Methods and processes for utilizing information collected for enhanced verification

    公开(公告)号:US12041043B2

    公开(公告)日:2024-07-16

    申请号:US18311092

    申请日:2023-05-02

    Abstract: A system for verifying a user identity. The system comprises one or more memory devices storing instructions and one or more processors configured to execute the instructions. The processors are configured to receive information associated with an account of a user. The processors are further configured to generate a first profile, where the first profile being related to the user. The processors also receive an indication that the account is accessed by an accessor through an accessor device; and receive, from the accessor device, identity data comprising a plurality of data subsets associated with the accessor. The processors are configured to store the data subsets in respective clusters. The processors are further configured generate cluster analyses by analyzing the data subsets in respective clusters; and output the cluster analyses to node instances that weighs the cluster analyses outputs. The processors also generate a second profile, the second profile related to the accessor and being based on the received identity data and weighted cluster analysis. And the processors are configured to determine a likelihood factor that the accessor is the user based on a comparison of the first profile and the second profile.

    Methods and processes for utilizing information collected for enhanced verification

    公开(公告)号:US11665149B2

    公开(公告)日:2023-05-30

    申请号:US17332266

    申请日:2021-05-27

    Abstract: A system for verifying a user identity. The system comprises one or more memory devices storing instructions and one or more processors configured to execute the instructions. The processors are configured to receive information associated with an account of a user. The processors are further configured to generate a first profile, where the first profile being related to the user. The processors also receives an indication that the account is accessed by an accessor through an accessor device; and receive, from the accessor device, identity data comprising a plurality of data subsets associated with the accessor. The processors are configured to store the data subsets in respective clusters. The processors are further configured generate cluster analyses by analyzing the data subsets in respective clusters; and output the cluster analyses to node instances that weighs the cluster analyses outputs. The processors also generate a second profile, the second profile related to the accessor and being based on the received identity data and weighted cluster analysis. And the processors are configured to determine a likelihood factor that the accessor is the user based on a comparison of the first profile and the second profile.

    Dynamic re-configuration of a user interface based on location information

    公开(公告)号:US10701529B2

    公开(公告)日:2020-06-30

    申请号:US16564606

    申请日:2019-09-09

    Abstract: A device may receive location information that identifies a location of a user device associated with an individual. The location information may be received from the user device. The device may determine a distance between the location of the user device and each of a set of third party locations of a set of third parties using a digital map after receiving the location information. The device may provide a set of instructions to configure a user interface of an application associated with the user device to display messages of an electronic messaging account associated with the set of third parties after determining the distance between the location of the user device and each of the set of third party locations.

    Methods and processes for utilizing information collected for enhanced verification

    公开(公告)号:US10257181B1

    公开(公告)日:2019-04-09

    申请号:US15972697

    申请日:2018-05-07

    Abstract: A system for verifying a user identity is disclosed. The system is configured to generate a first profile related to the user and receive an indication that the account is accessed by an accessor through an accessor device. The system receives, from the accessor device, identity data associated with the accessor. The system is configured to store the identity data subsets in clusters, analyze the clusters, and output the cluster analyses to node instances that weighs the cluster analyses outputs. The system also generates a second profile related to the accessor based on the received identity data and weighted cluster analysis. The system determines a likelihood factor that the accessor is the user based on a comparison of the first profile and the second profile.

    Processing messages for value extraction

    公开(公告)号:US12154076B2

    公开(公告)日:2024-11-26

    申请号:US18145091

    申请日:2022-12-22

    Abstract: A device may receive access information that permits access to messages associated with an electronic messaging account. The device may process the messages associated with the electronic messaging account to identify one or more of the messages that include at least one coupon after receiving the access information. The one or more of the messages may be identified using at least two of an image processing technique, a text processing technique, or a code processing technique. The device may store information identifying the one or more of the messages that include the at least one coupon after processing the messages. The device may perform one or more actions to facilitate use of the at least one coupon in association with completing a transaction.

    Methods and processes for utilizing information collected for enhanced verification

    公开(公告)号:US11038865B2

    公开(公告)日:2021-06-15

    申请号:US15930149

    申请日:2020-05-12

    Abstract: A system for verifying a user identity. The system comprises one or more memory devices storing instructions and one or more processors configured to execute the instructions. The processors are configured to receive information associated with an account of a user. The processors are further configured to generate a first profile, where the first profile being related to the user. The processors also receives an indication that the account is accessed by an accessor through an accessor device; and receive, from the accessor device, identity data comprising a plurality of data subsets associated with the accessor. The processors are configured to store the data subsets in respective clusters. The processors are further configured generate cluster analyses by analyzing the data subsets in respective clusters; and output the cluster analyses to node instances that weighs the cluster analyses outputs. The processors also generate a second profile, the second profile related to the accessor and being based on the received identity data and weighted cluster analysis. And the processors are configured to determine a likelihood factor that the accessor is the user based on a comparison of the first profile and the second profile.

Patent Agency Ranking