G06Q20/4016

Data storage and management and methods of thereof

Described herein are various methods of sharing data across multiple computers. The method of sharing data permits the pruning of data from the shared data.

Systems and methods for a virtual identity card

According to one example arrangement, a computer implemented method performed by a computing system, includes identifying a user device associated with a user. Authentication information regarding the user indicative of use of the user device is captured. A confidence level for the user is dynamically adjusted based on the authentication information. The confidence level is responsive to the use of the user device by the user.

Methods and systems for generating, subscribing to and processing action plans using a blockchain
11563571 · 2023-01-24 ·

A method and system and computer program product for subscribing to action plans including a processing device for receiving an action plan transaction message having one or more data fields from an analyst node in a blockchain network and generating an action plan transaction in a blockchain including the one or more data fields of the action plan transaction message and a newly generated plan identification. The processing device may transmit an action plan notice to the blockchain network alerting the nodes of the blockchain network of the action plan transaction. The processing device may receive one or more client bids for the action plan transaction, determine a winning client bid of the one or more client bids, generate a winning bid transaction in the blockchain and transmit a winning bid notification to the client node of the winning client bid.

System, Method, and Computer Program Product for Generating Synthetic Data

Provided are a method, system, and computer program product for generating synthetic data. The method includes generating a correlation graph of a plurality of data types based on a plurality of correlations. The method also includes generating a directed acyclic graph of the plurality of data types based on the correlation graph. The method further includes traversing the directed acyclic graph to produce a hierarchical graph of the plurality of data types, wherein the hierarchical graph includes a plurality of nodes, and wherein each node of the plurality of nodes is associated with a data type of the plurality of data types. The method further includes generating synthetic training data including a plurality of records of data by repeatedly traversing the hierarchical graph and based on a plurality of sets of values and a plurality of sets of interdependencies.

Manage remote procedure calls in centralized processing
11704674 · 2023-07-18 · ·

The present solution is generally directed to managing remote procedure calls in centralized processing. In particular, the present solution can reduce the number of remote procedure calls by selecting and applying multiple processing scripts for a single electronic transaction based on a real-time condition.

Virtual currency for managing advertising and content delivery
11704635 · 2023-07-18 · ·

A content delivery platform may deliver program content segments and advertising content segments to multiple user devices. The content delivery platform may deliver a program content segment to a primary user device of a user for presentation on the primary user device. The content delivery platform may retrieve an advertising content segment from an advertising content store for presentation. The advertising content segment is provided by an advertiser that is sponsoring the presentation of the program content segment on the primary user device. The content delivery platform may send the advertising content segment to a secondary user device of the user for presentation at the secondary user device.

METHOD AND SYSTEM FOR RECORDING FORWARD ROYALTIES USING A DISTRIBUTED LEDGER
20230230054 · 2023-07-20 ·

To manage property records using a multi-layered hybrid distributed ledger architecture, identification information for a particular property is obtained and transmitted to at least one participant in a public distributed ledger network for a public distributed ledger layer. Ownership information for the same particular property is obtained and transmitted to at least one participant in a federated distributed ledger network for a federated distributed ledger layer. Transaction-related documents for the same particular property are obtained and transmitted to at least one participant in a private distributed ledger network for a private distributed ledger. The distributed ledger layers are different layers of a property distributed ledger each having a separate set of consensus rules for appending distributed ledger data to the respective layer. This allows for the immutable preservation of royalty terms and conditions for a property or asset using the distributed ledger.

Systems and methods for facilitating network voice authentication

Systems and methods are provided for facilitating voice authentication of a user in connection with a network transaction. One exemplary method includes receiving an authentication request for a transaction, initiated at a voice interactive device, from a merchant plug-in (MPI) associated with a merchant involved in the transaction, where the authentication request includes a pre-authentication indicator based on voice authentication of a user by the voice interactive device or by a voice authentication service. The method also includes generating a risk score for the transaction based at least in part on the pre-authentication indicator, transmitting the risk score with the authentication request for the transaction to an access controller server (ACS) associated with an issuer of an account to which the transaction is directed, and returning a result response to the MPI where the result response indicates permission to proceed in the transaction based on authentication of the user.

Person transaction tracking
11704650 · 2023-07-18 · ·

Images are captured of a customer during a transaction at a transaction terminal along with images associated with items of the transaction and any bags or cart used to hold the items. The images are processed to track any movement and locations of the customer, items, bags, and cart relative to a known location of the transaction terminal. When a transaction payment is required for the transaction and movement is detected in a direction that is moving away from the transaction terminal before a payment notification is received for the transaction, one or more alerts are raised as an indication to staff and/or security systems of a potential in-progress walk-away theft.

FUZZY LOGIC MODELING FOR DETECTION AND PRESENTMENT OF ANOMALOUS MESSAGING
20230231876 · 2023-07-20 · ·

Disclosed is an approach that applies a fuzzy logic model that may involve fuzzy-matching a plurality of address fields to determine a common physical address, and determining a number of communiques directed to that address with reference to a threshold that may determine an excessive number of communiques. The plurality of address fields may also be fuzzy-matched to information in a fraud-risk database which may comprise a fraud-risk address. One or more matches may be presented to a user who may adjust the views of the various matches, track various trends within the data, and harmonize the various address fields relating to a physical address.