Distributed quantum encrypted pattern generation and scoring
First Claim
8. A computer-implemented method for processing a current transaction, the computer-implemented method comprising:
- receiving information associated with the current transaction;
generating features for a first set of keys associated with the current transaction;
clustering the features into a first set of secondary keys;
comparing the first set of keys to a second set of keys, wherein the second set of keys are associated with at least one previous transaction;
comparing the first set of secondary keys and a second set of secondary keys, wherein the second set of secondary keys is associated with the at least one previous transaction;
determining whether there are differences between the first set of keys and the second set of keys;
determining whether there are differences between the first set of secondary keys and the second set of secondary keys;
encrypting the differences between the first set of keys and the second set of keys when it is determined that there are differences between the first set of keys and the second set of keys; and
encrypting the differences between the first set of secondary keys and the second set of secondary keys when it is determined that there are differences between the first set of secondary keys and the second set of secondary keys.
1 Assignment
0 Petitions
Accused Products
Abstract
Transaction scoring is performed in a distributed manner across a client-server computing system. A computing system for processing a transaction includes a server system and a client system. The server system is arranged to process information associated with the transaction, while the client system communicates with the server system and includes a key engine which is arranged to generate keys. The client system and the server system are arranged to cooperate to assess risk associated with the transaction. The client is arranged to send the keys generated by the key engine as a transaction to the server system.
156 Citations
23 Claims
-
8. A computer-implemented method for processing a current transaction, the computer-implemented method comprising:
-
receiving information associated with the current transaction;
generating features for a first set of keys associated with the current transaction;
clustering the features into a first set of secondary keys;
comparing the first set of keys to a second set of keys, wherein the second set of keys are associated with at least one previous transaction;
comparing the first set of secondary keys and a second set of secondary keys, wherein the second set of secondary keys is associated with the at least one previous transaction;
determining whether there are differences between the first set of keys and the second set of keys;
determining whether there are differences between the first set of secondary keys and the second set of secondary keys;
encrypting the differences between the first set of keys and the second set of keys when it is determined that there are differences between the first set of keys and the second set of keys; and
encrypting the differences between the first set of secondary keys and the second set of secondary keys when it is determined that there are differences between the first set of secondary keys and the second set of secondary keys. - View Dependent Claims (1, 2, 3, 4, 5, 6, 7, 9, 10, 11, 12, 13, 14, 15, 16, 18, 19, 20, 21, 22)
-
-
17. A computer-implemented method for handling a local transaction, the computer-implemented method comprising:
-
receiving a local transaction from a source;
encrypting at least a portion of the local transaction into at least one local transaction key;
producing at least one enhanced key using the at least one local transaction key;
determining when the at least one enhanced key is a new key;
sending the at least one enhanced key to the source when it is determined that the at least one enhanced key is the new key; and
processing the local transaction with the at least one enhanced key using the source, wherein processing the local transaction with the at least one enhanced key include applying a measure of transaction risk.
-
-
22-1. A computer-implemented method as recited in claim 17 further including:
sending the transaction to the source along with the at least one enhanced key.
-
23. A computer-implemented method for handling a current transaction within a client-server system, the client-server system including a client computing system and a server computing system, the computer-implemented method comprising:
-
receiving information associated with the current transaction on the client computing system;
producing enhanced keys from the information associated with the current transaction using the client computing system;
sending the enhanced keys from the client computing system to the server computing system;
generating features for keys associated with the current transaction using the server computing system;
generating secondary keys associated with the features for keys associated with the current transaction using the server computing system;
determining whether the keys associated with the current transaction and the secondary keys associated with the features for keys associated with the current transaction differ from the keys and the secondary keys associated with a past transaction using the server computing system; and
modifying a key database based upon the determination of whether the keys associated with the current transaction and the secondary keys associated with the features for keys associated with the current transaction differ from the keys and the secondary keys associated with the past transaction.
-
Specification