G06Q20/4016

Virtual Account Use

Virtual account use in an online marketplace is described. Listings published to a multitude of client devices by the online marketplace include a first listing for a first item and a second listing for a second item. The first item is listed by a first user account and the second item is listed by a second user account. In connection with a third user account purchasing the first item, the online marketplace provides a first monetary compensation to the first user account from the third user account by updating a balance of a virtual account of the first user account to include the first monetary compensation. In connection with the first user account purchasing the second item via the second listing, the online marketplace provides at least a portion of the balance to the second user account directly from the virtual account as second monetary compensation.

Method, system, and computer program product for identifying a malicious user

A method, system, and computer program product for identifying a malicious user obtain a plurality of service requests for a service provided by a processing system, each service request of the plurality of service requests being associated with a requesting user and a requesting system, and a plurality of service responses associated with the plurality of service requests, each service response of the plurality of service responses being associated with the processing system; and identify the requesting user as malicious based on the plurality of service requests and the plurality of service responses.

Security and fraud prevention techniques based on detection of a transaction card in an image

In some implementations, a transaction card security system may detect a transaction card in an image, and may perform image processing to identify one or more character sequences or one or more designs that appear on the transaction card. The one or more character sequences or the one or more designs may identify an institution associated with the transaction card and/or a cardholder associated with the transaction card. The transaction card security system may identify the institution or the cardholder associated with the transaction card based on the one or more character sequences or the one or more designs, and may perform one or more actions relating to security of the transaction card based on detecting the transaction card in the image and identifying the institution or the cardholder associated with the transaction card.

Payment transaction authentication system and method
11593773 · 2023-02-28 · ·

This disclosure describes, in part, techniques for validating a money transfer request between a sender and a recipient via challenge questions. For instance, the method includes determining, by a payment service system, a level of risk associated with the money transfer request between the sender and the recipient; in response the level of risk being higher than a threshold, obtaining a query for the recipient, wherein the query is based at least on the current money transfer request or one or more past requests between the sender and recipient; receiving, from the recipient device, a response to the query; and validating the current payment transaction based on the response.

Computer-based systems configured to utilize predictive machine learning techniques to define software objects and methods of use thereof

At least some embodiments are directed to a prediction system of software objects. The prediction system predicts a first aspect of a user profile utilizing a categorization machine learning model and a user activity profile, the user profile and the user activity profile are associated with a user. The user activity profile comprises a plurality of values associated with demographics and historical activity data of the user. The prediction system predicts a software object associated with the user profile utilizing an optimization machine learning model, the first aspect of the user profile, and a second aspect of the user profile. The software object is optimized with respect to at least one competitive interest between the user associated with the user profile and an entity associated with the software object. The prediction system outputs the software object to a client computing device of the user.

System and method for a new prescription scan

A method and system may provide a new prescription order interface which allows a customer to order one or more new prescription medications in a quick and easy manner from a remote location using a computer or mobile device. The customer provides a new paper prescription image that includes the prescription data for a pharmacy to fill the new prescription order. The new paper prescription image is received by a server and a default pickup store and a default pickup time are determined. The server also determines whether there is a high risk that the new prescription order is fraudulent by comparing a signature in the new paper prescription image to stored signatures associated with the prescriber, and comparing distances between the locations of the customer's web-enabled device, the pharmacy, and the prescriber. The system may be accessed through a series of web pages and/or via an application.

System and method employing virtual ledger

A system, method and computer program product for open innovation including an asset valuation device receiving asset information about tangible or non-tangible assets, and generating a valuation signal, based on the asset information; a self-executing code device receiving the valuation signal, and generating a self-executing code signal, based on the valuation signal; an air router device having both a low band radio channel, and an internet router channel for redundant internet communications, and a malicious code removal device for scrubbing malicious code from data received, receiving the valuation signal, and generating a node voting request signal, based on the valuation signal; and a mesh network having a plurality of node devices receiving the node voting request signal, and generating vote confirmation signals, based on the node voting request signal. Computing devices are connected to the node devices to perform problem solving, smart contract processing, and/or cryptocurrency mining.

Illicit proceeds tracking system

A computerized method produces an identity code to identify each subject stored in the computer systems connected to a computer network while protecting the privacy and confidentiality of the subject. A central computer system receives an identity code of a suspect of a financial crime and sends the identity code to all computer systems connected to the computer network. The computer systems that have the matched identity code send the requested information to the central computer system. As a result, law enforcement organizations can eliminate crimes and financial institutions can recover the money stolen from them. In addition, law enforcement organizations and financial institutions can identify money launderers that are missed by their anti-money laundering transactional monitoring systems.

Rule engine optimization via parallel execution

A first graph that includes a plurality of containers is accessed. The containers each contain one or more rules that each have corresponding computer code. The containers are configured for sequential execution by a rule engine. The computer code corresponding to the one or more rules in each of the containers is electronically scanned. Based on the electronic scan, an interdependency among the rules is determined. Based on the determined interdependency, a second graph is generated. The second graph includes all of the rules of the containers, but not the containers themselves. At least some of the rules are configured for parallel execution by the rule engine.

Systems and methods for hybrid blockchain control
11595406 · 2023-02-28 · ·

Various embodiments of the present application are directed towards systems and methods for hybrid blockchain control. According to some embodiments a method for hybrid blockchain control, an update to a distributed blockchain is received from a blockchain system. The blockchain system includes multiple nodes individually storing copies of the distributed blockchain and individually updating the copies by a consensus process. A determination is made as to whether the distributed blockchain has been fraudulently modified based on the received update. In response to determining the distributed blockchain has been fraudulently modified: 1) a corrective block is disseminated to the blockchain system to trigger the consensus process on the nodes; and 2) a predefined override in the consensus process is invoked to update the copies of the distributed blockchain in a manner that bypasses an illegitimate block. Further, the predefined override is invoked while the consensus process processes the corrective block.