G06Q20/4015

TRANSACTION RISK BASED TOKEN
20220129891 · 2022-04-28 ·

Embodiments of the invention provision multiple payment tokens on a communication device. The communication device may be provisioned with multiple limited use keys (LUK), each LUK being associated with a specific type of transaction. When the communication device is used for a transaction, the communication device automatically determines a type of the transaction and selects an appropriate LUK based on the determined transaction type. The selected LUK may be used to create a cryptogram, which can be used to verify the transaction.

SYSTEMS AND METHODS FOR DISTRIBUTING PERSONALLY IDENTIFIABLE INFORMATION ACROSS GEOGRAPHIC BOUNDARIES
20220129899 · 2022-04-28 ·

Systems, methods, and computer-readable storage media configured to facilitate execution of transactions via a money transfer network are disclosed. During execution of the transactions, tokenized identity information may be utilized when exchanging transaction data between geographically distributed nodes of the money transfer network and the transactions are recorded to a distributed ledger maintained by the nodes. Smart contracts may be utilized to digitally sign transactions at various stages of transaction processing, such as at different stages of regulatory compliance validation and to authenticate the validity of the requested transaction (e.g., prevent double-spends). Utilizing tokenized identity information may reduce the likelihood that personally identifiable information (PII data) is obtained by or inadvertently provided to unauthorized third parties or systems. Additionally, the distributed ledger may record information in immutable records, thereby increasing the reliability and trustworthiness (e.g., for auditing purposes) of the data stored on the distributed ledger.

METHODS AND SYSTEMS FOR AUTHENTICATION FOR HIGH-RISK COMMUNICATIONS

An authentication method includes assigning a risk status to a request received from a remote interaction system, transmitting a notification communication to a device associated with the request, monitoring interaction data from an interaction network, and identifying, from the monitored interaction data, authentication interaction information, the authentication interaction information including a coded sequence and a predetermined authentication identifier. The authentication method also includes comparing the coded sequence in the authentication interaction information to an expected coded sequence and transmitting a verification communication after determining the coded sequence in the authentication interaction information matches the expected coded sequence.

TRANSACTION AUTHENTICATION, AUTHORIZATION, AND/OR AUDITING UTILIZING SUBSCRIBER-SPECIFIC BEHAVIORS

Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, using one or more computing devices to receive at a server device coupled to a communications network, a first signal indicating that a subscriber of a mobile device has initiated a transaction. The method may continue with accessing a data store to determine occurrence of one or more deterministic events with respect to the mobile device and accessing the data store to determine one or more behavior norms specific to the subscriber with respect to the mobile device. The method may additionally include generating, by the server coupled to the communications network, a second signal indicating an authorization status of the transaction, the authorization status being dependent on the occurrence of the one or more deterministic events in relation to the one or more behavior norms.

SYSTEM AND METHOD FOR AUTHENTICATION AND FRAUD DETECTION BASED ON IOT ENABLED DEVICES

The invention relates to a customer authentication system that comprises: identifying a customer identification based on a customer input; using the customer identification, identifying a plurality of IoT devices associated with the customer where the customer has an authentication set of IoT devices; receiving a user selection of IoT devices; determining whether the user selection matches the authentication set of IoT devices; connecting to one or more of the user selected IoT devices; transmitting a request to one or more of the user selected IoT devices for user interaction data; and verifying user activity based on the user interaction data.

Multi-Phase Training Techniques for Machine Learning Models Using Weighted Training Data
20220129727 · 2022-04-28 ·

Techniques are disclosed relating to multi-phase training of machine learning models using weighted training data. In some embodiments, a computer system may train a machine learning classification model in at least two phases. During an initial training phase, the computer system may train an initial version of the classification model based on a training dataset, applying equal weight to the training samples in the training dataset. The computer system may then generate model scores for the training samples using the initial version of the classification model. Based on these model scores, the computer system may generate, for the training samples, corresponding weighting values. The computer system may then perform a subsequent training phase to generate an updated version of the classification model, where, during this subsequent training phase, at least some of the training samples are weighted using their respective weighting values.

Network based enforcement of geographical compliance

Improved systems and methods for enhancing the performance of network based computerized content rendering and hosting and providing of devices, systems and/or platforms by modifying the capabilities and providing non-native functionality to such devices, systems and/or platforms through a novel and improved application, networked based enforcement of geographical compliance, data processing and networking framework.

Computer-based systems and methods configured for one or more technological applications for authorizing a credit card for use by a user

A configured application for authorizing a credit card by a user and a method that may include receiving an electronic request to pair a mobile device associated with a user with a credit card of the user. The credit card may include a location tracking circuitry to remotely communicate a location of the credit card to a remote electronic recipient. The location of the credit card may be received by a processor from the remote electronic recipient. A proximity multi-factor authentication may verify that the user is an authorized user of the credit card. The mobile device associated with the user may be paired with the credit card of the user after verifying that the user is the authorized user. The processor may receive the location of the credit card paired with the mobile device from the remote electronic recipient. The location of the credit card may be displayed on a display of the mobile device associated with the user.

Beverage dispenser systems and methods
11311139 · 2022-04-26 · ·

A cartridge adaptor system may include a puncturing device; a nozzle adaptor including: a puncture port configured to receive the puncturing device; a nozzle coupling portion configured to releasably couple to a beverage dispenser nozzle; and a cartridge coupling portion configured to releasably couple to a cartridge containing a beverage ingredient; and a cartridge holster having a receiving portion for receiving a portion of the cartridge. The puncturing device may be configured to puncture the cartridge thereby releasing the beverage ingredient.

System and method for generating notifications based on digital wallet pass data

A server computer system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to receive, via the communications module and from a computing device, a signal including digital wallet pass data; store the digital wallet pass data in association with an account; monitor location data and data associated with a value card account to identify a notification event; responsive to identifying the notification event, generate a notification based on the digital wallet pass data; and send, via the communication module and to the computing device, a signal causing the computing device to display the notification.