Patent classifications
G06Q20/4016
Data structure analytics for real-time recommendations
Techniques and arrangements for analyzing previous tickets of a customer at different merchants—specifying interactions of the customer at the different merchants—to determine subsequent recommendations to send to a particular merchant in real-time when the customer is located at the particular merchant. Other techniques and arrangements facilitate annotation of merchant tickets by the merchants to enrich the data maintained by the tickets and, in some instances, to enhance the described real-time recommendations. Still other techniques and arrangements create a merchant ticket for recording interactions between a merchant and customer upon the customer creating a reservation at the merchant for a specified future time, or being added to a waitlist of the merchant. Upon the customer arriving at the merchant proximate to the specified future time, the merchant may use the created ticket to track items ordered by the merchants, track tenders used to pay for items, and the like.
Systems and methods for identifying errors in transaction messages
A computer-implemented method for identifying errors in transaction messages associated with payment transactions. The method includes a step of receiving a transaction message associated with a financial transaction, whereby the financial transaction originates from a merchant and is processed by an acquirer. The transaction message comprises a plurality of data element fields, with at least one of the data element fields being a merchant identification field used to identify the merchant originating the financial transaction. An additional step includes performing an error-identification routine on the transaction message, with the error-identification routine including analyzing a merchant identification (ID) data element populated in the merchant identification field to determine if the merchant ID data element is not uniquely associated with the merchant. An additional step includes generating an error message indicating that the merchant ID data element is not uniquely associated with the merchant, and transmitting the error message to the acquirer.
Determining subsets of accounts using a model of transactions
A computer system receives a first set of information that describes a set of transactions between pairs of user accounts of a service and a second set of information that specifies attribute values for user accounts of the service that are recipient user accounts within the set of transactions. Using the first set of information and the second set of information, the computer system generates an augmented graph model of the transactions and attribute values. By applying modularity maximization to the augmented graph model, the computer system determines a plurality of subsets of recipient user accounts.
Distributed blockchain-type implementations configured to execute know-your-customer (kyc) verification for MANAGING tokenized digital assets and improved electronic wallets, and methods of use thereof
In some embodiments, the present description provides a distributed blockchain ledger system that includes at least: a first distributed blockchain ledger, configured to storing first cryptographically-secured data representative of a plurality of tokenized assets; a second distributed blockchain ledger, configured to storing second cryptographically-secured data representative of a plurality of transactions related to the plurality of tokenized assets; and a plurality of smart contracts that is configured to self-execute to at least: store the first cryptographically-secured data on the first distributed blockchain ledger, store the second cryptographically-secured data on the second distributed blockchain ledger, and maintain a plurality of digital associations between the first cryptographically-secured data of the first distributed blockchain ledger and the second cryptographically-secured data of the second distributed blockchain ledger.
Graph decomposition for fraudulent transaction analysis
In an embodiment, a process for graph decomposition includes initializing nodes and edges of a data graph for analysis using a computer, and performing message passing between at least a portion of the nodes of the data graph to determine a corresponding measure of interest for each node of at least a portion of the data graph. The process further includes receiving an identification of one or more nodes of interest in the data graph, performing message passing between at least a portion of the nodes of the data graph using at least the determined measures of interest to identify a corresponding subgraph of interest for each of the one or more nodes of interest in the data graph, and performing an analysis action using the one or more identified subgraphs of interest.
System and computer-implemented method for using location data on a card network to detect and address billing fraud
A system and computer-implemented method for detecting and addressing billing fraud by an asserted provider of a good or service based on location data associated with card-based financial transactions by an asserted recipient and collected, stored, analyzed, and acted on by a payment card network to determine and respond to a likelihood of fraud. A computer stores locations of the recipient based on uses of a payment card over a time period, and determines a location of the provider based on location data associated with a card reader at a particular time at which the good or service was allegedly provided. The computer compares the two locations for the particular time and generates a fraud score based on a likelihood that the recipient was physically capable of being at the provider location at the particular time, and based on the score, may notify the recipient and decline the payment request.
System, method, and computer program product for real-time payment gateway event monitoring
Described are a system, method, and computer program product for real-time payment gateway event monitoring. The method includes receiving input data from a merchant system including an application URL associated with a merchant control interface having a web socket programmed and/or configured to persistently listen for HTTP POST messages, and an event of a payment gateway system. The method also includes monitoring ongoing events of the payment gateway system associated with ongoing transaction messages communicated from point-of-sale (POS) devices to the payment gateway system and detecting the event in the ongoing events. The method further includes, in response to detection of the event, generating a HTTP POST message including event data of the event, and communicating the HTTP POST message to the application URL to cause the merchant control interface to display the event data in a chart for visual representation of the event data.
Networked theft prevention and mutli-user synchronization system and method for percussive massage device
A percussive massage device theft prevention system includes a percussive massage device, a command center configured to generate a unique activation code configured to be received by the percussive massage device, and an authentication device configured to be paired with the percussive massage device and provide the activation code to the percussive massage device. The percussive massage device is configured to be paired with the authentication device, receive the authentication code from the authentication device, and activate the percussive massage device for a specified time period.
Identification of behavioral pattern of simulated transaction data
Embodiments can provide a method for identifying a behavioral pattern from simulated transaction data, including: simulating transaction data using a reinforcement learning model; identifying a behavioral pattern from the simulated transaction data; comparing the behavioral pattern with standard customer transaction data to determine whether the behavioral pattern is present in the standard customer transaction data. If the behavioral pattern is present in the standard customer transaction data, the behavioral pattern is applied in a model implemented on the cognitive system. The step of simulating transaction data further includes: providing standard customer transaction data representing a group of customers having similar transaction characteristics as a goal; and performing a plurality of iterations to simulate the standard customer transaction data, wherein the plurality of iterations is performed until a degree of similarity of simulated customer transaction data relative to the standard customer transaction data is higher than a first predefined threshold.
System for impetus resource distribution process confirmation with wearable device integration
Embodiments of the invention are directed to a system, method, or computer program product for integration with a wearable device for impetus resource distribution process confirmation and authentication. In this way, the invention coordinates with a wearable device and resource distribution vehicles of a user. Upon activation of a resource distribution vehicle, the system reviews metrics from the wearable device to identify discrepancies between the real-time metrics and a baseline for the user. The invention triggers tiered confirmation requests for authentication prior to allowing processing of the resource distribution for impetus distribution prevention.