Enhanced feedback exposure for users based on transaction metadata

    公开(公告)号:US12093949B2

    公开(公告)日:2024-09-17

    申请号:US18133236

    申请日:2023-04-11

    IPC分类号: G06Q20/40 G06Q20/38

    CPC分类号: G06Q20/40 G06Q20/389

    摘要: Methods, systems, and apparatuses are described herein for the direct sharing and use of transaction data separately from transaction authorization processes. Transaction metadata associated with a transaction may be received and validated. Authorization information corresponding to the transaction may be received. The degree to which the transaction metadata is tested may be based on a predicted time of receipt of the authorization information. The transaction metadata and authorization information may be correlated. A computing device may determine whether to authorize the financial transaction based on the authorization information and the correlated transaction metadata. All or portions of the transaction metadata may be provided to one or more users after the transaction has been authorized or denied.

    Systems and methods for secure authentication of online transactions using tokens

    公开(公告)号:US12093918B2

    公开(公告)日:2024-09-17

    申请号:US17228639

    申请日:2021-04-12

    IPC分类号: G06Q20/32 G06Q20/36 G06Q20/38

    摘要: Methods and systems are provided for secure payment using tokens. Consistent with disclosed embodiments, a token may be used to authenticate a transaction. The token may include token information configured to replace at least a portion of static information required to authenticate a transaction. A financial services system may provide the token to a digital wallet. The digital wallet may communicate the token to a payment application. A user-associated device may implement the digital wallet and a payment device may implement the payment application. The payment application may provide the token information to a merchant system. The merchant system may provide the token information to the financial services system. The financial services system may authenticate the transaction using the token information received from the merchant system. The disclosed methods may further include determining the proximity of the user-associated device and the payment device to authenticate the request for secure payment.

    Systems and methods for managing cloud environments

    公开(公告)号:US12093733B2

    公开(公告)日:2024-09-17

    申请号:US17512709

    申请日:2021-10-28

    IPC分类号: G06F9/50 G06F9/48 G06F11/14

    摘要: A system including: one or more processors; a memory storing instructions that, when executed by the one or more processors are configured to cause the system to: scan a plurality of distributed cloud servers to identify a plurality of distributed cloud applications comprising a scheduler configuration file; determine whether each identified distributed cloud application includes a standard or nonstandard environment; shutdown each distributed cloud application of having a standard environment based on a shutdown schedule; reinitialize each distributed cloud application having a standard cloud environment based on the shutdown schedule; create a restore point for each distributed application having a nonstandard environment; convert the nonstandard environments into standard environments; shut down each distributed cloud application having a nonstandard environment, reinitialize each distributed cloud application having a nonstandard environment, and restore the nonstandard cloud environment based on the created restore points.

    Machine learning model for recommending interaction parties

    公开(公告)号:US12093266B2

    公开(公告)日:2024-09-17

    申请号:US17820051

    申请日:2022-08-16

    CPC分类号: G06F16/24575 G06F16/2477

    摘要: In some implementations, a system may receive interaction data associated with interactions between a user and subsets of a plurality of interaction parties. The system may store the interaction data and the as historical interaction data associated with historical interactions of the user. The system may provide the historical interaction data as input to a machine learning model, which may be trained using supervised learning and the historical interactions of the user or historical interactions of one or more other users with one or more of the plurality of interaction parties. The system may receive an output, based on applying the machine learning model to the historical interaction data, that may indicate one or more recommended interaction parties based at least in part on one or more factors, wherein the one or more recommended parties may be local entities local to a geographic location associated with the user.

    SYSTEMS AND METHODS FOR DEVICE CASE DETECTION FOR ADAPTIVE NEAR FIELD COMMUNICATION

    公开(公告)号:US20240305964A1

    公开(公告)日:2024-09-12

    申请号:US18118680

    申请日:2023-03-07

    IPC分类号: H04W4/80 H04W12/06

    CPC分类号: H04W4/80 H04W12/06

    摘要: Example embodiments of systems and methods for adaptive near field communication include receiving, by an application comprising instructions for execution on a client device, data indicating a type of device from the client device and performing, by the application, at least one selected from the group of an explicit detection process and an implicit detection process to determine a type of case expected to house the client device. Example embodiments further provide determining, by the application, an optimal positioning of a transmitting device for near field communication with the client device based on the type of device and type of case, and displaying, by the application, an indication of an optimal positioning of the transmitting device for near field communication.

    MACHINE LEARNING TO DETECT MISCLASSIFIED ON-CHAIN ADDRESSES

    公开(公告)号:US20240305453A1

    公开(公告)日:2024-09-12

    申请号:US18180263

    申请日:2023-03-08

    摘要: A method and related system of operations that include retrieving a set of on-chain transactions of an on-chain address from a scan of on-chain transactions based on a request identifying the on-chain address and generating a sequence of embedding vectors by providing the set of on-chain transactions to a first machine learning model. The method further includes predicting a first use pattern of the on-chain address by providing the sequence of embedding vectors to a second machine learning model and determining whether the first use pattern matches with a second use pattern. The method further includes updating a record of the on-chain address in an off-chain database to indicate anomalous activity in response to a determination that the first use pattern does not match with the second use pattern.