G06Q20/4016

Cryptocurrency transaction pattern based threat intelligence

A method for identification of malicious internet content and campaigns is provided. The method extracts a cryptocurrency indicator within a compromised data set and inserts the cryptocurrency indicator into a threat intelligence database. The method identifies a set of cryptocurrency transactions associated with the cryptocurrency indicator. From the cryptocurrency indicator and the set of cryptocurrency transactions, the method generates a transaction graph with a set of features representing the set of cryptocurrency transactions. The method modifies the threat intelligence database with at least a portion of the transaction graph.

Computer systems and software for self-executing code and distributed database
11568495 · 2023-01-31 ·

A computer-implemented method includes creating a premiums escrow, with a zero balance, for a group of policyholders and managed using a distributed ledger and self-executing agreement. At a term beginning, the self-executing agreement receives premium payments using cryptocurrency from each policyholder and allocates the premium payments to the premiums escrow. During the term the self-executing agreement receives a notification of an incident claim associated with a claimant policyholder. At a term end, the self-executing agreement receives payment instructions from the policyholders; pays, using cryptocurrency from the premiums escrow, the claimant an incident claim payment larger than the premium payment and determined according to the payment instructions; and distributes to the policyholders a rebate payment equal to or lower than the premium payment from the premiums escrow, which returns to a zero balance. The self-executing agreement stores a record of the incident claim in a tamper-proof, publicly-available, non-repudiable distributed ledger.

Native-feature silent coercion alarm

Apparatus and methods for providing protection from economic exploitation. The apparatus and methods may include a platform for tagging a social security number and/or other suitable identification number. The system may allow a person associated with a social security number to automatically flag and deny any product or service request associated with the social security number. The alarms are “silent,” because the alarm may initiate an institution internal process in which the customer interaction with the institution follows a normal diligence process until an intervention can be effectively executed on behalf of the customer. This reduces the likelihood of a reaction from the customer's associate prior to completing the diligence process. A system may provide the customer with an opportunity to electronically activate an alarm by typing keystrokes on a card reader keypad or interacting with a physical sensor on the reader, on the card, or the like.

Computer-based systems configured to detect fraudulent activities related to card-transacting devices and methods of use thereof
11568349 · 2023-01-31 ·

Systems and methods of detecting fraudulent activity including skimmers adapted to compromise transacting devices such as automated teller machines (ATMs) are disclosed. In one embodiment, an exemplary computer-implemented method may comprise determining that a subject device has a risk level higher than a risk threshold, providing a push notification to a mobile device proximal to the subject device, executing a software application executed by the mobile device for gathering information and transmitting feedback regarding the subject device, and providing an incentive, upon receipt of the feedback, to, for example, an account or device associated with an individual involved with the feedback or interaction with the device.

Methods and systems for enhancing purchase experience via audio web-recording

A computer system includes a processor programmed to process a first web page to identify a hyperlink contained thereon. The hyperlink includes a link to a second web page. The processor performs natural language processing on the first web page to determine one or more context word tokens and on the second web page to determine a context of the second web page. The processor also applies a context relevant tag to the hyperlink to generate a tagged hyperlink. The processor maps at least one of the context word tokens to the context relevant tag applied to the hyperlink and generates a transaction score for the tagged hyperlink.

Secure modal based digital installments

Examples described herein include systems, methods, instructions, and other implementations for data security with integrated installment payment systems. In one example, account security system receives a checkout communication that includes data describing a validated checkout system of a merchant system. A client token is transmitted in response to an authentication that the checkout communication is from the validated checkout system, and an account communication including the client token and secure client information is received from a client device. An installment payment communication associated with the secure transaction is received from a system other than a merchant system involved in the transaction. The secure transaction is then facilitated following receipt of the installment payment communication.

Enhanced gradient boosting tree for risk and fraud modeling
11568317 · 2023-01-31 · ·

Methods and systems are presented for generating a machine learning model using enhanced gradient boosting techniques. The machine learning model is configured to receive inputs corresponding to a set of features and to produce an output based on the inputs. The machine learning model includes multiple layers, wherein each layer includes multiple models. To generate the machine learning model, multiple models are built and trained in parallel for each layer of the machine learning model. The multiple models use different subsets of features to produce corresponding output values. After a layer in built and trained, a collective error may be determined for the layer based on the output values from the different models in the layer. An additional layer of models may be added to the machine learning model to reduce the collective error of a previous layer.

Method for issuing and transacting non-fungible tokens based on time-context data to be used for supporting transactions of historical time slots, and server using the same
11568394 · 2023-01-31 · ·

A method for issuing non-fungible tokens based on time-context data to be used for supporting transactions of historical time slots includes steps of: (a) an NFT platform server, in response to acquiring a specific intention, determining whether at least one specific issuance condition for at least one specific token corresponding to at least one specific historical time slot is satisfied; and (b) the NFT platform server, in response to determining that the specific issuance condition is satisfied, transmitting a specific transaction indicating that an issuance of the specific token is valid to at least part of nodes included in the blockchain network, to thereby update the nodes in the blockchain network and thus enable the issuance of the specific token corresponding to the specific historical time slot.

Computer-based system for determining dynamic financial transaction parameters

An example method includes receiving information related to a transaction with a financial account initiated by a customer at a financial terminal, the financial account including a transaction limit. Based on the information related to the transaction exceeding the transaction limit for the financial account, the method includes identifying a mobile device associated with the financial account and receiving location information of the mobile device via one or both of a passive location response or an active location response. Based on the location information of the mobile device, the method includes determining that the mobile device is located within a predetermined distance from a location of the financial terminal and temporarily changing the transaction limit for the financial account by a variable amount based on whether the location information of the mobile device was received via the one or both of the passive or the active location response.

DYNAMIC TRUST SCORE

Systems and methods for the calculation of a dynamic trust score are disclosed. The dynamic trust score may indicate a likelihood that the consumer will complete the transaction in a positive manner. The system may calculate the dynamic trust score based on various static and dynamic variables including digital identity data, internal data, third-party data, private data, and/or data from the transaction initiated by the consumer.