Patent classifications
G06Q20/4014
Multiple billing computer system identification and payment processing
An interchange computer system includes a billing computer relationship that has a plurality of reference billing computer identifiers and a plurality of reference sensory representations, wherein each reference sensory representation is associated with a respective reference billing computer identifier. A billing identifier receiver receives, from a payment portal computer system, a billing identifier representing a user. A billing identifier transmission module transmits the billing identifier to a plurality of remote billing computer systems at the respective reference billing computer identifiers. A response receiving module receives a positive response from one or more of the billing computer systems. A sensory representation selection module determines select sensory representations for presentation and confirmation by a user at a user computer system connected to the payment portal computer system.
Data-driven partial rescan precision booster
A transaction is identified for a partial rescan security check based at least in part on basket items of the transaction. A total number of rescan items from the basket items is identified for rescan; the total number of rescan items selected for rescan is less than a total number of the basket items in the transaction. Based on the basket items and transaction features for the transaction, item categories or item departments are identified from which the total number of rescan items are to be selected from the basket items for the rescan security check. The total number of rescan items and the item categories for selection are provided to an attendant terminal for the rescan security check. The rescan security check is processed to determine whether the transaction was associated with theft or not associated with theft.
Systems, apparatus and methods for secure electrical communication of biometric personal identification information to validate the identity of an individual
An apparatus for validating an identity of an individual based on biometrics includes a memory and a processor operatively coupled to a distributed database and the memory. The processor is configured to provide biometric data as an input to a predefined hash function to obtain a first biometric hash value. The processor is configured to obtain, using a first pointer to the distributed database, a signed second biometric hash value. The processor is configured to define a certification of the biometric data in response to verifying that a signature of the signed second biometric hash value is associated with the compute device and verifying that the first biometric hash value corresponds with the second biometric hash value. The processor is configured to digitally sign the certification using a private key associated with the processor to produce a signed biometric certification and store the signed biometric certification in the distributed database.
SYSTEMS AND METHODS FOR DYNAMIC PASSPHRASES
A technical validation mechanism is described that includes the use of facial feature recognition and tokenization technology operating in combination with machine learning models can be used such that specific facial or auditory characteristics of how an originating script is effectuated can be used to train the machine learning models, which can then be used to validate a video or a particular dynamically generated passphrase by comparing overlapping phonemes or phoneme transitions between the originating script and the dynamically generated passphrase.
STREAMLINE BANKING
A streamline banking system includes a customer kiosk having a photographic element and a processor. The processor is programmed to capture an image with the photographic element and determine that the captured image comprises an image of a machine-readable code. The processor decodes the machine-readable code and extracts customer financial account data therefrom. The customer financial account data is associated with one or more financial institutions. The processor retrieves information associated with one or more financial product offerings offered by the financial institutions. Each of the financial institutions is presented to a customer along with the respective financial accounts and the respective financial product offerings. The customer selects one or more of the financial accounts and the financial product offerings. The customer kiosk then transmits to the customer service computing system the customer selection.
Multi-factor authentication providing a credential via a contactless card for secure messaging
Exemplary embodiments may use a contactless card as a secondary form of authentication in a multi-factor authentication for a secure messaging service. The recipient party of a request to initiate a messaging service session (such as a server computing device) may be programmed to use the phone number of the originating device to look up records regarding an identity of a party and their associated phone number as a primary credential and then may require an authentication credential originating from the contactless card as a secondary credential for the initiating party. In some instances, the credential originating from the contactless card is a onetime password that is valid only for a period of time. The recipient party determines whether the onetime password is valid. If both credentials are valid, a secure messaging session may be initiated with the initiating party.
TECHNIQUES TO IMPROVE FRAUD DETECTION AT FINANCIAL TERMINALS
Techniques to improve fraud detection for financial institutions maintaining a network of financial terminals. These techniques are applicable towards identifying instances of multiple account usage with at least one of the financial terminals. Example financial terminals known as Automated Teller Machines (ATMs) capture image data whenever a visitor initiates a financial service (and/or receives something of value) and leverage the techniques described herein to determine whether the visitor is engaged in multiple account usage. Such multiple account usage may occur when the visitor withdraws cash against two different accounts. These techniques are further applicable towards securing the two different accounts from misappropriation.
DATABASE WITH DIMENSIONAL BALANCES UPDATING
In an example embodiment, a method for updating a database with dimensional balancing comprises receiving a transaction request to transfer a portion of a first balance from the first balance to a second balance; determining a subset of the first balance less than or equal to the portion in the first balance compliant with dimensional rules based on one or more attributes of the subset and an identifier of an account holding the second balance; moving the determined subset from the first balance to the second balance; and updating attributes of the moved subset in the second balance.
METHOD FOR VIRTUAL ASSET TRANSMISSION
Disclosed is a method for use in a virtual asset transmission from a sender having a sending account at a sending virtual asset service provider (sending VASP) to a recipient having a receiving account at a receiving virtual asset service provider (receiving VASP). The method involves sending, to the receiving VASP, a first request for verifying the receiving account of the recipient at the receiving VASP; receiving, from the receiving VASP, a verification result confirming that the receiving account of the recipient at the receiving VASP is valid; subsequently receiving, from the sending VASP, a second request for verifying a blockchain record for a transmission of a virtual asset from the sender to the recipient; upon receipt of the second request, determining if the transmission has been recorded on a blockchain network; and upon determining that the transmission has been recorded on the blockchain network, sending, to the receiving VASP, a third request to update the receiving account of the recipient at the receiving VASP about the transmission of the virtual asset from the sender to the recipient.
Proactive listening bot-plus person advice chaining
A pervasive user experience capable of integrating robo-advising with human advising is discussed. Conversations and other inputs may be actively captured to identify issues with which the system may be able to assist. Inputs from multiple conversations separated in time may be correlated to identify relevant needs and goals. Recommendations and strategies may be developed and presented to the customer. When it is determined that human advising is appropriate for one or more issues, the customer may be connected to an advisor for assistance with particular issues. Transitions may be facilitated to allow customers to more efficiently return to robo-advising until human advising is again deemed appropriate.