G06Q50/265

PROVIDING VIDEO EVIDENCE
20230229799 · 2023-07-20 · ·

An example operation may include one or more of querying, by a transport, a plurality of transports within a range of an accident location, receiving, by the transport, agreements to access profiles of the plurality of transports on a storage, and responsive to the profiles containing video data associated with the accident location, linking the video data to a profile of the transport.

Probabilistic feature engineering technique for anomaly detection

A computerized-method for generating a dataset for a Machine Learning (ML) model for an increased accurate financial crime detection from an initiation stage of the ML model implementation. The computerized-method includes: retrieval of financial transaction records from a database of financial transaction records to arrange a dataset of financial transaction records, according to preconfigured techniques. Then, processing the records in the dataset; Then, operating feature engineering on preselected anomalous related features to yield probabilistic categorical features and to yield probabilistic numerical features, and then combining the probabilistic categorical features with the probabilistic numerical features to generate a complex features dataset, and providing the probabilistic categorical features, the probabilistic numerical features and the complex features dataset to an ML model, thus, increasing accuracy of detection that is performed right from an initiation stage of the ML model implementation.

SYSTEM AND METHOD FOR DELIVERY AND RECEIPT OF ELECTRONIC COMMUNICATIONS
20230018003 · 2023-01-19 · ·

A system for sending one or more electronic messages to one or more intended recipients each having access to an electronic communication device is provided. The electronic messages include a predefined address format and the one or more intended recipients are associated with one or more fixed geographic locations. The system includes a sender user interface operable to enable a sender to create and send one or more electronic messages to one or more predefined message addresses. The system further includes a computer processor in communication with the sender user interface and configured to resolve the one or more predefined addresses with respective associated fixed geographic locations, and forward the one or more electronic messages to one or more electronic message accounts associated with the one or more predefined addresses. Further, one or more recipient user interfaces are operable to enable intended recipients, associated with one or more fixed geographic locations, to access the one or more electronic messages sent to the message accounts associated with the recipient's fixed geographic location.

Integration of workflow with digital ID

The present disclosure involves systems, software, and computer implemented methods for performing identity validation using a digital ID shared and trusted among a coalition of institutions. One example method includes receiving, via a communications module and from a first consortium member system, a set of input credentials from a first consortium member system associated with an operation, where the set of input credentials is associated with a user. A digital ID is identified corresponding to the set of input credentials and the first user, wherein each digital ID uniquely identifies a particular user and corresponds to at least one user account associated with other consortium member systems in a trusted consortium network. Using the other user accounts, additional user account information associated with the user is obtained and used in a verification operation.

TEXT CLASSIFICATION METHOD, ELECTRONIC DEVICE AND COMPUTER-READABLE STORAGE MEDIUM
20230015054 · 2023-01-19 ·

Provided are a text classification method, an electronic device, and a computer-readable storage medium. The method includes acquiring the to-be-tested text; detecting a sensitive word through an AC automaton to determine whether the to-be-tested text contains the sensitive word; and in response to a determination result that the to-be-tested text contains the sensitive word, determining the text category of the to-be-tested text based on the sensitive word contained in the to-be-tested text.

Systems and methods for provisioning funding card numbers to third party wallets

Systems, methods, and devices for provisioning funding card numbers to merchant wallets are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for provisioning funding card numbers to third party wallets may include: (1) authenticating a customer using an electronic device; (2) redirecting the customer to a third-party website; (3) receiving, from the third-party website and via a first API, a request for funding primary account numbers (FPANs) associated with the customer; (4) providing the third-party website with a plurality of FPAN identifiers for FPANs associated with the customer; (5) receiving, from the third-party website and via a second API, a request for a FPAN associated with a selected FPAN identifier; (6) encrypting the FPAN associated with the selected FPAN identifier; and (7) communicating the encrypted FPAN to the third-party website.

Systems and methods for detecting fraudulent requests on client accounts

A method for detecting a fraud attempt in a communication session may include receiving, via at least one processor, a set of data associated with a communication session between a representative of an organization and a user, tagging, via the at least one processor, one or more items of the set of data as one or more tagged data items, applying, via the at least one processor, a fraud detecting algorithm to the one or more tagged data items to determine a percent likelihood of the user attempting to defraud the representative, generating, via the at least one processor, a visualization based on the percent likelihood, and displaying, via the at least one processor, the visualization via an electronic display during the communication session.

Adaptive validation and remediation systems and methods for credential fraud

Techniques for adaptive validation and remediation are described. In some embodiments, the method includes determining, for a plurality of media service accounts, corresponding fraud suspicion values based on a model. The method also includes identifying a plurality of suspected accounts based on the corresponding fraud suspicion values. The method additionally includes identifying one or more suspected devices and predicting a likelihood of account takeover from each of the one or more suspected devices. The method further includes detecting a triggering event from a device of the one or more suspected devices associated with an account. The method additionally includes executing a validation and/or remediation procedure based on a trigger sensitivity value associated with the triggering event, a respective likelihood of account takeover from the device associated with the account, a respective device risk value associated with the device, and a respective fraud suspicion value associated with the account.

Systems and methods for biometric tamper detection

Various embodiments provide systems and methods for detecting tampering with a monitoring device using biometric data.

USER INTERFACE FOR FRAUD ALERT MANAGEMENT
20230224403 · 2023-07-13 ·

A system for a graphical user interface for fraud detection for a call center system includes a processor and a visual display in communication with the processor. The processor causes the visual display to present an identifier corresponding to a communication received; a graphical representation of a threat risk associated with the identifier; a numeric score associated with the threat risk, wherein the numeric score is a weighted score based on a plurality of predetermined factors updated substantially continuously.