Patent classifications
H04L2463/102
DATA AGGREGATION AND PROCESS AUTOMATION SYSTEMS AND METHODS
A data aggregation and process automation (DAPA) system is disclosed. The DAPA system includes an authentication module, a monitoring module, an intelligent automation module, and a transformation module. The authentication module is configured to initiate authenticated communication with a plurality of servers, and includes an authentication storage having a plurality of authentication credentials and routing information. The monitoring module is configured to monitor a first server for a first change event and monitor a second server for a second change event. The first change event results in the receipt of a first data object and the second change event results in the receipt of a second data object. The intelligent automation module is configured to identify the second server, request a service, and submit an update data object to the first server. The transformation module is configured to transform data objects from one format into another.
Adaptive policies and protections for securing financial transaction data at rest
A system, method, and computer-readable medium for challenge-response authentication are provided. A plurality of codes is received over a communication network based on input provided by way of a user interface displaying a plurality of images. An alphanumeric string is generated based on the received plurality of codes and based on a table that associates each one of the plurality of codes with a respective one of the plurality of images and with a respective one of a plurality of alphanumeric characters. A determination is made as to whether to grant authorization based on whether the generated alphanumeric string matches an alphanumeric user identifier stored in a memory device in association with a user.
TECHNIQUE FOR EFFECTIVE ORGANIZATION AND COMMUNICATION OF INFORMATION
In a communication arrangement in accordance with the invention, a server is employed to collect and organize information for mobile device users according to the user profiles, e.g., personal profile, business profile, vacation profile, etc., which reflect different user personae. By using this arrangement, the user advantageously maintains only the necessary information in the mobile device and downloads any additional information from the server on an as needed basis. In addition, the server is capable of serving mobile devices which may be incompatible to one another, thereby facilitating an exchange of information between such devices. Moreover, with the server, incoming messages for the user are organized and stored according to the source of the messages and the user criteria established in the user profiles. Further, information in a mobile device may be organized using electronic information cards, referred to as “E-cards,” which facilitate, among others, transfer of information from the mobile device to the server, or other mobile devices to conduct various commercial and data transactions.
AUTOMATIC MODEL MONITORING FOR DATA STREAMS
In an embodiment, a process for automatic model monitoring for data streams includes receiving an input dataset, using a machine learning model to determine a model score for each data record of at least a portion of the input dataset, and determining monitoring values. Each monitoring value is associated with a measure of similarity between model scores for those data records of the input dataset within a corresponding moving reference window and model scores for those data records of the input dataset within a corresponding moving target window. The process includes outputting the determined monitoring values.
Method and system for identifying users and detecting fraud by use of the internet
A method and system for detecting and preventing Internet fraud in online transactions by utilizing and analyzing a number of parameters to uniquely identify a computer user and potential fraudulent transaction through predictive modeling. The method and system uses a delta of time between the clock of the computer used by the actual fraudulent use and the potentially fraudulent user and the clock of the server computer in conjunction with personal information and/or non-personal information, preferably the Browser ID.
NEURAL NETWORK SYSTEMS AND METHODS FOR GENERATING DISTRIBUTED REPRESENTATIONS OF ELECTRONIC TRANSACTION INFORMATION
Systems and methods are provided for authorizing an electronic transaction. In one implementation at least one processor is programmed to receive electronic transaction data and historical transaction data, the electronic transaction data including an entity identifier component and an amount component of an electronic transaction; determine, based on the entity identifier component and the amount component, a location of the electronic transaction in a space of a distributed representation space, the distributed representation space comprising a mapping of electronic transaction components in a high-order space; determine locations of the historical transaction data in the distributed representation space; determine a decision boundary in the distributed representation space based on the locations of the historical transaction data; and authorize the electronic transaction based on the location of the electronic transaction being within the decision boundary.
DATA PAYMENT AND AUTHENTICATION VIA A SHARED DATA STRUCTURE
The disclosed embodiments relate generally to complex data stream control and entitlement. Specifically, the disclosed embodiments provide systems and methods for ensuring that only authenticated/verified participants receive data streams. A third party, e.g., a party other than the data provider or the data recipient, who is nevertheless associated with both the data provider and the data recipient, may be involved in controlling whether data streams from the data provider can reach the data recipient. Thus, a third party may logically sit between the data provider and the data recipient, and may decide whether the data recipient should receive data streams. The disclosed embodiments implement data generation, flow, control and permissioning between multiple entities via digital assets accessed and manipulated on a shared data structure.
SECURE AUTHENTICATION BASED ON PASSPORT DATA STORED IN A CONTACTLESS CARD
Systems, methods, articles of manufacture, and computer-readable media for secure authentication based on passport data stored in a contactless card associated with an account. An application may receive an indication to perform an operation. The application may receive encrypted data from the card. The application may receive an indication that the authentication server verified the encrypted data based on a private key. The application may receive encrypted passport data from the contactless card, the encrypted passport data for a passport associated with the account. The application may determine an attribute of the passport based at least in part on image data or text input. The application may decrypt the encrypted passport data based on the attribute of the passport. The application may initiate performance of the operation based on the received indication specifying that the authentication server verified the encrypted data and the decryption of the encrypted passport data.
Payment system using customer's fingerprints
Shoppers install a software app on a mobile device and create a user profile. The shopper scans a fingerprint using a fingerprint sensor. Scanned fingerprint data is wirelessly transmitted to the shopper's mobile device for re-transmission over the Internet for storage in a secured server. The shopper can add payment methods (credit cards, debit cards, etc.) to the user's profile. Participating merchants registered with the payment system provide a fingerprint sensor at the point of sale. A shopper transacts purchases at a merchant's location by placing a finger on the fingerprint sensor. Scanned fingerprint data is transmitted to a merchant point of sale device and re-transmitted over the Internet to confirm the identity of the shopper, and to complete the transaction. A shopper makes purchases online using the installed software app. Participating merchants integrate APIs with existing e-commerce platforms, allowing merchants to charge and/or request access to user payment accounts.
Magnetic stripe attachment and application for mobile electronic devices
A mobile electronic device such as a mobile phone includes wallet application software for receiving, storing, encrypting, and transmitting selected payment card data. A tab including a programmable magnetic stripe is associated with a controller for receiving transmitted payment card data and programming the stripe with selected data. The tab is mounted directly to the electronic device or to an attachment device removably coupled to the electronic device. The attachment device may comprise a case for the mobile electronic device that allows access to a user interface and display of the mobile electronic device.