Abstract:
Methods and systems are presented for dynamically modifying electronic content presented on a user device by third-party content providers based on goals associated with one or more entities. A content modification system may receive inputs related to goals for a user. The content modification system may synthesize the goals associated with the user. When the user uses a user device to request content from a third-party server, the content modification system may obtain the content and extract items included within the content. The content modification system may modify the content based on the synthesized goals, such as re-arranging the items, highlighting some of the items, or adding and/or removing items. The content modification system may cause the user device to present the modified content.
Abstract:
There are provided systems and methods for initiating a device security setting on detection of conditions indicating a fraudulent capture of a machine-readable code. A service provider, such as an electronic transaction processor for digital transactions, may provide in-person or device-to-device data transfers through machine-readable codes, such as to effectuate a payment from one mobile device to another. However, unauthorized devices may be in close enough proximity to also capture the code and impermissibly use the code. Thus, device security settings are used to detect whether fraud may occur in certain settings and implement an operation to hide a valid code. This may include operations to obtain information for the unauthorized device, make the code dynamic, or mask the code in a display. Once a nearby valid scanner is detected, such as through emitted light or sound, the valid code may be displayed.
Abstract:
There are provided systems and methods for predictive analysis of computing patterns for preloaded data to reduce processing downtime. A user may utilize a computing device to interact with a service provider over a network connection, for example, to utilize one or more services or processes of the service provider. Based on the user's actions and/or historical data for the user, the service provider may determine potentially required data and/or processes of the user. The service provider may preload the data or processes, for example, by storing data to the communication device's cache or by executing some of the processes. The service provider may preload data to the communication device while the communication device has available bandwidth or network connectivity so that the data is available in an offline environment. Processes may be executed before requirement by the user during times of low processing load.