G06Q20/4016

Systems and methods for rules-based decisioning of events

Systems and methods for rules-based decisioning of events are disclosed. In one embodiment, a method may include: creating an in-memory cache by parsing stored checkpoints, signals, and rules definitions; receiving a checkpoint request; prioritizing the checkpoint request; preparing a basic context, comprising a limited set of objects, for the checkpoint request; using the in-memory cached definitions, generating at least one of a raw signal, an engineered signal, and a secondary signal for the checkpoint request based on the basic context; using the in-memory cached definitions, executing rules on at least one of the basic context, the raw signal, the engineered signal, and the secondary signal to generate a list of potential decisions; reducing the list of potential decisions to a list of final decisions; publishing the final decisions and supporting data rules and signals execution details; and executing the final decisions.

Transaction-enabled systems and methods for royalty apportionment and stacking

Transaction-enabled systems and methods for royalty apportionment and stacking are disclosed. An example system may include a plurality of royalty generating elements (a royalty stack) each related to a corresponding one or more of a plurality of intellectual property (IP) assets (an aggregate stack of IP). The system may further include a royalty apportionment wrapper to interpret IP licensing terms and apportion royalties to a plurality of owning entities corresponding to the aggregate stack of IP in response to the IP licensing terms and a smart contract wrapper. The smart contract wrapper is configured to access a distributed ledger, interpret an IP description value and IP addition request, to add an IP asset to the aggregate stack of IP, and to adjust the royalty stack.

SYSTEM AND METHOD FOR MANAGING TRANSACTIONS IN DYNAMIC DIGITAL DOCUMENTS
20230045774 · 2023-02-09 · ·

A system software and method which relates to the field of computing technology or business process models or computer systems or distributed computer systems or computer networks relating to general purpose devices that can be programmed to carry out a set of data table or hash table updates, validations or modifications supporting, enabling or executing public and private services, financial transactions and commercial applications. More specifically, the present invention is directed to distributed and decentralized computing in which said distributed network is supported and encrypted by cryptographic technology, hash functions and distributed public or private keys or other related technology. System and methods for managing dynamic electronic documents on a private distributed ledger comprise establishing a dynamic electronic document comprising a first state object, wherein the state object references a prior approved first transaction; proposing a second transaction comprising as an input the first state object and as an output a transaction command to alter the state object as well as what parameters are required to validate the second transaction; validating the proposed second transaction; and updating the state object on a private distributed ledger to reference the second transaction.

SYSTEM AND METHOD FOR PREVENTING SUSPICIOUS TRANSACTIONS IN DISTRIBUTED LEDGER

A system and method for preventing hacking of blockchain is proposed. The system includes a cryptocurrency owner configured to own a cryptocurrency wallet storing a cryptocurrency, a public key, and a private key, and capable of setting monitoring-subjected data and monitoring-excluded data, a hacking countermeasure system configured to check status of the cryptocurrency wallet by being connected to the cryptocurrency owner to receive the cryptocurrency and the public key, invalidate a hacking transaction when the hacking transaction matching the monitoring-subjected data is received, and allow the cryptocurrency to be traded by opening the cryptocurrency wallet with the private key and process transaction details into a block file when a monitoring-excluded transaction matching the monitoring-excluded data is received, and a blockchain network configured to receive the block file from the hacking countermeasure system and duplicate the block file into a plurality of block files to distribute and store each block file.

METHOD, COMPUTER, AND PROGRAM FOR ARTWORK MANAGEMENT
20230044309 · 2023-02-09 ·

An artwork management method executed by one or more computers is provided. The artwork management method includes detecting, by a first computer included in the one or more computers, artwork included in a website, determining, by the first computer, whether or not a purchase transaction indicating purchase of the artwork detected is recorded in a blockchain network, and transmitting, by the first computer, a report indicating discovery of unauthorized use of the artwork, in a case where the first computer determines that the purchase transaction is not recorded. According to one aspect, the artwork management method suppresses illegal use of artwork while maintaining accessibility of the artwork.

METHODS AND SYSTEMS FOR DYNAMIC SPEND POLICY OPTIMIZATION
20230043286 · 2023-02-09 ·

Embodiments provide methods and systems for dynamic spend policy optimization. Method performed by server system includes receiving payment authorization request for payment transaction initiated by cardholder from acquirer. The payment authorization request includes transaction data. The method includes determining spend variables associated with cardholder based on transaction data and identifying at least one cardholder segment from a plurality of cardholder segments based on the spend variables and a clustering model. The at least one cardholder segment is associated with cardholder. The method includes accessing spend policy rules applicable to the payment transaction based on the transaction data and determining optimal spend threshold values corresponding to the spend policy rules applicable to the payment transaction based on the at least one identified cardholder segment and a reinforcement learning (RL) model. The method includes generating spend policy recommendation for cardholder based on the optimal spend threshold values.

INTELLIGENT REAL TIME CARD ALERT SYSTEM TO DETECT SUSPICIOUS CONTACTLESS CARD READER
20230042425 · 2023-02-09 ·

Aspects of the disclosure relate to a smart contactless card to detect real-time suspicious card readers or other fraudulent devices. Prior to a transaction, the smart contactless card detects suspicious card readers or fraudulent devices. An alert may be generated upon detection of any suspicious or fraudulent card reader. In some arrangements, the smart contactless card may utilize machine learning models or machine learning capabilities to detect suspicious card readers. The smart contactless card may pair with other smart contactless cards to detect and alert users to suspicious card readers or other fraudulent devices. The paired smart contactless cards may share information regarding suspicious card readers or fraudulent devices over a semi-autonomous data-sharing network. A vulnerability score may be generated and used to determine if a card reader or other payment device is suspicious.

INTEGRATED FRAUD DETECTION USING LIGHT SENSORS
20230042320 · 2023-02-09 ·

Aspects described herein may allow for detecting fraudulent transaction requests using light sensors on smartcards. A computing device may receive, from a terminal, a request to approve a transaction. The request may comprise a timestamp corresponding to a time when the transaction was requested, a transaction type associated with the transaction, and an identification of a card associated with the transaction. The computing device may also receive, from one or more light sensors associated with the card, light data. The light data indicates an amount of ambient light during a time period when the transaction was requested. The computing device may determine, based on the transaction type, a model of expected ambient light. If the light data corresponds to the model, the computing device may send, based on the determination that the light data corresponds to the model, an approval of the request.

SYSTEM FOR DETERMINING NETWORK MEMBERSHIP
20230039480 · 2023-02-09 ·

Aspects described herein may allow for determining network membership to facilitate detecting fraudulent messages. A computing device may receive, from one or more terminals at a first location, a plurality of interactive messages during a pre-determined time period. Each interactive message may comprise personally identifiable information of a user. The computing device may store a first record and a second record that indicate interactive messages were received from a group of users in temporal proximity to each other at the first location and the second location respectively. The computing device may send a request to confirm users in the subset are members of a network and update a membership list based on a reply received from the user. If further messages are received from devices outside the membership list, an alert may be sent to alert the possibility of a fraudulent message.

System for user authentication
11556932 · 2023-01-17 · ·

A computer-implemented method of authenticating the identity of a user is provided, where the user is associated with a computer signature and is in possession of a cell phone. The method involves obtaining a current geographical location of the cell phone, determining if the computer signature is associated in a database with a stored geographical location of the phone, and, if the computer signature is associated in the database with a stored geographical location, comparing the stored geographical location to the current geographical location of the phone.