G06Q20/4015

Interleaved sequence recurrent neural networks for fraud detection

A process for handling interleaved sequences using RNNs includes receiving data of a first transaction, retrieving a first state (e.g., a default or a saved RNN state for an entity associated with the first transaction), and determining a new second state and a prediction result using the first state and an input data based on the first transaction. The process includes updating the saved RNN state for the entity to be the second state. The process includes receiving data of a second transaction, where the second transaction is associated with the same entity as the first transaction. The process unloops an RNN associated with the saved RNN state including by: retrieving the second state, determining a new third state and a prediction result using the second state and an input data based the second transaction, and updating the saved RNN state for the entity to be the third state.

Automated data tokenization through networked sensors
11989717 · 2024-05-21 · ·

There are provided systems and methods for automated data tokenization through networked sensors. A network of data sensors may detect that a user is likely to engage in electronic transaction processing with a merchant device, for example, based on an action performed by the user and/or with a user device. One or more of the sensors may connect with the user's device and retrieve financial data from the device and/or data necessary to issue a token to the device for transaction processing. The sensor may perform a background process to issue the token to the device, and once onboarded, may store the token to the user's device and/or the merchant device that the user is likely to interact with for transaction processing. The token may be limited in use by location and/or amount, or may be used to fully onboard the user with the token service provider.

Shopping basket monitoring using computer vision

A system for monitoring shopping carts uses cameras to generate images of the carts moving in a store. In some implementations, cameras may additionally or alternatively be mounted to the shopping carts and configured to image cart contents. The system may use the collected image data, and/or other types of sensor data (such as the store location at which an item was added to the basket), to classify items detected in the shopping carts. For example, a trained machine learning model may classify item in a cart as non-merchandise, high theft risk merchandise, electronics merchandise, etc. When a shopping cart approaches a store exit without any indication of an associated payment transaction, the system may use the associated item classification data, optionally in combination with other data such as cart path data, to determine whether to execute an anti-theft action, such as locking a cart wheel or activating a store alarm. The system may also compare the classifications of cart contents to payment transaction records (or summaries thereof) to, e.g., detect underpayment events.

Control apparatus, electric power supply apparatus, working machine, management apparatus, control method, management method, and computer-readable recording medium
11984626 · 2024-05-14 · ·

A control apparatus controls an electric power supply apparatus configured to supply electric power to a working machine. The electric power supply apparatus is provided with a fuel cell. The control apparatus is provided with a restriction request acquisition unit configured to acquire a restriction request for requesting restriction of the supply of the electric power via a communication network, and a restriction unit configured to restrict the supply of the electric power in a case where the restriction request acquisition unit acquires the restriction request. The control apparatus may be provided with an end detection unit configured to detect end of use of the working machine. The restriction unit may decide to start the restriction in a case where, after the restriction request acquisition unit acquires the restriction request, the end detection unit detects the end of the use of the working machine.

Location modeling using transaction data for validation

Location modeling may be generated for candidate locations based on validated location data. The location models for candidate locations may be based on validated location data associated with wireless access points that is validated using transaction data. Such validation may include comparing an identifier associated with candidate location data received from a client device to an identifier for a transaction account associated with a transaction from transaction data at a candidate location. Matching transaction data and candidate location data may generate validated location data to be used in generating location models for candidate locations.

METHOD AND SYSTEM FOR LOCATION-BASED TRANSACTIONS
20240152896 · 2024-05-09 · ·

A method, system, and computer-readable storage medium for implementing a location-based electronic transaction service are provided. The method includes: receiving a request for a first electronic transaction associated with a first transaction account; obtaining a geographic location associated with the request; transmitting a query for an identification of transaction accounts that are registered to conduct location-based electronic transactions at the geographic location; receiving the identification of transaction accounts; and utilizing the transaction account database to determine whether the first transaction account is registered to conduct the location-based electronic transactions. When the first transaction account is registered to conduct the location-based electronic transactions, the method further includes: retrieving, from a transaction history database, a first transaction history of the requester; and utilizing the first transaction history to suggest a third transaction account and proposed details of the first electronic transaction.

INTERCEPTING AND CONTROLLING AN ENTITY INTERACTION
20240152882 · 2024-05-09 · ·

A system can receive, from an entity device associated with a first entity, a threshold value that indicates an entity preference relating to an interaction type. The system can intercept a pending interaction before the pending interaction is executed. The pending interaction can originate from an interaction terminal configured to facilitate transfer of an electronic resource to a second entity. The pending interaction can include an interaction value of the pending interaction, information about the first entity, and information about the second entity. The system can determine whether the interaction value is consistent with the entity preference. The system can provide a result of a comparison between the interaction value and the threshold value. The system can control, based on the comparison between the interaction value and the threshold value, access of the pending interaction to the electronic resource.

SYSTEMS AND METHODS TO ADJUST A UNIT OF EXPERIENCE BASED ON DIGITAL ASSETS OF USERS

Systems and methods to adjust a unit of experience based on digital assets of users are disclosed. Exemplary implementations may: manage first user information of a first user; receive an authentication request from the first user; determine whether the authentication information input is valid by comparing the authentication information input and first authentication information included in the first user information; determine, responsive to determination that the authentication information input is valid, a set of one or more digital assets that are associated with a first address included in a first digital wallet of the first user based on one or more transactions including the first address and the one or more digital assets of the set; determine a set of one or more entities correlated to the set of the one or more digital assets; determine and effectuate adjustments to the first unit of experience based on the correlated entities.

SYSTEMS AND METHODS FOR GENERATING AND TRANSMITTING DIGITAL PROOFS OF OWNERSHIP FOR PURCHASED PRODUCTS
20240152907 · 2024-05-09 ·

Novel techniques for generating and ascertaining proof of ownership of physical goods employing blockchain-based methodologies. Upon purchase of a physical good, data relevant to that purchase including identification of the purchaser are employed to mint an NFT purchase token that is appended on a block chain and placed within the customer wallet to represent a unique certificate of ownership for the purchased physical good. Transaction fees associated with the process, creation of an electronic wallet, generation of tokens that include sub-tokens for maintaining chain of title information for the good's entire lifetime, among other things also are discussed.

SYSTEMS AND METHODS FOR TRANSLATING A GESTURE TO INITIATE A FINANCIAL TRANSACTION
20240152890 · 2024-05-09 ·

Systems and methods for initiating and/or facilitating a financial transaction in response to detecting and translating a spatial gesture may be provided. A payor transaction device may be capable of detecting, via a motion-detecting device, a payor spatial gesture corresponding to a payment gesture of one or more predetermined spatial gestures and, responsive to detecting the payor spatial gesture, receiving payee account information from a payee transaction device. The payor transaction device may also be capable of transmitting, to a payor computing device, transaction data comprising the payee account information and data indicative of the payor spatial gesture. The payor computing device may be capable of transmitting at least a portion of the transaction data to a financial service provider terminal to enable the financial service provider terminal to facilitate the requested transaction.