G06Q20/4016

AGGREGATION AND PROCESSING OF CHECK-BASED PAYMENTS

The present subject matter involves a system and method for producing and processing electronic transactions, including electronic checks, in a secure manner. In various embodiments, a secure server provides an electronic check service that maps payees to participating lockbox service providers and provides electronic payment instructions from the payor to the lockbox service providers to process payments to the payees. In various embodiments, a check is printed to fulfill Check21 Act requirements, electronic images are obtained of front and back of the printed check, and check image pairs are created of the electronic images of the front and back of the printed check. In various embodiments, paper items are processed where the electronic check service does not find an electronic deposit match. In various embodiments, the electronic lockbox files are used in a secure electronic payment platform that assists in the generation of electronic checks.

ONLINE QUERY EXECUTION USING A BIG DATA FRAMEWORK
20230124362 · 2023-04-20 ·

Techniques are disclosed relating to the execution of queries in an online manner. For example, in some embodiments, a server system may include a distributed computing system that, in turn, includes a distributed storage system operable to store transaction data associated with a plurality of users, and a distributed computing engine operable to perform distributed processing jobs based on the transaction data. In various embodiments, the server system preemptively creates a compute session on the distributed computing engine, where the compute session provides access to various functionalities of the distributed computing engine. The distributed computing engine may then use these preemptively created compute sessions to execute queries (e.g., for end users of the server system) against the transaction data and return the results dataset to the requesting users in an online manner.

ADVISOR INTERFACE SYSTEMS AND METHODS

Systems and methods managing interaction between one of a plurality of advisors and a client. Client intent is determined based upon request details indicating a category of interest to the client. One of a plurality of advisors is selected to advise the client based, at least in part, upon the category and the client intent. The client is added to a sales pipeline of the selected advisor, and the selected advisor is prompted, at intervals, to interact with the client. The workload of each advisor is managed. The selected advisor is also prompted to generate and send a curation to the client. The systems and methods also provides e-commerce card fraud protection using conventional transaction processing methodology by including a random code in a pending transaction for the card and finalizing the transaction with the card provider when the code is correctly returned by the client.

Methods for Conditional Transaction Tokens, Secure Sharing of Token Assets, Wallet Spam Protection, and User Interfaces for Acceptance of Terms

Devices can be configured to implement distributed ledgers capable of immutably recording a first set of data and a second set of data of an item, wherein the second set of data is made available by satisfaction of a condition. Such devices can include network interfaces, memory and processors. The processors can be configured to obtain a conditional item. The conditional item includes a first set of data that is available. The conditional item can further include a second set of data that is unavailable. The processor can be further configured to determine whether a condition is satisfied, and when the condition is satisfied perform an evolution to the conditional item.

SYSTEM AND METHOD FOR CONTENT STAKE VIA BLOCKCHAIN
20230120637 · 2023-04-20 ·

A content stake offering system is disclosed. The content stake offering system includes a content stake offering module, comprising computer-executable code stored in non volatile memory, a processor, and a plurality of computing devices. The content stake offering module, the processor, and the plurality of computing devices are configured to receive a request to sell a stake of content, determine a value of the content, generate a stake offering based on the value of the content, and update the value of the content. Determining the value of the content includes transferring data of a piece of content between the plurality of computing devices, recording a content data, which corresponds to the transferred data of the piece of content, in a database chunk, hashing the database chunk into a hashed database chunk, and appending the hashed database chunk to a block on a blockchain.

MULTI-MODEL SYSTEM FOR ELECTRONIC TRANSACTION AUTHORIZATION AND FRAUD DETECTION

A method receives an electronic image and uses the image as an input to a neural network. Based on a determination that the image represents a document, the method uses the image as an input to another neural network to identify a portion of the document containing an identifier. The method extracts the identifier by performing character recognition on the identified portion and determines whether the identifier is valid by using a validation API to determine whether the identifier is associated with a valid account at an institution. Based on a determination that the identifier is associated with a valid account, the method authorizes a transaction associated with the identifier. Based on a determination that the identifier is not associated with a valid account, the method denies the transaction. The first neural network classifies the electronic image into one of multiple valid document types and an invalid document type.

INTERACTIVE SWARMING

A method includes evaluating a transaction using a first swarm member to generate a first cooperative prediction related to the transaction. The first cooperative prediction is based, at least in part, on a first affinity value of the first swarm member to one or more other swarm members. The method also includes evaluating the transaction using a second swarm member to arrive at a second cooperative prediction related to the transaction. The second cooperative prediction is based, at least in part, on a second affinity of the second swarm member to one or more other swarm members. A swarm prediction related to the transaction is generated based on both the first cooperative prediction and the second cooperative prediction.

PSEUDONYMOUS TRANSACTIONS ON BLOCKCHAINS COMPLIANT WITH KNOW YOUR CUSTOMER REGULATIONS AND REPORTING REQUIREMENTS

A method for compliance with Know Your Customer (KYC) and other regulations includes a pseudonymous globally unique identifier stored on a blockchain that associates a pseudonymous first party address with a globally unique identifier representing the vetted identity of the owner of the address. The method also includes a trusted third party issuing a verifiable credential for a first pseudonymous party to a proposed transaction to a second pseudonymous party to the transaction.

Systems And Methods For Monitoring, Analyzing and Regulating Blockchain Transactions
20230118380 · 2023-04-20 ·

Systems and methods for generating a metric based on blockchain data for use in controlling, evaluating, or otherwise regulating a transaction. The metric may be used to control the release of assets, to trigger an event, or as a measure of the satisfaction of contractual conditions based on whether the characteristics of a transaction or of a party engaging in a transaction are associated with a score that satisfies a threshold value. In some embodiments, a state-change derived score or metric allows the creation of a layer of trust or reliability that a blockchain network can reference in situations where a greater degree of trust is desired.

FRAUD DETECTION SYSTEM, FRAUD DETECTION METHOD, AND PROGRAM
20220327186 · 2022-10-13 ·

A fraud detection system including at least one processor configured to: calculate a fraud level of a user who uses a service based on a behavior of the user; obtain a determination result as to whether the behavior is actually fraudulent and calculate accuracy of fraud detection for each user based on the fraud level and the determination result.