a price change for a transaction and facilitating an associated price adjustment based on electronic image capture of a paper receipt. An image capture system captures an electronic image of a paper transaction receipt, which is transmitted to a data extraction processor that extracts transaction receipt data from the captured electronic image. A unique key is generated by an authentication server that is matched to a transaction record to generate a reliability score for the OCRed image and to authorize price matching. If the price monitoring server identifies that the price of a purchased transaction item has changed, the price monitoring server automatically generates a notification to the user indicating the price change and an email to the customer service department of the merchant from which the transaction item was purchased, requesting a price adjustment that is credited back to the payment instrument.

Systems and methods for distribution item processing

Systems and methods for universal item returns. A universal returns systems allows a user the ability to return an item via a distribution network whether the item was purchased at a retail location, delivered by the distribution network, or delivered by another entity. The universal returns system comprises a user interface a return request. Based on the return request, the system obtains transaction information, provides a return code, and allows scheduling item pick-up.

METHOD AND SYSTEM FOR DETECTING ABNORMAL TRANSACTION BETWEEN COMPUTING DEVICES IN A COMMUNICATION NETWORK USING VALID TRANSACTION PATTERN
20220391912 · 2022-12-08 ·

The described technology relates to a method for detecting abnormal transaction data between computing devices in a communication network using valid transaction patterns and a server for performing the same. In one aspect, the method includes receiving, at a data collection processor, from an institution server computer, a plurality of pieces of transaction data communicated between two or more of the plurality of user devices, and determining, at a data processor, at least one piece of valid transaction data from the plurality of pieces of transaction data. The method may also include generating, at the data collection processor, a valid transaction pattern based on the determined valid transaction data. The method may further include detecting, at an abnormal transaction detection processor, an existence of an abnormal transaction data between two or more of the plurality of user devices based on the generated valid transaction pattern.

AUTOMATED SYSTEMS AND METHODS FOR COPIOUS ELECTRONIC ASSET TRANSFERS
20220391906 · 2022-12-08 ·

An automated payment delivery system is provided that combines electronic investigative data methods with fintech payment systems to deliver payments to payees. The system can be configured to receive payee account information, optionally enrich the payee account information through data discovered in public and private databases, automatically generate unique communications to each payee, verify the identity of the payee, and initiate electronic payment of the payment to the payee.

AUTOMATED SUPPORT FOR FREELANCERS
20220391863 · 2022-12-08 ·

A facility for facilitating payments from a client to a freelancer is described. The facility provides a mobile app enabling the freelancer to open an account and solicit payments by clients. In response, each client can use any of a variety of forms of electronic payments to pay into the account. The freelancer can use a debit card issued for the account to spend or withdraw payments made into the account, and can use the app to track requests for payment, payments, client activity, and spending and withdrawals from the account.

Settlement system, user terminal and method executed thereby, settlement device and method executed thereby, and program
11521192 · 2022-12-06 · ·

A settlement system with higher security which replaces a settlement system using credit cards is provided. The settlement system has a user terminal, a settlement device, and a settlement terminal. First, a user ID, a password, and upper limit amount information identifying an amount are inputted in a user terminal 100 (S912), and sent to the settlement device (S913). The settlement device performs credit determination (S922), generates temporary permission information if credit is possible (S923), and sends the temporary permission information to the user terminal (S924). The user terminal generates a one-time password (S915). The one-time password is inputted to the settlement terminal (S931). If the one-time password sent from the settlement terminal to the settlement device is identical to the one-time password created in the settlement device, the settlement device allows a user's payment (S928).