G06Q20/4014

Authentication circle management

An approach for establishing and managing authentication circles is disclosed. The circles may be used to facilitate management of accounts, goals, or resources of one or more entities, or to provide an integrated view of the circumstances of, for example, family members or other interrelated persons. A person receiving assistance with the management of one or more accounts need not disclose authentication credentials to persons helping manage the accounts, enhancing security. Members may view members and access accounts administered by separate computing systems without needing credentials for each member, account, and/or computing system. The multiple accounts (which may be held at multiple institutions) need not be accessed individually by each member of the authentication circle, saving time and computing resources of users.

Replacing a customer card payment with a one-time loan at a point of sale
11379821 · 2022-07-05 · ·

A system and method for replacing a customer's debit card payment with a one-time loan at a point of sale (POS) is disclosed. The method receives, at a POS, a debit card input from a customer to be used as a transaction payment. The POS obtains, from the debit card input, identification information for the customer. A total monetary amount of the transaction payment and the identification information is provided to a one-time loan provider's computer system. The one-time loan provider's system uses the customer identification information to perform a credit screening for the total monetary amount of the transaction payment. The one-time loan provider's system provides to the POS a one-time loan offer for the customer. The one-time loan offer to be used in place of the debit card input to make the transaction payment.

System and method for generating a recommendation

A method of generating recommendations for a collective profile, the collective profile being linked to a first profile and a second profile. The method may include authenticating a login request from an end user device in association with the collective profile based on credentials associated with the first profile, identifying a query from among a plurality of queries and transmit the query to the end user device, receiving a response to the query, determining that the response is not inconsistent with one or more earlier responses received in association with the second profile and, in response, refining at least one attribute or goal in the collective profile based on the response to generate and store a refined collective profile, and determining whether the refined collective profile results in a new recommendation and, if so, outputting the new recommendation.

USER INTERFACES FOR SHARING AN ACCOUNT WITH ANOTHER USER IDENTITY

The present disclosure generally relates to displaying a user interface for sharing an account associated with a first user identity with a second user identity. The user interface includes a first sharing option and a second sharing option. One or more inputs corresponding to a request to share the account are detected. If the one or more inputs include a selection of the first sharing option, a request to invite the second user identity to become a joint owner of the account is transmitted. If the one or more inputs include a selection of the second sharing option, a request to invite the second user identity to become a participant of the account without becoming a joint owner of the account is transmitted.

System and method for third-party food and dining ordering control
11403611 · 2022-08-02 · ·

A system and method for third-party food and dining ordering control, comprising at least one device capable of accessing the internet which may be a mobile device or personal computing device such as a laptop or desktop, a web application, and a point-of-sale system at a restaurant or retailer, wherein users of the web application may deposit funds into an account and set regulations on what they may purchase with the deposited funds, or have an administrator set up an account for them such as a parent setting up an account for a child or a doctor setting up an account for a patient, allowing the parent or doctor or other administrator to regulate what the sub-user such as the child or patient may purchase, in keeping with budget, diet, and lifestyle restrictions, and which may utilize zero-step authentication to allow for seamless use of the service at certain establishments.

Techniques to improve fraud detection at financial terminals

Techniques to improve fraud detection for financial institutions maintaining a network of financial terminals. These techniques are applicable towards identifying instances of multiple account usage with at least one of the financial terminals. Example financial terminals known as Automated Teller Machines (ATMs) capture image data whenever a visitor initiates a financial service (and/or receives something of value) and leverage the techniques described herein to determine whether the visitor is engaged in multiple account usage. Such multiple account usage may occur when the visitor withdraws cash against two different accounts. These techniques are further applicable towards securing the two different accounts from misappropriation.

Efficient transaction reconciliation system
11410167 · 2022-08-09 · ·

A system includes a first module that asynchronously communicates with a second module. The first module processes a set of digital transactions and transmits instructions for the second module to process the same set of digital transactions. The first module maintains a first aggregated hash value corresponding to the set of digital transactions that have been processed. The first aggregated has value is calculated using a commutative and associative hash function. The second module maintains a second aggregated hash value corresponding to a second set of digital transactions processed by the second module. The first and second aggregated hash values are compared to determine the second module processed the same digital transactions as the first module.

Utilizing a time-dependent graph convolutional neural network for fraudulent transaction identification

The present disclosure relates to utilizing a graph convolutional neural network to generate similarity probabilities between pairs of digital identities associated with digital transactions based on time dependencies for use in identifying fraudulent transactions. For example, the disclosed systems can generate a transaction graph that includes nodes corresponding to digital identities. The disclosed systems can utilize a time-dependent graph convolutional neural network to generate node embeddings for the nodes based on the edge connections of the transaction graph. Further, the disclosed systems can utilize the node embeddings to determine whether a digital identity is associated with a fraudulent transaction.

Automated data processing system

A method is disclosed. The method includes transmitting a verification request message comprising one or more personal data elements associated with a user and a target account identifier to an authorizing entity computer. The method includes receiving a verification response message comprising a verification result from the authorizing entity computer. Lastly, the method includes transmitting a credit transaction message comprising a source account identifier and an amount to the authorizing entity computer, which credits an account of the user with the amount.

Systems and methods for establishing, using, and recovering universal digital identifiers

Disclosed herein are systems and methods for establishing, using, and recovering universal digital identifiers. In an embodiment, a system establishes a universal identifier (ID) associated with a user and a device of the user. The universal ID is universal with respect to a plurality of distinct entities, has at least a suspended state and an unsuspended state, and initially is in the unsuspended state. The system transmits the universal ID to the device of the user. Thereafter, the system detects an ID-suspension event in connection with the universal ID, and responsively suspends the universal ID, including placing the universal ID in the suspended state. After suspending the universal ID, the system completes an ID-recovery process for the universal ID, and responsively unsuspends the universal ID, including placing the universal ID in the unsuspended state.