Patent classifications
G06Q20/4014
SYSTEMS AND METHODS FOR PROACTIVELY PREEMPTING/MITIGATING AXIETY-RELATED BEHAVIORS AND ASSOCIATED ISSUES/EVENTS
Exemplary embodiments are disclosed of systems and methods for proactively preempting/mitigating anxiety-related behaviors and associated issues/events.
DYNAMIC VALUE APPENDED TO COOKIE DATA FOR FRAUD DETECTION AND STEP-UP AUTHENTICATION
There are provided systems and methods for a dynamic value appended to cookie data for fraud detection and step-up authentication. A service provider, such as an electronic transaction processor for digital transactions, may utilize computer cookies for authentication and/or login for a user account. In order to further secure cookies from being compromised and used by malicious parties for fraudulent account access, the service provider may add or append a dynamic value that changes at each subsequent login to the computer cookie. The dynamic value may be used so that if a computer cookie is misappropriated, only one device may use the cookie once without the cookie updating and invalidating the cookie with another device or application on the device. Thereafter, when a login is requested, the dynamic value is matched to an expected value by the service provider when determining whether to authenticate the device.
Authentication decision engine for real-time resource transfer
Systems, computer program products, and methods are described herein for authentication decision engine for real-time resource transfer. The present invention is configured to electronically receive, from a computing device associated with a user, a resource distribution request at a first time; generate a notification on a computing device associated with a resource distribution source; dynamically generate a first resource authentication code based on at least the resource distribution request; transmit control signals configured to cause the computing device associated with the user to display the first resource authentication code to the user; dynamically generate a second resource authentication code based on at least the resource distribution request; transmit control signals configured to cause the computing device associated with the resource distribution source to display the second resource authentication code to the resource distribution source; initiate an execution of the resource distribution request at a second time
SECURE RESOURCE MANAGEMENT TO PREVENT FRAUDULENT RESOURCE ACCESS
Systems and methods for secure resource management are provided. A secure resource management system includes a resource record repository, such as a secure database or a blockchain, for storing resource records for resources. The resource records contain information of resource providers, information of resource users having a right to obtain resources, and resource transaction histories. Responsive to a request to verify an authorized user of a resource, the secure resource management system further queries the resource record repository, retrieves the resource record, determines the resource user currently having a right to obtain the resource as the authorized user of the resource, and transmits the verification result in response to the request. The verification result identifies the authorized user of the resource and can be used to grant access to the resource by the authorized user.
ELECTRONIC SYSTEM FOR AUTOMATICALLY GENERATING RESOURCE DISTRIBUTIONS BASED ON SMS-BASED INSTRUCTIONS USING MACHINE LEARNING
Systems, computer program products, and methods are described herein for automatically generating resource distributions. The present invention may be configured to receive a text-based instruction and parse, using a machine learning model, the text-based instruction to generate a structured resource distribution including predicted distribution elements. The present invention may be configured to generate, based on the structured resource distribution, a resource distribution. In some embodiments, the text-based instruction may include an email message, an SMS message, recorded speech converted to text, text input to a chat function, text recognized in an image, and/or the like.
Provisioning credentials on multiple electronic devices
This application relates to re-provisioning of credentials, such as payment credentials, on a second electronic device from one or more credentials previously provisioned on a first electronic device. The one or more previously provisioned credentials may be stored on an external storage system and may be retrieved by the second electronic device for re-provisioning. The second electronic device may re-provision an instance of the one or more retrieved credentials for use in electronic transactions on the second electronic device using a secure element linked to the second electronic device and information that is unique to the one or more credentials being re-provisioned to the second electronic device.
Predictive inventory management
In one embodiment, a method includes receiving a request from a user computing device associated with a user for one or more items from an in-vehicle vending apparatus during a ride. The method also includes sending information associated with the user to start a vending session using the in-vehicle vending apparatus. The method also includes receiving an indication that the user associated with the user computer device accessed the in-vehicle vending apparatus. The method also includes determining that the user associated with the user computing device is the only user associated with the ride, determining that the user associated with the user computing device is one of a plurality of users associated with the ride, or determining that the user associated with the user computing device is associated with the in-vehicle vending apparatus.
Apparatus, computer program and method of tracing events in a communications network
An apparatus for storing a set of events, is provided, the apparatus comprising one or more circuitry configured to: receive an electronic message comprising information of a first event between a first party and a second party, the first event being initiated by the first party; determine whether a record of the first event exists in a first storage unit; wherein when it is determined that the record of the first event does not exist, the one or more circuitry is configured to: determine whether any subsequent events between the second party and a third party are initiated by the second party within a predetermined time of the first event; and store an association between the second party and a first set of events, the first set of events comprising the first event and the subsequent event, in a second storage unit, when the subsequent event is initiated within the predetermined time.
Systems and methods for digital identity verification
Systems and methods for digital identity verification are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for digital identify verification may include: (1) receiving, from a user electronic device or at a website, an image of an identity document for a user, the identity document comprising an image of the user; (2) processing the identity document with at least one business-specific rule; (3) extracting identity information from the identity document; (4) determining a match rate of the image of the user on the identity document to a captured image; (5) assigning a verification score to the user based on extracted identity information and the match rate; and (6) publishing the verification score to at least one system.
Self-service modular drop safes with messenger access capability
Novel modular smart management devices in the form of drop safes include the modular components of a chassis, door and technology cabinet. The drop safes enable retailers to make cash deposits quickly and safely within or near their own facilities. Various technology, including RFID readers, RFID tags, and other equipment allow the drop safes to identify each deposited bag. Employees utilize specialized apps on their mobile devices to facilitate deposit creation and other tasks. Novel methodologies for accessing the drop safes for emptying employ single-use, time-expiration type authorization codes along with other security measures to minimize risk and to provide other benefits. Novel structures along with methodologies for replacing, on-site, modular components with auto-detection of functionality during initialization and re-initialization enables for efficient replacement and upgrading of components, including the upgrading of safes to provide additional functionality.