G06Q20/4014

System, Method, and Computer Program Product for Generating Synthetic Data

Provided are a method, system, and computer program product for generating synthetic data. The method includes generating a correlation graph of a plurality of data types based on a plurality of correlations. The method also includes generating a directed acyclic graph of the plurality of data types based on the correlation graph. The method further includes traversing the directed acyclic graph to produce a hierarchical graph of the plurality of data types, wherein the hierarchical graph includes a plurality of nodes, and wherein each node of the plurality of nodes is associated with a data type of the plurality of data types. The method further includes generating synthetic training data including a plurality of records of data by repeatedly traversing the hierarchical graph and based on a plurality of sets of values and a plurality of sets of interdependencies.

DATA STRUCTURE FOR EFFICIENTLY VERIFYING DATA
20230015569 · 2023-01-19 ·

A data structure embodied in one or more blockchain transactions has a plurality of nodes, each node embodied as a hash value contained in a blockchain transaction of the one or more blockchain transactions; and a plurality of directional edges plurality of nodes comprises leaf nodes and non-leaf nodes. In a first aspect, at least one of the non-leaf nodes has at least one child leaf node and at least one child non-leaf node, the hash value of the at least one non-leaf node being a hash of a concatenation of the respective hash values of the child leaf node and the child non-leaf node. In a second aspect, a first of the non-leaf nodes has a different number of child nodes than a second of the non-leaf nodes. In a third aspect, a first of the leaf nodes has a different level than a second of the leaf nodes.

Zero-step authentication using wireless-enabled mobile devices
11704656 · 2023-07-18 · ·

A zero-step authentication system and method which uses wireless mobile devices to automatically make payments in a secure manner without requiring the customer to handle his or her mobile device. The system and method uses a payment facilitation device at the business location which automatically detects and recognizes registered mobile devices, displays a photo of the customer to a business employee for identity confirmation, and automatically deducts payments for purchases from a pre-authorized customer account. The customer account is managed by a payment processing server, which stores the customer account data, makes appropriate deductions, sends confirmation of deductions to the customer's mobile device, and automatically refills the customer's account by making pre-authorized charges to the customer's banking institution.

Method, system, and computer program product for automatically providing items based on item preferences

A method for automatically providing items based on an item preference may include receiving payment credential data associated with a payment credential and preference data associated with an item preference of a user, determining whether one or more items associated with the item preference of the user is available, and processing, with at least one processor, a payment transaction involving the one or more items associated with the item preference of the user based on determining that the item is available. A system and a computer program product are also provided.

USER-LINKED PAYMENT METHODS FOR COMPLETION OF AN ONLINE TRANSACTION

A computer-implemented method of providing payment methods for an online transaction includes: receiving an unencrypted shopper identifier credential that is associated with a specific user and is input via a checkout user interface, wherein the checkout user interface is associated with the online transaction and is displayed at a user device; in response to receiving the unencrypted shopper identifier credential, generating a first encrypted shopper identifier credential based on the unencrypted shopper identifier credential; sending a first query that includes the first encrypted shopper identifier credential to a first payment instrument manager, wherein the first query requests an indication that the first encrypted shopper identifier credential is associated with an account for the first payment instrument manager; receiving a response from the first payment instrument manager that includes the indication; and causing the checkout user interface to be modified with a selection field, wherein the selection field is associated with the first payment instrument manager.

Retail HSA funding and payment mechanism

Disclosed herein are system, method, and computer program product embodiments describing the creation and funding of tax-advantaged accounts at a point-of-sale. By immediately funding the tax-advantaged account at the point-of-sale using a funding and payment mechanism, the disclosed embodiments may effectively and instantly fund a tax-advantaged account at a point-of-sale. The funding and payment mechanism overcomes the lapse in availability of funds inherent in legacy systems. Thus, an account holder may then immediately pay a provider from the tax-advantaged account for qualified expenses. The disclosure also presents a credit feature allowing prospective account holders to initially fund the tax-advantaged account. At the point-of-sale, the prospective account holder may link their newly created tax-advantaged account to other accounts, allowing the system to detect potential over-contributions. The disclosure also presents a retroactive analysis feature that analyzes linked accounts to create tax-advantaged transactions in transactions completed earlier in a plan year.

System and method for retail management of controlled substances
11704646 · 2023-07-18 · ·

A method and system for retail management of controlled substances is provided. Controlled substances such as alcohol or cannabis may be sold as products or served at a venue. The process of purchasing the controlled substance, or service of a controlled substance the current venue includes a customer presenting the controlled substance for purchase and providing a customer identifier. The point of sale device at the venue may send an authorization request to a processing server at a remote service, which may reply with an advisory response including information from a customer profile. Optionally, a system and method of retail management of controlled substances provides for a law enforcement system may send an investigation request comprising a vehicle identifier to the processing server, and in response an investigation response may be sent to the law enforcement system may be sent including information from the customer profile.

Networked utility services and vehicle charging stations

Networked utility services handle data-flow in a system to operate electrical vehicle charging stations. In an example, first and second utility companies may operate in first and second respective areas. A user may have a residence in the first area and may have an electric vehicle at a vehicle charging station in the second area. The user may provide identification at the vehicle charging station in the second area, and the user's vehicle may be charged at that location using electricity from the second utility. Data including the user's identification and the electricity consumed in the charging may be sent to the first utility serving the area including the user's residence. The first utility may bill the user for the electricity used to charge the user's vehicle at the remote vehicle charging station. The charging station, both utilities and/or other parties may share in the receipts.

OFFICE OF FOREIGN ASSETS CONTROL (OFAC) COMPLIANCE SYSTEM
20230019588 · 2023-01-19 ·

A computerized method produces an identity code to identify each subject stored in the computer systems connected to a computer network while protecting the privacy and confidentiality of the subject. A central computer system receives an identity code of a suspect of a financial crime and sends the identity code to all computer systems connected to the computer network. The computer systems that have the matched identity code send the requested information to the central computer system. As a result, law enforcement organizations can eliminate crimes and financial institutions can recover the money stolen from them. In addition, law enforcement organizations and financial institutions can identify money launderers that are missed by their anti-money laundering transactional monitoring systems.

Financial messaging transformation-as-a-service

A transformation-as-a-service apparatus, system and method are described, where the transformation converts financial messages from one format to another (such as SWIFT format to ISO 20022 format, etc), storing the original and transformed messages for future access by a token. The transformation service also includes a permissions and access control mechanism for allowing access to the financial messages based on requestor permissions when requested via the token.