Patent classifications
H04L2463/102
Cognitive automation platform for dynamic unauthorized event detection and processing
Systems for using cognitive automation techniques to detect unauthorized events are provided. In some examples, a request for a product or service (e.g., event processing) may be received. The request may be received electronically, via a telephone communication, in person, or the like. The request may be analyzed (e.g., using a cognitive automation model) to determine whether it is potentially unauthorized. If so, one or more requests for additional information may be generated or identified. For instance, requests for authentication information, responses to questions or a series of questions, or the like, may be generated. In some examples, the additional information requested may be identified using the cognitive automation model. Responses to the request for additional information may be analyzed (e.g., using the cognitive automation model) to determine whether the request for the product or service is unauthorized. If so, processing the request may be prevented.
Data processing systems for fulfilling data subject access requests and related methods
Responding to a data subject access request includes receiving the request and identifying the requestor and source. In response to identifying the requestor and source, a computer processor determines whether the data subject access request is subject to fulfillment constraints, including whether the requestor or source is malicious. If so, then the computer processor denies the request or requests a processing fee prior to fulfillment. If not, then the computer processor fulfills the request.
CONTACTLESS CARD PERSONAL IDENTIFICATION SYSTEM
A dual-factor PIN based authentication system and method uses a cryptogram provided by a contactless card associated with the client in association with a PIN stored by the contactless card to authenticate the client. In some embodiments, cryptogram authentication may be preconditioned upon a PIN match determination by the contactless card. In other embodiments, the cryptogram may be formed at least in part using the personal identification number (PIN) stored on the contactless card encoded using a dynamic key stored by the contactless card and uniquely associated with the client. Authentication may be achieved by comparing the cryptogram formed using the PIN against an expected cryptogram generated an expected PIN and an expected dynamic key.
NEURAL NETWORK SYSTEMS AND METHODS FOR GENERATING DISTRIBUTED REPRESENTATIONS OF ELECTRONIC TRANSACTION INFORMATION
Computer-implemented methods and systems are provided for generating a distributed representation of electronic transaction data. Consistent with disclosed embodiments, generation may include receiving electronic transaction data including first and second entity identifiers. Generation may also include generating an output distributed representation by iteratively updating a distributed representation using the electronic transaction data. The distributed representation may include rows corresponding to first entity identifiers and rows corresponding to second entity identifiers. An iterative update may include generating a training sample and an embedding vector using the components and the distributed representation; determining, by a neural network, a predicted category from the embedding vector; and updating the distributed representation using the predicted category and the training sample. The embodiments may also include outputting the output distributed representation to determine authorization of electronic transactions. Disclosed embodiments may also receive an electronic transaction and determine whether to authorize the electronic transaction based on a distributed representation of electronic transaction data.
Processing mobile payments when disconnected from payment servers
A computer-implemented method for facilitating offline transactions includes: receiving, by a first user device, an offline payment request from a merchant payment system via a first local communications connection; providing, by the first user device, a payment approval message to the merchant payment system via the first local communications connection; providing, by the first user device, the offline transaction information to the payment server corresponding to the payment approval message to the payment server when the first user device and the payment server are connected via a network; determining, by the first user device, that an instruction to transfer the offline mode of the first user device to a second user device has been received; and disabling, by the first user device, the offline mode of the first user device.
Providing improved contact center agent assistance during a secure transaction involving an interactive voice response unit
A secure payment agent assist (“SPAA”) feature provides assistance to a contact center agent during a transaction involving sensitive information, where the sensitive information provided by the remote party is maintained in secure manner, so that the agent is not exposed to it. The agent is assisted by being provided with a pop-up window that allows the agent to invoke a “recollect” and “cancel” function during the transaction. The pop-up window also provides information to the agent making the agent aware of the progress of the transaction as the remote party interacts with an interactive voice response (“IVR”) unit. In other embodiments, a configuration parameter allows the prompts for the payment information to be provided by the agent or the IVR.
SERVICE VOUCHER PROCESSING METHOD, DEVICE, AND SYSTEM, AND STORAGE MEDIUM
A service voucher processing method, device, and system, and a storage medium are disclosed. The method includes: obtaining information about a candidate service, and loading a virtual identifier of the candidate service in a graphical interface; initiating, if a target service reserved by the reservation instruction is detected, a reservation request; obtaining a service voucher corresponding to the target service based on permission corresponding to the target service, and activating the service voucher when an instruction for using the target service is detected; performing authentication on the permission, a verification request carrying permission information, and a serial communication method being used for the verification request; and providing the permission when the authentication passes, determining that the target service is used, and cancelling the permission. The present disclosure can support, in a high-efficient and convenient manner, a user to use services such as taking a bus/metro/train or the like.
System for dynamic network authentication protocols
A system for implementing and managing network-based, variable authentication protocols receives information relating to a digital monetary transaction. Additionally, the system accesses an initial authentication protocol dataset. The system also generates a variable authentication protocol dataset. The system then communicates the variable authentication protocol dataset to the point-of-sale computer system. The system also receives, from the point-of-sale computer system, authentication tokens. Further, the system validates the authentication tokens in view of the variable authentication protocol dataset. Further still, in response to the validation of the authentication tokens, the system processes the digital monetary transaction.
SYSTEMS AND METHODS FOR EFFICIENT PROCESSING OF LARGE SCALE PROPAGATION OF RESOURCES AMONG ACCOUNTS
Accounts are grouped via database connections to form account groups that can be used to efficiently track the propagation of resources or privileges. Virtual accounts can be grouped via non-replaceable connections, where each of the virtual accounts is limited for online transactions with a predefined website without a respective account identification device for presenting account identification information to a reader of a transaction terminal for offline transactions. A primary account in a non-replaceable group of virtual accounts may include (or be linked to) resources and/or privileges that can be propagated to the secondary accounts in the non-replaceable group. The primary account may be a virtual account, or a non-virtual account.
SYSTEM AND METHOD FOR ARBITRATING ENCRYPTED ELECTRONIC TRANSACTIONS AMONG INTERMEDIARY AND AUTHORING USERS ONLY WHEN AN INTERACTION OCCURS BETWEEN AUTHORING AND CANDIDATE USERS WHO WAS EXPOSED BY THE INTERMEDIARY USER TO DATA PUBLISHED BY AUTHORING USER
System and computer-implemented method of permitting or arbitrating encrypted electronic transactions to occur among an intermediary and an author in an electronic data system only when an interaction occurs between the author and a candidate who was exposed by the intermediary to data published by the author. The author publishes criteria about a candidate, and the candidate posts information about the candidate, which is ingested and married to personally identifiable information about the candidate. A score is calculated indicating a correlation between the candidate and the published criteria, and an intermediary exposes the candidate to the criteria, which is tracked. When the candidate completes an interaction with the author, an encrypted transaction is permitted to occur between the author and the candidate through a proxy, without the author knowing the identity of the intermediary who facilitated the introduction.