CAPTURING DATA FROM REQUESTS TRANSMITTED ON WEBSITES

    公开(公告)号:US20230140637A1

    公开(公告)日:2023-05-04

    申请号:US17518165

    申请日:2021-11-03

    摘要: The method, system, and non-transitory computer-readable medium embodiments described herein capture request data from requests transmitted on websites. In various embodiments, a server receives an HTML file including content of a first website from a web-component configured to extract the content of the first website. The content includes information about a search that was executed on the first website and returned a set of items. The server generates a profile of the user based on the information about the search in the HTML file and identifies a new item that corresponds to the profile. The server further detects authentication details of the user on a second website based on the user identifier and causes display of item data of the new item and the set of items on the second web site in response to detecting the authentication details of the user.

    DETECTION OF A THREAT IN A PHYSICAL ENVIRONMENT

    公开(公告)号:US20230136846A1

    公开(公告)日:2023-05-04

    申请号:US17453409

    申请日:2021-11-03

    摘要: A user device may obtain sensor data related to a physical environment. The user device may process the sensor data to determine that a potential threat exists in the physical environment and a threat score associated with the potential threat. The user device may determine that the threat score satisfies a threat score threshold. The user device may obtain, based on determining that the threat score satisfies the threat score threshold, additional information related to the physical environment. The user device may generate, based on the additional information related to the physical environment and at least one of the sensor data, information indicating the potential threat in the physical environment, or the threat score associated with the potential threat, threat determination information associated with the physical environment. The user device may perform, based on the threat determination information associated with the physical environment, one or more actions.

    CONTACTLESS CARD PERSONAL IDENTIFICATION SYSTEM

    公开(公告)号:US20230135815A1

    公开(公告)日:2023-05-04

    申请号:US18082890

    申请日:2022-12-16

    IPC分类号: G07F7/10 G06K19/077 G06K19/07

    摘要: A dual-factor PIN based authentication system and method uses a cryptogram provided by a contactless card associated with the client in association with a PIN stored by the contactless card to authenticate the client. In some embodiments, cryptogram authentication may be preconditioned upon a PIN match determination by the contactless card. In other embodiments, the cryptogram may be formed at least in part using the personal identification number (PIN) stored on the contactless card encoded using a dynamic key stored by the contactless card and uniquely associated with the client. Authentication may be achieved by comparing the cryptogram formed using the PIN against an expected cryptogram generated an expected PIN and an expected dynamic key.

    SYSTEMS AND METHODS FOR USER AUTHENTICATION TO VERIFY TRANSACTION LEGITIMACY

    公开(公告)号:US20230135488A1

    公开(公告)日:2023-05-04

    申请号:US17515260

    申请日:2021-10-29

    IPC分类号: G06Q20/40 G06Q20/32 G06Q20/20

    摘要: The disclosed technology relates to improved user authentication to verify transaction legitimacy. An exemplary system may send a request for a current image to a mobile device associated with a user. The request may include an indication of a requested action to be performed by the user. The system may classify an action depicted in the current image obtained in response to the request. A determination may be made as to whether the depicted action corresponds to the requested action based on the classification. When it does correspond, the system may compare facial feature(s) recognized in obtained past image(s) associated with the user to a facial feature(s) recognized in the current image to determine when the user is depicted in both the past image(s) and the current image. When the user is depicted in both the past image(s) and the current image, the system may allow the transaction to proceed.

    AUTOMATIC GENERATION OF A CONTEXTUAL MEETING SUMMARY

    公开(公告)号:US20230135071A1

    公开(公告)日:2023-05-04

    申请号:US17517644

    申请日:2021-11-02

    摘要: Systems and methods are disclosed herein for building contextual transcripts. A computing system may receive a textual transcript of a meeting that contains a variety of statements made by various attendees of the meeting, select the first statement made during the meeting, and determine which meeting attendee made the statement. A machine learning model corresponding to the particular attendee that has been trained using previously received statements by the particular attendee may be used on the utterance to determine the tone of the utterance. That tone may be recorded within the transcript and this process may be repeated for each utterance to build a contextual transcript.

    EXCLUDING TRANSACTIONS FROM RELATED USERS IN TRANSACTION BASED AUTHENTICATION

    公开(公告)号:US20230133070A1

    公开(公告)日:2023-05-04

    申请号:US17513411

    申请日:2021-10-28

    IPC分类号: G06Q20/40 G06N20/00

    摘要: Methods, systems, and apparatuses are described herein for improving computer authentication processes through excluding transactions from related users in transaction-based authentication. A computing device may receive a request for access to an account from a first user. The computing device may provide account data to a machine learning model. The computing device may receive data indicating a relatedness between the users from the machine learning model. The computing device may generate a modified set of false merchant choices for the first user by excluding merchants with which one or more users related to the first user has conducted a transaction within a predetermined time period. An authentication question may be generated, and access to the account may be provided based on a response to the authentication question.

    Smart card with sensors for detecting environmental conditions

    公开(公告)号:US11640510B2

    公开(公告)日:2023-05-02

    申请号:US17679599

    申请日:2022-02-24

    IPC分类号: G06K19/07 G06Q20/34

    摘要: In some embodiments, a smart card may include a substrate with a first side and a second side. A first protective layer covers the first side and a second protective layer covers the second side of the substrate. Circuitry held in the substrate includes electronic interconnects for interconnecting circuitry elements. The circuitry elements include a processor, power circuitry for powering the circuitry elements, and an environmental detection sensor for respectively detecting a predetermined environmental parameter. The processor is configured to receive an output from the environmental detection sensor, to determine from the output that the environmental detection sensor detected an environmental alert trigger condition, and to generate an alert that is representative of the environmental alert trigger condition. The protective layers include pores in a region proximate to the environmental detection sensor for exposing the environmental detection sensor to an environment around the smart card.

    REMEDIATION ACTION SYSTEM
    10.
    发明申请

    公开(公告)号:US20230126147A1

    公开(公告)日:2023-04-27

    申请号:US17509483

    申请日:2021-10-25

    摘要: Aspects described herein may use machine learning models to predict one or more remediation actions to mitigate reoccurrence of an incident that has become restored based upon previous incidents of an entity. Historical incident data is compiled into two incident datasets: one representative of incidents that were assigned a remediation action to mitigate reoccurrence of the incident, and a second representative of incidents that were not assigned a remediation action. A machine learning model matches relationships between data in the two datasets and outputs scores representative of similarities. Based on the scores, one or more remediation actions are mapped to an incident in the second dataset and the remediation action is performed for the incident.