Patent classifications
G06Q20/4093
ENTITY-BASED CONTROLS FOR VALUE TRANSFER CARDS
In an aspect, a computing system is configured to: send, to a transfer rail server, a request for stored card data associated with a value transfer card; receive stored card data identifying an entity having a stored representation of the value transfer card; provide user interface data to a client device, the user interface data causing the client device to display a user interface that includes an entity listing that is based on the stored card data, the user interface including a selectable option to add an entity-based control to the identified entity; receive, from the client device, an instruction to apply an entity-based control to an identified one of the entities in the stored card data; and in response to receiving the instruction to apply the entity-based control, implement the entity-based control to affect use of the value transfer card by the identified entity and not affect use of the value transfer card by other entities.
Systems and methods for authenticated peer-to-peer data transfer using resource locators
An authenticated data transfer system may include generating, after entry of one or more processors of a transmitting device into a communication field, a link, the link comprising a near field communication data exchange format uniform resource locator including identifier data and user data; transmitting, to a first application comprising instructions for execution on a first device, the link to initiate data transfer; authenticating a user associated with the first device by activating one or more actions based on the link; transmitting one or more requests for confirmation of quantity and recipient data associated with the data transfer; receiving one or more notifications that are based on the one or more requests for confirmation of quantity and recipient data associated with the data transfer; and performing one or more login credentials that are responsive to the one or more notifications so as to complete the data transfer.
CRYPTOBIONIC SYSTEM AND ASSOCIATED DEVICES AND METHODS
Introduced here are cryptobionic implants designed for implantation within a human body that are capable of facilitating an identity authentication and/or an intent validation process. These cryptobionic implants can be designed to be cryptographically secure. For example, a cryptobionic implant may include a processor configured to encrypt data residing in an internal storage and a transponder configured to transmit the encrypted data to a reader device located outside of the human body for decryption. The reader device (or some other electronic device) may be able to verify the identity of the individual in whom the cryptobionic implant is implanted based on the decrypted data.
HIERARCHICAL BLOCKCHAIN ARCHITECTURE FOR GLOBAL TRADE MANAGEMENT
Described is a reactive hierarchical blockchain architecture, system, and methodology for Global Trade Management (GTM). The system includes a comprehensive suite of GTM applications and leverages multi-national content to deliver efficient cross-border transactions anywhere in the world. The tiered computer-implemented system and method allow development of distributed GTM blockchain solutions capable of processing enormous amounts of global content at scale to meet huge transaction volume. The hierarchical blockchain architecture further assures scalability of the GTM solutions described herein by reducing the need for performing extensive calculations on multiple blockchain nodes. The GTM blockchain systems can be standalone or they can feed information into one or more main International Trade (ITC) blockchains. Smart contracts for specific GTM operations are segregated among appropriate childchains and verified by integrated GTM applications executed on permissioned nodes.
SYSTEM AND METHOD FOR ANALYZING TRANSACTION NODES USING VISUAL ANALYTICS
An account holder's portfolio of transactions may be represented as a network of interconnected transaction nodes where each node represents a credit card transaction. This network may then be analyzed using artificial intelligence and machine learning techniques coupled with visual representations of the interrelated nodes to draw conclusions. An account holder or other system entity may report a fraudulent transaction that employs the holder's account information. A backend system may organize transaction information as a network of data nodes that includes a variety of interrelated information. The backend system may then identify all financial transaction “nodes” within the network that are related or connected by common data. For example, multiple transactions may include a common merchant as the reported fraudulent transaction. The backend may then perform an analysis of the nodes to identify likely fraudulent transactions based on one or more of the data elements for each node.
Method and system for user address validation
A system and method for validating user address information is disclosed herein. A computing system periodically polls a client device associated with a user to identify a current location of the user. The computing system records the current location of the user after polling and a time associated with the polling. The computing system receives one or more transactions from one or more third party vendors. The computing system identifies, based on the one or more transactions, a location and a time associated with each transaction in the one or more transactions. The computing system defines a geographic area. The computing system determines that a current primary address on file for the user is outside of the geographic area. The computing system prompts, based on the determining, the user to update the current primary address.
Feature drift hardened online application origination (OAO) service for fraud prevention systems
A fraud prevention system that includes a fraud prevention server including an electronic processor and a memory. The memory includes a feature drift hardened online application origination (OAO) service. When executing the feature drift hardened OAO service, the electronic processor is configured to detect, with respect to a first OAO model, feature drift in a dataset of an online application that exceeds a predefined threshold, generate one or more feature drift hardened OAO models that mitigate the feature drift, determine a fraud score of the online application based on the one or more feature drift hardened OAO models that differentiates between a behavior of a normal user and a behavior of a nefarious actor during a submission of the online application on a device and mitigates the feature drift, and control a client server to approve, hold, or deny the online application based on the fraud score.
TECHNIQUES TO PROCESS TRANSACTIONS WITH A CONTACTLESS CARD BASED ON ONE OR MORE CONFIGURATIONS OF THE CONTACTLESS CARD
Embodiments may be generally directed to techniques, systems, and devices to control settings stored on contactless cards.
SYSTEMS AND METHODS FOR AUTHENTICATED PEER-TO-PEER DATA TRANSFER USING RESOURCE LOCATORS
An authenticated data transfer system may include generating, after entry of one or more processors of a transmitting device into a communication field, a link, the link comprising a near field communication data exchange format uniform resource locator including identifier data and user data; transmitting, to a first application comprising instructions for execution on a first device, the link to initiate data transfer; authenticating a user associated with the first device by activating one or more actions based on the link; transmitting one or more requests for confirmation of quantity and recipient data associated with the data transfer; receiving one or more notifications that are based on the one or more requests for confirmation of quantity and recipient data associated with the data transfer; and performing one or more login credentials that are responsive to the one or more notifications so as to complete the data transfer.
Machine learning system for transaction reconciliation
A device may receive transaction data associated with transactions. The transaction data may be associated with transaction entries that are associated with the transactions. The device may process, using a matching model, the transaction entries to classify the transaction entries into a set of matched transaction entries and a set of unmatched transaction entries. The device may update a transaction grouping model based on the set of matched transaction entries to create an updated transaction grouping model. The device may determine, using the updated transaction grouping model, that a subset of the set of unmatched transaction entries are associated with a same transaction. The device may classify the subset of the set of unmatched transaction entries as grouped transaction entries. The device may provide an indication that the grouped transaction entries and the set of matched transaction entries are reconciled transactions.