ANALYSIS OF A TOPIC IN A COMMUNICATION RELATIVE TO A CHARACTERISTIC OF THE COMMUNICATION

    公开(公告)号:US20200251102A1

    公开(公告)日:2020-08-06

    申请号:US16711714

    申请日:2019-12-12

    摘要: A device monitors a communication between a user associated with a user device and a service representative associated with a service representative device, and causes a natural language processing model to perform a natural language processing analysis of a user input of the communication to identify a topic associated with the communication. The device determines a first score associated with the topic, and determines a second score associated with enabling the communication, where the first score and second score indicate a service performance score of an entity. The device causes a sentiment analysis model to perform a sentiment analysis of the communication to determine a sentiment score indicating a level of satisfaction the user has relative to the topic. The device updates a transaction protocol associated with the topic based on the service performance score, and/or updates a communication processing protocol associated with the communication based on the sentiment score.

    SYSTEM AND METHOD FOR BIOMETRIC HEARTRATE AUTHENTICATION

    公开(公告)号:US20200213300A1

    公开(公告)日:2020-07-02

    申请号:US16238296

    申请日:2019-01-02

    IPC分类号: H04L29/06 G06Q20/40

    摘要: A biometric heartrate authentication system and method is disclosed that leverages heartrate information collected by heartrate tracking devices to build a heartrate profile for a client. The system further leverages location information collected by existing location information services to determine an activity profile for a client. The activity profile information may be used together with the heartrate profile to generate an expected heartrate range against which a cardholder heartrate may be compared for authentication purposes. Because client heartrate characteristics are generally unique, varying according to the unique activities being performed by the client at any point in time, the system and method thus provide a low cost, non-invasive method for reliably authenticating individuals and securing against fraudulent account accesses.

    MULTI-FACTOR AUTOMATED TELLER MACHINE (ATM) PERSONAL IDENTIFICATION NUMBER(PIN)

    公开(公告)号:US20200184476A1

    公开(公告)日:2020-06-11

    申请号:US16793615

    申请日:2020-02-18

    摘要: An automated teller machine (ATM) may include an input component and one or more processors. The input component may be configured to detect multi-factor input associated with an account. The multi-factor input may include at least two of: a sequence of characters input via the input component, a force with which at least one character, of the sequence of characters, is input via the input component, a length of time over which at least one character, of the sequence of characters, is input via the input component, or a combination of at least two characters, of the sequence of characters, that are input concurrently via the input component. The ATM may receive the multi-factor input, validate the multi-factor input in association with the account, and selectively permit or deny access to one or more actions associated with the account based on validating the multi-factor input.

    METHODS AND DEVICES FOR AUTOMATIC TRANSACTION MACHINES FOR RECOGNIZING SURROUNDINGS

    公开(公告)号:US20200066111A1

    公开(公告)日:2020-02-27

    申请号:US16232665

    申请日:2018-12-26

    IPC分类号: G07F19/00 G06Q20/10

    摘要: A method for enhancing automated transaction machine (ATM) security surveillance. The method consists of receiving a set of data from a financial device and generating a template for the financial device. The method generates an analysis by analyzing a portion of the received set of data. The method then determines a likelihood factor that the analyzed first portion is associated with a security threat, wherein if the likelihood factor is above a threshold then the method generates a second analysis by analyzing a second portion of the received first set of data and revises the likelihood factor based on the second analysis. The method generates a notice if the first likelihood factor exceeds a second threshold and then updates the template with the analysis and the likelihood factor and receives a second set of data from the monitoring device. The method updates the template with the second set of data.

    GENERATING A RANDOM VERIFICATION CODE FOR A TRANSACTION

    公开(公告)号:US20190354985A1

    公开(公告)日:2019-11-21

    申请号:US15980175

    申请日:2018-05-15

    IPC分类号: G06Q20/40 G06Q20/38 G06F7/58

    摘要: A device receives, from a user device, a request to generate a verification code for a transaction associated with a user of the user device, and receives user profile information associated with a transaction card to be used for the transaction. The device generates a random verification code for the transaction based on the request and the user profile information, and authenticates the random verification code, based on the user profile information, to generate an authenticated random verification code. The device provides the authenticated random verification code to the user device, and receives transaction information, including the authenticated random verification code, from a merchant device associated with the transaction. The device validates the transaction based on the transaction information, and provides, to the merchant device associated with the transaction, information indicating that the transaction is validated.

    DETECTING MALICIOUS USERS IN A DECENTRALIZED AUTONOMOUS ORGANIZATION

    公开(公告)号:US20240250971A1

    公开(公告)日:2024-07-25

    申请号:US18159654

    申请日:2023-01-25

    IPC分类号: H04L9/40 H04L9/00

    摘要: Methods and systems disclosed herein may detect a malicious user by scanning the messaging platform with the members for any malicious content using sentiment detection. Sentiment detection may be performed using a machine learning model or another type of sentiment detection. For example, the machine learning model may detect a malicious comment and then determine whether the user is malicious using a variety of behavior patterns. For example, the machine learning model may use factors like reactions from the community, sentiment analysis, and the number of posts to determine whether the user is malicious. By doing so, the system is able to search constantly for users that may be malicious.

    STORING AND RETRIEVING DATA BASED ON EXPERIENCE IN CATEGORIES ASSOCIATED WITH HISTORICAL INTERACTIONS

    公开(公告)号:US20240232406A9

    公开(公告)日:2024-07-11

    申请号:US18049126

    申请日:2022-10-24

    IPC分类号: G06F21/62

    CPC分类号: G06F21/6218

    摘要: In some implementations, a system may receive interaction data corresponding to an interaction associated with a particular user of a plurality of users. The system may determine, based on the interaction data, one or more interaction categories associated with the interaction. The system may store the interaction data as historical interaction data associated with historical interactions of the particular user. The system may determine, based on the historical interaction data, experience statuses associated with the particular user in at least a subset of the plurality of categories. The system may receive, from a user device of the particular user, review data indicating a review associated with a historical interaction of the particular user. The system may store the review as historical review data. The review may be associated with one or more experience statuses of the particular user in the one or more interaction categories associated with the historical interaction.

    SYSTEMS AND METHODS FOR GENERATING REAL-TIME RESOURCE REDUCTION NOTIFICATIONS

    公开(公告)号:US20240202032A1

    公开(公告)日:2024-06-20

    申请号:US18068482

    申请日:2022-12-19

    摘要: Systems and methods for generating real-time resource reduction notifications are described. The system receives, for a user system, a resource consumption and a dataset during a first period of time. The system processes the dataset to determine other user systems similar to the user system. The system generates an expected resource consumption of the user system during the first period of time based on resource consumption during one or more periods of time for the similar user systems. If the resource consumption of the user system exceeds the expected resource consumption, the system determines an action to reduce resource consumption of the user system. The system receives a reduced resource consumption of the user system during a second period of time. The system generates a notification to the similar user systems indicating the executed action and an amount of reduction in resource consumption.